The content of the invention
For above-mentioned problem, the present invention discloses a kind of remote speech encipher-decipher method, to overcome in the prior art
Carrying out encryption and decryption to file needs while file is transmitted, and separately passes a key, so as to add key loss or be stolen
Risk, and then be unfavorable for protect file confidentiality the problem of.
To achieve these goals, the application describes a kind of remote speech encipher-decipher method, wherein, moved applied to first
Dynamic terminal transmits file to the second mobile terminal, and the first acquisition module and encryption mould are provided with first mobile terminal
Block, the second acquisition module and deciphering module is provided with second mobile terminal, methods described comprises the following steps:
In one file to be sent of offer on first mobile terminal;
The first speech data is obtained using first acquisition module, and first speech data is sent to a voice and recognized
Demonstrate,prove server;
The voice authentication server generates an encryption key according to first speech data, and close in preserving the encryption
After key, sequence number corresponding to the encryption key is sent to first mobile terminal;
Generation encryption file after the file is encrypted according to the sequence number for the encrypting module, and described will add
Ciphertext part is sent to second mobile terminal;
Second acquisition module obtains a second speech data, and the second speech data is sent into the voice and recognized
Demonstrate,prove server;
After the voice authentication server carries out verification operation according to the sequence number to the second speech data, and will
The result is sent to the deciphering module;
The deciphering module according to the result judges whether that the encryption file is decrypted.
Above-mentioned remote speech encipher-decipher method, wherein, first acquisition module is obtained by way of locally recording
First speech data;Second acquisition module obtains the second speech data by way of talking recording.
Above-mentioned remote speech encipher-decipher method, wherein, obtained in second acquisition module by way of talking recording
When taking the second speech data, second mobile terminal is Jing Yin.
Above-mentioned remote speech encipher-decipher method, wherein, first acquisition module is obtained by way of talking recording
First speech data;Second acquisition module obtains the second speech data by way of locally recording.
Above-mentioned remote speech encipher-decipher method, wherein, obtained in first acquisition module by way of talking recording
When taking first speech data, first mobile terminal is Jing Yin.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server is according to first speech data
The step of generating the encryption key be specially:
The voice authentication server extracts the phonetic feature of first speech data, and is generated according to the phonetic feature
The encryption key.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server extracts first speech data
Phonetic feature and after identifying the voice content of first speech data, according to the phonetic feature and voice content generation
Encryption key.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server is according to the sequence number to described
Second speech data carry out verification operation the step of be specially:
The voice authentication server extracts the phonetic feature of the second speech data, and is transferred according to the sequence number
After the phonetic feature of first speech data, according to the phonetic feature of first speech data to the second speech data
Phonetic feature carry out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server extracts the second speech data
Phonetic feature and voice content, and transfer according to the sequence number phonetic feature and voice content of first speech data
Afterwards, the phonetic feature and voice according to the phonetic feature of first speech data and voice content to the second speech data
Content carries out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, first mobile terminal and second mobile terminal are
Mobile communication terminal device.
Foregoing invention has the following advantages that or beneficial effect:
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech number
Voice authentication server is uploaded to according to collection, and by the speech data collected, voice authentication server extracts the speech data
Phonetic feature and after identifying the voice content of the speech data, after generating a sequence number, and pass the sequence number back shifting
Dynamic terminal, which is implanted in file, to be encrypted, during decryption cloud voice server will according to corresponding to sequence number phonetic feature and voice
Content completes certification;This method is flexible and convenient to use, reduces the risk that key is lost and is stolen, is point-to-point classified papers
The efficient easily method of one of transmission.
Specific brief description of the drawings
By reading the detailed description made with reference to the following drawings to non-limiting example, the present invention and its feature, outside
Shape and advantage will become more apparent.The identical mark instruction identical part in whole accompanying drawings.Not can according to than
Example draws accompanying drawing, it is preferred that emphasis is shows the purport of the present invention.
Fig. 1 is the schematic flow sheet of medium-long range voice encryption/decryption method of the embodiment of the present invention;
Fig. 2 is the flow chart of mobile terminal ciphering process in the embodiment of the present invention;
Fig. 3 is the flow chart of medium cloud voice authentication server ciphering process of the embodiment of the present invention;
Fig. 4 is the flow chart of mobile terminal decrypting process in the embodiment of the present invention;
Fig. 5 is the schematic diagram of medium cloud voice authentication server decrypting process of the embodiment of the present invention.
Embodiment
The present invention is further illustrated with specific embodiment below in conjunction with the accompanying drawings, but not as the limit of the present invention
It is fixed.
As shown in figure 1, the present embodiment is related to a kind of remote speech encipher-decipher method, the first mobile terminal is can be applied to
Two mobile terminals transmit file, and the first acquisition module and encrypting module are provided with the first mobile terminal, the second mobile terminal
On be provided with the second acquisition module and deciphering module, specifically, the remote speech encipher-decipher method comprises the following steps:
Step S1, in providing a file to be sent on the first mobile terminal, the file to be transmitted can be document, photo
Or the file to be transmitted that other needs are encrypted, in an embodiment of the present invention, the file to be transmitted can be the first mobile terminal
On local file, or the first mobile terminal passes through the file that network or other modes obtain.
Step S2, the first speech data is obtained using the first acquisition module of the first mobile terminal, and by first voice
Data are sent to a voice authentication server, it is preferred that the voice authentication server is that can undertake the cloud language of data operation task
Sound certificate server, and the cloud voice authentication server can carry out data between the first mobile terminal and the second mobile terminal
In interactive communication network.
Step S3, after voice authentication server generates an encryption key according to the first speech data, and in the encryption is close
Key is stored in after voice authentication server, and sequence number corresponding to the encryption key is sent to the first mobile terminal.
Step S4, encrypting module generation encryption file after file is encrypted sequence number according to corresponding to encryption key,
And by encryption file be sent to the second mobile terminal, it is preferred that encrypting module according to corresponding to encryption key sequence number to file
When being encrypted, first speech data is deleted with the further reliability for improving encryption file.
Step S5, the second acquisition module obtains a second speech data, and the second speech data is sent into voice and recognized
Demonstrate,prove server.
Step S6, after voice authentication server carries out verification operation according to sequence number to second speech data, and will checking
As a result send to deciphering module.
Step S7, deciphering module according to the result judges whether that encryption file is decrypted, right if being verified
Encryption file is decrypted, and obtains file to be transmitted, if checking is not by encryption file being decrypted.
In a preferred embodiment of the invention, in step s 2, the first acquisition module passes through the side that locally records
Formula obtains the first speech data;And the second acquisition module obtains the second voice number by way of talking recording in step s 5
According to.
Specifically, in step s 2, the user of the first mobile terminal opens encrypting module, needs input feature vector going to
Encryption cipher (encryption cipher can be in short or phrase etc.) is directly said during code, while the first acquisition module is recorded
Make encryption cipher (encryption talk secretly i.e. the first speech data), i.e. the first acquisition module obtains the by way of locally recording
One speech data;Afterwards in step s 5, the user of the second mobile terminal establishes the second mobile terminal and the first mobile terminal
Voice connection (or call connection), the user of the first mobile terminal of request says decryption cipher, while the second acquisition module is recorded
The decryption is talked secretly (the decryption cipher is second speech data), i.e., the second acquisition module obtains second by way of talking recording
Speech data.
Further, in step s 5, when carrying out talking recording, the second mobile terminal is Jing Yin, i.e., in the second movement eventually
End and the first mobile terminal are established after voice connect (or call connection), and the user of the first mobile terminal says to decrypt and talked secretly, the
For two mobile terminals while talking recording decryption cipher is carried out, the second mobile terminal is Jing Yin, to ensure to decrypt the machine of cipher
(i.e. the user of only the first mobile terminal knows that the decryption is talked secretly to close property, and the user of the second mobile terminal can not also learn the decryption
Cipher).
In another preferred embodiment of the present invention, in step s 2, the first acquisition module passes through talking recording
Mode obtains the first speech data;And the second acquisition module obtains the second voice number by way of locally recording in step s 5
According to.
Specifically, in step s 2, the user of the first mobile terminal opens encrypting module, needs input feature vector going to
The voice connection (or call connection) of the first mobile terminal and the second mobile terminal is established during code, asks the use of the second mobile terminal
Encryption cipher is said at family, meanwhile, the first acquisition module records encryption cipher (encryption talk secretly i.e. the first speech data), i.e., and the
One acquisition module obtains the first speech data by way of talking recording;Afterwards in step s 5, the use of the second mobile terminal
Decryption cipher is directly said at family, while the second acquisition module records decryption cipher (decryption cipher i.e. second speech data),
I.e. the second acquisition module obtains second speech data by way of locally recording.
Further, in step s 2, when carrying out talking recording, the first mobile terminal is Jing Yin, i.e., in the first movement eventually
End and the second mobile terminal are established after voice connect (or call connection), and the user of the second mobile terminal says to encrypt and talked secretly, the
For one mobile terminal while talking recording encryption cipher is carried out, the first mobile terminal is Jing Yin, to ensure to encrypt the machine of cipher
(i.e. the user of only the second mobile terminal knows that the decryption is talked secretly to close property, and the user of the first mobile terminal can not also learn the decryption
Cipher).
In a preferred embodiment of the invention, in step s3, voice authentication server extracts the first voice number
According to phonetic feature, and according to the phonetic feature generate encryption key, and by corresponding to the encryption key sequence number send first
Mobile terminal.
Further, voice authentication server can extract the phonetic feature of the first speech data and identify the first voice number
According to voice content, and encryption key is generated according to the phonetic feature and voice content, can with further improve file encryption
By property.
In a preferred embodiment of the invention, the voice of voice authentication server extraction second speech data is special
Sign, and after transferring according to sequence number the phonetic feature of the first speech data, according to the phonetic feature of the first speech data to second
The phonetic feature of speech data carries out verification operation.
Further, the phonetic feature and voice content of voice authentication server extraction second speech data, and according to sequence
After row number transfers the phonetic feature and voice content of the first speech data, according in the phonetic feature and voice of the first speech data
Hold and verification operation is carried out to the phonetic feature and voice content of second speech data, it is preferred that the verification operation is:First to
The phonetic feature of one speech data and the phonetic feature of second speech data are compared, if comparison is unsuccessful, authentication failed,
If compare successfully, continue compare the first speech data voice content and second speech data voice content, if compare into
Work(, then it is verified, if comparison is unsuccessful, authentication failed.
Specifically, as shown in Figure 2-5:
In ciphering process, as shown in Fig. 2 the first mobile terminal starts that file to be transmitted is encrypted, first determine whether
Whether file to be transmitted is encrypted by the way of local cipher, if so, then being gathered by the way of cipher is locally recorded
The encryption cipher (i.e. the first speech data) of file to be transmitted, if it is not, it is close then to gather encryption by the way of talking recording cipher
Language (i.e. the first speech data), and encryption cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if
Success is not uploaded, then reacquires encryption cipher, if uploading successfully, continues to determine whether to obtain sequence number, if obtaining sequence
Number, then sequence number implantation file is completed into encryption, then encryption terminates, and otherwise, then reacquires encryption cipher;As shown in figure 3,
After cloud voice authentication server obtains the encryption cipher that the first acquisition module uploads, generation encryption key (it is close to extract the encryption
The phonetic feature of language and the voice content for identifying encryption cipher), if voice content identifies successfully, formation sequence code simultaneously should
Sequence code is sent to encrypting module, if voice content identification is unsuccessful, is sent and is retransmitted request to the first mobile terminal.
In decrypting process, as shown in figure 4, the file that the second mobile terminal starts to have encrypted is decrypted, first determine whether
Whether (whether sentenced according in above-mentioned ciphering process using local cipher using by the way of locally decrypting this document being decrypted
It is disconnected whether to be decrypted by the way of locally decrypting, in an embodiment of the present invention, recorded according to the mode locally recorded
Encryption cipher, then recorded by the way of talking recording decryption cipher, conversely, according to talking recording mode record encryption it is close
Language, then decryption cipher is recorded by the way of locally recording), if so, decryption cipher is then recorded by way of locally recording, if
It is no, then decryption cipher is recorded by way of talking recording, and decryption cipher is uploaded to cloud voice authentication server and sentenced
It is disconnected whether to upload success, if not uploading success, decryption cipher is reacquired, if uploading successfully, continues to determine whether to obtain
Reply (result whether being verified), if not replied, reacquire decryption cipher, if being replied, continue
Judge to verify whether by if being verified, being decrypted, if checking is not by terminating according to the content of reply;Such as figure
Shown in 5, after cloud voice authentication server obtains sequence number from encryption file, carry out sequence numbers match and (find out the sequence
Phonetic feature corresponding to number and voice content), if matching is unsuccessful, authentication failed is sent to deciphering module, if the match is successful,
Encryption key corresponding to the sequence number (phonetic feature and voice content of encryption cipher i.e. corresponding to the sequence number) is then obtained, and
To encrypted corresponding to sequence number cipher phonetic feature and above-mentioned decryption cipher phonetic feature match, if matching not into
Work(, then authentication failed is sent to deciphering module, if the match is successful, continues that the voice content of cipher will be encrypted corresponding to sequence number
Matched with the voice content of above-mentioned decryption cipher, if matching is unsuccessful, authentication failed is sent to deciphering module, if matching
Success, then send and be proved to be successful to deciphering module, complete decryption.
Preferably, the first mobile terminal and the second mobile terminal can be that the mobile communication terminals such as mobile phone or tablet personal computer are set
It is standby, and the first mobile terminal and the second mobile terminal can be same mobile communication terminal device (such as the first mobile terminal
It is mobile phone), or (such as the first mobile terminal is mobile phone to different types of mobile communication terminal device, and the second movement is eventually
Hold as tablet personal computer), while in an embodiment of the present invention, be mounted on first mobile terminal and the second mobile terminal
Into the corresponding application program needed for file encryption-decryption, so that first mobile terminal and the second mobile terminal are completed to file
Remote speech encryption and decryption.
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech number
Voice authentication server is uploaded to according to collection, and by the speech data collected, voice authentication server extracts the speech data
Phonetic feature and after identifying the voice content of the speech data, after generating a sequence number, and pass the sequence number back shifting
Dynamic terminal, which is implanted in file, to be encrypted, during decryption cloud voice server will according to corresponding to sequence number phonetic feature and voice
Content completes certification;This method is flexible and convenient to use, reduces the risk that key is lost and is stolen, is point-to-point classified papers
The efficient easily method of one of transmission.
It should be appreciated by those skilled in the art that those skilled in the art combine prior art and above-described embodiment can be with
The change case is realized, will not be described here.Such change case has no effect on the substantive content of the present invention, not superfluous herein
State.
Presently preferred embodiments of the present invention is described above.It is to be appreciated that the invention is not limited in above-mentioned
Particular implementation, wherein the equipment and structure be not described in detail to the greatest extent are construed as giving reality with the common mode in this area
Apply;Any those skilled in the art, without departing from the scope of the technical proposal of the invention, all using the disclosure above
Methods and technical content many possible changes and modifications are made to technical solution of the present invention, or be revised as equivalent variations etc.
Embodiment is imitated, this has no effect on the substantive content of the present invention.Therefore, every content without departing from technical solution of the present invention, foundation
The technical spirit of the present invention still falls within the present invention to any simple modifications, equivalents, and modifications made for any of the above embodiments
In the range of technical scheme protection.