CN104144051B - A kind of remote speech encipher-decipher method - Google Patents

A kind of remote speech encipher-decipher method Download PDF

Info

Publication number
CN104144051B
CN104144051B CN201410357098.6A CN201410357098A CN104144051B CN 104144051 B CN104144051 B CN 104144051B CN 201410357098 A CN201410357098 A CN 201410357098A CN 104144051 B CN104144051 B CN 104144051B
Authority
CN
China
Prior art keywords
speech data
mobile terminal
speech
voice
encipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410357098.6A
Other languages
Chinese (zh)
Other versions
CN104144051A (en
Inventor
丁镝飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aerospace Guosheng Technology Co ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201410357098.6A priority Critical patent/CN104144051B/en
Publication of CN104144051A publication Critical patent/CN104144051A/en
Application granted granted Critical
Publication of CN104144051B publication Critical patent/CN104144051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of remote speech encipher-decipher method, it is related to technical field of electronic communication, the call function that this method passes through mobile terminal, realize remote speech data acquisition, and the speech data collected is uploaded to voice authentication server, after voice authentication server extracts the phonetic feature of the speech data and identifies the voice content of the speech data, after one sequence number of generation, and pass the sequence number back mobile terminal and be implanted in file and be encrypted, cloud voice server phonetic feature and voice content will complete certification according to corresponding to sequence number during decryption;This method is flexible and convenient to use, reduces the risk that key is lost and is stolen, and is an efficient easily method of point-to-point classified papers transmission.

Description

A kind of remote speech encipher-decipher method
Technical field
The present invention relates to technical field of electronic communication, more particularly to a kind of it is applied to transmit the long-range of file between mobile terminal Voice encryption/decryption method.
Background technology
As the continuous development of mobile communication technology, such as the function of the mobile terminal such as mobile phone, tablet personal computer are more and more stronger Greatly, meanwhile, with the popularization of mobile terminal, increasing user carries out the transmission of file between mobile terminals, is such as moving Document, photo or song etc. are transmitted between dynamic terminal, therefore, carries out the high efficiency of file transmission and convenient between mobile terminals Property greatly facilitates the life of people, and at the same time, (photo more particularly to privacy and is related to machine to the file of transmission Close document) encryption and decryption is carried out to protect the confidentiality of file just becoming more and more important.
At present, when carrying out encryption and decryption to transmission file, after encryption file is sent in other side's hand, generally require separately to pass A key (password string or key file etc.).This undoubtedly add key lose or the equivalent risk that is stolen, enter without Beneficial to the protection of classified papers.
Therefore, a kind of encipher-decipher method applied to transmission file between mobile terminal how is found, to be effectively protected machine The transmission of ciphertext part turns into the direction that those skilled in the art endeavour research.
The content of the invention
For above-mentioned problem, the present invention discloses a kind of remote speech encipher-decipher method, to overcome in the prior art Carrying out encryption and decryption to file needs while file is transmitted, and separately passes a key, so as to add key loss or be stolen Risk, and then be unfavorable for protect file confidentiality the problem of.
To achieve these goals, the application describes a kind of remote speech encipher-decipher method, wherein, moved applied to first Dynamic terminal transmits file to the second mobile terminal, and the first acquisition module and encryption mould are provided with first mobile terminal Block, the second acquisition module and deciphering module is provided with second mobile terminal, methods described comprises the following steps:
In one file to be sent of offer on first mobile terminal;
The first speech data is obtained using first acquisition module, and first speech data is sent to a voice and recognized Demonstrate,prove server;
The voice authentication server generates an encryption key according to first speech data, and close in preserving the encryption After key, sequence number corresponding to the encryption key is sent to first mobile terminal;
Generation encryption file after the file is encrypted according to the sequence number for the encrypting module, and described will add Ciphertext part is sent to second mobile terminal;
Second acquisition module obtains a second speech data, and the second speech data is sent into the voice and recognized Demonstrate,prove server;
After the voice authentication server carries out verification operation according to the sequence number to the second speech data, and will The result is sent to the deciphering module;
The deciphering module according to the result judges whether that the encryption file is decrypted.
Above-mentioned remote speech encipher-decipher method, wherein, first acquisition module is obtained by way of locally recording First speech data;Second acquisition module obtains the second speech data by way of talking recording.
Above-mentioned remote speech encipher-decipher method, wherein, obtained in second acquisition module by way of talking recording When taking the second speech data, second mobile terminal is Jing Yin.
Above-mentioned remote speech encipher-decipher method, wherein, first acquisition module is obtained by way of talking recording First speech data;Second acquisition module obtains the second speech data by way of locally recording.
Above-mentioned remote speech encipher-decipher method, wherein, obtained in first acquisition module by way of talking recording When taking first speech data, first mobile terminal is Jing Yin.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server is according to first speech data The step of generating the encryption key be specially:
The voice authentication server extracts the phonetic feature of first speech data, and is generated according to the phonetic feature The encryption key.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server extracts first speech data Phonetic feature and after identifying the voice content of first speech data, according to the phonetic feature and voice content generation Encryption key.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server is according to the sequence number to described Second speech data carry out verification operation the step of be specially:
The voice authentication server extracts the phonetic feature of the second speech data, and is transferred according to the sequence number After the phonetic feature of first speech data, according to the phonetic feature of first speech data to the second speech data Phonetic feature carry out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, the voice authentication server extracts the second speech data Phonetic feature and voice content, and transfer according to the sequence number phonetic feature and voice content of first speech data Afterwards, the phonetic feature and voice according to the phonetic feature of first speech data and voice content to the second speech data Content carries out verification operation.
Above-mentioned remote speech encipher-decipher method, wherein, first mobile terminal and second mobile terminal are Mobile communication terminal device.
Foregoing invention has the following advantages that or beneficial effect:
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech number Voice authentication server is uploaded to according to collection, and by the speech data collected, voice authentication server extracts the speech data Phonetic feature and after identifying the voice content of the speech data, after generating a sequence number, and pass the sequence number back shifting Dynamic terminal, which is implanted in file, to be encrypted, during decryption cloud voice server will according to corresponding to sequence number phonetic feature and voice Content completes certification;This method is flexible and convenient to use, reduces the risk that key is lost and is stolen, is point-to-point classified papers The efficient easily method of one of transmission.
Specific brief description of the drawings
By reading the detailed description made with reference to the following drawings to non-limiting example, the present invention and its feature, outside Shape and advantage will become more apparent.The identical mark instruction identical part in whole accompanying drawings.Not can according to than Example draws accompanying drawing, it is preferred that emphasis is shows the purport of the present invention.
Fig. 1 is the schematic flow sheet of medium-long range voice encryption/decryption method of the embodiment of the present invention;
Fig. 2 is the flow chart of mobile terminal ciphering process in the embodiment of the present invention;
Fig. 3 is the flow chart of medium cloud voice authentication server ciphering process of the embodiment of the present invention;
Fig. 4 is the flow chart of mobile terminal decrypting process in the embodiment of the present invention;
Fig. 5 is the schematic diagram of medium cloud voice authentication server decrypting process of the embodiment of the present invention.
Embodiment
The present invention is further illustrated with specific embodiment below in conjunction with the accompanying drawings, but not as the limit of the present invention It is fixed.
As shown in figure 1, the present embodiment is related to a kind of remote speech encipher-decipher method, the first mobile terminal is can be applied to Two mobile terminals transmit file, and the first acquisition module and encrypting module are provided with the first mobile terminal, the second mobile terminal On be provided with the second acquisition module and deciphering module, specifically, the remote speech encipher-decipher method comprises the following steps:
Step S1, in providing a file to be sent on the first mobile terminal, the file to be transmitted can be document, photo Or the file to be transmitted that other needs are encrypted, in an embodiment of the present invention, the file to be transmitted can be the first mobile terminal On local file, or the first mobile terminal passes through the file that network or other modes obtain.
Step S2, the first speech data is obtained using the first acquisition module of the first mobile terminal, and by first voice Data are sent to a voice authentication server, it is preferred that the voice authentication server is that can undertake the cloud language of data operation task Sound certificate server, and the cloud voice authentication server can carry out data between the first mobile terminal and the second mobile terminal In interactive communication network.
Step S3, after voice authentication server generates an encryption key according to the first speech data, and in the encryption is close Key is stored in after voice authentication server, and sequence number corresponding to the encryption key is sent to the first mobile terminal.
Step S4, encrypting module generation encryption file after file is encrypted sequence number according to corresponding to encryption key, And by encryption file be sent to the second mobile terminal, it is preferred that encrypting module according to corresponding to encryption key sequence number to file When being encrypted, first speech data is deleted with the further reliability for improving encryption file.
Step S5, the second acquisition module obtains a second speech data, and the second speech data is sent into voice and recognized Demonstrate,prove server.
Step S6, after voice authentication server carries out verification operation according to sequence number to second speech data, and will checking As a result send to deciphering module.
Step S7, deciphering module according to the result judges whether that encryption file is decrypted, right if being verified Encryption file is decrypted, and obtains file to be transmitted, if checking is not by encryption file being decrypted.
In a preferred embodiment of the invention, in step s 2, the first acquisition module passes through the side that locally records Formula obtains the first speech data;And the second acquisition module obtains the second voice number by way of talking recording in step s 5 According to.
Specifically, in step s 2, the user of the first mobile terminal opens encrypting module, needs input feature vector going to Encryption cipher (encryption cipher can be in short or phrase etc.) is directly said during code, while the first acquisition module is recorded Make encryption cipher (encryption talk secretly i.e. the first speech data), i.e. the first acquisition module obtains the by way of locally recording One speech data;Afterwards in step s 5, the user of the second mobile terminal establishes the second mobile terminal and the first mobile terminal Voice connection (or call connection), the user of the first mobile terminal of request says decryption cipher, while the second acquisition module is recorded The decryption is talked secretly (the decryption cipher is second speech data), i.e., the second acquisition module obtains second by way of talking recording Speech data.
Further, in step s 5, when carrying out talking recording, the second mobile terminal is Jing Yin, i.e., in the second movement eventually End and the first mobile terminal are established after voice connect (or call connection), and the user of the first mobile terminal says to decrypt and talked secretly, the For two mobile terminals while talking recording decryption cipher is carried out, the second mobile terminal is Jing Yin, to ensure to decrypt the machine of cipher (i.e. the user of only the first mobile terminal knows that the decryption is talked secretly to close property, and the user of the second mobile terminal can not also learn the decryption Cipher).
In another preferred embodiment of the present invention, in step s 2, the first acquisition module passes through talking recording Mode obtains the first speech data;And the second acquisition module obtains the second voice number by way of locally recording in step s 5 According to.
Specifically, in step s 2, the user of the first mobile terminal opens encrypting module, needs input feature vector going to The voice connection (or call connection) of the first mobile terminal and the second mobile terminal is established during code, asks the use of the second mobile terminal Encryption cipher is said at family, meanwhile, the first acquisition module records encryption cipher (encryption talk secretly i.e. the first speech data), i.e., and the One acquisition module obtains the first speech data by way of talking recording;Afterwards in step s 5, the use of the second mobile terminal Decryption cipher is directly said at family, while the second acquisition module records decryption cipher (decryption cipher i.e. second speech data), I.e. the second acquisition module obtains second speech data by way of locally recording.
Further, in step s 2, when carrying out talking recording, the first mobile terminal is Jing Yin, i.e., in the first movement eventually End and the second mobile terminal are established after voice connect (or call connection), and the user of the second mobile terminal says to encrypt and talked secretly, the For one mobile terminal while talking recording encryption cipher is carried out, the first mobile terminal is Jing Yin, to ensure to encrypt the machine of cipher (i.e. the user of only the second mobile terminal knows that the decryption is talked secretly to close property, and the user of the first mobile terminal can not also learn the decryption Cipher).
In a preferred embodiment of the invention, in step s3, voice authentication server extracts the first voice number According to phonetic feature, and according to the phonetic feature generate encryption key, and by corresponding to the encryption key sequence number send first Mobile terminal.
Further, voice authentication server can extract the phonetic feature of the first speech data and identify the first voice number According to voice content, and encryption key is generated according to the phonetic feature and voice content, can with further improve file encryption By property.
In a preferred embodiment of the invention, the voice of voice authentication server extraction second speech data is special Sign, and after transferring according to sequence number the phonetic feature of the first speech data, according to the phonetic feature of the first speech data to second The phonetic feature of speech data carries out verification operation.
Further, the phonetic feature and voice content of voice authentication server extraction second speech data, and according to sequence After row number transfers the phonetic feature and voice content of the first speech data, according in the phonetic feature and voice of the first speech data Hold and verification operation is carried out to the phonetic feature and voice content of second speech data, it is preferred that the verification operation is:First to The phonetic feature of one speech data and the phonetic feature of second speech data are compared, if comparison is unsuccessful, authentication failed, If compare successfully, continue compare the first speech data voice content and second speech data voice content, if compare into Work(, then it is verified, if comparison is unsuccessful, authentication failed.
Specifically, as shown in Figure 2-5:
In ciphering process, as shown in Fig. 2 the first mobile terminal starts that file to be transmitted is encrypted, first determine whether Whether file to be transmitted is encrypted by the way of local cipher, if so, then being gathered by the way of cipher is locally recorded The encryption cipher (i.e. the first speech data) of file to be transmitted, if it is not, it is close then to gather encryption by the way of talking recording cipher Language (i.e. the first speech data), and encryption cipher is uploaded to cloud voice authentication server and judges whether to upload successfully, if Success is not uploaded, then reacquires encryption cipher, if uploading successfully, continues to determine whether to obtain sequence number, if obtaining sequence Number, then sequence number implantation file is completed into encryption, then encryption terminates, and otherwise, then reacquires encryption cipher;As shown in figure 3, After cloud voice authentication server obtains the encryption cipher that the first acquisition module uploads, generation encryption key (it is close to extract the encryption The phonetic feature of language and the voice content for identifying encryption cipher), if voice content identifies successfully, formation sequence code simultaneously should Sequence code is sent to encrypting module, if voice content identification is unsuccessful, is sent and is retransmitted request to the first mobile terminal.
In decrypting process, as shown in figure 4, the file that the second mobile terminal starts to have encrypted is decrypted, first determine whether Whether (whether sentenced according in above-mentioned ciphering process using local cipher using by the way of locally decrypting this document being decrypted It is disconnected whether to be decrypted by the way of locally decrypting, in an embodiment of the present invention, recorded according to the mode locally recorded Encryption cipher, then recorded by the way of talking recording decryption cipher, conversely, according to talking recording mode record encryption it is close Language, then decryption cipher is recorded by the way of locally recording), if so, decryption cipher is then recorded by way of locally recording, if It is no, then decryption cipher is recorded by way of talking recording, and decryption cipher is uploaded to cloud voice authentication server and sentenced It is disconnected whether to upload success, if not uploading success, decryption cipher is reacquired, if uploading successfully, continues to determine whether to obtain Reply (result whether being verified), if not replied, reacquire decryption cipher, if being replied, continue Judge to verify whether by if being verified, being decrypted, if checking is not by terminating according to the content of reply;Such as figure Shown in 5, after cloud voice authentication server obtains sequence number from encryption file, carry out sequence numbers match and (find out the sequence Phonetic feature corresponding to number and voice content), if matching is unsuccessful, authentication failed is sent to deciphering module, if the match is successful, Encryption key corresponding to the sequence number (phonetic feature and voice content of encryption cipher i.e. corresponding to the sequence number) is then obtained, and To encrypted corresponding to sequence number cipher phonetic feature and above-mentioned decryption cipher phonetic feature match, if matching not into Work(, then authentication failed is sent to deciphering module, if the match is successful, continues that the voice content of cipher will be encrypted corresponding to sequence number Matched with the voice content of above-mentioned decryption cipher, if matching is unsuccessful, authentication failed is sent to deciphering module, if matching Success, then send and be proved to be successful to deciphering module, complete decryption.
Preferably, the first mobile terminal and the second mobile terminal can be that the mobile communication terminals such as mobile phone or tablet personal computer are set It is standby, and the first mobile terminal and the second mobile terminal can be same mobile communication terminal device (such as the first mobile terminal It is mobile phone), or (such as the first mobile terminal is mobile phone to different types of mobile communication terminal device, and the second movement is eventually Hold as tablet personal computer), while in an embodiment of the present invention, be mounted on first mobile terminal and the second mobile terminal Into the corresponding application program needed for file encryption-decryption, so that first mobile terminal and the second mobile terminal are completed to file Remote speech encryption and decryption.
Remote speech encipher-decipher method disclosed by the invention, by the call function of mobile terminal, realize remote speech number Voice authentication server is uploaded to according to collection, and by the speech data collected, voice authentication server extracts the speech data Phonetic feature and after identifying the voice content of the speech data, after generating a sequence number, and pass the sequence number back shifting Dynamic terminal, which is implanted in file, to be encrypted, during decryption cloud voice server will according to corresponding to sequence number phonetic feature and voice Content completes certification;This method is flexible and convenient to use, reduces the risk that key is lost and is stolen, is point-to-point classified papers The efficient easily method of one of transmission.
It should be appreciated by those skilled in the art that those skilled in the art combine prior art and above-described embodiment can be with The change case is realized, will not be described here.Such change case has no effect on the substantive content of the present invention, not superfluous herein State.
Presently preferred embodiments of the present invention is described above.It is to be appreciated that the invention is not limited in above-mentioned Particular implementation, wherein the equipment and structure be not described in detail to the greatest extent are construed as giving reality with the common mode in this area Apply;Any those skilled in the art, without departing from the scope of the technical proposal of the invention, all using the disclosure above Methods and technical content many possible changes and modifications are made to technical solution of the present invention, or be revised as equivalent variations etc. Embodiment is imitated, this has no effect on the substantive content of the present invention.Therefore, every content without departing from technical solution of the present invention, foundation The technical spirit of the present invention still falls within the present invention to any simple modifications, equivalents, and modifications made for any of the above embodiments In the range of technical scheme protection.

Claims (10)

1. a kind of remote speech encipher-decipher method, it is characterised in that transmitted applied to the first mobile terminal to the second mobile terminal File, and the first acquisition module and encrypting module are provided with first mobile terminal, set on second mobile terminal There are the second acquisition module and deciphering module, methods described comprises the following steps:
In one file to be sent of offer on first mobile terminal;
The first speech data is obtained using first acquisition module, and first speech data is sent to voice authentication clothes Business device;
The voice authentication server generates an encryption key according to first speech data, and in the preservation encryption key Afterwards, sequence number corresponding to the encryption key is sent to first mobile terminal;
Generation encryption file after the file is encrypted according to the sequence number for the encrypting module, and the encryption is literary Part is sent to second mobile terminal;
Second acquisition module obtains a second speech data, and the second speech data is sent into the voice authentication and taken Business device;
After the voice authentication server carries out verification operation according to the sequence number to the second speech data, and will checking As a result send to the deciphering module;
The deciphering module according to the result judges whether that the encryption file is decrypted.
2. remote speech encipher-decipher method as claimed in claim 1, it is characterised in that first acquisition module passes through local The mode of recording obtains first speech data;Second acquisition module obtains described second by way of talking recording Speech data.
3. remote speech encipher-decipher method as claimed in claim 2, it is characterised in that pass through in second acquisition module logical When the mode that words are recorded obtains the second speech data, second mobile terminal is Jing Yin.
4. remote speech encipher-decipher method as claimed in claim 1, it is characterised in that first acquisition module passes through logical The mode that words are recorded obtains first speech data;Second acquisition module obtains described by way of locally recording Two speech datas.
5. remote speech encipher-decipher method as claimed in claim 4, it is characterised in that pass through in first acquisition module When the mode of talking recording obtains first speech data, first mobile terminal is Jing Yin.
6. remote speech encipher-decipher method as claimed in claim 1, it is characterised in that the voice authentication server according to First speech data generates the step of encryption key and is specially:
The voice authentication server extracts the phonetic feature of first speech data, and according to phonetic feature generation Encryption key.
7. remote speech encipher-decipher method as claimed in claim 6, it is characterised in that the voice authentication server extraction The phonetic feature of first speech data and after identifying the voice content of first speech data, according to the phonetic feature and Voice content generates the encryption key.
8. remote speech encipher-decipher method as claimed in claim 7, it is characterised in that the voice authentication server according to The sequence number to the second speech data carry out verification operation the step of be specially:
The voice authentication server extracts the phonetic feature of the second speech data, and according to being transferred the sequence number After the phonetic feature of first speech data, the language according to the phonetic feature of first speech data to the second speech data Sound feature carries out verification operation.
9. remote speech encipher-decipher method as claimed in claim 8, it is characterised in that the voice authentication server extraction The phonetic feature and voice content of the second speech data, and transfer according to the sequence number language of first speech data After sound feature and voice content, according to the phonetic feature of first speech data and voice content to the second speech data Phonetic feature and voice content carry out verification operation.
10. the remote speech encipher-decipher method as any one of claims 1-9, it is characterised in that described first moves Dynamic terminal and second mobile terminal are mobile communication terminal device.
CN201410357098.6A 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method Active CN104144051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410357098.6A CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410357098.6A CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Publications (2)

Publication Number Publication Date
CN104144051A CN104144051A (en) 2014-11-12
CN104144051B true CN104144051B (en) 2018-04-06

Family

ID=51853123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410357098.6A Active CN104144051B (en) 2014-07-24 2014-07-24 A kind of remote speech encipher-decipher method

Country Status (1)

Country Link
CN (1) CN104144051B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105023155A (en) * 2015-07-29 2015-11-04 广东欧珀移动通信有限公司 Payment method, network equipment and terminal equipment
CN111931484B (en) * 2020-07-31 2022-02-25 贵州多彩宝互联网服务有限公司 Data transmission method based on big data

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855955A (en) * 2005-04-27 2006-11-01 英华达(上海)电子有限公司 Voice encryption and decryption
CN101345965A (en) * 2008-08-29 2009-01-14 中国电信股份有限公司 Encryption call method based on speech code stream and mobile terminal
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102413462A (en) * 2011-11-21 2012-04-11 郑州信大捷安信息技术股份有限公司 Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN102883325A (en) * 2012-10-29 2013-01-16 东莞宇龙通信科技有限公司 Identification server, mobile terminal and end-to-end identification communication channel establishing method
CN103023900A (en) * 2012-12-06 2013-04-03 北京百度网讯科技有限公司 Identity authentication method, cloud service system and cloud server based on cloud server-side
CN103023580A (en) * 2012-12-06 2013-04-03 深圳市创想天空科技有限公司 Method for achieving data transmission through voice

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1855955A (en) * 2005-04-27 2006-11-01 英华达(上海)电子有限公司 Voice encryption and decryption
CN101345965A (en) * 2008-08-29 2009-01-14 中国电信股份有限公司 Encryption call method based on speech code stream and mobile terminal
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN102413462A (en) * 2011-11-21 2012-04-11 郑州信大捷安信息技术股份有限公司 Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
CN102883325A (en) * 2012-10-29 2013-01-16 东莞宇龙通信科技有限公司 Identification server, mobile terminal and end-to-end identification communication channel establishing method
CN103023900A (en) * 2012-12-06 2013-04-03 北京百度网讯科技有限公司 Identity authentication method, cloud service system and cloud server based on cloud server-side
CN103023580A (en) * 2012-12-06 2013-04-03 深圳市创想天空科技有限公司 Method for achieving data transmission through voice

Also Published As

Publication number Publication date
CN104144051A (en) 2014-11-12

Similar Documents

Publication Publication Date Title
CN101406021B (en) SIM based authentication
CN106169041B (en) A kind of safety encryption mobile hard disk and its data transmission method based on USBKEY authentication
CN101170554B (en) Message safety transfer system
CN104363250B (en) A kind of method and system for equipment connection
JP2020005260A5 (en) Authentication device, authentication system and authentication method
CN106059869A (en) Internet of things smart home equipment safety control method and system
CN105722013A (en) Bluetooth pairing method and device
CN104468126B (en) A kind of safe communication system and method
RU2011130191A (en) METHOD AND SYSTEM OF SAFE PROCESSING OF TRANSACTION
CN101282218B (en) Method for ciphering and deciphering host computer and pickaback plane of split type terminal
CN108471404A (en) File sharing method, device, computer equipment and storage medium
WO2005091149A1 (en) Backup device, backed-up device, backup intermediation device, backup system, backup method, data restoration method, program, and recording medium
CN104092550A (en) Password protection method, system and device
CN101488111A (en) Identification authentication method and system
CN103020504A (en) Image management system and image management method based on fingerprint identification
CN105208028A (en) Data transmission method and related device and equipment
CN103632081A (en) Encrypted storage device and authentication system and authentication method thereof
CN107959573A (en) A kind of guard method of the IP Camera based on digital signature
CN105763325A (en) Encryption authentication method and device
CN105631298B (en) A kind of ciphering and deciphering device and method
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN104144051B (en) A kind of remote speech encipher-decipher method
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN105389526A (en) Mobile hard disk integrating encrypted area and non-encrypted area and data storage method for mobile hard disk

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201203

Address after: 313021 industrial function area of Donglin Town, Huzhou City, Zhejiang Province

Patentee after: ZHEJIANG YUANTE NEW MATERIAL Co.,Ltd.

Address before: 201620 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211123

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 313021 industrial functional zone, Donglin Town, Huzhou City, Zhejiang Province

Patentee before: ZHEJIANG YUANTE NEW MATERIAL CO.,LTD.

TR01 Transfer of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A remote speech encryption and decryption method

Effective date of registration: 20221205

Granted publication date: 20180406

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2022330003458

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20231205

Granted publication date: 20180406

Pledgee: Huzhou Wuxing Rural Commercial Bank Co.,Ltd. high tech Zone Green sub branch

Pledgor: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Registration number: Y2022330003458

PC01 Cancellation of the registration of the contract for pledge of patent right
TR01 Transfer of patent right

Effective date of registration: 20240219

Address after: Room 601, 6th Floor, Building 5, Lianhuayuan, Haidian District, Beijing, 100080

Patentee after: Aerospace Guosheng Technology Co.,Ltd.

Guo jiahuodiqu after: Zhong Guo

Address before: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee before: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Guo jiahuodiqu before: Zhong Guo

TR01 Transfer of patent right