Summary of the invention
For the problem of above-mentioned existence; the present invention discloses a kind of remote speech encipher-decipher method; with overcome in prior art file is carried out to encryption and decryption need to be in transmitting file; the a key of another biography; thereby increase the risk that key is lost or is stolen, and then be unfavorable for the problem of protected file confidentiality.
To achieve these goals, the application has recorded a kind of remote speech encipher-decipher method, wherein, be applied to the first mobile terminal and transmit file to the second mobile terminal, and be provided with the first acquisition module and encrypting module on described the first mobile terminal, on described the second mobile terminal, be provided with the second acquisition module and deciphering module, described method comprises the steps:
One file to be transmitted is provided on described the first mobile terminal;
Utilize described the first acquisition module to obtain the first speech data, and this first speech data is sent to a voice authentication server;
Described voice authentication server generates an encryption key according to described the first speech data, and after preserving this encryption key, sequence number corresponding this encryption key is sent to described the first mobile terminal;
Described encrypting module is encrypted rear generation encrypt file according to described sequence number to described file, and described encrypt file is sent to described the second mobile terminal;
Described the second acquisition module obtains a second speech data, and this second speech data is sent to described voice authentication server;
Described voice authentication server is carried out after verification operation described second speech data according to described sequence number, and the result is sent to described deciphering module;
Described deciphering module judges whether described encrypt file to be decrypted according to described the result.
Above-mentioned remote speech encipher-decipher method, wherein, the mode that described the first acquisition module is recorded by this locality is obtained described the first speech data; Described the second acquisition module obtains described second speech data by the mode of talking recording.
Above-mentioned remote speech encipher-decipher method, wherein, in the time that described the second acquisition module obtains described second speech data by the mode of talking recording, described the second mobile terminal is quiet.
Above-mentioned remote speech encipher-decipher method, wherein, described the first acquisition module obtains described the first speech data by the mode of talking recording; The mode that described the second acquisition module is recorded by this locality is obtained described second speech data.
Above-mentioned remote speech encipher-decipher method, wherein, in the time that described the first acquisition module obtains described the first speech data by the mode of talking recording, described the first mobile terminal is quiet.
Above-mentioned remote speech encipher-decipher method, wherein, the step that described voice authentication server generates described encryption key according to described the first speech data is specially:
Described voice authentication server is extracted the phonetic feature of described the first speech data, and generates described encryption key according to this phonetic feature.
Above-mentioned remote speech encipher-decipher method, wherein, described voice authentication server is extracted the phonetic feature of described the first speech data and is identified after the voice content of described the first speech data, generates described encryption key according to this phonetic feature and voice content.
Above-mentioned remote speech encipher-decipher method, wherein, the step that described voice authentication server is carried out verification operation according to described sequence number to described second speech data is specially:
Described voice authentication server is extracted the phonetic feature of described second speech data, and transfer according to described sequence number after the phonetic feature of described the first speech data, according to the phonetic feature of described the first speech data, the phonetic feature of described second speech data is carried out to verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, described voice authentication server is extracted phonetic feature and the voice content of described second speech data, and transfer according to described sequence number after the phonetic feature and voice content of described the first speech data, according to the phonetic feature of described the first speech data and voice content, phonetic feature and the voice content to described second speech data carries out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, described the first mobile terminal and described the second mobile terminal are mobile communication terminal device.
Foregoing invention tool has the following advantages or beneficial effect:
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech data acquisition, and the speech data collecting is uploaded to voice authentication server, voice authentication server is extracted the phonetic feature of this speech data and is identified after the voice content of this speech data, after generating a sequence number, and pass this sequence number back mobile terminal and be implanted in file and be encrypted, when deciphering, cloud voice server will complete certification according to phonetic feature corresponding to sequence number and voice content; The method is flexible and convenient to use, has reduced the risk that key is lost and is stolen, and is one of point-to-point classified papers transmission efficiently method easily.
Concrete brief description of the drawings
By reading the detailed description of non-limiting example being done with reference to the following drawings, the present invention and feature thereof, profile and advantage will become more apparent.In whole accompanying drawings, identical mark is indicated identical part.Can proportionally not draw accompanying drawing, focus on illustrating purport of the present invention.
Fig. 1 is the schematic flow sheet of embodiment of the present invention medium-long range voice encryption/decryption method;
Fig. 2 is the flow chart of mobile terminal ciphering process in the embodiment of the present invention;
Fig. 3 is the flow chart of embodiment of the present invention medium cloud voice authentication server ciphering process;
Fig. 4 is the flow chart of mobile terminal decrypting process in the embodiment of the present invention;
Fig. 5 is the schematic diagram of embodiment of the present invention medium cloud voice authentication server decrypting process.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment, the present invention is further illustrated, but not as limiting to the invention.
As shown in Figure 1, the present embodiment relates to a kind of remote speech encipher-decipher method, can be applicable to the first mobile terminal and transmit file to the second mobile terminal, and on the first mobile terminal, be provided with the first acquisition module and encrypting module, on the second mobile terminal, be provided with the second acquisition module and deciphering module, concrete, this remote speech encipher-decipher method comprises the steps:
Step S1, one file to be transmitted is provided on the first mobile terminal, this file to be transmitted can be document, photo or other files to be transmitted that need to encrypt, in an embodiment of the present invention, this file to be transmitted can be the local file on the first mobile terminal, can be also the file that the first mobile terminal obtains by network or other modes.
Step S2, utilize the first acquisition module of the first mobile terminal to obtain the first speech data, and this first speech data is sent to a voice authentication server, preferably, this voice authentication server is to bear the cloud voice authentication server of data operation task, and this cloud voice authentication server can be carried out in the communication network of data interaction between the first mobile terminal and the second mobile terminal.
Step S3, voice authentication server generates after an encryption key according to the first speech data, and after this encryption key is kept to voice authentication server, sequence number corresponding this encryption key is sent to the first mobile terminal.
Step S4, encrypting module is encrypted rear generation encrypt file according to sequence number corresponding to encryption key to file, and encrypt file is sent to the second mobile terminal, preferably, when encrypting module is encrypted file according to sequence number corresponding to encryption key, delete this first speech data further to improve the reliability of encrypt file.
Step S5, the second acquisition module obtains a second speech data, and this second speech data is sent to voice authentication server.
Step S6, voice authentication server is carried out after verification operation second speech data according to sequence number, and the result is sent to deciphering module.
Step S7, deciphering module judges whether encrypt file to be decrypted according to the result, if be verified, encrypt file is decrypted, and obtains file to be transmitted, if checking is not passed through, encrypt file is not decrypted.
In a preferred embodiment of the present invention, in step S2, the mode that the first acquisition module is recorded by this locality is obtained the first speech data; And the second acquisition module obtains second speech data by the mode of talking recording in step S5.
Concrete, in step S2, the user of the first mobile terminal opens encrypting module, directly say and encrypt cipher (this encryption cipher can be a word or a phrase etc.) carrying out during to needs input feature vector code, the first acquisition module is recorded this encryption cipher (i.e. the first speech data of this encryption cipher) simultaneously, and the mode that the first acquisition module is recorded by this locality is obtained the first speech data; Afterwards in step S5, the user of the second mobile terminal sets up the second mobile terminal and is connected (or call connects) with the voice of the first mobile terminal, ask the user of the first mobile terminal to say deciphering cipher, the second acquisition module is recorded this deciphering cipher (this deciphering cipher is second speech data) simultaneously, and the second acquisition module obtains second speech data by the mode of talking recording.
Further, in step S5, in the time carrying out talking recording, the second mobile terminal is quiet, setting up voice at the second mobile terminal and the first mobile terminal was connected after (or call connects), the user of the first mobile terminal says deciphering cipher, the second mobile terminal is in carrying out this deciphering cipher of talking recording, the second mobile terminal is quiet, to ensure the confidentiality (only the user of the first mobile terminal knows this deciphering cipher, and the user of the second mobile terminal also cannot learn this deciphering cipher) of deciphering cipher.
In another preferred embodiment of the present invention, in step S2, the first acquisition module obtains the first speech data by the mode of talking recording; And the mode that the second acquisition module is recorded by this locality in step S5 is obtained second speech data.
Concrete, in step S2, the user of the first mobile terminal opens encrypting module, set up the first mobile terminal when needing input feature vector code and is connected (or the connection of conversing) with the voice of the second mobile terminal carrying out, ask the user of the second mobile terminal to say encryption cipher, meanwhile, the first acquisition module is recorded this encryption cipher (i.e. the first speech data of this encryption cipher), and the first acquisition module obtains the first speech data by the mode of talking recording; Afterwards in step S5, the user of the second mobile terminal directly says deciphering cipher, the second acquisition module is recorded this deciphering cipher (this deciphering cipher is second speech data) simultaneously, and the mode that the second acquisition module is recorded by this locality is obtained second speech data.
Further, in step S2, in the time carrying out talking recording, the first mobile terminal is quiet, setting up voice at the first mobile terminal and the second mobile terminal was connected after (or call connects), the user of the second mobile terminal says and encrypts cipher, the first mobile terminal is in carrying out this encryption cipher of talking recording, the first mobile terminal is quiet, to ensure to encrypt the confidentiality (only the user of the second mobile terminal knows this deciphering cipher, and the user of the first mobile terminal also cannot learn this deciphering cipher) of cipher.
In a preferred embodiment of the present invention, in step S3, voice authentication server is extracted the phonetic feature of the first speech data, and generates encryption key according to this phonetic feature, and sequence number corresponding this encryption key is sent to the first mobile terminal.
Further, voice authentication server can be extracted the phonetic feature of the first speech data and identify the voice content of the first speech data, and generates encryption key according to this phonetic feature and voice content, further to improve the reliability of file encryption.
In a preferred embodiment of the present invention, voice authentication server is extracted the phonetic feature of second speech data, and transfer according to sequence number after the phonetic feature of the first speech data, according to the phonetic feature of the first speech data, the phonetic feature of second speech data is carried out to verification operation.
Further, voice authentication server is extracted phonetic feature and the voice content of second speech data, and transfer according to sequence number after the phonetic feature and voice content of the first speech data, according to the phonetic feature of the first speech data and voice content, phonetic feature and the voice content to second speech data carries out verification operation, preferably, this verification operation is: first the phonetic feature of the phonetic feature to the first speech data and second speech data is compared, if compare unsuccessful, authentication failed, if compare successfully, continue the comparison voice content of the first speech data and the voice content of second speech data, if compare successfully, be verified, if compare unsuccessful, authentication failed.
Concrete, as shown in Figure 2-5:
In ciphering process, as shown in Figure 2, the first mobile terminal starts to treat transmission file and is encrypted, first judge whether to adopt the mode of local cipher to treat to transmit file and be encrypted, if, adopt the local mode of recording cipher to gather the encryption cipher (i.e. the first speech data) of file to be transmitted, if not, adopt the mode of talking recording cipher to gather encryption cipher (i.e. the first speech data), and this encryption cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if do not upload successfully, again obtain and encrypt cipher, if upload successfully, continue to judge whether to obtain sequence number, if acquisition sequence number, this sequence number is implanted to file and complete encryption, encrypt and finish, otherwise, again obtain and encrypt cipher, as shown in Figure 3, cloud voice authentication server obtains after the encryption cipher that the first acquisition module uploads, generate encryption key (extract the phonetic feature of this encryption cipher and identify the voice content that this encryption is talked secretly), if voice content is identified successfully, formation sequence code is also sent to encrypting module by this sequence code, if voice content identification is unsuccessful, send re-send request may to the first mobile terminal.
In decrypting process, as shown in Figure 4, the file that the second mobile terminal starts to have encrypted is decrypted, first judge whether to adopt the mode of local deciphering to be decrypted and (to adopt the mode of local deciphering to be decrypted according to whether adopting local cipher to judge whether in above-mentioned ciphering process this file, in an embodiment of the present invention, encrypt cipher if adopt the local mode of recording to record, adopt the mode of talking recording to record deciphering cipher, otherwise, encrypt cipher if adopt the mode of talking recording to record, adopt the local mode of recording to record deciphering cipher), if, the mode of recording by this locality is recorded deciphering cipher, if not, record deciphering cipher by the mode of talking recording, and this deciphering cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if do not upload successfully, again obtain deciphering cipher, if upload successfully, continue to judge whether to obtain reply (result whether being verified), if do not obtain and reply, again obtain deciphering cipher, reply if obtain, continue to judge according to the content of replying whether checking is passed through, if be verified, be decrypted, if checking is not passed through, finish, as shown in Figure 5, after cloud voice authentication server obtains sequence number from encrypt file, carry out sequence numbers match (finding out phonetic feature and voice content that this sequence number is corresponding), if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, obtain the encryption key that this sequence number is corresponding (phonetic feature and the voice content of the encryption cipher that this sequence number is corresponding), and the phonetic feature of the phonetic feature that corresponding encryption is talked secretly to sequence number and above-mentioned deciphering cipher mates, if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, continue the voice content of the voice content of encryption cipher corresponding sequence number and above-mentioned deciphering cipher to mate, if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, send and be proved to be successful to deciphering module, complete deciphering.
Preferably, the first mobile terminal and the second mobile terminal can be the mobile communication terminal devices such as mobile phone or panel computer, and the first mobile terminal and the second mobile terminal can be same mobile communication terminal device (as the first mobile terminal is mobile phone), also can be for different types of mobile communication terminal device be (if the first mobile terminal is mobile phone, the second mobile terminal is panel computer), in an embodiment of the present invention simultaneously, the required corresponding application program of file encryption-decryption has all been installed on this first mobile terminal and the second mobile terminal, so that this first mobile terminal and the second mobile terminal complete the remote speech encryption and decryption to file.
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech data acquisition, and the speech data collecting is uploaded to voice authentication server, voice authentication server is extracted the phonetic feature of this speech data and is identified after the voice content of this speech data, after generating a sequence number, and pass this sequence number back mobile terminal and be implanted in file and be encrypted, when deciphering, cloud voice server will complete certification according to phonetic feature corresponding to sequence number and voice content; The method is flexible and convenient to use, has reduced the risk that key is lost and is stolen, and is one of point-to-point classified papers transmission efficiently method easily.
It should be appreciated by those skilled in the art that those skilled in the art, realizing described variation example in conjunction with prior art and above-described embodiment, do not repeat at this.Such variation example does not affect flesh and blood of the present invention, does not repeat them here.
Above preferred embodiment of the present invention is described.It will be appreciated that, the present invention is not limited to above-mentioned specific implementations, and the equipment of wherein not describing in detail to the greatest extent and structure are construed as to be implemented with the common mode in this area; Any those of ordinary skill in the art, do not departing from technical solution of the present invention scope situation, all can utilize method and the technology contents of above-mentioned announcement to make many possible variations and modification to technical solution of the present invention, or being revised as the equivalent embodiment of equivalent variations, this does not affect flesh and blood of the present invention.Therefore, every content that does not depart from technical solution of the present invention,, all still belongs in the scope of technical solution of the present invention protection any simple modification made for any of the above embodiments, equivalent variations and modification according to technical spirit of the present invention.