CN105072094B - A kind of method and car-mounted terminal of voice data encryption - Google Patents

A kind of method and car-mounted terminal of voice data encryption Download PDF

Info

Publication number
CN105072094B
CN105072094B CN201510425367.2A CN201510425367A CN105072094B CN 105072094 B CN105072094 B CN 105072094B CN 201510425367 A CN201510425367 A CN 201510425367A CN 105072094 B CN105072094 B CN 105072094B
Authority
CN
China
Prior art keywords
car
voice data
terminal
encryption
mounted terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510425367.2A
Other languages
Chinese (zh)
Other versions
CN105072094A (en
Inventor
刘均
宋朝忠
欧阳张鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201510425367.2A priority Critical patent/CN105072094B/en
Publication of CN105072094A publication Critical patent/CN105072094A/en
Application granted granted Critical
Publication of CN105072094B publication Critical patent/CN105072094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses the methods and car-mounted terminal of a kind of encryption of voice data, comprising: when call connection has been established in detection, car-mounted terminal obtains the collected voice data in call connection process first;Then encryption key is generated according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal, and voice data is encrypted using encryption key, obtain encrypted voice data;Encrypted voice data is sent to the user terminal for establishing call connection again encrypted voice data is decrypted using decruption key so that user terminal generates the decruption key for decrypting encrypted voice data.As it can be seen that implementing the embodiment of the present invention can be improved the safety during voice data transmission.

Description

A kind of method and car-mounted terminal of voice data encryption
Technical field
A kind of method and car-mounted terminal encrypted the present invention relates to field of communication technology more particularly to voice data.
Background technique
With the continuous development of the communication technology, not requiring nothing more than communication system has the spies such as quality is high, multi-functional, reliability is high Point, and increasingly higher demands also proposed to the confidentiality of communication system, the range of coded communication extends from special user To ordinary user.Concealment, confidentiality and the safety that existing communication system provides are unable to satisfy the requirement of secret communication.It is right In fixed telephone system, it is only necessary to which eavesdropping can be achieved the purpose that by simply making contact;Even the higher movement of confidentiality Car-mounted terminal does not also encrypt voice, to reduce the safety of voice data transmission.
Summary of the invention
The embodiment of the invention provides the methods and car-mounted terminal of a kind of encryption of voice data, can be improved voice data biography Safety during defeated.
In a first aspect, the embodiment of the invention discloses a kind of methods of voice data encryption, comprising:
When call connection has been established in detection, car-mounted terminal obtains the collected voice number in the call connection process According to;
The car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset Cipher mode generates encryption key, and is encrypted using the encryption key to the voice data, obtains encryption voice number According to;
The car-mounted terminal sends the encrypted voice data to the user terminal for establishing the call connection, so that described User terminal generates the decruption key for decrypting the encrypted voice data, using the decruption key to the encryption voice Data are decrypted.
Implementation with reference to first aspect, in the first possible implementation of the first aspect, the method is also It may comprise steps of:
The car-mounted terminal receives the decruption key that the user terminal is sent, and detects the encryption key and institute State whether decruption key matches;
If the car-mounted terminal detects the encryption key and matches with the decruption key, the car-mounted terminal is to described User terminal sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the user Terminal responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, to be decrypted Voice data, and play the decrypted voice data.
The possible implementation of with reference to first aspect the first, in second of possible implementation of first aspect In, the method also includes:
If the car-mounted terminal detects the encryption key and the decruption key mismatches, the car-mounted terminal stops Voice data is sent to the user terminal.
The of the first possible implementation of implementation, first aspect with reference to first aspect and first aspect Any one implementation in two kinds of possible implementations, in a third possible implementation of the first aspect, institute The method of stating can with the following steps are included:
The car-mounted terminal sends call connection request to the user terminal, and the call connection request carries the vehicle The terminal device number of mounted terminal, for generating decruption key, which was used for the vehicle-mounted end terminal device number The encryption data that end is sent is decrypted;
When the car-mounted terminal, which receives the user terminal, responds the connection reply that the call connection request is sent, Establish the data list including the terminal device number.
The third possible implementation with reference to first aspect, in the 4th kind of possible implementation of first aspect In, the car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset encryption side Formula generates encryption key, comprising:
The car-mounted terminal extracts the terminal device number from the data list;
The car-mounted terminal generates encryption key according to preset cipher mode using the terminal device number.
Second aspect, the embodiment of the invention discloses a kind of car-mounted terminals, comprising:
Acquiring unit, for obtaining collected in the call connection process when call connection has been established in detection Voice data;
Generation unit, for using the data list of the terminal device number including the car-mounted terminal according to preset Cipher mode generates encryption key;
Encryption unit obtains encrypted voice data for encrypting using the encryption key to the voice data;
First transmission unit, for sending the encrypted voice data to the user terminal for establishing the call connection, with So that the user terminal is generated the decruption key for decrypting the encrypted voice data, is added using the decruption key to described Close voice data is decrypted.
In conjunction with the car-mounted terminal of second aspect, in the first possible car-mounted terminal of second aspect, the vehicle-mounted end End can also include:
Receiving unit, the decruption key sent for receiving the user terminal;
Whether detection unit matches for detecting the encryption key with the decruption key;
Second transmission unit matches if detecting the encryption key for the detection unit with the decruption key, The play instruction that the encryption data is decrypted for triggering the user terminal is sent to the user terminal, so that institute It states user terminal and responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, with To decrypted voice data, and play the decrypted voice data.
In conjunction with the first possible car-mounted terminal of second aspect, in second of possible car-mounted terminal of second aspect In, the car-mounted terminal further include:
Control unit is controlled if detecting the encryption key and decruption key mismatch for the detection unit First transmission unit is made to stop sending voice data to the user terminal.
In conjunction with the of the car-mounted terminal of second aspect, the first possible car-mounted terminal of second aspect and second aspect Any one car-mounted terminal in two kinds of possible car-mounted terminals, in the third possible car-mounted terminal of second aspect, institute Stating car-mounted terminal can also include:
Third transmission unit, for sending call connection request to the user terminal, the call connection request is carried The terminal device number of the car-mounted terminal, for generating decruption key, which is used for described the terminal device number The encryption data that car-mounted terminal is sent is decrypted;
Unit is established, for responding the call connection request transmission when the receiving unit receives the user terminal Connection reply when, establish include the terminal device number data list.
In conjunction with the third possible car-mounted terminal of second aspect, in the 4th kind of possible car-mounted terminal of second aspect In, the generation unit includes:
Extraction module, for extracting the terminal device number from the data list;
Generation module, for generating encryption key according to preset cipher mode using the terminal device number.
In the embodiment of the present invention, when call connection has been established in detection, car-mounted terminal is obtained in call connection process first In collected voice data;Car-mounted terminal is then using the data list for the terminal device number for including car-mounted terminal according to preparatory The cipher mode of setting generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data; Car-mounted terminal to the user terminal transmission encrypted voice data conversed and connected is established, adds so that user terminal is generated for decryption again The decruption key of close voice data is decrypted encrypted voice data using decruption key.In embodiments of the present invention, work as vehicle When mounted terminal collects voice data in call connection process, car-mounted terminal can first be carried out voice data using encryption key Encryption, and encryption key is the data list using the terminal device number for including car-mounted terminal according to preset cipher mode Encryption key generated, to further increase the safety of voice data.As it can be seen that implementing the embodiment of the present invention can mention Safety during high voice data transmission.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the method for voice data encryption disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the method for another voice data encryption disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of car-mounted terminal disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the invention provides the methods and car-mounted terminal of a kind of encryption of voice data.In embodiments of the present invention, When car-mounted terminal collects voice data in call connection process, car-mounted terminal can be first using encryption key to voice data It is encrypted, and encryption key is the data list using the terminal device number for including car-mounted terminal according to preset encryption Mode encryption key generated, to further increase the safety of voice data.It can as it can be seen that implementing the embodiment of the present invention To improve the safety during voice data transmission.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of the method for voice data encryption disclosed by the embodiments of the present invention. As shown in Figure 1, the method for voice data encryption may comprise steps of:
S101, when detection have been established call connection when, car-mounted terminal obtain in call connection process collected voice Data.
In the embodiment of the present invention, call connection may include user by phone number (mobile number, connection number and One of telecom number) with car-mounted terminal and the call established is connect, can also include (micro- by some chat applications The application programs such as letter, QQ) and the call connection of foundation.Wherein, which supports Subscriber Identity Module.The call of foundation connects It can be the car-mounted terminal and send call connection request to other car-mounted terminals, and the call connection established;It is also possible to the vehicle The call that mounted terminal responds the call connection request that other car-mounted terminals received are sent and establishes connects.
In the embodiment of the present invention, collected voice data includes the use using the car-mounted terminal in call connection process Family, the voice data of sending.Specifically, when car-mounted terminal has built up call connection, then the available user of car-mounted terminal The voice data of output.
S102, car-mounted terminal use the data list of the terminal device number including car-mounted terminal according to preset encryption Mode generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code (International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS) (Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160 Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
Specifically, after the car-mounted terminal and other car-mounted terminals establish connection, then the car-mounted terminal can go to obtain voice Data, and the voice data got is encrypted.It wherein, should be using one in above-mentioned cipher mode when encryption Kind or it is a variety of, and with include car-mounted terminal terminal device number data list for according to generate encryption key.And use generation Encryption key the voice data is encrypted.For example, when terminal device number includes IMEI, then the encryption generated is close Key should be related to IMEI, as the selection of cipher mode, then can be arbitrary cipher mode one kind or a variety of encryption sides The combination of formula.
S103, car-mounted terminal send encrypted voice data to the user terminal for establishing call connection, so that user terminal is raw At the decruption key for decrypting encrypted voice data, encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, user terminal can include but is not limited to smart phone (such as Android phone, iOS mobile phone Deng), tablet computer, the tool such as palm PC and mobile internet device (Mobile Internet Devices, MID), PAD There is the user terminal of voice data transmission function.
In the embodiment of the present invention, when car-mounted terminal adds collected voice data according to preset encryption rule It is close, after obtaining encrypted voice data, which can be sent to the user terminal for establishing call connection.Work as user After terminal receives the encrypted voice data of car-mounted terminal transmission, then it will use the data of the terminal device number including car-mounted terminal List generates decruption key according to preset manner of decryption.Wherein, encrypted voice data is that car-mounted terminal is close using encrypting The data that key encrypts voice data, encryption key are that car-mounted terminal uses the terminal device number including car-mounted terminal Data list according to preset cipher mode generate encryption key.
In Fig. 1, when call connection has been established in detection, car-mounted terminal obtains collect in call connection process first Voice data;Then car-mounted terminal is added using the data list for the terminal device number for including car-mounted terminal according to preset Close mode generates encryption key, and is encrypted using encryption key to voice data, obtains encrypted voice data;Car-mounted terminal Encrypted voice data is sent to the user terminal for establishing call connection again, so that user terminal is generated for decrypting encryption voice number According to decruption key, encrypted voice data is decrypted using decruption key.In embodiments of the present invention, when car-mounted terminal exists When collecting voice data in call connection process, car-mounted terminal can first be encrypted voice data using encryption key, and Encryption key is to be generated using the data list for the terminal device number for including car-mounted terminal according to preset cipher mode Encryption key, to further increase the safety of voice data.As it can be seen that implementing the embodiment of the present invention can be improved voice Safety in data transmission procedure.
Referring to Fig. 2, Fig. 2 is the process signal of the method for another voice data encryption disclosed by the embodiments of the present invention Figure.As shown in Fig. 2, the method for voice data encryption may comprise steps of:
S201, car-mounted terminal send call connection request to user terminal.
In the embodiment of the present invention, call connection request carries the terminal device number of car-mounted terminal, and terminal device number is for giving birth to At decruption key, the encryption data which is used to send car-mounted terminal is decrypted.
In the embodiment of the present invention, since call connection may include that user passes through phone number (mobile number, connection number And one of telecom number) with car-mounted terminal and the call established is connect, can also include passing through some chat application journeys Sequence (application programs such as wechat, QQ) and establish call connection.Then call connection is sent to other car-mounted terminals in car-mounted terminal When, the terminal device number of the terminal can be carried.And in sending different call connections, different information can also be carried. For example, when car-mounted terminal sends call connection to other car-mounted terminals by connection WIFI, the WIFI can also be carried The IP address of corresponding server.
S202, when car-mounted terminal receive user terminal response call connection request send connection reply when, establish packet Include the data list of terminal device number.
In the embodiment of the present invention, according to step S201 it is found that when car-mounted terminal is by connecting WIFI to other car-mounted terminals Send call connection when, due to send converse connection request when, in addition to the car-mounted terminal terminal device when, also carry The IP address of the server of network connection is established with the car-mounted terminal.Therefore, lead to when car-mounted terminal receives user terminal response When talking about the connection reply that connection request is sent, the clothes for including terminal device number and establishing network connection with the car-mounted terminal are established The data list of the IP address of business device.
S203, when detection have been established call connection when, car-mounted terminal obtain in call connection process collected voice Data.
S204, car-mounted terminal extract terminal device number from data list.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code (International Mobile Equipment Identity,IMEI)。
S205, car-mounted terminal using terminal device number generate encryption key according to preset cipher mode, and use Encryption key encrypts voice data, obtains encrypted voice data.
S206, car-mounted terminal send encrypted voice data to the user terminal for establishing call connection, so that user terminal is raw At the decruption key for decrypting encrypted voice data, encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS) (Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160 Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
In the embodiment of the present invention, when car-mounted terminal carries out collected voice data according to preset encryption rule Encryption, when obtaining encrypted voice data, and encrypted voice data being sent to the user terminal, user terminal can be from pre-set It obtains manner of decryption corresponding with encryption rule in manner of decryption set to be decrypted, to obtain decrypted voice data.
As an alternative embodiment, when user terminal according to the cipher mode of encrypted voice data from presetting Manner of decryption set in obtain corresponding with cipher mode manner of decryption, and generate decruption key, and decruption key is sent out Send to car-mounted terminal, can with the following steps are included:
11) car-mounted terminal receives the decruption key that user terminal is sent, and detect encryption key and decruption key whether phase Matching;
12) if car-mounted terminal detection encryption key matches with decruption key, car-mounted terminal is used for user terminal transmission The play instruction that encryption data is decrypted in triggering user terminal, so that user terminal responds play instruction, to use decryption Key pair encryption voice data is decrypted, and to obtain decrypted voice data, and plays the decrypted voice data.
In the embodiment of the present invention, when car-mounted terminal receives the decruption key of user terminal transmission, then car-mounted terminal meeting Whether the decruption key that the encryption key that detection car-mounted terminal generates is sent with user terminal matches.Wherein, above-mentioned vehicle-mounted end Whether the decruption key that the encryption key and user terminal that end generates are sent, which matches, can be understood as adding for car-mounted terminal generation Whether the decruption key that close key and user terminal is sent is identical;It also will be understood that at the encryption key and use of car-mounted terminal generation Whether the decruption key that family terminal is sent is consistent with pre-stored matching rule.
In the embodiment of the present invention, when the decruption key that is sent with user terminal of encryption key that car-mounted terminal generates whether phase When whether the decruption key that matching is understood as the encryption key of car-mounted terminal generation and user terminal is sent is identical, corresponding example Son may is that the decruption key generated when car-mounted terminal is 123*, and the decruption key that user terminal is sent is 123*, then illustrates vehicle The encryption key that mounted terminal generates is identical as the decruption key that user terminal is sent.When the encryption key that generates car-mounted terminal with Whether the decruption key that user terminal is sent, which matches, is understood as encryption key and the user terminal transmission of car-mounted terminal generation When whether decruption key is consistent with pre-stored matching rule, corresponding example be may is that when pre-stored matching When rule is by adding 1 form to increase every time, and all carrying * after key, such as: when the encryption key that car-mounted terminal generates is 123*, and user terminal send decruption key be 456* when, then illustrate car-mounted terminal generate encryption key and user terminal The decruption key of transmission is consistent.If the decruption key that user terminal is sent is 458#, illustrate the encryption that car-mounted terminal generates The decruption key that key and user terminal is sent is not consistent.
In the embodiment of the present invention, if the encryption key that is generated according to above-mentioned detection according to detection car-mounted terminal of car-mounted terminal with When the decruption key that user terminal is sent does not match that, then car-mounted terminal can stop continuing to send data to the user terminal.And It, then can be by before when user terminal does not continue to the voice data of car-mounted terminal transmission within the preset period The voice data relevant to the data of this transmission received abandons.
In Fig. 2, be described in detail car-mounted terminal receive user terminal transmission decruption key when, local terminal can be generated Encryption key matched with the decruption key received.Only when car-mounted terminal detect local terminal generate encryption key with When the decruption key successful match received, it can continue to send encrypted voice data, and send for triggering user terminal pair The play instruction that encryption data is decrypted to obtain decrypted voice data, and plays the decrypted voice data.As it can be seen that implementing The embodiment of the present invention can be further improved the safety during voice data transmission.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram of car-mounted terminal disclosed by the embodiments of the present invention, for executing The method of predicate sound data encryption.As shown in figure 3, the car-mounted terminal may include: acquiring unit 301, generation unit 302, add Close unit 303 and the first transmission unit 304, wherein
Acquiring unit 301, for obtaining the collected language in call connection process when call connection has been established in detection Sound data.
In the embodiment of the present invention, call connection may include user by phone number (mobile number, connection number and One of telecom number) with the car-mounted terminal and the call established is connect, can also include passing through some chat applications (application programs such as wechat, QQ) and establish call connection.Wherein, which supports Subscriber Identity Module.The call of foundation Connection can be the car-mounted terminal and send call connection request to other car-mounted terminals, and the call connection established;It is also possible to The call that the car-mounted terminal responds the call connection request that other car-mounted terminals received are sent and establishes connects.
In the embodiment of the present invention, the collected voice data in call connection process of acquiring unit 301 includes using to be somebody's turn to do The user of car-mounted terminal, the voice data of sending.Specifically, when car-mounted terminal has built up call connection, then acquiring unit The voice data of 301 available user's outputs.
Generation unit 302, for using the data list of the terminal device number including car-mounted terminal according to preset Cipher mode generates encryption key.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code (International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS) (Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160 Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
Specifically, after the car-mounted terminal and other car-mounted terminals establish connection, then acquiring unit 301 can go to obtain voice Data, generation unit 302 can generate encryption key, and be encrypted using encryption key to the voice data got.Wherein, One of above-mentioned cipher mode or a variety of should be used when encryption, and to include the terminal device number of car-mounted terminal Data list is according to generation encryption key.And the voice data is encrypted using the encryption key of generation.For example, When terminal device number includes IMEI, then the encryption key generated should be related to IMEI, as the selection of cipher mode, then may be used To be arbitrary one kind of cipher mode or the combination of a variety of cipher modes.
Encryption unit 303 obtains encrypted voice data for encrypting using encryption key to voice data.
First transmission unit 304, for sending encrypted voice data to the user terminal for establishing call connection, so that user Terminal generates the decruption key for decrypting encrypted voice data, and encrypted voice data is decrypted using decruption key.
In the embodiment of the present invention, user terminal can include but is not limited to smart phone (such as Android phone, iOS mobile phone Deng), tablet computer, the tool such as palm PC and mobile internet device (Mobile Internet Devices, MID), PAD There is the user terminal of voice data transmission function.
In the embodiment of the present invention, when encryption unit 303 to collected voice data according to preset encryption rule Encryption, after obtaining encrypted voice data, the first transmission unit 304 can by the encrypted voice data to establish call connection use Family terminal is sent.After user terminal receives the encrypted voice data of car-mounted terminal transmission, then it will use including car-mounted terminal Terminal device number data list according to preset manner of decryption generate decruption key.Wherein, encrypted voice data is The data that the encryption key generated using generation unit 302 encrypts voice data, encryption key are encryption unit 3032 generate encryption key according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal.
In Fig. 3, when call connection has been established in detection, acquiring unit 301 obtains adopt in call connection process first The voice data collected;Generation unit 302 is then using the data list for the terminal device number for including car-mounted terminal according to preparatory The cipher mode of setting generates encryption key, and encryption unit 303 simultaneously encrypts voice data using encryption key, added Close voice data;First transmission unit 304 sends encrypted voice data to the user terminal for establishing call connection again, so that user Terminal generates the decruption key for decrypting encrypted voice data, and encrypted voice data is decrypted using decruption key.? In the embodiment of the present invention, when acquiring unit 301 collects voice data in call connection process, encryption unit 303 can be first Voice data is encrypted using encryption key, and encryption key is the data using the terminal device number for including car-mounted terminal List is according to preset cipher mode encryption key generated, to further increase the safety of voice data. As it can be seen that implementing the embodiment of the present invention can be improved the safety during voice data transmission.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another car-mounted terminal disclosed by the embodiments of the present invention, for executing The method of above-mentioned voice data encryption.Wherein, Fig. 4 is that further refinement obtains on the basis of Fig. 3, except including shown in Fig. 3 Outside all units, it can also include: third transmission unit 305, establish unit 306, receiving unit 307, detection unit 308, Two transmission units 309 and control unit 310, wherein
Third transmission unit 305, for sending call connection request to user terminal.
In the embodiment of the present invention, call connection request carries the terminal device number of car-mounted terminal, and terminal device number is for giving birth to At decruption key, the encryption data which is used to send car-mounted terminal is decrypted.
In the embodiment of the present invention, since call connection may include that user passes through phone number (mobile number, connection number And one of telecom number) with the car-mounted terminal and the call established is connect, can also include passing through some chat applications Program (application programs such as wechat, QQ) and establish call connection.Then call is sent to other car-mounted terminals in car-mounted terminal to connect When connecing, the terminal device number of the terminal can be carried.And in sending different call connections, different letters can also be carried Breath.It for example, can be with when third transmission unit 305 sends call connection to other car-mounted terminals by connection WIFI Carry the IP address of the corresponding server of the WIFI.
Unit 306 is established, for receiving the connection that user terminal response call connection request is sent when receiving unit 305 When response, the data list including terminal device number is established.
In the embodiment of the present invention, connect when third transmission unit 305 sends call to other car-mounted terminals by connection WIFI When connecing, due to send converse connection request when, in addition to the car-mounted terminal terminal device when, also carry and the vehicle-mounted end The IP address of the server of network connection is established at end.Therefore, when the company for receiving user terminal response call connection request transmission It scoops out when answering, establishes and include terminal device number and the data of the IP address of the server of establishing network connection with the car-mounted terminal List.
Receiving unit 307, for receiving the decruption key of user terminal transmission.
Whether detection unit 308 matches for detecting encryption key with decruption key.
Second transmission unit 309 matches if detecting encryption key for detection unit 308 with decruption key, to user Terminal sends the play instruction that encryption data is decrypted for triggering user terminal, so that user terminal response plays and refers to It enables, to use decruption key that encrypted voice data is decrypted, to obtain decrypted voice data, and plays decrypted voice number According to.
In the embodiment of the present invention, when receiving unit 307 receives the decruption key of user terminal transmission, then detection unit Whether the decruption key that 308 encryption keys that can detect the generation of generation unit 302 are sent with user terminal matches.Wherein, on Whether the decruption key that the encryption key and user terminal for stating the generation of generation unit 302 are sent, which matches, can be understood as generating list Whether the encryption key that member 302 generates and the decruption key that user terminal is sent are identical;It also will be understood that raw at generation unit 302 At the decruption key that sends of encryption key and user terminal whether be consistent with pre-stored matching rule.
In the embodiment of the present invention, when the decruption key that the encryption key that generation unit 302 generates is sent with user terminal is It is no match be understood as generation unit 302 generation encryption key and user terminal send decruption key it is whether identical when, phase Corresponding example may is that the decruption key generated when generation unit 302 is 123*, and the decruption key that user terminal is sent is 123*, the then encryption key for illustrating that generation unit 302 generates are identical as the decruption key that user terminal is sent.When by generation unit Whether the decruption key that 302 encryption keys generated and user terminal are sent, which matches, is understood as adding for the generation of generation unit 302 When whether the decruption key that close key and user terminal is sent is consistent with pre-stored matching rule, corresponding example can To be: when pre-stored matching rule is by adding 1 form to increase every time, and all carrying * after key, such as: single when generating Member 302 generate encryption keys be 123*, and user terminal send decruption key be 456* when, then illustrate generation unit 302 The encryption key of generation is consistent with the decruption key that user terminal is sent.If the decruption key that user terminal is sent is 458#, The encryption key for then illustrating that generation unit 302 generates is not consistent with the decruption key that user terminal is sent.
Control unit 310 controls first if detecting encryption key and decruption key mismatch for detection unit 308 Transmission unit 304 stops sending voice data to user terminal.
If encryption key and user terminal that detection unit 308 is generated according to above-mentioned detection according to detection generation unit 302 When the decruption key of transmission does not match that, then the first transmission unit 304 can stop continuing to send data to the user terminal.And it uses When family terminal does not continue to the voice data of car-mounted terminal transmission within the preset period, then it will can connect before The voice data relevant to the data of this transmission received abandons.
As an alternative embodiment, generation unit 302 can further refine to obtain: extraction module 3020 and Generation module 3021, wherein
Extraction module 3020, for extracting terminal device number from data list.
Generation module 3021 generates encryption key according to preset cipher mode for using terminal device number.
In the embodiment of the present invention, terminal device number can include but is not limited to mobile device international identity code (International Mobile Equipment Identity,IMEI)。
In the embodiment of the present invention, cipher mode can include but is not limited to Message Digest Algorithm 5 (Message Digest Algorithm, MD5), Secure Hash Algorithm (Secure Hash Algorithm, SHA) and data encryption standards Cipher modes such as (Data Encryption Standard, DES).Wherein, MD5 is computer safety field widely used one Kind hash function, to provide the integrity protection of message.Secure Hash Algorithm (Secure Hash Algorithm, SHA) is main The Digital Signature Algorithm to be suitable for defining inside digital signature standard (Digital Signature Standard, DSS) (Digital Signature Algorithm, DSA).It is less than 2^64 message for length, SHA can generate one 160 Eap-message digest.When receiving message, this eap-message digest can be used to the integrality of verify data.In the mistake of transmission Cheng Zhong, data are likely to change, then will at this time generate different eap-message digests.Wherein, SHA1 has following spy Property: information cannot be restored from eap-message digest;Two different message will not generate same eap-message digest.Data encryption mark Quasi- (Data Encryption Standard, DES) is a kind of block algorithm encrypted using key.
In Fig. 4, be described in detail receiving unit 307 receive user terminal transmission decruption key when, detection unit 308 can match the encryption key that local terminal generates with the decruption key received.Only when detection unit 308 detects this When holding the encryption key generated and the decruption key successful match received, the first transmission unit 304 can continue to send encryption Voice data, the second transmission unit 309 simultaneously send the play instruction that encryption data is decrypted for triggering user terminal, with Decrypted voice data are obtained, and play the decrypted voice data.As it can be seen that implementing the embodiment of the present invention can be further improved voice Safety in data transmission procedure.
Referring to Fig. 5, Fig. 5 is the structural schematic diagram of another terminal disclosed by the embodiments of the present invention, it is above-mentioned for executing The method of voice data encryption.As shown in figure 5, the terminal 500 may include: at least one processor 501, at least one input Device 502, at least one output device 503, the equal components of memory 505.Wherein, these components pass through one or more bus 504 are communicatively coupled.It will be understood by those skilled in the art that the structure of terminal shown in Fig. 5 is not constituted to the present invention The restriction of embodiment, it is also possible to hub-and-spoke configuration either busbar network, can also include more more or less than illustrating Component, perhaps combine certain components or different component layouts.Wherein:
Processor 501 is the control centre of terminal, using the various pieces of various interfaces and the entire terminal of connection, is led to It crosses operation or executes the program and/or module being stored in memory 505, and call the data being stored in memory 505, To execute the various functions and processing data of terminal.Processor 501 can be by integrated circuit (Integrated Circuit, letter Claim IC) composition, such as can be made of the IC of single encapsulation, it can also be by the envelope of more identical functions of connection or different function It fills IC and forms.For example, processor 501 can only include central processing unit (Central Processing Unit, letter Claim CPU), it is also possible to CPU, digital signal processor (digital signal processor, abbreviation DSP), graphics process The combination of device (Graphic Processing Unit, abbreviation GPU) and various control chips.In embodiments of the present invention, CPU can be single operation core, also may include multioperation core.
Input unit 502 may include the touch screen of standard, keyboard etc., also may include wireline interface, wireless interface etc..
Output device 503 may include display screen, loudspeaker etc., also may include wireline interface, wireless interface etc..
Memory 505 can be used for storing software program and module, processor 501, input unit 502 and output device 503 by calling the software programs and module that are stored in memory 505, thereby executing terminal various function applications and Realize data processing.Memory 505 mainly includes program storage area and data storage area, wherein program storage area can store behaviour Application program needed for making system, at least one function etc.;Data storage area, which can be stored, uses created number according to terminal According to etc..In embodiments of the present invention, operating system can be android system, iOS system or Windows operating system etc..
Specifically, processor 501 calls the application program being stored in memory 505, for performing the following operations:
The control input unit of processor 501,502, when call connection has been established in detection, obtain in call connection process Collected voice data;
It is generated and is encrypted according to preset cipher mode using the data list for the terminal device number for including car-mounted terminal Key, and voice data is encrypted using encryption key, obtain encrypted voice data;
Processor 501 controls output device 503, sends encrypted voice data to the user terminal for establishing call connection, with So that user terminal is generated the decruption key for decrypting encrypted voice data, encrypted voice data is solved using decruption key It is close.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with Lower step:
The decruption key that user terminal is sent is received, and detects whether encryption key matches with decruption key;
Processor 501 controls output device 503, if detection encryption key matches with decruption key, sends out to user terminal The play instruction that encryption data is decrypted for triggering user terminal is sent, so that user terminal responds play instruction, so that Encrypted voice data is decrypted with decruption key, to obtain decrypted voice data, and plays decrypted voice data.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with Lower step:
Processor 501 controls output device 503, if detection encryption key and decruption key mismatch, stops to user Terminal sends voice data.
In the embodiment of the present invention, processor 501 calls the application program that is stored in memory 505, be also used to execute with Lower step:
Processor 501 controls output device 503, sends call connection request to user terminal, connection request of conversing carries The terminal device number of car-mounted terminal, for generating decruption key, which is used to send car-mounted terminal terminal device number Encryption data be decrypted;
When receiving the connection reply that user terminal response call connection request is sent, establishing includes terminal device number Data list.
In the embodiment of the present invention, processor 501 calls the application program being stored in memory 505, executes step and uses The data list of terminal device number including the car-mounted terminal generates encryption key according to preset cipher mode, mainly The following steps are included:
Terminal device number is extracted from data list;
Encryption key is generated according to preset cipher mode using the terminal device number.
Specifically, the voice number that the present invention combines Fig. 1, Fig. 2 introduction can be implemented in the terminal introduced in the embodiment of the present invention According to process some or all of in the embodiment of the method for encryption.
Module or submodule in all embodiments of the invention can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, specific integrated circuit) it realizes.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Unit in the terminal of that embodiment of the invention can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (6)

1. a kind of method of voice data encryption characterized by comprising
Car-mounted terminal sends call connection request to user terminal, and the call connection request carries the terminal of the car-mounted terminal Device number, for the terminal device number for generating decruption key, which is used for the encryption sent to the car-mounted terminal Data are decrypted;
When the car-mounted terminal, which receives the user terminal, responds the connection reply that the call connection request is sent, establish Data list including the terminal device number;
When call connection has been established in detection, car-mounted terminal obtains the collected voice data in the call connection process;
The car-mounted terminal uses the data list of the terminal device number including the car-mounted terminal according to preset encryption Mode generates encryption key, and is encrypted using the encryption key to the voice data, obtains encrypted voice data;
The car-mounted terminal sends the encrypted voice data to the user terminal for establishing the call connection, so that the user Terminal generates the decruption key for decrypting the encrypted voice data, using the decruption key to the encrypted voice data It is decrypted;
The car-mounted terminal receives the decruption key that the user terminal is sent, and detects the encryption key and the solution Whether key matches;
If the car-mounted terminal detects the encryption key and matches with the decruption key, the car-mounted terminal is to the user Terminal sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the user terminal The play instruction is responded, to use the decruption key that the encrypted voice data is decrypted, to obtain decrypted voice Data, and play the decrypted voice data;
Whether the detection encryption key matches with the decruption key, comprising: detect the encryption key with it is described Whether decruption key identical, or the detection encryption key and the decruption key whether with pre-stored matching rule phase Symbol.
2. the method according to claim 1, wherein the method also includes:
If the car-mounted terminal detects the encryption key and the decruption key mismatches, the car-mounted terminal stops to institute It states user terminal and sends voice data.
3. the method according to claim 1, wherein the car-mounted terminal uses the end including the car-mounted terminal The data list of end equipment number generates encryption key according to preset cipher mode, comprising:
The car-mounted terminal extracts the terminal device number from the data list;
The car-mounted terminal generates encryption key according to preset cipher mode using the terminal device number.
4. a kind of car-mounted terminal characterized by comprising
Third transmission unit, for sending call connection request to user terminal, the call connection request carries described vehicle-mounted The terminal device number of terminal, for generating decruption key, which is used for the car-mounted terminal terminal device number The encryption data of transmission is decrypted;
Establish unit, for when receiving unit receive the user terminal respond it is described call connection request send connection answer When answering, the data list including the terminal device number is established;
Acquiring unit, for obtaining the collected voice in the call connection process when call connection has been established in detection Data;
Generation unit, for using the data list of the terminal device number including the car-mounted terminal according to preset encryption Mode generates encryption key;
Encryption unit obtains encrypted voice data for encrypting using the encryption key to the voice data;
First transmission unit, for sending the encrypted voice data to the user terminal for establishing the call connection, so that institute It states user terminal and generates decruption key for decrypting the encrypted voice data, using the decruption key to the encryption language Sound data are decrypted;
Receiving unit, the decruption key sent for receiving the user terminal;
Whether detection unit matches for detecting the encryption key with the decruption key;
Second transmission unit matches if detecting the encryption key for the detection unit with the decruption key, to institute It states user terminal and sends the play instruction that the encryption data is decrypted for triggering the user terminal, so that the use Family terminal responds the play instruction, to use the decruption key that the encrypted voice data is decrypted, to be solved Close voice data, and play the decrypted voice data;
The detection unit is specifically used for detecting the encryption key and whether the decruption key is identical, or the detection encryption Whether key and the decruption key are consistent with pre-stored matching rule.
5. car-mounted terminal according to claim 4, which is characterized in that the car-mounted terminal further include:
Control unit controls institute if detecting the encryption key and decruption key mismatch for the detection unit The first transmission unit is stated to stop sending voice data to the user terminal.
6. car-mounted terminal according to claim 4, which is characterized in that the generation unit includes:
Extraction module, for extracting the terminal device number from the data list;
Generation module, for generating encryption key according to preset cipher mode using the terminal device number.
CN201510425367.2A 2015-07-17 2015-07-17 A kind of method and car-mounted terminal of voice data encryption Active CN105072094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510425367.2A CN105072094B (en) 2015-07-17 2015-07-17 A kind of method and car-mounted terminal of voice data encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510425367.2A CN105072094B (en) 2015-07-17 2015-07-17 A kind of method and car-mounted terminal of voice data encryption

Publications (2)

Publication Number Publication Date
CN105072094A CN105072094A (en) 2015-11-18
CN105072094B true CN105072094B (en) 2019-02-15

Family

ID=54501377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510425367.2A Active CN105072094B (en) 2015-07-17 2015-07-17 A kind of method and car-mounted terminal of voice data encryption

Country Status (1)

Country Link
CN (1) CN105072094B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471874A (en) * 2015-11-30 2016-04-06 深圳市元征软件开发有限公司 Data transmission method and device
CN108629189A (en) * 2018-03-20 2018-10-09 蔚来汽车有限公司 Engine end data guard method, device and vehicle
CN111681662B (en) * 2020-06-01 2023-07-25 科大讯飞股份有限公司 In-vehicle interactive audio encryption method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN103179557A (en) * 2011-12-26 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Real-time encryption and decryption method and system for communication data and mobile terminal
CN103973696A (en) * 2014-05-16 2014-08-06 天地融科技股份有限公司 Data processing method of voice communication

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100547855B1 (en) * 2003-01-14 2006-01-31 삼성전자주식회사 Secure communication system and method of a composite mobile communication terminal having a local area communication device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420303A (en) * 2008-12-12 2009-04-29 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN103179557A (en) * 2011-12-26 2013-06-26 宇龙计算机通信科技(深圳)有限公司 Real-time encryption and decryption method and system for communication data and mobile terminal
CN103973696A (en) * 2014-05-16 2014-08-06 天地融科技股份有限公司 Data processing method of voice communication

Also Published As

Publication number Publication date
CN105072094A (en) 2015-11-18

Similar Documents

Publication Publication Date Title
JP3917330B2 (en) Common key sharing method
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
CN105634737B (en) Data transmission method, terminal and system
CN103249014B (en) Method for encrypting short message of mobile communication
CN103747012A (en) Security verification method, device and system of network transaction
CN110620846B (en) Message merging method, device, equipment and storage medium
CN103458400A (en) Key management method for voice encryption communication system
CN112003696A (en) SM9 key generation method, system, electronic equipment, device and storage medium
TW201729562A (en) Server, mobile terminal, and internet real name authentication system and method
CN111245771B (en) Instant message encryption and decryption method, device, equipment and storage medium
CN105072094B (en) A kind of method and car-mounted terminal of voice data encryption
CN113038463B (en) Communication encryption authentication experimental device
CN103873245B (en) Dummy machine system data ciphering method and equipment
US20150156173A1 (en) Communication system utilizing fingerprint information and use thereof
CN102550060B (en) For the method for fast and safely traffic encryption key
CN113542231B (en) Communication method, electronic device, and storage medium
CN113642022B (en) E-mail processing method, device, system and storage medium
CN106685931B (en) Smart card application management method and system, terminal and smart card
CN112333699B (en) Internet of things communication protocol encryption method, equipment and storage medium
CN114584971A (en) Account registration method and device, electronic equipment and storage medium
CN108769989B (en) Wireless network connection method, wireless access device and equipment
CN105915696B (en) A kind of communication connection method for building up and terminal
CN106055989B (en) A kind of data transferring method and terminal
CN106156571A (en) Encrypting fingerprint instrument, encrypting fingerprint instrument encrypting and deciphering system and encipher-decipher method
CN104955037A (en) Communication encryption method and device for GSM (global system for mobile communications) mobile phones

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant