CN104144051A - Remote voice encryption and decryption method - Google Patents

Remote voice encryption and decryption method Download PDF

Info

Publication number
CN104144051A
CN104144051A CN201410357098.6A CN201410357098A CN104144051A CN 104144051 A CN104144051 A CN 104144051A CN 201410357098 A CN201410357098 A CN 201410357098A CN 104144051 A CN104144051 A CN 104144051A
Authority
CN
China
Prior art keywords
speech data
mobile terminal
voice
speech
authentication server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410357098.6A
Other languages
Chinese (zh)
Other versions
CN104144051B (en
Inventor
丁镝飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace Guosheng Technology Co ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201410357098.6A priority Critical patent/CN104144051B/en
Publication of CN104144051A publication Critical patent/CN104144051A/en
Application granted granted Critical
Publication of CN104144051B publication Critical patent/CN104144051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a remote voice encryption and decryption method and relates to the technical field of electronic communication. The method comprises the steps that remote voice data are collected through the call function of a mobile terminal, and the collected voice data are uploaded to a voice authentication server; the voice authentication server extracts voice features of the voice data, identifies the voice content of the voice data, generates a serial number and then sends the serial number back to the mobile terminal; the serial number is implanted into a file and encrypted; in the decryption process, a cloud voice server completes authentication according to the voice features and voice content corresponding to the serial number. The remote voice encryption and decryption method is flexible and convenient to use, reduces the risks that a secret key is lost and stolen, and is an efficient and quick method for point-to-point secret document transmission.

Description

A kind of remote speech encipher-decipher method
Technical field
The present invention relates to electronic communication field, relate in particular to a kind of remote speech encipher-decipher method that transmits file between mobile terminal that is applied to.
Background technology
Along with the development of mobile communication technology, for example mobile phone, the function of the mobile terminals such as panel computer from strength to strength, simultaneously, along with popularizing of mobile terminal, increasing user carries out the transmission of file between mobile terminal, as transmitted document between mobile terminal, photo or song etc., therefore, between mobile terminal, carry out the life that the high efficiency of file transmission and convenience greatly facilitate people, and meanwhile, the file (particularly relate to the photo of privacy and relate to secret document) transmitting is carried out to encryption and decryption and just becoming more and more important with the confidentiality of protected file.
At present, to transmitting file while carrying out encryption and decryption, in encrypt file is sent to the other side's hand after, often need separately to pass a key (password string or key file etc.).This has increased key undoubtedly loses or the equivalent risk that is stolen, and then is unfavorable for the protection of classified papers.
Therefore, how to find a kind of encipher-decipher method that transmits file between mobile terminal that is applied to, endeavour the direction of research effectively to protect the transmission of classified papers to become those skilled in the art.
Summary of the invention
For the problem of above-mentioned existence; the present invention discloses a kind of remote speech encipher-decipher method; with overcome in prior art file is carried out to encryption and decryption need to be in transmitting file; the a key of another biography; thereby increase the risk that key is lost or is stolen, and then be unfavorable for the problem of protected file confidentiality.
To achieve these goals, the application has recorded a kind of remote speech encipher-decipher method, wherein, be applied to the first mobile terminal and transmit file to the second mobile terminal, and be provided with the first acquisition module and encrypting module on described the first mobile terminal, on described the second mobile terminal, be provided with the second acquisition module and deciphering module, described method comprises the steps:
One file to be transmitted is provided on described the first mobile terminal;
Utilize described the first acquisition module to obtain the first speech data, and this first speech data is sent to a voice authentication server;
Described voice authentication server generates an encryption key according to described the first speech data, and after preserving this encryption key, sequence number corresponding this encryption key is sent to described the first mobile terminal;
Described encrypting module is encrypted rear generation encrypt file according to described sequence number to described file, and described encrypt file is sent to described the second mobile terminal;
Described the second acquisition module obtains a second speech data, and this second speech data is sent to described voice authentication server;
Described voice authentication server is carried out after verification operation described second speech data according to described sequence number, and the result is sent to described deciphering module;
Described deciphering module judges whether described encrypt file to be decrypted according to described the result.
Above-mentioned remote speech encipher-decipher method, wherein, the mode that described the first acquisition module is recorded by this locality is obtained described the first speech data; Described the second acquisition module obtains described second speech data by the mode of talking recording.
Above-mentioned remote speech encipher-decipher method, wherein, in the time that described the second acquisition module obtains described second speech data by the mode of talking recording, described the second mobile terminal is quiet.
Above-mentioned remote speech encipher-decipher method, wherein, described the first acquisition module obtains described the first speech data by the mode of talking recording; The mode that described the second acquisition module is recorded by this locality is obtained described second speech data.
Above-mentioned remote speech encipher-decipher method, wherein, in the time that described the first acquisition module obtains described the first speech data by the mode of talking recording, described the first mobile terminal is quiet.
Above-mentioned remote speech encipher-decipher method, wherein, the step that described voice authentication server generates described encryption key according to described the first speech data is specially:
Described voice authentication server is extracted the phonetic feature of described the first speech data, and generates described encryption key according to this phonetic feature.
Above-mentioned remote speech encipher-decipher method, wherein, described voice authentication server is extracted the phonetic feature of described the first speech data and is identified after the voice content of described the first speech data, generates described encryption key according to this phonetic feature and voice content.
Above-mentioned remote speech encipher-decipher method, wherein, the step that described voice authentication server is carried out verification operation according to described sequence number to described second speech data is specially:
Described voice authentication server is extracted the phonetic feature of described second speech data, and transfer according to described sequence number after the phonetic feature of described the first speech data, according to the phonetic feature of described the first speech data, the phonetic feature of described second speech data is carried out to verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, described voice authentication server is extracted phonetic feature and the voice content of described second speech data, and transfer according to described sequence number after the phonetic feature and voice content of described the first speech data, according to the phonetic feature of described the first speech data and voice content, phonetic feature and the voice content to described second speech data carries out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, described the first mobile terminal and described the second mobile terminal are mobile communication terminal device.
Foregoing invention tool has the following advantages or beneficial effect:
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech data acquisition, and the speech data collecting is uploaded to voice authentication server, voice authentication server is extracted the phonetic feature of this speech data and is identified after the voice content of this speech data, after generating a sequence number, and pass this sequence number back mobile terminal and be implanted in file and be encrypted, when deciphering, cloud voice server will complete certification according to phonetic feature corresponding to sequence number and voice content; The method is flexible and convenient to use, has reduced the risk that key is lost and is stolen, and is one of point-to-point classified papers transmission efficiently method easily.
Concrete brief description of the drawings
By reading the detailed description of non-limiting example being done with reference to the following drawings, the present invention and feature thereof, profile and advantage will become more apparent.In whole accompanying drawings, identical mark is indicated identical part.Can proportionally not draw accompanying drawing, focus on illustrating purport of the present invention.
Fig. 1 is the schematic flow sheet of embodiment of the present invention medium-long range voice encryption/decryption method;
Fig. 2 is the flow chart of mobile terminal ciphering process in the embodiment of the present invention;
Fig. 3 is the flow chart of embodiment of the present invention medium cloud voice authentication server ciphering process;
Fig. 4 is the flow chart of mobile terminal decrypting process in the embodiment of the present invention;
Fig. 5 is the schematic diagram of embodiment of the present invention medium cloud voice authentication server decrypting process.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment, the present invention is further illustrated, but not as limiting to the invention.
As shown in Figure 1, the present embodiment relates to a kind of remote speech encipher-decipher method, can be applicable to the first mobile terminal and transmit file to the second mobile terminal, and on the first mobile terminal, be provided with the first acquisition module and encrypting module, on the second mobile terminal, be provided with the second acquisition module and deciphering module, concrete, this remote speech encipher-decipher method comprises the steps:
Step S1, one file to be transmitted is provided on the first mobile terminal, this file to be transmitted can be document, photo or other files to be transmitted that need to encrypt, in an embodiment of the present invention, this file to be transmitted can be the local file on the first mobile terminal, can be also the file that the first mobile terminal obtains by network or other modes.
Step S2, utilize the first acquisition module of the first mobile terminal to obtain the first speech data, and this first speech data is sent to a voice authentication server, preferably, this voice authentication server is to bear the cloud voice authentication server of data operation task, and this cloud voice authentication server can be carried out in the communication network of data interaction between the first mobile terminal and the second mobile terminal.
Step S3, voice authentication server generates after an encryption key according to the first speech data, and after this encryption key is kept to voice authentication server, sequence number corresponding this encryption key is sent to the first mobile terminal.
Step S4, encrypting module is encrypted rear generation encrypt file according to sequence number corresponding to encryption key to file, and encrypt file is sent to the second mobile terminal, preferably, when encrypting module is encrypted file according to sequence number corresponding to encryption key, delete this first speech data further to improve the reliability of encrypt file.
Step S5, the second acquisition module obtains a second speech data, and this second speech data is sent to voice authentication server.
Step S6, voice authentication server is carried out after verification operation second speech data according to sequence number, and the result is sent to deciphering module.
Step S7, deciphering module judges whether encrypt file to be decrypted according to the result, if be verified, encrypt file is decrypted, and obtains file to be transmitted, if checking is not passed through, encrypt file is not decrypted.
In a preferred embodiment of the present invention, in step S2, the mode that the first acquisition module is recorded by this locality is obtained the first speech data; And the second acquisition module obtains second speech data by the mode of talking recording in step S5.
Concrete, in step S2, the user of the first mobile terminal opens encrypting module, directly say and encrypt cipher (this encryption cipher can be a word or a phrase etc.) carrying out during to needs input feature vector code, the first acquisition module is recorded this encryption cipher (i.e. the first speech data of this encryption cipher) simultaneously, and the mode that the first acquisition module is recorded by this locality is obtained the first speech data; Afterwards in step S5, the user of the second mobile terminal sets up the second mobile terminal and is connected (or call connects) with the voice of the first mobile terminal, ask the user of the first mobile terminal to say deciphering cipher, the second acquisition module is recorded this deciphering cipher (this deciphering cipher is second speech data) simultaneously, and the second acquisition module obtains second speech data by the mode of talking recording.
Further, in step S5, in the time carrying out talking recording, the second mobile terminal is quiet, setting up voice at the second mobile terminal and the first mobile terminal was connected after (or call connects), the user of the first mobile terminal says deciphering cipher, the second mobile terminal is in carrying out this deciphering cipher of talking recording, the second mobile terminal is quiet, to ensure the confidentiality (only the user of the first mobile terminal knows this deciphering cipher, and the user of the second mobile terminal also cannot learn this deciphering cipher) of deciphering cipher.
In another preferred embodiment of the present invention, in step S2, the first acquisition module obtains the first speech data by the mode of talking recording; And the mode that the second acquisition module is recorded by this locality in step S5 is obtained second speech data.
Concrete, in step S2, the user of the first mobile terminal opens encrypting module, set up the first mobile terminal when needing input feature vector code and is connected (or the connection of conversing) with the voice of the second mobile terminal carrying out, ask the user of the second mobile terminal to say encryption cipher, meanwhile, the first acquisition module is recorded this encryption cipher (i.e. the first speech data of this encryption cipher), and the first acquisition module obtains the first speech data by the mode of talking recording; Afterwards in step S5, the user of the second mobile terminal directly says deciphering cipher, the second acquisition module is recorded this deciphering cipher (this deciphering cipher is second speech data) simultaneously, and the mode that the second acquisition module is recorded by this locality is obtained second speech data.
Further, in step S2, in the time carrying out talking recording, the first mobile terminal is quiet, setting up voice at the first mobile terminal and the second mobile terminal was connected after (or call connects), the user of the second mobile terminal says and encrypts cipher, the first mobile terminal is in carrying out this encryption cipher of talking recording, the first mobile terminal is quiet, to ensure to encrypt the confidentiality (only the user of the second mobile terminal knows this deciphering cipher, and the user of the first mobile terminal also cannot learn this deciphering cipher) of cipher.
In a preferred embodiment of the present invention, in step S3, voice authentication server is extracted the phonetic feature of the first speech data, and generates encryption key according to this phonetic feature, and sequence number corresponding this encryption key is sent to the first mobile terminal.
Further, voice authentication server can be extracted the phonetic feature of the first speech data and identify the voice content of the first speech data, and generates encryption key according to this phonetic feature and voice content, further to improve the reliability of file encryption.
In a preferred embodiment of the present invention, voice authentication server is extracted the phonetic feature of second speech data, and transfer according to sequence number after the phonetic feature of the first speech data, according to the phonetic feature of the first speech data, the phonetic feature of second speech data is carried out to verification operation.
Further, voice authentication server is extracted phonetic feature and the voice content of second speech data, and transfer according to sequence number after the phonetic feature and voice content of the first speech data, according to the phonetic feature of the first speech data and voice content, phonetic feature and the voice content to second speech data carries out verification operation, preferably, this verification operation is: first the phonetic feature of the phonetic feature to the first speech data and second speech data is compared, if compare unsuccessful, authentication failed, if compare successfully, continue the comparison voice content of the first speech data and the voice content of second speech data, if compare successfully, be verified, if compare unsuccessful, authentication failed.
Concrete, as shown in Figure 2-5:
In ciphering process, as shown in Figure 2, the first mobile terminal starts to treat transmission file and is encrypted, first judge whether to adopt the mode of local cipher to treat to transmit file and be encrypted, if, adopt the local mode of recording cipher to gather the encryption cipher (i.e. the first speech data) of file to be transmitted, if not, adopt the mode of talking recording cipher to gather encryption cipher (i.e. the first speech data), and this encryption cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if do not upload successfully, again obtain and encrypt cipher, if upload successfully, continue to judge whether to obtain sequence number, if acquisition sequence number, this sequence number is implanted to file and complete encryption, encrypt and finish, otherwise, again obtain and encrypt cipher, as shown in Figure 3, cloud voice authentication server obtains after the encryption cipher that the first acquisition module uploads, generate encryption key (extract the phonetic feature of this encryption cipher and identify the voice content that this encryption is talked secretly), if voice content is identified successfully, formation sequence code is also sent to encrypting module by this sequence code, if voice content identification is unsuccessful, send re-send request may to the first mobile terminal.
In decrypting process, as shown in Figure 4, the file that the second mobile terminal starts to have encrypted is decrypted, first judge whether to adopt the mode of local deciphering to be decrypted and (to adopt the mode of local deciphering to be decrypted according to whether adopting local cipher to judge whether in above-mentioned ciphering process this file, in an embodiment of the present invention, encrypt cipher if adopt the local mode of recording to record, adopt the mode of talking recording to record deciphering cipher, otherwise, encrypt cipher if adopt the mode of talking recording to record, adopt the local mode of recording to record deciphering cipher), if, the mode of recording by this locality is recorded deciphering cipher, if not, record deciphering cipher by the mode of talking recording, and this deciphering cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if do not upload successfully, again obtain deciphering cipher, if upload successfully, continue to judge whether to obtain reply (result whether being verified), if do not obtain and reply, again obtain deciphering cipher, reply if obtain, continue to judge according to the content of replying whether checking is passed through, if be verified, be decrypted, if checking is not passed through, finish, as shown in Figure 5, after cloud voice authentication server obtains sequence number from encrypt file, carry out sequence numbers match (finding out phonetic feature and voice content that this sequence number is corresponding), if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, obtain the encryption key that this sequence number is corresponding (phonetic feature and the voice content of the encryption cipher that this sequence number is corresponding), and the phonetic feature of the phonetic feature that corresponding encryption is talked secretly to sequence number and above-mentioned deciphering cipher mates, if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, continue the voice content of the voice content of encryption cipher corresponding sequence number and above-mentioned deciphering cipher to mate, if mate unsuccessful, send authentication failed to deciphering module, if the match is successful, send and be proved to be successful to deciphering module, complete deciphering.
Preferably, the first mobile terminal and the second mobile terminal can be the mobile communication terminal devices such as mobile phone or panel computer, and the first mobile terminal and the second mobile terminal can be same mobile communication terminal device (as the first mobile terminal is mobile phone), also can be for different types of mobile communication terminal device be (if the first mobile terminal is mobile phone, the second mobile terminal is panel computer), in an embodiment of the present invention simultaneously, the required corresponding application program of file encryption-decryption has all been installed on this first mobile terminal and the second mobile terminal, so that this first mobile terminal and the second mobile terminal complete the remote speech encryption and decryption to file.
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech data acquisition, and the speech data collecting is uploaded to voice authentication server, voice authentication server is extracted the phonetic feature of this speech data and is identified after the voice content of this speech data, after generating a sequence number, and pass this sequence number back mobile terminal and be implanted in file and be encrypted, when deciphering, cloud voice server will complete certification according to phonetic feature corresponding to sequence number and voice content; The method is flexible and convenient to use, has reduced the risk that key is lost and is stolen, and is one of point-to-point classified papers transmission efficiently method easily.
It should be appreciated by those skilled in the art that those skilled in the art, realizing described variation example in conjunction with prior art and above-described embodiment, do not repeat at this.Such variation example does not affect flesh and blood of the present invention, does not repeat them here.
Above preferred embodiment of the present invention is described.It will be appreciated that, the present invention is not limited to above-mentioned specific implementations, and the equipment of wherein not describing in detail to the greatest extent and structure are construed as to be implemented with the common mode in this area; Any those of ordinary skill in the art, do not departing from technical solution of the present invention scope situation, all can utilize method and the technology contents of above-mentioned announcement to make many possible variations and modification to technical solution of the present invention, or being revised as the equivalent embodiment of equivalent variations, this does not affect flesh and blood of the present invention.Therefore, every content that does not depart from technical solution of the present invention,, all still belongs in the scope of technical solution of the present invention protection any simple modification made for any of the above embodiments, equivalent variations and modification according to technical spirit of the present invention.

Claims (10)

1. a remote speech encipher-decipher method, it is characterized in that, be applied to the first mobile terminal and transmit file to the second mobile terminal, and be provided with the first acquisition module and encrypting module on described the first mobile terminal, on described the second mobile terminal, be provided with the second acquisition module and deciphering module, described method comprises the steps:
One file to be transmitted is provided on described the first mobile terminal;
Utilize described the first acquisition module to obtain the first speech data, and this first speech data is sent to a voice authentication server;
Described voice authentication server generates an encryption key according to described the first speech data, and after preserving this encryption key, sequence number corresponding this encryption key is sent to described the first mobile terminal;
Described encrypting module is encrypted rear generation encrypt file according to described sequence number to described file, and described encrypt file is sent to described the second mobile terminal;
Described the second acquisition module obtains a second speech data, and this second speech data is sent to described voice authentication server;
Described voice authentication server is carried out after verification operation described second speech data according to described sequence number, and the result is sent to described deciphering module;
Described deciphering module judges whether described encrypt file to be decrypted according to described the result.
2. remote speech encipher-decipher method as claimed in claim 1, is characterized in that, the mode that described the first acquisition module is recorded by this locality is obtained described the first speech data; Described the second acquisition module obtains described second speech data by the mode of talking recording.
3. remote speech encipher-decipher method as claimed in claim 2, is characterized in that, in the time that described the second acquisition module obtains described second speech data by the mode of talking recording, described the second mobile terminal is quiet.
4. remote speech encipher-decipher method as claimed in claim 1, is characterized in that, described the first acquisition module obtains described the first speech data by the mode of talking recording; The mode that described the second acquisition module is recorded by this locality is obtained described second speech data.
5. remote speech encipher-decipher method as claimed in claim 4, is characterized in that, in the time that described the first acquisition module obtains described the first speech data by the mode of talking recording, described the first mobile terminal is quiet.
6. remote speech encipher-decipher method as claimed in claim 1, is characterized in that, the step that described voice authentication server generates described encryption key according to described the first speech data is specially:
Described voice authentication server is extracted the phonetic feature of described the first speech data, and generates described encryption key according to this phonetic feature.
7. remote speech encipher-decipher method as claimed in claim 6, it is characterized in that, described voice authentication server is extracted the phonetic feature of described the first speech data and is identified after the voice content of described the first speech data, generates described encryption key according to this phonetic feature and voice content.
8. remote speech encipher-decipher method as claimed in claim 7, is characterized in that, the step that described voice authentication server is carried out verification operation according to described sequence number to described second speech data is specially:
Described voice authentication server is extracted the phonetic feature of described second speech data, and transfer according to described sequence number after the phonetic feature of described the first speech data, according to the phonetic feature of described the first speech data, the phonetic feature of described second speech data is carried out to verification operation.
9. remote speech encipher-decipher method as claimed in claim 8, it is characterized in that, described voice authentication server is extracted phonetic feature and the voice content of described second speech data, and transfer according to described sequence number after the phonetic feature and voice content of described the first speech data, according to the phonetic feature of described the first speech data and voice content, phonetic feature and the voice content to described second speech data carries out verification operation.
10. the remote speech encipher-decipher method as described in any one in claims 1-9, is characterized in that, described the first mobile terminal and described the second mobile terminal are mobile communication terminal device.
CN201410357098.6A 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method Active CN104144051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410357098.6A CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410357098.6A CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Publications (2)

Publication Number Publication Date
CN104144051A true CN104144051A (en) 2014-11-12
CN104144051B CN104144051B (en) 2018-04-06

Family

ID=51853123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410357098.6A Active CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Country Status (1)

Country Link
CN (1) CN104144051B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105023155A (en) * 2015-07-29 2015-11-04 广东欧珀移动通信有限公司 Payment method, network equipment and terminal equipment
CN111931484A (en) * 2020-07-31 2020-11-13 于梦丽 Data transmission method based on big data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855955A (en) * 2005-04-27 2006-11-01 英华达(上海)电子有限公司 Voice encryption and decryption
CN101345965A (en) * 2008-08-29 2009-01-14 中国电信股份有限公司 Encryption call method based on speech code stream and mobile terminal
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102413462A (en) * 2011-11-21 2012-04-11 郑州信大捷安信息技术股份有限公司 Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN102883325A (en) * 2012-10-29 2013-01-16 东莞宇龙通信科技有限公司 Identification server, mobile terminal and end-to-end identification communication channel establishing method
CN103023580A (en) * 2012-12-06 2013-04-03 深圳市创想天空科技有限公司 Method for achieving data transmission through voice
CN103023900A (en) * 2012-12-06 2013-04-03 北京百度网讯科技有限公司 Identity authentication method, cloud service system and cloud server based on cloud server-side

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855955A (en) * 2005-04-27 2006-11-01 英华达(上海)电子有限公司 Voice encryption and decryption
CN101345965A (en) * 2008-08-29 2009-01-14 中国电信股份有限公司 Encryption call method based on speech code stream and mobile terminal
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102413462A (en) * 2011-11-21 2012-04-11 郑州信大捷安信息技术股份有限公司 Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN102883325A (en) * 2012-10-29 2013-01-16 东莞宇龙通信科技有限公司 Identification server, mobile terminal and end-to-end identification communication channel establishing method
CN103023580A (en) * 2012-12-06 2013-04-03 深圳市创想天空科技有限公司 Method for achieving data transmission through voice
CN103023900A (en) * 2012-12-06 2013-04-03 北京百度网讯科技有限公司 Identity authentication method, cloud service system and cloud server based on cloud server-side

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105023155A (en) * 2015-07-29 2015-11-04 广东欧珀移动通信有限公司 Payment method, network equipment and terminal equipment
CN111931484A (en) * 2020-07-31 2020-11-13 于梦丽 Data transmission method based on big data
CN111931484B (en) * 2020-07-31 2022-02-25 贵州多彩宝互联网服务有限公司 Data transmission method based on big data

Also Published As

Publication number Publication date
CN104144051B (en) 2018-04-06

Similar Documents

Publication Publication Date Title
CN107169374B (en) Encryption and decryption system and method based on voiceprint and voice recognition technology
JP2020144873A (en) Hearing device with communication protection and related method
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN103152366B (en) Obtain the method for terminal authorization, terminal and server
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN1889419B (en) Method and apparatus for realizing encrypting
CN105722013A (en) Bluetooth pairing method and device
CN101621794A (en) Method for realizing safe authentication of wireless application service system
EP3386165B1 (en) Method and device for implementing and managing secure communications, provisioning systems, authentication and signing systems
CN103714299A (en) Method and system for encryption and decryption of file of mobile terminal
CN102404337A (en) Data encryption method and device
CN105208028A (en) Data transmission method and related device and equipment
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
CN103701586A (en) Method and device for acquiring secret key
CN103905388A (en) Authentication method, authentication device, smart card, and server
CN109005144B (en) Identity authentication method, equipment, medium and system
WO2015196642A1 (en) Data encryption method, decryption method and device
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN116709325B (en) Mobile equipment security authentication method based on high-speed encryption algorithm
CN105554759A (en) Authentication method and authentication system
CN105847261B (en) A kind of electronic signature method based on the wireless encryption and decryption of bluetooth
CN104144051A (en) Remote voice encryption and decryption method
KR101745482B1 (en) Communication method and apparatus in smart-home system
JP2014527786A (en) Communication system for authentication by fingerprint information and use thereof
KR102053993B1 (en) Method for Authenticating by using Certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201203

Address after: 313021 industrial function area of Donglin Town, Huzhou City, Zhejiang Province

Patentee after: ZHEJIANG YUANTE NEW MATERIAL Co.,Ltd.

Address before: 201620 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211123

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 313021 industrial functional zone, Donglin Town, Huzhou City, Zhejiang Province

Patentee before: ZHEJIANG YUANTE NEW MATERIAL CO.,LTD.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A remote speech encryption and decryption method

Effective date of registration: 20221205

Granted publication date: 20180406

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2022330003458

PC01 Cancellation of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231205

Granted publication date: 20180406

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2022330003458

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240219

Address after: Room 601, 6th Floor, Building 5, Lianhuayuan, Haidian District, Beijing, 100080

Patentee after: Aerospace Guosheng Technology Co.,Ltd.

Country or region after: China

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Country or region before: China