CN103986712B - A kind of data processing method of voice call - Google Patents
A kind of data processing method of voice call Download PDFInfo
- Publication number
- CN103986712B CN103986712B CN201410208664.7A CN201410208664A CN103986712B CN 103986712 B CN103986712 B CN 103986712B CN 201410208664 A CN201410208664 A CN 201410208664A CN 103986712 B CN103986712 B CN 103986712B
- Authority
- CN
- China
- Prior art keywords
- authorization code
- user
- call
- terminal
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title abstract description 9
- 238000004891 communication Methods 0.000 claims abstract description 321
- 238000013475 authorization Methods 0.000 claims abstract description 298
- 238000012790 confirmation Methods 0.000 claims description 94
- 238000000034 method Methods 0.000 claims description 65
- 238000012545 processing Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 description 28
- 230000006870 function Effects 0.000 description 19
- 230000005540 biological transmission Effects 0.000 description 15
- 238000004422 calculation algorithm Methods 0.000 description 15
- 238000012544 monitoring process Methods 0.000 description 13
- 238000006243 chemical reaction Methods 0.000 description 11
- 238000012795 verification Methods 0.000 description 8
- 238000009795 derivation Methods 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 239000004984 smart glass Substances 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
Landscapes
- Telephone Function (AREA)
Abstract
The present invention provides data processing method in a kind of voice call, including:First safety chip of the first safety means generates the first negotiation information, and receives the second negotiation information that the first call terminal is sent;First safety chip is calculated the first negotiation information and the second negotiation information, obtains the first call key;First safety means export the first authorization code;First safety chip by the first communication interface after the second encryption data is received, the second encryption data is decrypted using the first call key, the second ciphertext data is obtained, the user that the second encryption data includes the second call terminal that the second safety means obtain reads aloud result to authorization code;First safety means play the second ciphertext data, and prompt whether unanimously to confirm the authorization code in the second ciphertext data and the first authorization code, and read aloud whether the sound characteristic of authorization code is unanimously confirmed with the sound characteristic of the user of the second call terminal in the second ciphertext data.
Description
Technical Field
The invention relates to the technical field of electronics, in particular to a data processing method for voice communication.
Background
In the prior art, the voice call between users has the possibility of being monitored, so that the current voice call has a safety risk. Aiming at the security risk, the mode adopted in the prior art is to encrypt the voice through a call key stored in a TF card on the mobile phone, so as to realize the protection of the voice call. However, in practical application, if malicious software is installed in the call terminal, a hacker can steal the call key in the TF card by means of the malicious software, and further crack the encrypted voice information, which causes a risk of voice data leakage of the call terminal, so how to safely perform voice encryption operation is an urgent technical problem to be solved; in addition, in the prior art, there is a possibility that a voice call is intercepted, so that it is also an urgent technical problem to reduce the possibility that a voice call is intercepted.
Disclosure of Invention
The present invention provides a data processing method for voice communication, and mainly aims to solve one of the above technical problems.
The invention provides a data processing method in voice communication, which comprises the following steps: a first security chip of first security equipment generates first negotiation information, and the first negotiation information is sent to a first call terminal through a first communication interface of the first security equipment; the first safety equipment is connected with the first call terminal and is independent of the first call terminal; the first security chip receives second negotiation information sent by the first call terminal through the first communication interface, wherein the second negotiation information is generated by second security equipment of the second call terminal; the first security chip calculates the first negotiation information and the second negotiation information to obtain a first call key, and the first call key is used for encrypting and decrypting voice calls of a user of the first call terminal; the first security device outputs a first authorization code, wherein the first authorization code is generated by the first security chip according to the first call key; after receiving the second encrypted data through the first communication interface, the first security chip decrypts the second encrypted data by using the first communication key to obtain second decrypted data, wherein the second encrypted data comprises a reading result of the user of the second communication terminal to the authorization code, which is obtained by the second security device; and the first safety device plays the second decrypted data and prompts to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code or not and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal or not.
Further, the first security device outputs a first authorization code, including: A. the first security device converts the first authorization code into sound information to obtain the sound information of the first authorization code, and plays the sound information of the first authorization code; or B, the first security device displays the first authorization code.
In addition, the method further comprises: the first security device prompts the first authorization code to be read aloud; the first security chip obtains a reading result of a user of the first communication terminal on the first authorization code to obtain first sound information; the first security chip encrypts the first sound information by using the first call key to obtain first encrypted data, and sends the first encrypted data through the first communication interface.
In addition, the method further comprises: and if the first security chip detects that the voice call of the user of the first call terminal is ended, the first security chip deletes the first call key.
In addition, the obtaining, by the first security chip, a reading result of the first authorization code by the user of the first communication terminal, and the obtaining of the first sound information includes: A. the method comprises the steps that a first security chip obtains a reading result of a user of a first call terminal on a first authorization code, wherein the reading result is collected by a voice collecting unit of first security equipment, and first sound information is obtained; or B, the first security chip receives a reading result of the first authorization code, collected by the first call terminal, of the user of the first call terminal through the first communication interface, and first sound information is obtained.
In addition, the method further comprises: after prompting to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, if the first security chip receives a first confirmation instruction, the first security chip starts to utilize the first communication key to carry out encryption and decryption operation on the voice communication of the user of the first communication terminal; or after the voice call of the user of the first call terminal is encrypted and decrypted by the first call key,
if the first security chip receives the first confirmation instruction, the first security chip continues to perform encryption and decryption operations on the voice call of the user of the first call terminal by using the first call key; the first confirmation instruction is an instruction for confirming that the authorization code in the second decrypted data is consistent with the first authorization code, and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal.
Furthermore, the first confirmation instruction is generated by a confirmation key of the first security device; or, generated by the first telephony terminal.
In addition, the length of the first authorization code is smaller than that of the first call key.
In addition, the first authorization code is used to uniquely identify the first session key.
Compared with the mode that the call key is generated on the TF card in the prior art, the method provided by the embodiment of the invention reduces the possibility of being attacked by malicious software on the first call terminal in the voice encryption process by generating the first call key on the first safety equipment independent of the first call terminal; the first security chip in the first security device generates the first security key, and based on the high security of the first security chip, the possibility that the first call key is stolen is reduced, and the security of voice encryption is ensured; in addition, when voice encryption is performed, the first session key is used for encryption in the first security chip, so that the first session key is called in a secure environment, and the secure use of the first session key is ensured.
In the process of voice encryption communication, the first safety device plays the second decryption data from the second communication terminal to prompt and determine whether the authorization code in the second decryption data is consistent with the locally generated first authorization code, and determining whether or not the sound characteristic of the second decrypted data is identical to the sound characteristic of the user of the second communication terminal, and thereby, the content and the sound characteristic of the first authorization code in the second decrypted data are respectively verified to realize the confirmation of the identity information of the second communication terminal, so that the user can determine whether the call is monitored, the success rate of identifying the third person in the voice call is improved, thereby reducing the possibility of monitoring the voice call, and when the user determines that the voice call has third person monitoring, the user can adopt a security measure for preventing monitoring in time to prevent information leakage, and the security of data transmission in voice communication is improved.
Furthermore, second decrypted data from the second call terminal is played on the first safety device, attack of malicious software on the first call terminal is reduced, and voice call safety is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic flowchart illustrating a data processing method for voice call according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another data processing method for voice call according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a data processing method for voice call according to an embodiment of the present invention. The embodiment of the method shown in fig. 1 comprises:
step 01, the first security device and the second security device respectively generate negotiation information and send:
step 011, a first security chip of a first security device generates first negotiation information, and sends the first negotiation information to a first call terminal through a first communication interface of the first security device, wherein the first negotiation information includes parameter information for generating a first call key, the first call key is used for encrypting and decrypting a voice call of a user of the first call terminal, and the first security device is connected with the first call terminal and is independent of the first call terminal;
the first safety device can be wearable devices such as smart glasses, smart watches and earphone devices, or can be integrated in the wearable devices; of course, the first security device may also be an intelligent Key device capable of communicating with the call terminal, such as an intelligent Key device USB Key with a USB interface, an intelligent Key device supporting an audio interface, an intelligent Key device with a bluetooth communication function, or integrated in an intelligent Key device capable of communicating with the call terminal. That is, the first security device is a separate device from the first telephony terminal and is not integrated with the first telephony terminal.
The first communication interface may be a wireless connection interface or a wired connection interface. If the first communication interface is a wireless connection interface, a wireless communication module, which can be a Wi-Fi module, a Wi-FiDirect module, an NFC module, a Bluetooth module or an infrared module, is arranged in the first safety device, for example, the first safety device is a Bluetooth headset; if the first communication interface is a wired connection interface, the first safety device may have a data transmission line, and an interface of the data transmission line may be an audio interface or a USB interface, for example, the first safety device is a line control earphone. Of course, the first safety device may also have two functions of wireless connection and wired connection, that is, the first safety device has a wireless communication module inside and a data transmission line outside.
If the first safety equipment is internally provided with the wireless communication module, the first safety equipment can be connected with the first call terminal through wireless connection; if the first communication interface is a wired connection interface, the first safety device can be connected with the first call terminal through wired connection.
The first communication terminal is a terminal with voice communication capability, and may be a traditional communication device, such as a fixed phone and a mobile phone, or a terminal with a network telephone function, such as a PC, a notebook computer, a tablet computer, and the like.
Compared with the prior art in which the first session terminal performs key negotiation, the first negotiation information is generated by the first security chip in the first security device, and the negotiation is completed by the first security device independent of the first session terminal, so that the possibility that the key negotiation operation is attacked by malicious software in the first session terminal is reduced, and the generation of the first negotiation information by the first security chip in the first security device is safer and more reliable.
After generating the first negotiation information, the first security chip sends the first negotiation information to the first call terminal through the first communication interface, and the first call terminal sends the first negotiation information to the second call terminal through the communication network.
Step 012, a second security chip of the second security device generates second negotiation information, and sends the second negotiation information to the second communication terminal through a second communication interface of the second security device, where the second negotiation information includes parameter information used to generate a second communication key, the second communication key is used to encrypt and decrypt a voice call of a user of the second communication terminal, and the second security device is connected to the second communication terminal and is independent of the second communication terminal;
and after generating second negotiation information, the second security chip sends the second negotiation information to the second communication terminal through the second communication interface, and the second communication terminal sends the second negotiation information to the first communication terminal through the communication network.
The second security device may be a wearable device such as smart glasses, a smart watch, or an earphone device, or may be integrated in the wearable device. I.e. the second security device is a separate device from the second telephony terminal and is not integrated in the second telephony terminal.
The second communication interface may be a wireless connection interface or a wired connection interface. If the second communication interface is a wireless connection interface, a wireless communication module, which can be a Wi-Fi module, a Wi-FiDirect module, an NFC module, a Bluetooth module or an infrared module, is arranged in the second safety device, for example, the second safety device is a Bluetooth headset; if the second communication interface is a wired connection interface, the second safety device may have a data transmission line, and an interface of the data transmission line may be an audio interface or a USB interface, for example, the second safety device is a line control earphone. Of course, the second safety device may also have two functions of wireless connection and wired connection, that is, the second safety device has a wireless communication module therein and is externally connected with a data transmission line.
If the second safety equipment is internally provided with a wireless communication module, the second safety equipment can be connected with a second communication terminal through wireless connection; if the second communication interface is a wired connection interface, the second security device may be connected to the second communication terminal through a wired connection.
The second communication terminal is a terminal with voice communication capability, and may be a traditional communication device, such as a fixed phone and a mobile phone, or a terminal with a network telephone function, such as a PC, a notebook computer, a tablet computer, and the like.
Compared with the prior art in which the second security chip in the second security device performs key negotiation, the second security device independent of the second communication terminal is used to complete the negotiation, so that the possibility that the key negotiation operation is attacked by malicious software in the second communication terminal is reduced, and the second negotiation information generated by the second security chip in the second security device is safer and more reliable.
Step 011 and step 012 have no obvious sequence, and can be executed simultaneously or sequentially.
Step 02: the first security chip and the second security chip both receive negotiation information and generate a call key:
step 021, the first security chip receives second negotiation information sent by the first call terminal through the first communication interface, and calculates the first negotiation information and the second negotiation information to obtain a first call key;
and the second negotiation information is sent to the first safety chip by the first communication interface after the first conversation terminal receives the second negotiation information sent by the second conversation terminal.
022, the second security chip receives first negotiation information sent by the second communication terminal through the second communication interface, and calculates the first negotiation information and the second negotiation information to obtain a second communication key;
and the first negotiation information is sent to the second security chip by the second communication interface after the second communication terminal receives the first negotiation information sent by the first communication terminal.
The operation of sending the first negotiation information in step 011 and the operation of receiving the second negotiation information in step 021 have no obvious precedence relationship in the execution sequence, and can be executed simultaneously or sequentially according to the sequence. Similarly, the operation of sending the second negotiation information in step 012 and the operation of receiving the first negotiation information in step 022 have no obvious precedence relationship in the execution sequence, and may be executed simultaneously or sequentially according to the sequence.
The specific content of the parameter information in the first negotiation information and the second negotiation information may be set by referring to a key negotiation algorithm in the prior art, for example, a key negotiation algorithm ztrp.
The calculation of the first session key and the second session key may be obtained by referring to the calculation manner of the key agreement algorithm in the prior art, for example, ZRTP. The first session key can be stored in the first security chip to ensure the storage security of the first session key; similarly, the second communication key may be stored in the second security chip to ensure the storage security of the second communication key.
And on the premise that the first communication terminal and the second communication terminal do not have the third person monitoring function, the first communication key and the second communication key are the same. On the contrary, when the third person monitors the first call terminal and the second call terminal, the first call key used by the user of the first call terminal is different from the second call key used by the user of the second call terminal. The first and second session keys are different because: the first conversation key is obtained by the negotiation between the first conversation terminal and the conversation terminal of the third person, and the second conversation key is obtained by the negotiation between the second conversation terminal and the conversation terminal of the third person and is not obtained by the direct negotiation between the first conversation terminal and the second conversation terminal.
Step 021 and step 022 have no obvious sequence, and can be executed simultaneously or sequentially according to the sequence.
Step 03: the first security device and the second security device both output authorization codes and send:
step 031, the first security device outputs a first authorization code, wherein the first authorization code is generated by the first security chip according to the first session key, and prompts reading of the first authorization code; the first security chip obtains a reading result of a user of the first communication terminal on the first authorization code to obtain first sound information; the first security chip encrypts the first sound information by using the first call key to obtain first encrypted data, and sends the first encrypted data through the first communication interface;
after the first security chip sends the first encrypted data through the first communication interface, the first communication terminal receives the first encrypted data through the first communication interface and sends the first encrypted data to the second communication terminal through the communication network.
Step 032, the second security device outputs a second authorization code, where the second authorization code is generated by the second security chip according to the second communication key; prompting to read the second authorization code; the second security chip obtains a reading result of a user of the second communication terminal on the second authorization code to obtain second sound information; and the second security chip encrypts the second sound information by using the second communication key to obtain second encrypted data, and sends the second encrypted data through the second communication interface.
After the second security chip sends the second encrypted data through the second communication interface, the second communication terminal receives the second encrypted data through the second communication interface and sends the second encrypted data to the first communication terminal through the communication network.
Here, the implementation of step 031 is taken as an example to explain:
for the first session key, after the first security chip in the first security device obtains the first session key, the first session key may be used to ensure the security of the voice session between the first security device and the second security device, which is equivalent to establishing a voice encryption channel between the first security device and the second security device based on the voice session in the prior art.
The voice encryption channel provided by the invention is a channel established between the first security device and the second security device, namely for the first security device, the voice encryption channel sequentially passes through the first security device, the first communication device, the second communication device and the second security device. Therefore, the voice encryption channel is established between the safety devices, so that the first communication terminal and the second communication terminal play a role in data transmission in the whole process from the establishment of the communication to the termination of the communication, the possibility of malicious software attack on the communication terminals is reduced, and the safety of data transmission is improved.
Wherein, first security equipment output first authorization code includes: A. the first security device converts the first authorization code into sound information to obtain the sound information of the first authorization code, and plays the sound information of the first authorization code; or B, the first security device displays the first authorization code.
Specifically, the output mode of the first authorization code may be played by a playing unit of the first security device, for example, a speaker or a loudspeaker, or displayed by a display unit of the first security device. Specifically, the method comprises the following steps:
in a first mode, the first security chip sends the digital signal of the first authorization code to the voice conversion unit of the first security device, the voice conversion unit converts the digital signal of the first authorization code into sound information to obtain sound information of the first authorization code, and sends the sound information of the first authorization code to the playing unit of the first security device, and the playing unit plays the sound information of the first authorization code.
In the first mode, the information of the first authorization code is converted to obtain the sound information of the first authorization code, and the purpose of outputting the first authorization code is achieved by playing the sound information of the first authorization code.
In a second mode, the first security chip sends the digital signal of the first authorization code to the display unit of the first security device, and the display unit displays the first authorization code.
In the second mode, the purpose of outputting the first authorization code is achieved by displaying the first authorization code.
The information for prompting to read the information of the first authorization code may be output together with the first authorization code, for example, "please read the authorization code XXX", where XXX represents the content of the first authorization code. The output mode can adopt a playing mode or a display mode.
Of course, the information for prompting to read aloud the information of the first authorization code may be output separately from the first authorization code, for example, the information of "please read aloud the authorization code" is output first, and then the information of "authorization code XXX" is output, or the information of "authorization code XXX" is output first, and then the information of "please read aloud the authorization code" is output. The output modes of the two pieces of information can be output in a playing mode or a display mode, and the output modes of the two pieces of information can be the same or different.
The first authorization code and the information for prompting to read the information of the first authorization code may also be output through the first communication terminal, for example, output in a display manner, or output in a play manner.
Compared with the mode of outputting the first authorization code and the information used for prompting to read the information of the first authorization code on the first call terminal, the mode of outputting the first authorization code and the information used for prompting to read the information of the first authorization code through the first safety device can reduce the possibility of malicious software attack on the first call terminal and improve the safety of data transmission.
When the first authorization code is prompted to be read, the read content is the first authorization code and is not the first call key, so that the possibility that a lawbreaker steals the first call key when a user reads the first call key is reduced; in addition, the first authorization code is generated according to the first call key and can uniquely identify the first call key, so that the two communication parties determine whether the call keys used by the two communication parties are consistent by comparing whether the contents of the authorization codes are consistent; because the number of bits of the first session key is longer, the first session key is processed into the first authorization code, so that the length of the first authorization code is shorter than that of the first session key, the content read by a user is reduced, and the user operation is facilitated.
The first security chip obtains a reading result of a user of the first communication terminal on the first authorization code to obtain the first sound information, and the following two ways can be adopted:
in the mode A, the first security chip receives a reading result of the first authorization code, collected by the first call terminal, of the user of the first call terminal through the first communication interface, and first sound information is obtained.
In the mode A, the existing microphone of the first communication terminal is used for collecting the reading results, the reading results are convenient to realize, the reading results can be obtained without modifying hardware of the first safety equipment, and the hardware cost of the first safety equipment is reduced.
And in the mode B, the first security chip acquires the reading result of the first authorization code, acquired by the voice acquisition unit of the first security device, of the user of the first communication terminal, so as to obtain the first sound information.
In the mode B, the voice collecting unit may be a microphone. When the reading result of the first authorization code is collected, the voice collecting unit on the first safety device is used for collecting the reading result, the possibility of malicious software attack on the first communication terminal can be reduced, and the safety of data collection is guaranteed. For example, when the first security device is a bluetooth headset, the reading result may be directly collected by using a microphone of the bluetooth headset.
The method includes the steps that sound of the user reading the first authorization code is collected to obtain first sound information, and actually two parts of information are collected, wherein one part is the content of the first authorization code output by the first safety device, and the other part is the sound characteristic of the user reading the first authorization code.
The sound characteristic in the first sound information is the sound characteristic of a user of the first call terminal when the user directly reads the first authorization code, and the content of the first authorization code in the first sound information is identified to be originated from the user of the first call terminal; the voice characteristics are not obtained by simulating the sound production effect of the user of the first call terminal by voice simulation software.
Because the sound characteristics simulated by the voice simulation software are different from the sound characteristics obtained when the user directly reads, when the two sound characteristics are played, the listener can identify whether the sound is the sound of the real user of the first communication terminal according to the personalized information such as tone, tone and the like carried by the two sound characteristics, so as to identify whether the sound information carrying the authorization code comes from the first communication terminal.
The implementation manner of processing the first sound information into the first encrypted data by the first security device is as follows:
the voice acquisition unit of the first safety device sends the first sound information to the voice conversion unit of the first safety device, the voice conversion unit processes the first sound information into a digital signal to obtain data to be verified, the data to be verified is sent to the first safety chip, the first safety chip encrypts the data to be verified by using the first call key to obtain first encrypted data, and the first encrypted data is sent through the first communication interface.
The voice conversion unit is used for converting the analog signal into a digital signal, so that the first sound information can be transmitted in a voice encryption channel. The voice acquisition unit and the voice conversion unit can be integrated in the first safety device, and can also be different physical units.
Of course, if the communication network between the first and second call terminals supports direct transmission of the analog signal, the operation of converting the analog signal into the digital signal need not be performed in the process of processing the first sound information into the first encrypted data.
In addition, the implementation manner of each step performed by the second security device in step 032 is similar to that of each step performed by the first security device in step 031, and is not described herein again.
And on the premise that the first call terminal and the second call terminal are not monitored by a third person, the first authorization code and the second authorization code are the same. On the contrary, when third person monitoring exists at the first call terminal and the second call terminal, the first call key used by the user of the first call terminal is different from the second call key used by the user of the second call terminal, so that the first authorization code generated according to the first call key is different from the second authorization code generated according to the second call key. The user can judge whether the third person monitors by comparing the content of the first authorization code with the content of the second authorization code.
There is no obvious sequence between step 031 and step 032, which may be executed simultaneously or sequentially.
Step 04, the first security device and the second security device both prompt confirmation of the authorization code and the sound feature:
step 041, after receiving the second encrypted data through the first communication interface, the first security chip decrypts the second encrypted data by using the first session key to obtain second decrypted data; the first safety device plays the second decrypted data and prompts confirmation of whether the authorization code in the second decrypted data is consistent with the first authorization code or not and confirmation of whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of a user of the second communication terminal or not;
and the second encrypted data is sent to the first security chip through the first communication interface after the first communication terminal receives the second encrypted data sent by the second communication terminal.
The following two ways are available for the first security chip to acquire the second encrypted data, including: the method comprises the steps that the voice is received before a user of a first communication terminal and a user of a second communication terminal carry out voice communication; or the receiving is carried out in the process of carrying out voice call between the user of the first call terminal and the user of the second call terminal.
Because there are two ways for the first secure chip to acquire the second encrypted data, the implementation ways for the first secure device to prompt whether the authorization code in the second decrypted data is consistent with the first authorization code, and whether the sound characteristic of the read-aloud authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal include the following three ways:
first, after receiving second encrypted data before a user of a first communication terminal and a user of a second communication terminal perform voice communication, a first security device prompts to confirm whether an authorization code in second decrypted data is consistent with a first authorization code or not and whether a sound characteristic of a reading authorization code in the second decrypted data is consistent with a sound characteristic of the user of the second communication terminal or not before the user of the first communication terminal and the user of the second communication terminal perform voice communication;
secondly, after receiving second encrypted data before the user of the first communication terminal and the user of the second communication terminal perform voice communication, the first security device prompts whether authorization codes in the second decrypted data are consistent with the first authorization codes or not and whether sound characteristics of reading authorization codes in the second decrypted data are consistent with sound characteristics of the user of the second communication terminal or not to confirm in the process of performing voice communication between the user of the first communication terminal and the user of the second communication terminal;
and thirdly, after receiving the second encrypted data in the process of carrying out voice communication between the user of the first communication terminal and the user of the second communication terminal, the first safety device prompts whether the authorization code in the second decrypted data is consistent with the first authorization code or not and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal or not in the process of carrying out voice communication between the user of the first communication terminal and the user of the second communication terminal.
042, after receiving the first encrypted data through the second communication interface, the second security chip decrypts the first encrypted data by using the second communication key to obtain first decrypted data; the second safety equipment plays the first decrypted data; after outputting the second authorization code and playing the first decrypted data, the second security chip prompts to confirm whether the authorization code in the first decrypted data is consistent with the second authorization code and whether the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal;
and the first encrypted data is sent to the second security chip through the second communication interface after the second communication terminal receives the first encrypted data sent by the first communication terminal.
The second encrypted data can be received before the user of the first communication terminal and the user of the second communication terminal carry out voice communication; or the receiving is carried out in the process of carrying out voice call between the user of the first call terminal and the user of the second call terminal.
Because there are two ways for the second security chip to acquire the first encrypted data, there are three ways for the second security device to prompt whether the authorization code in the first decrypted data is consistent with the second authorization code, and whether the sound characteristic of the read-aloud authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal:
firstly, after first encrypted data is received before a user of a first communication terminal and a user of a second communication terminal perform voice communication, a second safety device prompts whether an authorization code in first decrypted data is consistent with a second authorization code or not and whether the sound characteristic of a reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal or not to confirm before the user of the first communication terminal and the user of the second communication terminal perform voice communication;
secondly, after receiving the first encrypted data before the user of the first communication terminal and the user of the second communication terminal perform voice communication, the second security device prompts whether the authorization code in the first decrypted data is consistent with the second authorization code or not and whether the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal or not to confirm in the process of performing voice communication between the user of the first communication terminal and the user of the second communication terminal;
and thirdly, after the first encrypted data is received in the process of carrying out voice call between the user of the first call terminal and the user of the second call terminal, the second safety device prompts whether the authorization code in the first decrypted data is consistent with the second authorization code or not and whether the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first call terminal or not to confirm in the process of carrying out voice call between the user of the first call terminal and the user of the second call terminal.
Here, the implementation of step 041 is described as an example:
the first security chip can decrypt the second encrypted data by using the first session key, and the second decrypted data is obtained because the first session key and the second session key are the same when no third person monitors between the first session terminal and the second session terminal, so that the encrypted result encrypted by the second session key can be successfully decrypted by using the first session key.
However, although the first session key may be used to successfully decrypt the encrypted result encrypted by the second session key, it cannot be determined whether a third person monitors between the first session terminal and the second session terminal, because when the third person monitors between the first session terminal and the second session terminal, the first session key negotiated between the first session terminal and the third person session terminal is different from the second session key negotiated between the second session terminal and the third person session terminal. The third person can decrypt the data sent by the first communication terminal by using the first communication key, then encrypt the data by using the second communication key, and send the data to the second communication terminal, at this time, the second communication terminal can still successfully decrypt the received encrypted data by using the second communication key, but at this time, the third person monitors the data at the first communication terminal and the second communication terminal, so that whether the third person monitors the data cannot be judged according to whether the received encrypted data is successfully decrypted.
In order to solve the technical defect, the following introduces a concept of an authorization code, reads the authorization code, obtains a reading result, and sends the reading result to determine whether a third person monitors, where specific implementation details are described in step 05 below.
The first security device processes the second encrypted data into second decrypted data and plays the second decrypted data in the following manner:
if the second encrypted data is a digital signal, the first security chip decrypts the second encrypted data by using the first call key to obtain second decrypted data; the first safety chip sends second decryption data to a voice conversion unit of the first safety device, the voice conversion unit converts the second decryption data into sound information to obtain a conversion result of the second decryption data, the conversion result of the second decryption data is sent to a playing unit of the first safety device, and the playing unit plays the conversion result of the second decryption data;
if the second encrypted data is an analog signal, the first security chip decrypts the second encrypted data by using the first call key to obtain second decrypted data, and sends the second decrypted data to a playing unit of the first security device, and the playing unit plays the second decrypted data.
There is no obvious sequence between the operation of playing the second decrypted data in step 041 and the operation of outputting the first authorization code in step 031, and the operations may be executed simultaneously or sequentially according to the sequence.
The second decrypted data may also be played by a playing unit of the first communication terminal, such as a speaker and a loudspeaker.
Compared with the mode of playing the second decrypted data on the first call terminal, the mode of playing the second decrypted data through the first safety equipment can reduce the possibility of malicious software attack on the call terminal and improve the safety of data transmission.
The first security device displays or plays the prompt message to prompt whether the authorization code in the second decrypted data is consistent with the first authorization code or not, and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal or not. For example, the display of the first security device displays the prompt message, and the playing unit of the first security device plays the prompt message. Of course, the first call terminal may also display the prompt message or play the prompt message.
Compared with the mode of displaying or playing the prompt message on the first call terminal, the mode of displaying or playing the prompt message through the first safety equipment can reduce the possibility of malicious software attack on the call terminal and improve the safety of data transmission.
In this embodiment, the second decrypted data is output to the user in a playing manner because the second decrypted data includes two parts of information, one part is specific content representing the authorization code generated by the second security device of the second communication terminal, and the other part is sound characteristic representing the user of the second communication terminal, the two parts of information can be directly obtained by the user of the first communication terminal by playing the second decrypted data, and further, the user of the first communication terminal can confirm the authenticity of the content carried in the second decrypted data by judging whether the authorization code in the second decrypted data is consistent with the first authorization code on one hand, and can confirm the legitimacy of the source of the second decrypted data by judging whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal on the other hand, that is, it is possible to judge whether or not the third person exists.
If the manner of playing the second decrypted data is replaced with the manner of displaying the second decrypted data, after the user of the first communication terminal receives the second decrypted data, the authenticity of the content carried in the second decrypted data can be confirmed only by judging whether the authorization code in the second decrypted data is consistent with the first authorization code, but the source validity of the second decrypted data cannot be confirmed, that is, whether a third person exists cannot be judged.
On the premise that third person monitoring does not exist in the first call terminal and the second call terminal, the first authorization code and the second authorization code are the same, the first authorization code can uniquely identify the first call key, and the second authorization code can uniquely identify the second call key.
In addition, the implementation manner of each step performed by the second secure device in step 042 is similar to that of each step performed by the first secure device in step 041, and is not described herein again.
Wherein, there is no obvious sequence between step 041 and step 042, and they may be executed simultaneously or sequentially according to the sequence.
Step 05: the first security chip and the second security chip both prompt the confirmation of the authorization code content and the sound characteristic in the received encrypted data:
step 051: the first security chip has the following two modes for encrypting and decrypting the voice call of the user of the first call terminal:
a: after prompting to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, if the first security chip receives a first confirmation instruction, the first security chip starts to perform encryption and decryption operations on the voice call of the user of the first communication terminal by using the first call key, wherein the first confirmation instruction is an instruction for confirming that the authorization code in the second decrypted data is consistent with the first authorization code and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal;
the encryption and decryption operation of the voice call of the user of the first call terminal by using the first call key can be started when the voice call of the user of the first call terminal and the user of the second call terminal is started, and can also be started in the process of the voice call of the user of the first call terminal and the user of the second call terminal.
B: after the encryption and decryption operation of the voice call of the user of the first call terminal by using the first call key is started, if the first security chip receives a first confirmation instruction, the first security chip continues the encryption and decryption operation of the voice call of the user of the first call terminal by using the first call key, wherein the first confirmation instruction is an instruction for confirming that an authorization code in the second decrypted data is consistent with the first authorization code and sound characteristics of a reading authorization code in the second decrypted data are consistent with sound characteristics of the user of the second call terminal;
fig. 1 only shows the implementation of the mode a in step 051, and the implementation of the mode B is similar to the implementation of the mode a, except that the receiving timing of the first confirmation instruction is different, in the mode a, the first security chip receives before the encryption and decryption operation for the voice call is started, and in the mode B, the first security chip receives after the encryption and decryption operation for the voice call is started. Wherein, the first confirmation instruction can be obtained by the following steps:
first, the first security device receives a first confirmation instruction input by a user of the first call terminal, where the first confirmation instruction is an instruction input by the user of the first call terminal after confirming that the authorization code in the second decrypted data is consistent with the first authorization code, and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second call terminal.
The user of the first call terminal can input an instruction on the first call terminal and can also input an instruction on the first safety device. The user of the first call terminal inputs an instruction on the first safety device, so that the attack of malicious software on the first call terminal is reduced, and the voice call safety is ensured.
Secondly, after receiving a second confirmation instruction sent by a second communication terminal, obtaining a first confirmation instruction according to the second confirmation instruction;
the second confirmation instruction is an instruction input by the user of the second call terminal after confirming that the received authorization code is consistent with the locally generated authorization code and the sound characteristic of the reading authorization code is consistent with the sound characteristic of the user of the first call terminal.
When the user of the first communication terminal trusts the user of the second communication terminal, if the user of the second communication terminal confirms that the authorization code received from the first communication terminal is consistent with the authorization code generated by the second security device and the sound characteristic of the read-alouthentication code is consistent with the sound characteristic of the user of the first communication terminal, the user of the first communication terminal can know that the authorization code in the second decrypted data is consistent with the first authorization code and the sound characteristic of the read-alouthentication code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, that is, the first confirmation instruction is obtained.
Step 052: the second security chip has the following two modes for encrypting and decrypting the voice call of the user of the second communication terminal:
a: after prompting to confirm whether the authorization code in the first decrypted data is consistent with the second authorization code and whether the sound feature of the reading authorization code in the first decrypted data is consistent with the sound feature of the user of the first communication terminal, if the second security chip receives a second confirmation instruction, the second security chip starts to encrypt and decrypt the voice communication of the user of the second communication terminal by using the second communication key, wherein the encryption and decryption operation of the voice communication of the user of the second communication terminal by using the second communication key can be started when the user of the first communication terminal and the user of the second communication terminal start voice communication, and can also be started in the process of voice communication between the user of the first communication terminal and the user of the second communication terminal.
B: after the encryption and decryption operation of the voice call of the user of the second communication terminal by using the second communication key is started, if the second security chip receives a second confirmation instruction, the second security chip continues the encryption and decryption operation of the voice call of the user of the second communication terminal by using the second communication key, wherein the second confirmation instruction is an instruction for confirming that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal.
Fig. 1 only shows the implementation of the mode a in step 052, and the implementation of the mode B is similar to the implementation of the mode a, except that the receiving timing of the second confirmation instruction is different, in the mode a, the second secure chip is received before the encryption and decryption operation on the voice call is started, and in the mode B, the second secure chip is received after the encryption and decryption operation on the voice call is started.
Wherein the second confirmation instruction may be obtained by:
first, the second security device receives a second confirmation instruction input by the user of the second communication terminal, where the second confirmation instruction is an instruction input by the user of the second communication terminal after confirming that the authorization code in the first decrypted data is consistent with the second authorization code, and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal.
The user of the second communication terminal can input an instruction on the second communication terminal and can also input an instruction on the second safety device. And the user of the second communication terminal inputs an instruction on the second safety equipment, so that the attack of malicious software on the second communication terminal is reduced, and the voice communication safety is ensured.
Secondly, after receiving a first confirmation instruction sent by the first call terminal, obtaining a second confirmation instruction according to the first confirmation instruction;
the first confirmation instruction is an instruction input by the user of the first communication terminal after confirming that the received authorization code is consistent with the locally generated authorization code and the sound characteristic of the reading authorization code is consistent with the sound characteristic of the user of the second communication terminal.
When the user of the second communication terminal trusts the user of the first communication terminal, if the user of the first communication terminal confirms that the authorization code received from the second communication terminal is consistent with the authorization code generated by the first security device and the sound characteristic of the reading authorization code is consistent with the sound characteristic of the user of the second communication terminal, the user of the second communication terminal can know that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal, that is, the second confirmation instruction is obtained.
Here, the implementation of step 051 is taken as an example to explain:
unlike the prior art in which the first session terminal encrypts using the first session key, the main body of the encryption operation performed in the present invention is the first security chip. The first security chip encrypts the voice call, so that the possibility of malicious software attack on the first call terminal can be reduced, and the security of data transmission is improved.
And the first security chip encrypts the obtained voice information by using the first call key generated by the first security chip, so that the call security is improved. Specifically, the method comprises the following steps:
(1) the execution main body of the voice encryption is the first safety chip, and the first safety chip is arranged in the first safety device, so that the first safety device is independent of the first call terminal, and the possibility of being attacked by malicious software on the first call terminal in the voice encryption process is reduced; in addition, compared with the processor of the earphone in the prior art, the execution main body for encrypting the voice in the first safety device is the first safety chip, and the operation of encrypting and decrypting the voice is completed in the first safety chip, so that the encryption result and the decryption result are only output, and the chance of data decryption is avoided.
(2) The first communication key used by the voice encryption is generated by the first security chip, and the first security chip stores the first communication key in the first security chip, so that the possibility that the first communication key is stolen is reduced, and the security of the voice encryption is ensured; in addition, when voice encryption is performed, the first session key is used for encryption in the first security chip, so that the first session key is called in a secure environment, and the secure use of the first session key is ensured.
(3) The encrypted object is acquired by a voice acquisition unit of the first security device. The voice acquisition method and the voice acquisition system utilize the first safety equipment to carry out voice acquisition, and the first safety equipment is independent of the first call terminal, so that the possibility of being attacked by malicious software on the first call terminal in the voice acquisition process is reduced.
Therefore, when voice encryption is performed, the whole encryption operation is completed by the first safety device, interaction with external devices is not needed, and the security of the encryption operation is ensured.
Of course, the voice encrypted by the first security device may also be collected by the voice collecting unit of the first communication terminal, and the collected voice is obtained through the first communication interface. The voice collecting unit of the first communication terminal can be a microphone.
In addition, the implementation manner of each step performed by the second security device in step 052 is similar to that of each step performed by the first security device in step 051, and is not described herein again.
Step 051 and step 052 have no obvious sequence, and can be executed simultaneously or sequentially according to the sequence.
Since there is no obvious precedence order between step 051 and step 052, in practical application, the following different application scenarios may occur:
c1: when the first safety device confirms that the authorization code in the second decrypted data is consistent with the first authorization code and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, a first confirmation instruction is obtained, and the voice call of the user of the first communication terminal is started to be encrypted and decrypted according to the first confirmation instruction; when the second security device confirms that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, and the voice communication of the user of the second communication terminal is started to be encrypted and decrypted according to the second confirmation instruction;
c2: when the second security device confirms that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, the encryption and decryption operation of the voice communication of the user of the second communication terminal is started according to the second confirmation instruction, and the second confirmation instruction is sent to the first security device; after receiving the second confirmation instruction, the first safety equipment obtains a first confirmation instruction according to the second confirmation instruction, and starts encryption and decryption operations on the voice call of the user of the first call terminal according to the first confirmation instruction;
c3: after the first security device obtains the first call key, starting encryption and decryption operations on the voice call of the user of the first call terminal; after the voice call of the user of the first call terminal is started to be encrypted and decrypted, when the authorization code in the second decrypted data is prompted and confirmed to be consistent with the first authorization code, and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second call terminal, a first confirmation instruction is obtained, and the voice call of the user of the first call terminal is continuously encrypted and decrypted according to the first confirmation instruction; when the second security device confirms that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, and the voice communication of the user of the second communication terminal is started to be encrypted and decrypted according to the second confirmation instruction;
c4: when the second security device confirms that the authorization code in the first decrypted data is consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, the encryption and decryption operation of the voice communication of the user of the second communication terminal is started according to the second confirmation instruction, and the second confirmation instruction is sent to the first security device; after the first security device obtains the first call key, starting encryption and decryption operations on the voice call of the user of the first call terminal; after the encryption and decryption operation of the voice call of the user of the first call terminal is started, the first safety equipment obtains a first confirmation instruction according to a second confirmation instruction after receiving the second confirmation instruction, and continues to perform the encryption and decryption operation on the voice call of the user of the first call terminal according to the first confirmation instruction;
c5: when the first safety device confirms that the authorization code in the second decrypted data is consistent with the first authorization code and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, a first confirmation instruction is obtained, and the voice call of the user of the first communication terminal is started to be encrypted and decrypted according to the first confirmation instruction; after the second security device obtains the second communication key, starting encryption and decryption operations on the voice communication of the user of the second communication terminal; after the encryption and decryption operation of the voice call of the user of the second call terminal is started, when the authorization code in the first decryption data is confirmed to be consistent with the second authorization code, and the sound characteristic of the reading authorization code in the first decryption data is confirmed to be consistent with the sound characteristic of the user of the first call terminal, a second confirmation instruction is obtained, and the encryption and decryption operation of the voice call of the user of the second call terminal is continued according to the second confirmation instruction;
c6: after the second safety device starts the encryption and decryption operation on the voice call of the user of the second communication terminal, when the authorization code in the first decrypted data is confirmed to be consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is confirmed to be consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, the encryption and decryption operation on the voice call of the user of the second communication terminal is continued according to the second confirmation instruction, and the second confirmation instruction is sent to the first safety device; after receiving the second confirmation instruction, the first safety equipment obtains a first confirmation instruction according to the second confirmation instruction, and starts encryption and decryption operations on the voice call of the user of the first call terminal according to the first confirmation instruction;
c7: after the first security device obtains the first call key, starting encryption and decryption operations on the voice call of the user of the first call terminal; after the voice call of the user of the first call terminal is started to be encrypted and decrypted, when the authorization code in the second decrypted data is prompted and confirmed to be consistent with the first authorization code, and the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second call terminal, a first confirmation instruction is obtained, and the voice call of the user of the first call terminal is continuously encrypted and decrypted according to the first confirmation instruction; after the second security device starts the encryption and decryption operation on the voice call of the user of the second communication terminal, when the authorization code in the first decrypted data is confirmed to be consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is confirmed to be consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, and the encryption and decryption operation on the voice call of the user of the second communication terminal is continued according to the second confirmation instruction;
c8: after the second safety device starts the encryption and decryption operation on the voice call of the user of the second communication terminal, when the authorization code in the first decrypted data is confirmed to be consistent with the second authorization code and the sound characteristic of the reading authorization code in the first decrypted data is confirmed to be consistent with the sound characteristic of the user of the first communication terminal, a second confirmation instruction is obtained, the encryption and decryption operation on the voice call of the user of the second communication terminal is continued according to the second confirmation instruction, and the second confirmation instruction is sent to the first safety device; after the first security device obtains the first call key, starting encryption and decryption operations on the voice call of the user of the first call terminal; after the encryption and decryption operation of the voice call of the user of the first call terminal is started, the first safety device obtains a first confirmation instruction according to a second confirmation instruction after receiving the second confirmation instruction, and continues the encryption and decryption operation of the voice call of the user of the first call terminal according to the first confirmation instruction.
The technical feature described in step 05 is that the encryption and decryption operations of the voice call are executed after it is confirmed that both the content of the authorization code and the sound feature of the reading authorization code are consistent, and of course, this embodiment also provides a processing scheme when at least one of the content of the authorization code and the sound feature of the reading authorization code is inconsistent, which specifically includes:
the description will be given taking as an example the implementation of the first security device:
when the user of the first communication terminal determines that the authorization code in the second decrypted data is inconsistent with the first authorization code, and/or the sound characteristic of the reading authorization code in the second decrypted data is inconsistent with the sound characteristic of the user of the second communication terminal, the user of the first communication terminal may end the voice communication at the first communication terminal or the first security device.
Similarly, the implementation of the second security device is similar to that of the first security device, and is not described here again.
The method further comprises the following steps:
if the first security chip detects that the voice call of the user of the first call terminal is ended, the first security chip deletes the first call key; and/or the presence of a gas in the gas,
and if the second security chip detects that the voice call of the user of the second call terminal is ended, the second security chip deletes the second call key.
In the method, after the call is finished, the first security chip destroys the first call key used by the voice call, so that the possibility that the first call key is unreasonably utilized after being stolen can be reduced, the operation security of the first security chip is ensured, and the storage space of the first security chip is effectively utilized. Similarly, after the call is finished, the second security chip destroys the second call key used in the voice call, so that the possibility that the second call key is unreasonably utilized after being stolen can be reduced, the operation security of the second security chip is ensured, and the storage space of the second security chip is effectively utilized.
The following description takes a specific application scenario as an example:
the user A and the user B carry out normal conversation, when the third party does not monitor the conversation, the user A and the user B directly carry out conversation key negotiation to obtain a conversation key X, and the voice conversation between the user A and the user B also directly adopts the conversation key X to carry out encryption and decryption.
During the conversation between the user A and the user B, if a third user C monitors, the user A and the user B negotiate a conversation key with the third user C respectively, after the negotiation is finished, the conversation key obtained by the negotiation between the user C and the user A is M, and the conversation key obtained by the negotiation between the user C and the user B is N. In the process of sending the conversation voice from the user A to the user B, the user C intercepts the conversation voice A sent from the user A to the user B, the conversation voice A is decrypted by using the conversation key M to obtain a plaintext A, and the plaintext A is encrypted by using the conversation key N and then sent to the user B. In the same way, in the process of sending the conversation voice to the user A by the user B, the user C intercepts the conversation voice B sent to the user A by the user B, decrypts the conversation voice B by using the conversation key N to obtain a plaintext B, encrypts the plaintext B by using the conversation key M and sends the plaintext B to the user A. Since the user a can decrypt the ciphertext sent by the user C by using the call key M, the user a can obtain the voice of the user B. Because the user a and the user B can both obtain the voice of the opposite end of the call, the user a and the user B can perform the voice call, but actually, the users at the opposite end of the communication between the user a and the user B are both the user C, that is, the voice of the call between the user a and the user B is already monitored by the user C.
Correspondingly, when the method provided by this embodiment is used for voice call, if there is monitoring of the user C, the security device of the user a obtains an authorization code M by using the call key M negotiated with the user C of the opposite communication terminal, and reads the authorization code M aloud by the user a to obtain the sound file M, the sound file M includes the sound of the user a and the content of the authorization code M, after the user C decrypts the sound file M, the sound file M is encrypted by using the call key N and sent to the user B, when the user B hears the sound file M, the sound of the user a is heard, the source of the sound file M is determined to be the user a, but the security device of the user B also obtains an authorization code N by using the call key N negotiated with the user C of the opposite communication terminal, and the user B compares the heard authorization code M carried by the sound file M with the locally generated authorization code N, and finding that the authorization code m is different from the authorization code n, the third person monitoring in the call can be known.
Of course, the user C cracks the sound file m to obtain a sound file, and replaces the sound file with a sound file including the authorization code N (the authorization code generated by the session key N), but since the sound file is not read aloud by the user a and does not include the sound characteristics of the user a, the sound file is called a sound file m ', that is, the sound file m' includes the content of the authorization code N and the sound characteristics from the user a; after hearing the sound file m ', the user B finds that the authorization code in the sound file m ' is consistent with the output of the security device of the user B, but the sound feature in the sound file m ' is not the sound feature of the user a, so that the user B can determine that third person monitoring exists in the call.
Therefore, the sound file comprises the sound characteristic of the reading authorization code and the content of the authorization code, so that the user can judge whether a third person monitors in the call process according to the two information, and the call safety is ensured.
The following further describes a way of obtaining a session key and an authorization code based on ZRTP key negotiation, where the specific process is as follows:
firstly, generation of a call key:
f1: the first security device sends a Hello message to the second security device, wherein the Hello message comprises a version number of a ZRTP used by the first security device, a key negotiation type, a key algorithm and a session identification ID1 of a user of the first call terminal; wherein the key agreement types of the ZRTP protocol comprise a pre-sharing mode, a multimedia streaming mode and a Diffie-Hellman (DH) mode;
f2: the second safety equipment sends a response message of the Hello message to the first safety equipment;
f3: the second security device sends a Hello message to the first security device, wherein the Hello message comprises the version number of the ZRTP used by the second security device, the key negotiation type, the key algorithm and the session identification ID2 of the user of the second communication terminal; wherein the key agreement types of the ZRTP protocol comprise a pre-sharing mode, a multimedia streaming mode and a Diffie-Hellman (DH) mode;
f4: the first safety device sends a response message of the Hello message to the second safety device;
f5: after receiving the response message of the Hello message, the second security device sends the key negotiation type and the key algorithm both supported by the two parties to the first security device, where the selected key negotiation type is taken as a DH mode as an example;
f6, the first secure device sending locally generated first function information to the second secure device, where the first function information is a power function, where the power function may be g ^ x, where x ^ svr mod p, where svr denotes a secret value of the responder, mod is a rounding algorithm, and p is an integer;
f7, the second secure device sending locally generated second function information to the first secure device, where the second function information is also a power function, where the power function may be g ^ y, where y ^ svi mod p, where svi denotes a secret value of the initiator, mod is a rounding algorithm, and p is an integer;
wherein g ^ x is the first negotiation information mentioned above, and g ^ y is the second negotiation information mentioned above.
In this embodiment, the first security chip can obtain the first session key gxy according to gx and gy; and the second security chip can obtain a second communication key g x according to g x and g y.
F8, the first secure device sends a first verification message to the second secure device, where the first verification message is obtained by verifying the following information, and the first verification message includes: whether the first call key is disclosed locally or not, whether the first call key is destroyed after the call is performed locally or not, and the like; wherein the key used for verification is obtained according to the first session key, specifically, the first session key g ^ xy, the session ID1, the session ID2 and a string of characters are processed to obtain a key S0, wherein the string of characters is a string of characters which is publicly used for describing functions; processing the key S0 by using a key derivation algorithm in a ZRTP protocol to obtain a key for verification calculation; wherein, the key derivation algorithm can be an HMAC algorithm;
f9, after the second secure device checks the first check message, sending a second check message to the first secure device, where the second check message is obtained by checking the following information, and includes: whether the second communication key is disclosed locally or not, whether the second communication key is destroyed after communication locally or not and the like; wherein the key used for verification is obtained according to the second communication key, specifically, the second communication key g ^ xy, the session ID1, the session ID2 and a string of characters are processed to obtain a key S0, wherein the string of characters is a string of characters which is publicly used for describing functions; processing the key S0 by using a key derivation algorithm in a ZRTP protocol to obtain a key for verification calculation; wherein, the key derivation algorithm can be an HMAC algorithm;
f10, after the first secure device completes the verification of the second check message, the first secure device sends a confirmation message to the second secure device, and the key agreement is completed.
II, secondly: generation mode of authorization code:
here, the first security device is taken as an example to generate the first authorization code:
after obtaining the key S0, processing S0 by using a key derivation algorithm to obtain a segment of character string M;
obtaining a string of character strings M by taking the first 32 bits from the character strings M;
and coding the character string m, coding the character string m into a visual character, and taking the visual character as a first authorization code.
Compared with the mode that the call key is generated on the TF card in the prior art, the method provided by the embodiment of the invention reduces the possibility of being attacked by malicious software on the call terminal in the voice encryption process by generating the call key on the safety equipment independent of the call terminal; the voice encryption device is generated by a security chip in the security device, and based on the high security of the security chip, the possibility that a call key is stolen is reduced, and the security of voice encryption is ensured; in addition, when voice encryption is performed, the session key is used for encryption in the security chip, so that the session key is called in a secure environment, and the secure use of the session key is ensured.
In the process of voice encryption communication, the security device prompts and determines whether an authorization code in the decrypted data is consistent with a locally generated authorization code or not and determines whether the sound characteristic of the decrypted data is consistent with the sound characteristic of a user at the opposite end of the communication through playing the decrypted data from the opposite end of the communication, so that the content and the sound characteristic of the authorization code in the decrypted data are verified respectively, the identity information of the opposite end of the communication is confirmed, the user determines whether the communication is monitored, the success rate of identifying the monitoring of a third person in the voice communication is improved, the possibility that the voice communication is monitored is reduced, and when the user determines that the communication is monitored by the third person, the user can take a monitoring-prevention security measure timely to prevent information leakage and improve the security of data transmission in the voice communication.
Furthermore, the decrypted data from the opposite end of the call is played on the safety equipment, so that the attack of malicious software on the call terminal is reduced, and the safety of the voice call is ensured.
The following is a brief description of a flow of a method for processing data in a voice call by a first security device, as shown in fig. 2:
step 21, a first security chip of the first security device generates first negotiation information, and the first negotiation information is sent to the first call terminal through a first communication interface of the first security device; the first safety equipment is connected with the first call terminal and is independent of the first call terminal;
step 22, the first security chip receives second negotiation information sent by the first call terminal through the first communication interface, wherein the second negotiation information is generated by second security equipment of the second call terminal;
step 23, the first security device outputs a first authorization code, wherein the first authorization code is generated by the first security chip according to the first session key;
step 24, after receiving the second encrypted data through the first communication interface, the first security chip decrypts the second encrypted data by using the first session key to obtain second decrypted data, wherein the second encrypted data includes a reading result of the user of the second session terminal to the authorization code, which is obtained by the second security device;
and step 25, the first security device plays the second decrypted data, and prompts to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code, and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal.
Compared with the mode that the call key is generated on the TF card in the prior art, the method provided by the embodiment of the invention reduces the possibility of being attacked by malicious software on the first call terminal in the voice encryption process by generating the first call key on the first safety equipment independent of the first call terminal; the first security chip in the first security device generates the first security key, and based on the high security of the first security chip, the possibility that the first call key is stolen is reduced, and the security of voice encryption is ensured; in addition, when voice encryption is performed, the first session key is used for encryption in the first security chip, so that the first session key is called in a secure environment, and the secure use of the first session key is ensured.
In the process of voice encryption communication, the first safety device plays the second decryption data from the second communication terminal to prompt and determine whether the authorization code in the second decryption data is consistent with the locally generated first authorization code, and determining whether or not the sound characteristic of the second decrypted data is identical to the sound characteristic of the user of the second communication terminal, and thereby, the content and the sound characteristic of the first authorization code in the second decrypted data are respectively verified to realize the confirmation of the identity information of the second communication terminal, so that the user can determine whether the call is monitored, the success rate of identifying the third person in the voice call is improved, thereby reducing the possibility of monitoring the voice call, and when the user determines that the voice call has third person monitoring, the user can adopt a security measure for preventing monitoring in time to prevent information leakage, and the security of data transmission in voice communication is improved.
Furthermore, second decrypted data from the second call terminal is played on the first safety device, attack of malicious software on the first call terminal is reduced, and voice call safety is guaranteed.
Similarly, the second security device can execute the same process as the first security device, thereby achieving the same technical effect as the first security device, and the details are not repeated here.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (14)
1. A method for processing data in a voice call is characterized in that the method comprises the following steps:
a first security chip of first security equipment generates first negotiation information, and the first negotiation information is sent to a first call terminal through a first communication interface of the first security equipment; the first safety equipment is connected with the first call terminal and is independent of the first call terminal; the first security chip receives second negotiation information sent by the first call terminal through the first communication interface, wherein the second negotiation information is generated by second security equipment of a second call terminal;
the first security chip calculates the first negotiation information and the second negotiation information to obtain a first call key, and the first call key is used for encrypting and decrypting voice calls of users of the first call terminal;
the first security device outputs a first authorization code, wherein the first authorization code is generated by the first security chip according to the first call key;
after receiving second encrypted data through the first communication interface, the first security chip decrypts the second encrypted data by using the first call key to obtain second decrypted data, wherein the second encrypted data comprises a reading result of the user of the second communication terminal on the authorization code, which is obtained by the second security device;
and the first safety device plays the second decrypted data and prompts confirmation of whether the authorization code in the second decrypted data is consistent with the first authorization code or not and confirmation of whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal or not.
2. The method of claim 1, wherein outputting, by the first security device, the first authorization code comprises:
A. the first security device converts a first authorization code into sound information, obtains the sound information of the first authorization code, and plays the sound information of the first authorization code; or,
B. the first security device displays a first authorization code.
3. The method of claim 1, further comprising:
the first security device prompts the first authorization code to be read aloud;
the first security chip obtains a reading result of the user of the first communication terminal on the first authorization code to obtain first sound information;
and the first security chip encrypts the first sound information by using the first call key to obtain first encrypted data, and sends the first encrypted data through the first communication interface.
4. The method of claim 2, further comprising:
the first security device prompts the first authorization code to be read aloud;
the first security chip obtains a reading result of the user of the first communication terminal on the first authorization code to obtain first sound information;
and the first security chip encrypts the first sound information by using the first call key to obtain first encrypted data, and sends the first encrypted data through the first communication interface.
5. The method according to any one of claims 1 to 2, further comprising:
and if the first security chip detects that the voice call of the user of the first call terminal is ended, the first security chip deletes the first call key.
6. The method according to any one of claims 3 to 4, further comprising:
and if the first security chip detects that the voice call of the user of the first call terminal is ended, the first security chip deletes the first call key.
7. The method according to claim 3 or 4, wherein the obtaining, by the first secure chip, the reading result of the first authorization code by the user of the first communication terminal, and obtaining the first sound information includes:
A. the first security chip obtains a reading result of the user of the first communication terminal on the first authorization code, which is acquired by a voice acquisition unit of the first security device, so as to obtain first sound information; or,
B. and the first security chip receives a reading result of the first authorization code, acquired by the first call terminal, from the user of the first call terminal through the first communication interface, so as to obtain first sound information.
8. The method according to claim 6, wherein the obtaining, by the first security chip, the reading result of the first authorization code by the user of the first communication terminal, and obtaining the first sound information includes:
A. the first security chip obtains a reading result of the user of the first communication terminal on the first authorization code, which is acquired by a voice acquisition unit of the first security device, so as to obtain first sound information; or,
B. and the first security chip receives a reading result of the first authorization code, acquired by the first call terminal, from the user of the first call terminal through the first communication interface, so as to obtain first sound information.
9. The method according to any one of claims 1 to 4, 8, further comprising:
after prompting to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, if the first security chip receives a first confirmation instruction, the first security chip starts to encrypt and decrypt the voice call of the user of the first communication terminal by using the first call key; or,
after the voice call of the user of the first call terminal is encrypted and decrypted by using the first call key, if the first security chip receives a first confirmation instruction, the first security chip continues to encrypt and decrypt the voice call of the user of the first call terminal by using the first call key;
the first confirmation instruction is an instruction for confirming that the authorization code in the second decrypted data is consistent with the first authorization code, and the sound characteristic of the speaking authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal.
10. The method of claim 6, further comprising:
after prompting to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, if the first security chip receives a first confirmation instruction, the first security chip starts to encrypt and decrypt the voice call of the user of the first communication terminal by using the first call key; or,
after the voice call of the user of the first call terminal is encrypted and decrypted by using the first call key, if the first security chip receives a first confirmation instruction, the first security chip continues to encrypt and decrypt the voice call of the user of the first call terminal by using the first call key;
the first confirmation instruction is an instruction for confirming that the authorization code in the second decrypted data is consistent with the first authorization code, and the sound characteristic of the speaking authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal.
11. The method of claim 7, further comprising:
after prompting to confirm whether the authorization code in the second decrypted data is consistent with the first authorization code and whether the sound characteristic of the reading authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal, if the first security chip receives a first confirmation instruction, the first security chip starts to encrypt and decrypt the voice call of the user of the first communication terminal by using the first call key; or,
after the voice call of the user of the first call terminal is encrypted and decrypted by using the first call key, if the first security chip receives a first confirmation instruction, the first security chip continues to encrypt and decrypt the voice call of the user of the first call terminal by using the first call key;
the first confirmation instruction is an instruction for confirming that the authorization code in the second decrypted data is consistent with the first authorization code, and the sound characteristic of the speaking authorization code in the second decrypted data is consistent with the sound characteristic of the user of the second communication terminal.
12. The method according to claim 9, wherein the first confirmation instruction is generated by a confirmation key of the first secure device; or, generated by the first telephony terminal.
13. The method as claimed in any one of claims 1-4, 8 and 10-12, wherein the length of the first authorization code is smaller than the length of the first session key.
14. The method of any of claims 1-4, 8, 10-12, wherein the first authorization code is used to uniquely identify the first session key.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410208664.7A CN103986712B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
HK15100302.6A HK1199988A1 (en) | 2014-05-16 | 2015-01-12 | Data processing method for voice communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410208664.7A CN103986712B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103986712A CN103986712A (en) | 2014-08-13 |
CN103986712B true CN103986712B (en) | 2017-11-10 |
Family
ID=51278537
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410208664.7A Active CN103986712B (en) | 2014-05-16 | 2014-05-16 | A kind of data processing method of voice call |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103986712B (en) |
HK (1) | HK1199988A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104640108A (en) * | 2015-01-28 | 2015-05-20 | 深圳市比维视创科技有限公司 | Terminal communication voice encryption method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101228770A (en) * | 2005-07-27 | 2008-07-23 | 国际商业机器公司 | Systems and method for secure delivery of files to authorized recipients |
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN101917711A (en) * | 2010-08-25 | 2010-12-15 | 中兴通讯股份有限公司 | Mobile communication system and voice call encryption method thereof |
CN103353973A (en) * | 2013-06-17 | 2013-10-16 | 上海方付通商务服务有限公司 | Banking transaction authentication method based on video verification, and banking transaction authentication system based on video verification |
-
2014
- 2014-05-16 CN CN201410208664.7A patent/CN103986712B/en active Active
-
2015
- 2015-01-12 HK HK15100302.6A patent/HK1199988A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101228770A (en) * | 2005-07-27 | 2008-07-23 | 国际商业机器公司 | Systems and method for secure delivery of files to authorized recipients |
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN101917711A (en) * | 2010-08-25 | 2010-12-15 | 中兴通讯股份有限公司 | Mobile communication system and voice call encryption method thereof |
CN103353973A (en) * | 2013-06-17 | 2013-10-16 | 上海方付通商务服务有限公司 | Banking transaction authentication method based on video verification, and banking transaction authentication system based on video verification |
Also Published As
Publication number | Publication date |
---|---|
HK1199988A1 (en) | 2015-07-24 |
CN103986712A (en) | 2014-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103973696B (en) | A kind of data processing method of voice call | |
CN109462476B (en) | Key agreement method, device, terminal and computer readable storage medium | |
US10038676B2 (en) | Call encryption systems and methods | |
US20100227549A1 (en) | Apparatus and Method for Pairing Bluetooth Devices by Acoustic Pin Transfer | |
CN104065648B (en) | A kind of data processing method of voice call | |
CN104393994B (en) | Audio data secure transmission method, system and terminal | |
CN103974243B (en) | A kind of data handling system of voice call | |
TW201539429A (en) | A smart phone paired with a Bluetooth headset for voice data encryption and decryption | |
CN103974242B (en) | A kind of data processing method of voice call | |
CN103986711B (en) | A kind of data processing method of voice call | |
CN104284328A (en) | Method and device for encrypting mobile phone communication content | |
CN106856606A (en) | Communication means, communication system and mobile terminal | |
CN103986712B (en) | A kind of data processing method of voice call | |
CN104080080B (en) | A kind of data handling system of voice call | |
CN104065649B (en) | A kind of data processing method of voice call | |
CN104065650B (en) | A kind of data handling system of voice call | |
CN104038932B (en) | A kind of safety equipment | |
CN111064577A (en) | Security authentication method and device and electronic equipment | |
CN104184873A (en) | Information security attachment device for voice communication and information security method | |
CN112242977A (en) | Data transmission method and data transmission system | |
CN104066081B (en) | A kind of data handling system of voice call | |
CN104952467A (en) | Mobile terminal and audio file playing method thereof | |
CN104066080B (en) | A kind of data processing method of voice call | |
CN104640108A (en) | Terminal communication voice encryption method and system | |
CN103986579B (en) | A kind of data handling system of voice call |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1199988 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1199988 Country of ref document: HK |