CN105072094B - A kind of method and car-mounted terminal of voice data encryption - Google Patents
A kind of method and car-mounted terminal of voice data encryption Download PDFInfo
- Publication number
- CN105072094B CN105072094B CN201510425367.2A CN201510425367A CN105072094B CN 105072094 B CN105072094 B CN 105072094B CN 201510425367 A CN201510425367 A CN 201510425367A CN 105072094 B CN105072094 B CN 105072094B
- Authority
- CN
- China
- Prior art keywords
- car
- voice data
- terminal
- encryption
- mounted terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses the methods and car-mounted terminal of a kind of encryption of voice data, comprising: when call connection has been established in detection, car-mounted terminal obtains the collected voice data in call connection process first;Then encryption key is generated according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal, and voice data is encrypted using encryption key, obtain encrypted voice data;Encrypted voice data is sent to the user terminal for establishing call connection again encrypted voice data is decrypted using decruption key so that user terminal generates the decruption key for decrypting encrypted voice data.As it can be seen that implementing the embodiment of the present invention can be improved the safety during voice data transmission.
Description
Technical field
A kind of method and car-mounted terminal encrypted the present invention relates to field of communication technology more particularly to voice data.
Background technique
With the continuous development of the communication technology, not requiring nothing more than communication system has the spies such as quality is high, multi-functional, reliability is high
Point, and increasingly higher demands also proposed to the confidentiality of communication system, the range of coded communication extends from special user
To ordinary user.Concealment, confidentiality and the safety that existing communication system provides are unable to satisfy the requirement of secret communication.It is right
In fixed telephone system, it is only necessary to which eavesdropping can be achieved the purpose that by simply making contact;Even the higher movement of confidentiality
Car-mounted terminal does not also encrypt voice, to reduce the safety of voice data transmission.
Summary of the invention
The embodiment of the invention provides the methods and car-mounted terminal of a kind of encryption of voice data, can be improved voice data biography
Safety during defeated.
In a first aspect, the embodiment of the invention discloses a kind of methods of voice data encryption, comprising:
When call connection has been established in detection, car-mounted terminal obtains the collected voice number in the call connection process
According to;
The car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset
Cipher mode generates encryption key, and is encrypted using the encryption key to the voice data, obtains encryption voice number
According to;
The car-mounted terminal sends the encrypted voice data to the user terminal for establishing the call connection, so that described
User terminal generates the decruption key for decrypting the encrypted voice data, using the decruption key to the encryption voice
Data are decrypted.
Implementation with reference to first aspect, in the first possible implementation of the first aspect, the method is also
It may comprise steps of:
The car-mounted terminal receives the decruption key that the user terminal is sent, and detects the encryption key and institute
State whether decruption key matches;
If the car-mounted terminal detects the encryption key and matches with the decruption key, the car-mounted terminal is to described
User terminal sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the user
Terminal responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, to be decrypted
Voice data, and play the decrypted voice data.
The possible implementation of with reference to first aspect the first, in second of possible implementation of first aspect
In, the method also includes:
If the car-mounted terminal detects the encryption key and the decruption key mismatches, the car-mounted terminal stops
Voice data is sent to the user terminal.
The of the first possible implementation of implementation, first aspect with reference to first aspect and first aspect
Any one implementation in two kinds of possible implementations, in a third possible implementation of the first aspect, institute
The method of stating can with the following steps are included:
The car-mounted terminal sends call connection request to the user terminal, and the call connection request carries the vehicle
The terminal device number of mounted terminal, for generating decruption key, which was used for the vehicle-mounted end terminal device number
The encryption data that end is sent is decrypted;
When the car-mounted terminal, which receives the user terminal, responds the connection reply that the call connection request is sent,
Establish the data list including the terminal device number.
The third possible implementation with reference to first aspect, in the 4th kind of possible implementation of first aspect
In, the car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset encryption side
Formula generates encryption key, comprising:
The car-mounted terminal extracts the terminal device number from the data list;
The car-mounted terminal generates encryption key according to preset cipher mode using the terminal device number.
Second aspect, the embodiment of the invention discloses a kind of car-mounted terminals, comprising:
Acquiring unit, for obtaining collected in the call connection process when call connection has been established in detection
Voice data;
Generation unit, for using the data list of the terminal device number including the car-mounted terminal according to preset
Cipher mode generates encryption key;
Encryption unit obtains encrypted voice data for encrypting using the encryption key to the voice data;
First transmission unit, for sending the encrypted voice data to the user terminal for establishing the call connection, with
So that the user terminal is generated the decruption key for decrypting the encrypted voice data, is added using the decruption key to described
Close voice data is decrypted.
In conjunction with the car-mounted terminal of second aspect, in the first possible car-mounted terminal of second aspect, the vehicle-mounted end
End can also include:
Receiving unit, the decruption key sent for receiving the user terminal;
Whether detection unit matches for detecting the encryption key with the decruption key;
Second transmission unit matches if detecting the encryption key for the detection unit with the decruption key,
The play instruction that the encryption data is decrypted for triggering the user terminal is sent to the user terminal, so that institute
It states user terminal and responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, with
To decrypted voice data, and play the decrypted voice data.
In conjunction with the first possible car-mounted terminal of second aspect, in second of possible car-mounted terminal of second aspect
In, the car-mounted terminal further include:
Control unit is controlled if detecting the encryption key and decruption key mismatch for the detection unit
First transmission unit is made to stop sending voice data to the user terminal.
In conjunction with the of the car-mounted terminal of second aspect, the first possible car-mounted terminal of second aspect and second aspect
Any one car-mounted terminal in two kinds of possible car-mounted terminals, in the third possible car-mounted terminal of second aspect, institute
Stating car-mounted terminal can also include:
Third transmission unit, for sending call connection request to the user terminal, the call connection request is carried
The terminal device number of the car-mounted terminal, for generating decruption key, which is used for described the terminal device number
The encryption data that car-mounted terminal is sent is decrypted;
Unit is established, for responding the call connection request transmission when the receiving unit receives the user terminal
Connection reply when, establish include the terminal device number data list.
In conjunction with the third possible car-mounted terminal of second aspect, in the 4th kind of possible car-mounted terminal of second aspect
In, the generation unit includes:
Extraction module, for extracting the terminal device number from the data list;
Generation module, for generating encryption key according to preset cipher mode using the terminal device number.
In the embodiment of the present invention, when call connection has been established in detection, car-mounted terminal is obtained in call connection process first
In collected voice data;Car-mounted terminal is then using the data list for the terminal device number for including car-mounted terminal according to preparatory
The cipher mode of setting generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data;
Car-mounted terminal to the user terminal transmission encrypted voice data conversed and connected is established, adds so that user terminal is generated for decryption again
The decruption key of close voice data is decrypted encrypted voice data using decruption key.In embodiments of the present invention, work as vehicle
When mounted terminal collects voice data in call connection process, car-mounted terminal can first be carried out voice data using encryption key
Encryption, and encryption key is the data list using the terminal device number for including car-mounted terminal according to preset cipher mode
Encryption key generated, to further increase the safety of voice data.As it can be seen that implementing the embodiment of the present invention can mention
Safety during high voice data transmission.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the method for voice data encryption disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the method for another voice data encryption disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of car-mounted terminal disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
The embodiment of the invention provides the methods and car-mounted terminal of a kind of encryption of voice data.In embodiments of the present invention,
When car-mounted terminal collects voice data in call connection process, car-mounted terminal can be first using encryption key to voice data
It is encrypted, and encryption key is the data list using the terminal device number for including car-mounted terminal according to preset encryption
Mode encryption key generated, to further increase the safety of voice data.It can as it can be seen that implementing the embodiment of the present invention
To improve the safety during voice data transmission.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of the method for voice data encryption disclosed by the embodiments of the present invention.
As shown in Figure 1, the method for voice data encryption may comprise steps of:
S101, when detection have been established call connection when, car-mounted terminal obtain in call connection process collected voice
Data.
In the embodiment of the present invention, call connection may include user by phone number (mobile number, connection number and
One of telecom number) with car-mounted terminal and the call established is connect, can also include (micro- by some chat applications
The application programs such as letter, QQ) and the call connection of foundation.Wherein, which supports Subscriber Identity Module.The call of foundation connects
It can be the car-mounted terminal and send call connection request to other car-mounted terminals, and the call connection established;It is also possible to the vehicle
The call that mounted terminal responds the call connection request that other car-mounted terminals received are sent and establishes connects.
In the embodiment of the present invention, collected voice data includes the use using the car-mounted terminal in call connection process
Family, the voice data of sending.Specifically, when car-mounted terminal has built up call connection, then the available user of car-mounted terminal
The voice data of output.
S102, car-mounted terminal use the data list of the terminal device number including car-mounted terminal according to preset encryption
Mode generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code
(International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message
Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards
Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one
Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main
The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS)
(Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160
Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission
Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy
Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark
Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
Specifically, after the car-mounted terminal and other car-mounted terminals establish connection, then the car-mounted terminal can go to obtain voice
Data, and the voice data got is encrypted.It wherein, should be using one in above-mentioned cipher mode when encryption
Kind or it is a variety of, and with include car-mounted terminal terminal device number data list for according to generate encryption key.And use generation
Encryption key the voice data is encrypted.For example, when terminal device number includes IMEI, then the encryption generated is close
Key should be related to IMEI, as the selection of cipher mode, then can be arbitrary cipher mode one kind or a variety of encryption sides
The combination of formula.
S103, car-mounted terminal send encrypted voice data to the user terminal for establishing call connection, so that user terminal is raw
At the decruption key for decrypting encrypted voice data, encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, user terminal can include but is not limited to smart phone (such as Android phone, iOS mobile phone
Deng), tablet computer, the tool such as palm PC and mobile internet device (Mobile Internet Devices, MID), PAD
There is the user terminal of voice data transmission function.
In the embodiment of the present invention, when car-mounted terminal adds collected voice data according to preset encryption rule
It is close, after obtaining encrypted voice data, which can be sent to the user terminal for establishing call connection.Work as user
After terminal receives the encrypted voice data of car-mounted terminal transmission, then it will use the data of the terminal device number including car-mounted terminal
List generates decruption key according to preset manner of decryption.Wherein, encrypted voice data is that car-mounted terminal is close using encrypting
The data that key encrypts voice data, encryption key are that car-mounted terminal uses the terminal device number including car-mounted terminal
Data list according to preset cipher mode generate encryption key.
In Fig. 1, when call connection has been established in detection, car-mounted terminal obtains collect in call connection process first
Voice data;Then car-mounted terminal is added using the data list for the terminal device number for including car-mounted terminal according to preset
Close mode generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data;Car-mounted terminal
Encrypted voice data is sent to the user terminal for establishing call connection again, so that user terminal is generated for decrypting encryption voice number
According to decruption key, encrypted voice data is decrypted using decruption key.In embodiments of the present invention, when car-mounted terminal exists
When collecting voice data in call connection process, car-mounted terminal can first be encrypted voice data using encryption key, and
Encryption key is to be generated using the data list for the terminal device number for including car-mounted terminal according to preset cipher mode
Encryption key, to further increase the safety of voice data.As it can be seen that implementing the embodiment of the present invention can be improved voice
Safety in data transmission procedure.
Referring to Fig. 2, Fig. 2 is the process signal of the method for another voice data encryption disclosed by the embodiments of the present invention
Figure.As shown in Fig. 2, the method for voice data encryption may comprise steps of:
S201, car-mounted terminal send call connection request to user terminal.
In the embodiment of the present invention, call connection request carries the terminal device number of car-mounted terminal, and terminal device number is for giving birth to
At decruption key, the encryption data which is used to send car-mounted terminal is decrypted.
In the embodiment of the present invention, since call connection may include that user passes through phone number (mobile number, connection number
And one of telecom number) with car-mounted terminal and the call established is connect, can also include passing through some chat application journeys
Sequence (application programs such as wechat, QQ) and establish call connection.Then call connection is sent to other car-mounted terminals in car-mounted terminal
When, the terminal device number of the terminal can be carried.And in sending different call connections, different information can also be carried.
For example, when car-mounted terminal sends call connection to other car-mounted terminals by connection WIFI, the WIFI can also be carried
The IP address of corresponding server.
S202, when car-mounted terminal receive user terminal response call connection request send connection reply when, establish packet
Include the data list of terminal device number.
In the embodiment of the present invention, according to step S201 it is found that when car-mounted terminal is by connecting WIFI to other car-mounted terminals
Send call connection when, due to send converse connection request when, in addition to the car-mounted terminal terminal device when, also carry
The IP address of the server of network connection is established with the car-mounted terminal.Therefore, lead to when car-mounted terminal receives user terminal response
When talking about the connection reply that connection request is sent, the clothes for including terminal device number and establishing network connection with the car-mounted terminal are established
The data list of the IP address of business device.
S203, when detection have been established call connection when, car-mounted terminal obtain in call connection process collected voice
Data.
S204, car-mounted terminal extract terminal device number from data list.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code
(International Mobile Equipment Identity,IMEI)。
S205, car-mounted terminal using terminal device number generate encryption key according to preset cipher mode, and use
Encryption key encrypts voice data, obtains encrypted voice data.
S206, car-mounted terminal send encrypted voice data to the user terminal for establishing call connection, so that user terminal is raw
At the decruption key for decrypting encrypted voice data, encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message
Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards
Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one
Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main
The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS)
(Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160
Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission
Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy
Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark
Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
In the embodiment of the present invention, when car-mounted terminal carries out collected voice data according to preset encryption rule
Encryption, when obtaining encrypted voice data, and encrypted voice data being sent to the user terminal, user terminal can be from pre-set
It obtains manner of decryption corresponding with encryption rule in manner of decryption set to be decrypted, to obtain decrypted voice data.
As an alternative embodiment, when user terminal according to the cipher mode of encrypted voice data from presetting
Manner of decryption set in obtain corresponding with cipher mode manner of decryption, and generate decruption key, and decruption key is sent out
Send to car-mounted terminal, can with the following steps are included:
11) car-mounted terminal receives the decruption key that user terminal is sent, and detect encryption key and decruption key whether phase
Matching;
12) if car-mounted terminal detection encryption key matches with decruption key, car-mounted terminal is used for user terminal transmission
The play instruction that encryption data is decrypted in triggering user terminal, so that user terminal responds play instruction, to use decryption
Key pair encryption voice data is decrypted, and to obtain decrypted voice data, and plays the decrypted voice data.
In the embodiment of the present invention, when car-mounted terminal receives the decruption key of user terminal transmission, then car-mounted terminal meeting
Whether the decruption key that the encryption key that detection car-mounted terminal generates is sent with user terminal matches.Wherein, above-mentioned vehicle-mounted end
Whether the decruption key that the encryption key and user terminal that end generates are sent, which matches, can be understood as adding for car-mounted terminal generation
Whether the decruption key that close key and user terminal is sent is identical;It also will be understood that at the encryption key and use of car-mounted terminal generation
Whether the decruption key that family terminal is sent is consistent with pre-stored matching rule.
In the embodiment of the present invention, when the decruption key that is sent with user terminal of encryption key that car-mounted terminal generates whether phase
When whether the decruption key that matching is understood as the encryption key of car-mounted terminal generation and user terminal is sent is identical, corresponding example
Son may is that the decruption key generated when car-mounted terminal is 123*, and the decruption key that user terminal is sent is 123*, then illustrates vehicle
The encryption key that mounted terminal generates is identical as the decruption key that user terminal is sent.When the encryption key that generates car-mounted terminal with
Whether the decruption key that user terminal is sent, which matches, is understood as encryption key and the user terminal transmission of car-mounted terminal generation
When whether decruption key is consistent with pre-stored matching rule, corresponding example be may is that when pre-stored matching
When rule is by adding 1 form to increase every time, and all carrying * after key, such as: when the encryption key that car-mounted terminal generates is
123*, and user terminal send decruption key be 456* when, then illustrate car-mounted terminal generate encryption key and user terminal
The decruption key of transmission is consistent.If the decruption key that user terminal is sent is 458#, illustrate the encryption that car-mounted terminal generates
The decruption key that key and user terminal is sent is not consistent.
In the embodiment of the present invention, if the encryption key that is generated according to above-mentioned detection according to detection car-mounted terminal of car-mounted terminal with
When the decruption key that user terminal is sent does not match that, then car-mounted terminal can stop continuing to send data to the user terminal.And
It, then can be by before when user terminal does not continue to the voice data of car-mounted terminal transmission within the preset period
The voice data relevant to the data of this transmission received abandons.
In Fig. 2, be described in detail car-mounted terminal receive user terminal transmission decruption key when, local terminal can be generated
Encryption key matched with the decruption key received.Only when car-mounted terminal detect local terminal generate encryption key with
When the decruption key successful match received, it can continue to send encrypted voice data, and send for triggering user terminal pair
The play instruction that encryption data is decrypted to obtain decrypted voice data, and plays the decrypted voice data.As it can be seen that implementing
The embodiment of the present invention can be further improved the safety during voice data transmission.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram of car-mounted terminal disclosed by the embodiments of the present invention, for executing
The method of predicate sound data encryption.As shown in figure 3, the car-mounted terminal may include: acquiring unit 301, generation unit 302, add
Close unit 303 and the first transmission unit 304, wherein
Acquiring unit 301, for obtaining the collected language in call connection process when call connection has been established in detection
Sound data.
In the embodiment of the present invention, call connection may include user by phone number (mobile number, connection number and
One of telecom number) with the car-mounted terminal and the call established is connect, can also include passing through some chat applications
(application programs such as wechat, QQ) and establish call connection.Wherein, which supports Subscriber Identity Module.The call of foundation
Connection can be the car-mounted terminal and send call connection request to other car-mounted terminals, and the call connection established;It is also possible to
The call that the car-mounted terminal responds the call connection request that other car-mounted terminals received are sent and establishes connects.
In the embodiment of the present invention, the collected voice data in call connection process of acquiring unit 301 includes using to be somebody's turn to do
The user of car-mounted terminal, the voice data of sending.Specifically, when car-mounted terminal has built up call connection, then acquiring unit
The voice data of 301 available user's outputs.
Generation unit 302, for using the data list of the terminal device number including car-mounted terminal according to preset
Cipher mode generates encryption key.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code
(International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message
Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards
Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one
Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main
The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS)
(Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160
Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission
Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy
Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark
Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
Specifically, after the car-mounted terminal and other car-mounted terminals establish connection, then acquiring unit 301 can go to obtain voice
Data, generation unit 302 can generate encryption key, and be encrypted using encryption key to the voice data got.Wherein,
One of above-mentioned cipher mode or a variety of should be used when encryption, and to include the terminal device number of car-mounted terminal
Data list is according to generation encryption key.And the voice data is encrypted using the encryption key of generation.For example,
When terminal device number includes IMEI, then the encryption key generated should be related to IMEI, as the selection of cipher mode, then may be used
To be arbitrary one kind of cipher mode or the combination of a variety of cipher modes.
Encryption unit 303 obtains encrypted voice data for encrypting using encryption key to voice data.
First transmission unit 304, for sending encrypted voice data to the user terminal for establishing call connection, so that user
Terminal generates the decruption key for decrypting encrypted voice data, and encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, user terminal can include but is not limited to smart phone (such as Android phone, iOS mobile phone
Deng), tablet computer, the tool such as palm PC and mobile internet device (Mobile Internet Devices, MID), PAD
There is the user terminal of voice data transmission function.
In the embodiment of the present invention, when encryption unit 303 to collected voice data according to preset encryption rule
Encryption, after obtaining encrypted voice data, the first transmission unit 304 can by the encrypted voice data to establish call connection use
Family terminal is sent.After user terminal receives the encrypted voice data of car-mounted terminal transmission, then it will use including car-mounted terminal
Terminal device number data list according to preset manner of decryption generate decruption key.Wherein, encrypted voice data is
The data that the encryption key generated using generation unit 302 encrypts voice data, encryption key are encryption unit
3032 generate encryption key according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal.
In Fig. 3, when call connection has been established in detection, acquiring unit 301 obtains adopt in call connection process first
The voice data collected;Generation unit 302 is then using the data list for the terminal device number for including car-mounted terminal according to preparatory
The cipher mode of setting generates encryption key, and encryption unit 303 simultaneously encrypts voice data using encryption key, added
Close voice data;First transmission unit 304 sends encrypted voice data to the user terminal for establishing call connection again, so that user
Terminal generates the decruption key for decrypting encrypted voice data, and encrypted voice data is decrypted using decruption key.?
In the embodiment of the present invention, when acquiring unit 301 collects voice data in call connection process, encryption unit 303 can be first
Voice data is encrypted using encryption key, and encryption key is the data using the terminal device number for including car-mounted terminal
List is according to preset cipher mode encryption key generated, to further increase the safety of voice data.
As it can be seen that implementing the embodiment of the present invention can be improved the safety during voice data transmission.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention, for executing
The method of above-mentioned voice data encryption.Wherein, Fig. 4 is that further refinement obtains on the basis of Fig. 3, except including shown in Fig. 3
Outside all units, it can also include: third transmission unit 305, establish unit 306, receiving unit 307, detection unit 308,
Two transmission units 309 and control unit 310, wherein
Third transmission unit 305, for sending call connection request to user terminal.
In the embodiment of the present invention, call connection request carries the terminal device number of car-mounted terminal, and terminal device number is for giving birth to
At decruption key, the encryption data which is used to send car-mounted terminal is decrypted.
In the embodiment of the present invention, since call connection may include that user passes through phone number (mobile number, connection number
And one of telecom number) with the car-mounted terminal and the call established is connect, can also include passing through some chat applications
Program (application programs such as wechat, QQ) and establish call connection.Then call is sent to other car-mounted terminals in car-mounted terminal to connect
When connecing, the terminal device number of the terminal can be carried.And in sending different call connections, different letters can also be carried
Breath.It for example, can be with when third transmission unit 305 sends call connection to other car-mounted terminals by connection WIFI
Carry the IP address of the corresponding server of the WIFI.
Unit 306 is established, for receiving the connection that user terminal response call connection request is sent when receiving unit 305
When response, the data list including terminal device number is established.
In the embodiment of the present invention, connect when third transmission unit 305 sends call to other car-mounted terminals by connection WIFI
When connecing, due to send converse connection request when, in addition to the car-mounted terminal terminal device when, also carry and the vehicle-mounted end
The IP address of the server of network connection is established at end.Therefore, when the company for receiving user terminal response call connection request transmission
It scoops out when answering, establishes and include terminal device number and the data of the IP address of the server of establishing network connection with the car-mounted terminal
List.
Receiving unit 307, for receiving the decruption key of user terminal transmission.
Whether detection unit 308 matches for detecting encryption key with decruption key.
Second transmission unit 309 matches if detecting encryption key for detection unit 308 with decruption key, to user
Terminal sends the play instruction that encryption data is decrypted for triggering user terminal, so that user terminal response plays and refers to
It enables, to use decruption key that encrypted voice data is decrypted, to obtain decrypted voice data, and plays decrypted voice number
According to.
In the embodiment of the present invention, when receiving unit 307 receives the decruption key of user terminal transmission, then detection unit
Whether the decruption key that 308 encryption keys that can detect the generation of generation unit 302 are sent with user terminal matches.Wherein, on
Whether the decruption key that the encryption key and user terminal for stating the generation of generation unit 302 are sent, which matches, can be understood as generating list
Whether the encryption key that member 302 generates and the decruption key that user terminal is sent are identical;It also will be understood that raw at generation unit 302
At the decruption key that sends of encryption key and user terminal whether be consistent with pre-stored matching rule.
In the embodiment of the present invention, when the decruption key that the encryption key that generation unit 302 generates is sent with user terminal is
It is no match be understood as generation unit 302 generation encryption key and user terminal send decruption key it is whether identical when, phase
Corresponding example may is that the decruption key generated when generation unit 302 is 123*, and the decruption key that user terminal is sent is
123*, the then encryption key for illustrating that generation unit 302 generates are identical as the decruption key that user terminal is sent.When by generation unit
Whether the decruption key that 302 encryption keys generated and user terminal are sent, which matches, is understood as adding for the generation of generation unit 302
When whether the decruption key that close key and user terminal is sent is consistent with pre-stored matching rule, corresponding example can
To be: when pre-stored matching rule is by adding 1 form to increase every time, and all carrying * after key, such as: single when generating
Member 302 generate encryption keys be 123*, and user terminal send decruption key be 456* when, then illustrate generation unit 302
The encryption key of generation is consistent with the decruption key that user terminal is sent.If the decruption key that user terminal is sent is 458#,
The encryption key for then illustrating that generation unit 302 generates is not consistent with the decruption key that user terminal is sent.
Control unit 310 controls first if detecting encryption key and decruption key mismatch for detection unit 308
Transmission unit 304 stops sending voice data to user terminal.
If encryption key and user terminal that detection unit 308 is generated according to above-mentioned detection according to detection generation unit 302
When the decruption key of transmission does not match that, then the first transmission unit 304 can stop continuing to send data to the user terminal.And it uses
When family terminal does not continue to the voice data of car-mounted terminal transmission within the preset period, then it will can connect before
The voice data relevant to the data of this transmission received abandons.
As an alternative embodiment, generation unit 302 can further refine to obtain: extraction module 3020 and
Generation module 3021, wherein
Extraction module 3020, for extracting terminal device number from data list.
Generation module 3021 generates encryption key according to preset cipher mode for using terminal device number.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code
(International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message
Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards
Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one
Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main
The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS)
(Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160
Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission
Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy
Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark
Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
In Fig. 4, be described in detail receiving unit 307 receive user terminal transmission decruption key when, detection unit
308 can match the encryption key that local terminal generates with the decruption key received.Only when detection unit 308 detects this
When holding the encryption key generated and the decruption key successful match received, the first transmission unit 304 can continue to send encryption
Voice data, the second transmission unit 309 simultaneously send the play instruction that encryption data is decrypted for triggering user terminal, with
Decrypted voice data are obtained, and play the decrypted voice data.As it can be seen that implementing the embodiment of the present invention can be further improved voice
Safety in data transmission procedure.
Referring to Fig. 5, Fig. 5 is the structural schematic diagram of another terminal disclosed by the embodiments of the present invention, it is above-mentioned for executing
The method of voice data encryption.As shown in figure 5, the terminal 500 may include: at least one processor 501, at least one input
Device 502, at least one output device 503, the equal components of memory 505.Wherein, these components pass through one or more bus
504 are communicatively coupled.It will be understood by those skilled in the art that the structure of terminal shown in Fig. 5 is not constituted to the present invention
The restriction of embodiment, it is also possible to hub-and-spoke configuration either busbar network, can also include more more or less than illustrating
Component, perhaps combine certain components or different component layouts.Wherein:
Processor 501 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to
It crosses operation or executes the program and/or module being stored in memory 505, and call the data being stored in memory 505,
To execute the various functions and processing data of terminal.Processor 501 can be by integrated circuit (Integrated Circuit, letter
Claim IC) composition, such as can be made of the IC of single encapsulation, it can also be by the envelope of more identical functions of connection or different function
It fills IC and forms.For example, processor 501 can only include central processing unit (Central Processing Unit, letter
Claim CPU), it is also possible to CPU, digital signal processor (digital signal processor, abbreviation DSP), graphics process
The combination of device (Graphic Processing Unit, abbreviation GPU) and various control chips.In embodiments of the present invention,
CPU can be single operation core, also may include multioperation core.
Input unit 502 may include the touch screen of standard, keyboard etc., also may include wireline interface, wireless interface etc..
Output device 503 may include display screen, loudspeaker etc., also may include wireline interface, wireless interface etc..
Memory 505 can be used for storing software program and module, processor 501, input unit 502 and output device
503 by calling the software programs and module that are stored in memory 505, thereby executing terminal various function applications and
Realize data processing.Memory 505 mainly includes program storage area and data storage area, wherein program storage area can store behaviour
Application program needed for making system, at least one function etc.;Data storage area, which can be stored, uses created number according to terminal
According to etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operating system etc..
Specifically, processor 501 calls the application program being stored in memory 505, for performing the following operations:
The control input unit of processor 501,502, when call connection has been established in detection, obtain in call connection process
Collected voice data;
It is generated and is encrypted according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal
Key, and voice data is encrypted using encryption key, obtain encrypted voice data;
Processor 501 controls output device 503, sends encrypted voice data to the user terminal for establishing call connection, with
So that user terminal is generated the decruption key for decrypting encrypted voice data, encrypted voice data is solved using decruption key
It is close.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with
Lower step:
The decruption key that user terminal is sent is received, and detects whether encryption key matches with decruption key;
Processor 501 controls output device 503, if detection encryption key matches with decruption key, sends out to user terminal
The play instruction that encryption data is decrypted for triggering user terminal is sent, so that user terminal responds play instruction, so that
Encrypted voice data is decrypted with decruption key, to obtain decrypted voice data, and plays decrypted voice data.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with
Lower step:
Processor 501 controls output device 503, if detection encryption key and decruption key mismatch, stops to user
Terminal sends voice data.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with
Lower step:
Processor 501 controls output device 503, sends call connection request to user terminal, connection request of conversing carries
The terminal device number of car-mounted terminal, for generating decruption key, which is used to send car-mounted terminal terminal device number
Encryption data be decrypted;
When receiving the connection reply that user terminal response call connection request is sent, establishing includes terminal device number
Data list.
In the embodiment of the present invention, processor 501 calls the application program being stored in memory 505, executes step and uses
The data list of terminal device number including the car-mounted terminal generates encryption key according to preset cipher mode, mainly
The following steps are included:
Terminal device number is extracted from data list;
Encryption key is generated according to preset cipher mode using the terminal device number.
Specifically, the voice number that the present invention combines Fig. 1, Fig. 2 introduction can be implemented in the terminal introduced in the embodiment of the present invention
According to process some or all of in the embodiment of the method for encryption.
Module or submodule in all embodiments of the invention can pass through universal integrated circuit, such as CPU (Central
Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated
Circuit, specific integrated circuit) it realizes.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Unit in the terminal of that embodiment of the invention can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, abbreviation RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.
Claims (6)
1. a kind of method of voice data encryption characterized by comprising
Car-mounted terminal sends call connection request to user terminal, and the call connection request carries the terminal of the car-mounted terminal
Device number, for the terminal device number for generating decruption key, which is used for the encryption sent to the car-mounted terminal
Data are decrypted;
When the car-mounted terminal, which receives the user terminal, responds the connection reply that the call connection request is sent, establish
Data list including the terminal device number;
When call connection has been established in detection, car-mounted terminal obtains the collected voice data in the call connection process;
The car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset encryption
Mode generates encryption key, and is encrypted using the encryption key to the voice data, obtains encrypted voice data;
The car-mounted terminal sends the encrypted voice data to the user terminal for establishing the call connection, so that the user
Terminal generates the decruption key for decrypting the encrypted voice data, using the decruption key to the encrypted voice data
It is decrypted;
The car-mounted terminal receives the decruption key that the user terminal is sent, and detects the encryption key and the solution
Whether key matches;
If the car-mounted terminal detects the encryption key and matches with the decruption key, the car-mounted terminal is to the user
Terminal sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the user terminal
The play instruction is responded, to use the decruption key that the encrypted voice data is decrypted, to obtain decrypted voice
Data, and play the decrypted voice data;
Whether the detection encryption key matches with the decruption key, comprising: detect the encryption key with it is described
Whether decruption key identical, or the detection encryption key and the decruption key whether with pre-stored matching rule phase
Symbol.
2. the method according to claim 1, wherein the method also includes:
If the car-mounted terminal detects the encryption key and the decruption key mismatches, the car-mounted terminal stops to institute
It states user terminal and sends voice data.
3. the method according to claim 1, wherein the car-mounted terminal uses the end including the car-mounted terminal
The data list of end equipment number generates encryption key according to preset cipher mode, comprising:
The car-mounted terminal extracts the terminal device number from the data list;
The car-mounted terminal generates encryption key according to preset cipher mode using the terminal device number.
4. a kind of car-mounted terminal characterized by comprising
Third transmission unit, for sending call connection request to user terminal, the call connection request carries described vehicle-mounted
The terminal device number of terminal, for generating decruption key, which is used for the car-mounted terminal terminal device number
The encryption data of transmission is decrypted;
Establish unit, for when receiving unit receive the user terminal respond it is described call connection request send connection answer
When answering, the data list including the terminal device number is established;
Acquiring unit, for obtaining the collected voice in the call connection process when call connection has been established in detection
Data;
Generation unit, for using the data list of the terminal device number including the car-mounted terminal according to preset encryption
Mode generates encryption key;
Encryption unit obtains encrypted voice data for encrypting using the encryption key to the voice data;
First transmission unit, for sending the encrypted voice data to the user terminal for establishing the call connection, so that institute
It states user terminal and generates decruption key for decrypting the encrypted voice data, using the decruption key to the encryption language
Sound data are decrypted;
Receiving unit, the decruption key sent for receiving the user terminal;
Whether detection unit matches for detecting the encryption key with the decruption key;
Second transmission unit matches if detecting the encryption key for the detection unit with the decruption key, to institute
It states user terminal and sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the use
Family terminal responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, to be solved
Close voice data, and play the decrypted voice data;
The detection unit is specifically used for detecting the encryption key and whether the decruption key is identical, or the detection encryption
Whether key and the decruption key are consistent with pre-stored matching rule.
5. car-mounted terminal according to claim 4, which is characterized in that the car-mounted terminal further include:
Control unit controls institute if detecting the encryption key and decruption key mismatch for the detection unit
The first transmission unit is stated to stop sending voice data to the user terminal.
6. car-mounted terminal according to claim 4, which is characterized in that the generation unit includes:
Extraction module, for extracting the terminal device number from the data list;
Generation module, for generating encryption key according to preset cipher mode using the terminal device number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510425367.2A CN105072094B (en) | 2015-07-17 | 2015-07-17 | A kind of method and car-mounted terminal of voice data encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510425367.2A CN105072094B (en) | 2015-07-17 | 2015-07-17 | A kind of method and car-mounted terminal of voice data encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105072094A CN105072094A (en) | 2015-11-18 |
CN105072094B true CN105072094B (en) | 2019-02-15 |
Family
ID=54501377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510425367.2A Active CN105072094B (en) | 2015-07-17 | 2015-07-17 | A kind of method and car-mounted terminal of voice data encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105072094B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471874A (en) * | 2015-11-30 | 2016-04-06 | 深圳市元征软件开发有限公司 | Data transmission method and device |
CN108629189A (en) * | 2018-03-20 | 2018-10-09 | 蔚来汽车有限公司 | Engine end data guard method, device and vehicle |
CN111681662B (en) * | 2020-06-01 | 2023-07-25 | 科大讯飞股份有限公司 | In-vehicle interactive audio encryption method, device and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN103179557A (en) * | 2011-12-26 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Real-time encryption and decryption method and system for communication data and mobile terminal |
CN103973696A (en) * | 2014-05-16 | 2014-08-06 | 天地融科技股份有限公司 | Data processing method of voice communication |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100547855B1 (en) * | 2003-01-14 | 2006-01-31 | 삼성전자주식회사 | Secure communication system and method of a composite mobile communication terminal having a local area communication device |
-
2015
- 2015-07-17 CN CN201510425367.2A patent/CN105072094B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420303A (en) * | 2008-12-12 | 2009-04-29 | 广州杰赛科技股份有限公司 | Communication method for audio data and apparatus thereof |
CN103179557A (en) * | 2011-12-26 | 2013-06-26 | 宇龙计算机通信科技(深圳)有限公司 | Real-time encryption and decryption method and system for communication data and mobile terminal |
CN103973696A (en) * | 2014-05-16 | 2014-08-06 | 天地融科技股份有限公司 | Data processing method of voice communication |
Also Published As
Publication number | Publication date |
---|---|
CN105072094A (en) | 2015-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3917330B2 (en) | Common key sharing method | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN105634737B (en) | Data transmission method, terminal and system | |
CN103249014B (en) | Method for encrypting short message of mobile communication | |
CN103747012A (en) | Security verification method, device and system of network transaction | |
CN110620846B (en) | Message merging method, device, equipment and storage medium | |
CN103458400A (en) | Key management method for voice encryption communication system | |
CN112003696A (en) | SM9 key generation method, system, electronic equipment, device and storage medium | |
TW201729562A (en) | Server, mobile terminal, and internet real name authentication system and method | |
CN111245771B (en) | Instant message encryption and decryption method, device, equipment and storage medium | |
CN105072094B (en) | A kind of method and car-mounted terminal of voice data encryption | |
CN113038463B (en) | Communication encryption authentication experimental device | |
CN103873245B (en) | Dummy machine system data ciphering method and equipment | |
US20150156173A1 (en) | Communication system utilizing fingerprint information and use thereof | |
CN102550060B (en) | For the method for fast and safely traffic encryption key | |
CN113542231B (en) | Communication method, electronic device, and storage medium | |
CN113642022B (en) | E-mail processing method, device, system and storage medium | |
CN106685931B (en) | Smart card application management method and system, terminal and smart card | |
CN112333699B (en) | Internet of things communication protocol encryption method, equipment and storage medium | |
CN114584971A (en) | Account registration method and device, electronic equipment and storage medium | |
CN108769989B (en) | Wireless network connection method, wireless access device and equipment | |
CN105915696B (en) | A kind of communication connection method for building up and terminal | |
CN106055989B (en) | A kind of data transferring method and terminal | |
CN106156571A (en) | Encrypting fingerprint instrument, encrypting fingerprint instrument encrypting and deciphering system and encipher-decipher method | |
CN104955037A (en) | Communication encryption method and device for GSM (global system for mobile communications) mobile phones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |