CN105099670A - Encryption method and terminal - Google Patents

Encryption method and terminal Download PDF

Info

Publication number
CN105099670A
CN105099670A CN201510409620.5A CN201510409620A CN105099670A CN 105099670 A CN105099670 A CN 105099670A CN 201510409620 A CN201510409620 A CN 201510409620A CN 105099670 A CN105099670 A CN 105099670A
Authority
CN
China
Prior art keywords
user
communication user
encrypting
communication
enciphered message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510409620.5A
Other languages
Chinese (zh)
Inventor
张星星
张上进
兰伟中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201510409620.5A priority Critical patent/CN105099670A/en
Publication of CN105099670A publication Critical patent/CN105099670A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

Embodiments of the invention provide an encryption method and terminal. The method comprises: the terminal obtains voice data collected in a talking connection process at first, so as to make a voice file of the voice data, then judges whether at least one communication user establishing the talking connection is a preset encrypted user needing to be encrypted, if judging that the at least one communication user is the encrypted user, obtains encryption information set for the at least one communication user, and finally encrypts the voice file by using the encryption information. In the embodiments of the invention, the terminal can set different encryption information for different communication users, and thus, the embodiments of the invention can be implemented to improve the security of the voice file.

Description

A kind of method of encryption and terminal
Technical field
The present invention relates to communication technical field, particularly relate to a kind of method and terminal of encryption.
Background technology
Along with the fast development of the Internet and the universal rapidly of terminal, the function of terminal strengthens day by day.Such as: user can utilize that terminal is taken pictures, down-load music and carry out conversing etc. with good friend.When user is when using terminal to converse, need to look back this content conversed again if user thinks in the future, then can select to be become by call voice data recording voice document to store in the terminal, when user needs to look back some content uploading call, this voice document can be transferred in the storage system of terminal.But, in actual applications, when using terminal to be encrypted this voice document, the password of all voice documents can be arranged to identical by terminal, once this voice document obtain by lawless person, then can cause immeasurable consequence, thus reduce the fail safe of voice document.
Summary of the invention
Embodiments provide a kind of method and terminal of encryption, the fail safe of voice document can be improved.
Embodiments provide a kind of method of encryption, comprising:
Obtain the speech data collected in call connection process, to make the voice document for described speech data;
Judge whether at least one communication user setting up described call connection is the encrypting user that the needs pre-set are encrypted;
If judge, at least one communication user described is described encrypting user, obtains the enciphered message arranged at least one communication user described;
Described enciphered message is used to be encrypted institute's voice file.
Correspondingly, the embodiment of the present invention additionally provides a kind of terminal, comprising:
First acquiring unit, for obtaining the speech data collected in call connection process, to make the voice document for described speech data;
First judging unit, for judging whether at least one communication user setting up described call connection is the encrypting user that the needs pre-set are encrypted;
Second acquisition unit, if judge that at least one communication user described is described encrypting user for described first judging unit, obtains the enciphered message arranged at least one communication user described;
Ciphering unit, is encrypted institute's voice file for using described enciphered message.
In the embodiment of the present invention, obtain the speech data collected in call connection process, to make the voice document for described speech data; Judge whether at least one communication user setting up described call connection is the encrypting user that the needs pre-set are encrypted again; If judge, at least one communication user described is described encrypting user, then obtain the enciphered message arranged at least one communication user described; Described enciphered message is finally used to be encrypted institute's voice file.In embodiments of the present invention, terminal pins can arrange different enciphered messages to different communication users, visible, implements the fail safe that the embodiment of the present invention can improve voice document.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the method for a kind of encryption that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the method for the another kind encryption that the embodiment of the present invention provides;
Fig. 3 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 4 is the structural representation of the another kind of terminal that the embodiment of the present invention provides;
Fig. 5 is the structural representation of another terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiments provide a kind of method and terminal of encryption, the fail safe of voice document can be improved.Below be described in detail respectively.
Refer to Fig. 1, Fig. 1 is the schematic flow sheet of the method for a kind of encryption that the embodiment of the present invention provides.Wherein, method described by Fig. 1 can be applied to smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palmtop PC and mobile internet device (MobileInternetDevices, MID), PAD etc. to be had in the terminal setting up call linkage function.As shown in Figure 1, the method for this encryption can comprise the following steps:
S101, obtain the speech data collected in call connection process, to make the voice document for speech data.
In the embodiment of the present invention, it can be that terminal sends call connection request to other communication terminals that the call of foundation connects, and the call of setting up connects; Also can be the call connection request that sends of other communication terminals of receiving of this terminal response and the call of setting up connects.
Particularly, when terminal sets up call connection, the speech data collected in call connection process can be obtained, to make the voice document for speech data.
S102, judge to set up the encrypting user whether at least one communication user that call connects is the needs encryption pre-set.
In the embodiment of the present invention, at least one communication user above-mentioned can be for single communication user, also can be for communication user group.
In the embodiment of the present invention, the encrypting user needing encryption can be pre-set in the terminal.Wherein, arranging of this encrypting user can user oneself set as required; Also can be that terminal sets according to the keyword collected in call connection process, (encrypting user set by this setting means can be come into force at this, also can be to come into force in connecting in upper once call); Can also be that terminal sets according to history setting recording.
For example, when terminal carries out setting encrypting user according to the keyword collected in call connection process, then keyword can be gathered in call connection process.As: when the keyword collected in call connection process is the word such as " work ", " time ", " place ", " completing ", then terminal can preliminary judgement foundation call connection communication user may be colleague, owing to relating to work, then this user can be added in encrypting user.
Again for example, when terminal carries out setting encrypting user according to history setting recording, the contact details being mainly used for this communication user have stored record in the terminal, and are encrypting user.As: when upgrading the contact details of a certain communication user, because this communication user is encrypting user before, when upgrading the contact details of this communication user, this communication user is still encrypting user.
If S103 judges that at least one communication user is encrypting user, obtain the enciphered message arranged at least one communication user.
In the embodiment of the present invention, enciphered message comprises Crypted password, encryption rule etc.From step S102, encrypting user can be a communication user; Also can be a communication user group (family's group, co-workers group, buddy group and classmate's group etc.).When encrypting user is single communication user, then can be encrypted according to the contact details of this communication user.As: the communication name according to this communication user carries out generation enciphered message, or according to the last several groups of numerals of the contact method of this communication user foundations as generation enciphered message.When encrypting user is a communication user group, then the feature total according to this groups of users can carry out generation enciphered message.Wherein, above-mentioned enciphered message is when determining encrypting user, and enciphered message just generates immediately.
In the embodiment of the present invention, when at least one communication user above-mentioned is a communication user group, then the enciphered message of its correspondence can be same Crypted password, also can be identical encryption rule.
Particularly, if terminal detects the encrypting user that at least one communication user above-mentioned is the needs encryption pre-set, then the enciphered message arranged at least one communication user above-mentioned can be obtained.
S104, use enciphered message are encrypted voice document.
In the embodiment of the present invention, when getting the enciphered message of communication user, then this enciphered message can be utilized to be encrypted voice document.For example, when above-mentioned communication user is unique user, then can according to the last several groups of numerals of the contact method of this communication user as enciphered message; When last six groups of numerals of the contact method of this communication user are 123456, then enciphered message can be 123456.
In the method described by Fig. 1, first obtain the speech data collected in call connection process, to make the voice document for speech data; Judge whether at least one communication user setting up call connection is the encrypting user that the needs pre-set are encrypted again; If judge, at least one communication user is encrypting user, then obtain the enciphered message arranged at least one communication user; Enciphered message is finally used to be encrypted voice document.In embodiments of the present invention, terminal can gather speech data in communication process, and the speech data collected is made into voice document, and when judging that at least one communication user is encrypting user, obtain the enciphered message arranged at least one communication user, and use enciphered message to be encrypted voice document.Due to different enciphered messages can be arranged for different communication users, visible, implement the fail safe that the embodiment of the present invention can improve voice document.
Refer to Fig. 2, Fig. 2 is the schematic flow sheet of the method for the another kind encryption that the embodiment of the present invention provides.As shown in Figure 2, the method for this encryption can comprise the following steps:
S201, obtain the contact details of at least one communication user.
In the embodiment of the present invention, the contact details of at least one communication user comprise at least one at least one communication user name and at least one communication user contact method.For example, when user directly inputs a certain contact method, but communication user corresponding to this contact method be not in the address list prestored, then send before call connects at this, only need the contact method of obtaining communication user.
In the embodiment of the present invention, after execution step obtains the contact details of at least one communication user, can also comprise the following steps:
11) sense terminals whether opening voice encryption mode, this voice encryption pattern is included in the pattern to the encrypt voice data collected in communication process;
12) when sense terminals opening voice encryption mode, then perform step and send call connection request according to contact details;
13) when the non-opening voice encryption mode of sense terminals, then the information for pointing out opening voice encryption mode is exported.
S202, according to contact details send call connection request.
In the embodiment of the present invention, send call connection request according to the contact details got to other user terminals mainly for this terminal, and the call of setting up connects.
In the embodiment of the present invention, when terminal gets the contact details of at least one communication user, then can send call according to these contact details and be connected to other communication terminals.
S203, obtain the speech data collected in call connection process, to make the voice document for speech data.
In the embodiment of the present invention, time under calling record is in opening, then can obtain the speech data collected in communication process, and make the voice document for speech data.
S204, judge to set up the communication user name of at least one communication user that call connects and whether belong in the encrypting user collection of names pre-set.
In the embodiment of the present invention, in this encrypting user set, single communication user can be comprised; Also communication user group can be comprised.And identical enciphered message can be adopted for different encrypting users, wherein, enciphered message can comprise at least one in Crypted password and encryption rule.
If S205 judges that the communication user name of at least one communication user belongs in encrypting user collection of names, then judge that whether the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set.
In the embodiment of the present invention, identical communication user name may be there is due in the communication user that stores in terminal, and its correspondence is different communication users.Therefore, when the communication user name detecting certain communication user belongs in the encrypting user collection of names pre-set, can't determine that it is exactly the encrypting user preset, whether the communication user contact method that also should detect this communication user is consistent with the contact method of the encrypting user pre-set.Only have when detecting the communication user name of this communication user and communication user contact method all with the encrypting user information match pre-set, can determine that this communication user is encrypting user.If do not matched by least one information in the communication user name of this communication user and communication user contact method, all can not judge that this communication user is as encrypting user.
If S206 judges that the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set, obtain the state information that terminal is current.
In the embodiment of the present invention, state information comprises at least one in temporal information and positional information.
S207, mapping relations according to the state information that prestores and enciphered message, obtain the enciphered message corresponding with state information.
In the embodiment of the present invention, for an encrypting user, the enciphered message corresponding with this encrypting user can be arranged to multiple.Also namely, an encrypting user can correspond to multiple enciphered message, and wherein, enciphered message can be relevant to current temporal information, also can be relevant with current positional information, also can be to current temporal information and current positional information all relevant.
For example, when the enciphered message obtained is relevant to current positional information, then the enciphered message obtaining the state information current with terminal corresponding can comprise the following steps:
21) the current positional information of terminal is obtained;
22) detect in the positional information set prestored whether comprise the current positional information of above-mentioned terminal;
23) if detect the positional information set that prestores when comprising the current positional information of above-mentioned terminal, from the enciphered message prestored, the enciphered message that the positional information current with above-mentioned terminal matches is obtained.
In the embodiment of the present invention, the mapping relations of positional information and enciphered message can be prestored in the terminal.For example, when the positional information that terminal is current comprises residential information, then enciphered message is set to the enciphered message relevant to the birthday of kinsfolk, also can be set to the enciphered message relevant to the door for house trade mark.When the positional information that terminal is current comprises business address, then enciphered message is set to the enciphered message relevant to user's work trade mark, also can be set to the enciphered message relevant to business address floor.
Again for example, when the enciphered message obtained is relevant to current temporal information, then the enciphered message obtaining the state information current with terminal corresponding can comprise the following steps:
31) temporal information current in terminal is obtained;
32) from the enciphered message prestored, obtain the enciphered message matched with above-mentioned current temporal information.
In the embodiment of the present invention, the mapping relations of temporal information and enciphered message can be prestored in the terminal.For example, the enciphered message that the week is arranged can be relevant to the work trade mark, and Saturday, the enciphered message to week setting can be relevant to home address etc.
As the optional execution mode of one, if step detects the encrypting user that at least one communication user is the needs encryption pre-set, obtain the enciphered message arranged at least one communication user can comprise the following steps: the encrypting user that at least one communication user is the needs encryption pre-set if detect, obtains the keyword collected at call connection process; According to the mapping relations of the keyword prestored and enciphered message, obtain the enciphered message corresponding with the keyword collected at described call connection process.
S208, use enciphered message are encrypted voice document.
In fig. 2, detect if describe in detail at least one communication user be pre-set needs encryption encrypting user time, obtain the enciphered message arranged at least one communication user.Wherein, enciphered message can obtain according to current positional information, also can be obtain according to current temporal information, can also be to obtain according to the keyword collected in call connection process.Implement the embodiment of the present invention, not only can improve the efficiency of voice document encryption, and add the diversity of enciphered message, thus substantially increase Consumer's Experience.
Refer to Fig. 3, Fig. 3 is the structural representation of a kind of terminal that the embodiment of the present invention provides, for performing the method for above-mentioned data resource encryption.Wherein, the terminal shown in Fig. 3 can include but not limited to that smart mobile phone (as Android phone, iOS mobile phone etc.), panel computer, palmtop PC and mobile internet device MID, PAD etc. have the terminal setting up call linkage function.As shown in Figure 3, this terminal can comprise: the first acquiring unit 301, first judging unit 302, second acquisition unit 303 and ciphering unit 304, wherein,
First acquiring unit 301, for obtaining the speech data collected in call connection process, to make the voice document for speech data.
In the embodiment of the present invention, it can be that terminal sends call connection request to other communication terminals that the call of foundation connects, and the call of setting up connects; Also can be the call connection request that sends of other communication terminals of receiving of this terminal response and the call of setting up connects.
Particularly, when terminal sets up call connection, the speech data collected in call connection process can be obtained.
First judging unit 302, for judging whether at least one communication user setting up call connection is the encrypting user that the needs pre-set are encrypted.
In the embodiment of the present invention, at least one communication user above-mentioned can be for single communication user, also can be for communication user group.
In the embodiment of the present invention, the encrypting user needing encryption can be pre-set in the terminal.Wherein, arranging of this encrypting user can user oneself set as required; Also can be that terminal sets according to the keyword collected in call connection process, (encrypting user set by this setting means can be come into force at this, also can be to come into force in connecting in upper once call); Can also be that terminal sets according to history setting recording.
For example, when terminal carries out setting encrypting user according to the keyword collected in call connection process, then keyword can be gathered in call connection process.As: when the keyword collected in call connection process is the word such as " work ", " time ", " place ", " completing ", then terminal can preliminary judgement foundation call connection communication user may be colleague, owing to relating to work, then this user can be added in encrypting user.
Again for example, when terminal carries out setting encrypting user according to history setting recording, the contact details being mainly used for this communication user have stored record in the terminal, and are encrypting user.As: when upgrading the contact details of a certain communication user, because this communication user is encrypting user before, when upgrading the contact details of this communication user, this communication user is still encrypting user.
Second acquisition unit 303, if judge that at least one communication user is encrypting user for the first judging unit 302, obtains the enciphered message arranged at least one communication user.
In the embodiment of the present invention, enciphered message comprises Crypted password, encryption rule etc.Wherein, encrypting user can be a communication user; Also can be a communication user group (family's group, co-workers group, buddy group and classmate's group etc.).When encrypting user is single communication user, then can be encrypted according to the contact details of this communication user.As: carry out according to the communication name of this communication user the last several groups of digital foundations as generating enciphered message generating enciphered message or the contact method according to this communication user.When encrypting user is a communication user group, then the feature total according to this groups of users can carry out generation enciphered message.Wherein, above-mentioned enciphered message is when determining encrypting user, and enciphered message just generates immediately.
In the embodiment of the present invention, when at least one communication user above-mentioned is a communication user group, then the enciphered message of its correspondence can be same Crypted password, also can be identical encryption rule.
Particularly, if the first judging unit 302 judges that at least one communication user above-mentioned is the encrypting user of the needs encryption pre-set, then second acquisition unit 303 can obtain the enciphered message arranged at least one communication user above-mentioned.
Ciphering unit 304, is encrypted voice document for using enciphered message.
In the embodiment of the present invention, when second acquisition unit 303 gets the enciphered message of communication user, then ciphering unit 304 can utilize this enciphered message to be encrypted the voice document got.For example, when above-mentioned communication user is unique user, then ciphering unit 304 can according to the last several groups of numerals of the contact method of this communication user as enciphered message; When last six groups of numerals of the contact method of this communication user are 123456, then enciphered message can be 123456.
In the terminal shown in Fig. 3, first the first acquiring unit 301 obtains the speech data collected in call connection process, to make the voice document for speech data; First judging unit 302 judges whether at least one communication user setting up call connection is the encrypting user that the needs pre-set are encrypted again; If the first judging unit 302 judges that at least one communication user is encrypting user, then second acquisition unit 303 obtains the enciphered message arranged at least one communication user; Last ciphering unit 304, uses enciphered message to be encrypted voice document.In embodiments of the present invention, terminal can gather speech data in communication process, and the speech data collected is made into voice document, and when judging that at least one communication user is encrypting user, obtain the enciphered message arranged at least one communication user, and use enciphered message to be encrypted voice document.Due to different enciphered messages can be arranged for different communication users, visible, implement the fail safe that the embodiment of the present invention can improve voice document.
Refer to Fig. 4, Fig. 4 is the structural representation of the another kind of terminal that the embodiment of the present invention provides, for performing the method for above-mentioned data resource encryption.Wherein, the terminal shown in Fig. 4 is that the enterprising step refining in basis of terminal shown in Fig. 3 obtains, and as shown in Figure 4, except comprising all unit shown in Fig. 3, can also comprise: the 3rd acquiring unit 305 and transmitting element 306, wherein,
3rd acquiring unit 305, for obtaining the contact details of at least one communication user.
Transmitting element 306, for sending call connection request according to contact details.
In the embodiment of the present invention, the contact details of at least one communication user comprise at least one in the contact method of at least one communication user name and at least one communication user.For example, when user directly inputs a certain contact method, but communication user corresponding to this contact method be not in the address list prestored, then send before call connects at this, only need the contact method of obtaining communication user.
In the embodiment of the present invention, after the 3rd acquiring unit 305 obtains the contact details of at least one communication user, can also comprise the following steps:
11) sense terminals whether opening voice encryption mode, described voice encryption pattern is included in the pattern to the encrypt voice data collected in communication process;
12) when sense terminals opening voice encryption mode, then perform step and send call connection request according to contact details;
13) when the non-opening voice encryption mode of sense terminals, then the information for pointing out opening voice encryption mode is exported.
In the embodiment of the present invention, send call connection request according to the contact details got to other user terminals mainly for this terminal, and the call of setting up connects.
In the embodiment of the present invention, when terminal gets the contact details of at least one communication user, then can send call according to these contact details and be connected to other communication terminals.
As the optional execution mode of one, the first judging unit 302 can comprise: the second judging unit 3020, the 3rd judging unit 3021 and the 3rd judging unit 3022, wherein,
Second judging unit 3020, for judging whether the communication user name of at least one communication user belongs in the encrypting user collection of names pre-set.
3rd judging unit 3021, if judge that the communication user name of at least one communication user belongs in encrypting user collection of names for the second judging unit 3020, then judge that whether the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set.
4th judging unit 3022, if judge that the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set for the 3rd judging unit 3021, then judge that at least one communication user is the encrypting user of the needs encryption pre-set.
In the embodiment of the present invention, in this encrypting user set, single communication user can be comprised; Also communication user group can be comprised.And identical enciphered message can be adopted for different encrypting users, wherein, enciphered message can comprise at least one in Crypted password and encryption rule.
In the embodiment of the present invention, identical communication user name may be there is due in the communication user that stores in terminal, and its correspondence is different communication users.Therefore, when the second judging unit 3020 judges that the communication user name of certain communication user belongs in the encrypting user collection of names pre-set, can't determine that it is exactly the encrypting user preset, the 3rd judging unit 3021 also should judge that whether the communication user contact method of this communication user is consistent with the contact method of the encrypting user pre-set.Only have judge this communication user communication user name and communication user contact method all with the encrypting user information match pre-set time, the 4th judging unit 3022 can determine that this communication user is encrypting user.If do not matched by least one information in the communication user name of this communication user and communication user contact method, all can not judge that this communication user is as encrypting user.
As the optional execution mode of another kind, second acquisition unit 303 can comprise: the 4th acquiring unit 3030 and the 5th acquiring unit 3031, wherein,
4th acquiring unit 3030, if judge that at least one communication user is the encrypting user of the needs encryption pre-set for the first judging unit 302, obtains the state information that terminal is current.
In the embodiment of the present invention, state information comprises at least one in temporal information and positional information.
5th acquiring unit 3041, for the mapping relations according to the state information prestored and enciphered message, obtains the enciphered message that the state information current with terminal is corresponding.
In the embodiment of the present invention, for an encrypting user, the enciphered message corresponding with this encrypting user can be arranged to multiple.Also namely, an encrypting user can correspond to multiple enciphered message, and wherein, enciphered message can be relevant to current temporal information, also can be relevant with current positional information, also can be to current temporal information and current positional information all relevant.
For example, when the enciphered message obtained is relevant to current positional information, then the enciphered message obtaining the state information current with terminal corresponding can comprise following operation:
21) the 4th acquiring unit 3030 obtains the current positional information of terminal;
22) the 4th acquiring unit 3030 detects in the positional information set prestored whether comprise the current positional information of above-mentioned terminal;
23) if the 5th acquiring unit 3031 detects the positional information set prestored when comprising the current positional information of above-mentioned terminal, from the enciphered message prestored, the enciphered message that the positional information current with above-mentioned terminal matches is obtained.
Again for example, when the enciphered message obtained is relevant to current temporal information, then the enciphered message obtaining the state information current with terminal corresponding can comprise following operation:
31) the 4th acquiring unit 3030 obtains temporal information current in terminal;
32) the 5th acquiring unit 3031 obtains the enciphered message matched with above-mentioned current temporal information from the enciphered message prestored.
As another optional execution mode, second acquisition unit 303 can comprise: the 6th acquiring unit 3032 and the 7th acquiring unit 3033, wherein,
6th acquiring unit 3032, if judge that at least one communication user is the encrypting user of the needs encryption pre-set for the first judging unit 302, obtains the keyword collected at call connection process.
7th acquiring unit 3033, according to the mapping relations of the keyword prestored and enciphered message, obtains the enciphered message that the keyword that collects at call connection process with the 6th acquiring unit 3032 is corresponding.
In the embodiment of the present invention, the encrypting user that at least one communication user is the needs encryption pre-set if detect, the 6th acquiring unit 3032 obtains the keyword collected at call connection process; 7th acquiring unit 3033, according to the mapping relations of the keyword prestored and enciphered message, obtains the enciphered message corresponding with the keyword collected at described call connection process.
In the terminal shown in Fig. 4, if describe in detail the first judging unit 302 judge at least one communication user be pre-set needs encryption encrypting user time, second acquisition unit 303 obtains the enciphered message arranged at least one communication user.Wherein, enciphered message can obtain according to current positional information, also can be obtain according to current temporal information, can also be to obtain according to the keyword collected in call connection process.Implement the terminal shown in Fig. 4, not only can improve the efficiency of voice document encryption, and add the diversity of enciphered message, thus substantially increase Consumer's Experience.
Refer to Fig. 5, Fig. 5 is the structural representation of another terminal that the embodiment of the present invention provides, for performing the method for above-mentioned data resource encryption.As shown in Figure 5, this terminal 500 can comprise: at least one processor 501, at least one input unit 502, at least one output device 503, assembly such as memory 505 grade.Wherein, these assemblies carry out call connection by one or more bus 504.It will be appreciated by those skilled in the art that, the structure of the terminal shown in Fig. 5 does not form the restriction to the embodiment of the present invention, it both can be busbar network, also can be hub-and-spoke configuration, the parts more more or less than diagram can also be comprised, or combine some parts, or different parts are arranged.Wherein:
Processor 501 is the control centre of terminal, utilize the various piece of various interface and the whole terminal of connection, by running or perform the program in memory 505 of being stored in and/or module, and call the data be stored in memory 505, to perform various function and the deal with data of terminal.Processor 501 by integrated circuit (IntegratedCircuit is called for short IC) composition, such as, can be made up of the IC of single encapsulation, also can be made up of the encapsulation IC connecting many identical functions or difference in functionality.For example, processor 501 can only comprise central processing unit (CentralProcessingUnit, be called for short CPU), also can be CPU, digital signal processor (digitalsignalprocessor, be called for short DSP), the combination of graphic process unit (GraphicProcessingUnit, be called for short GPU) and various control chip.In embodiments of the present invention, CPU can be single arithmetic core, also can comprise multioperation core.
Input unit 502 can comprise the touch-screen, keyboard etc. of standard, also can include line interface, wave point etc.
Output device 503 can comprise display screen, loud speaker etc., also can include line interface, wave point etc.
Memory 505 can be used for storing software program and module, processor 501, input unit 502 and output device 503 are stored in software program in memory 505 and module by calling, thus perform the various functions application of terminal and realize data processing.Memory 505 mainly comprises program storage area and data storage area, and wherein, program storage area can storage operation system, application program etc. needed at least one function; Data storage area can store the data etc. created according to the use of terminal.In embodiments of the present invention, operating system can be android system, iOS system or Windows operating system etc.
Particularly, processor 501 calls the application program be stored in memory 505, for performing following operation:
Processor 501 control inputs device 502 obtains the speech data collected in call connection process, to make the voice document for speech data;
Judge whether at least one communication user setting up call connection is the encrypting user that the needs pre-set are encrypted;
If judge, at least one communication user is encrypting user, obtains the enciphered message arranged at least one communication user;
Enciphered message is used to be encrypted voice document.
In the embodiment of the present invention, processor 501 calls the application program be stored in memory 505, for performing before step obtains the speech data collected in call connection process, can also perform following steps:
Obtain the contact details of at least one communication user, contact details comprise at least one in communication user name and communication user contact method;
Call connection request is sent according to contact details.
In the embodiment of the present invention, processor 501 calls the application program be stored in memory 505, and whether at least one communication user judging to set up call connection for performing step is the encrypting user that the needs pre-set are encrypted, and can comprise the following steps:
Judge whether the communication user name setting up at least one communication user that call connects belongs in the encrypting user collection of names pre-set;
If judge, the communication user name of at least one communication user belongs in encrypting user collection of names, then judge that whether the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set;
If judge, the communication user contact method of at least one communication user is consistent with the contact method of the encrypting user pre-set, judge at least one communication user for described in pre-set needs encryption encrypting user.
In the embodiment of the present invention, processor 501 calls the application program be stored in memory 505, if judging that at least one communication user is encrypting user for performing step, obtaining the enciphered message arranged at least one communication user, can comprise the following steps:
If judge, at least one communication user is encrypting user, and obtain the state information that terminal is current, state information comprises at least one in temporal information and positional information;
According to the mapping relations of the state information prestored and enciphered message, obtain the enciphered message corresponding with state information.
In the embodiment of the present invention, processor 501 calls the application program be stored in memory 505, if judging that at least one communication user is encrypting user for performing step, obtaining the enciphered message arranged at least one communication user, comprising:
If judge, at least one communication user is encrypting user, obtains the keyword collected in call connection process;
According to the mapping relations of the keyword prestored and enciphered message, obtain the enciphered message corresponding with keyword.
Concrete, the terminal introduced in the embodiment of the present invention can implement the part or all of flow process in the embodiment of the method for the encryption of composition graphs 1 of the present invention or Fig. 2 introduction.
Module in all embodiments of the present invention or submodule, can pass through universal integrated circuit, such as CPU, or realized by ASIC (ApplicationSpecificIntegratedCircuit, application-specific integrated circuit (ASIC)).
Step in embodiment of the present invention method can be carried out order according to actual needs and be adjusted, merges and delete.
Unit in embodiment of the present invention terminal can carry out merging, divide and deleting according to actual needs.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random access memory (RandomAccessMemory is called for short RAM) etc.
The method that a kind of data resource provided the embodiment of the present invention is above encrypted and terminal are described in detail, apply specific case herein to set forth principle of the present invention and execution mode, the explanation of above embodiment just understands method of the present invention and core concept thereof for helping; Meanwhile, for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (10)

1. a method for encryption, is characterized in that, comprising:
Obtain the speech data collected in call connection process, to make the voice document for described speech data;
Judge whether at least one communication user setting up described call connection is the encrypting user that the needs pre-set are encrypted;
If judge, at least one communication user described is described encrypting user, obtains the enciphered message arranged at least one communication user described;
Described enciphered message is used to be encrypted institute's voice file.
2. method according to claim 1, is characterized in that, described method also comprises:
Obtain the contact details of at least one communication user described, described contact details comprise at least one in communication user name and communication user contact method;
Call connection request is sent according to described contact details.
3. method according to claim 2, is characterized in that, whether at least one communication user that described call connection is set up in described judgement is the encrypting user that the needs pre-set are encrypted, and comprising:
Judge whether the communication user name setting up at least one communication user that described call connects belongs in the encrypting user collection of names pre-set;
If judge, the communication user name of at least one communication user described belongs in described encrypting user collection of names, then judge that whether the communication user contact method of at least one communication user described is consistent with the contact method of the encrypting user pre-set;
If judge, the communication user contact method of at least one communication user described is consistent with the contact method of the described encrypting user pre-set, at least one communication user described in judging for described in the encrypting user encrypted of the needs that pre-set.
4. according to the method in claims 1 to 3 described in any one, it is characterized in that, if described judgement at least one communication user described is described encrypting user, obtains the enciphered message arranged at least one communication user described, comprising:
If judge, at least one communication user described is described encrypting user, and obtain the state information that terminal is current, described state information comprises at least one in temporal information and positional information;
According to the mapping relations of the state information prestored and enciphered message, obtain the enciphered message corresponding with described state information.
5. according to the method in claims 1 to 3 described in any one, it is characterized in that, if described judgement at least one communication user described is described encrypting user, obtains the enciphered message arranged at least one communication user described, comprising:
If judge, at least one communication user described is described encrypting user, obtains the keyword collected in described call connection process;
According to the mapping relations of the keyword prestored and enciphered message, obtain the enciphered message corresponding with described keyword.
6. a terminal, is characterized in that, comprising:
First acquiring unit, for obtaining the speech data collected in call connection process, to make the voice document for described speech data;
First judging unit, for judging whether at least one communication user setting up described call connection is the encrypting user that the needs pre-set are encrypted;
Second acquisition unit, if judge that at least one communication user described is described encrypting user for described first judging unit, obtains the enciphered message arranged at least one communication user described;
Ciphering unit, is encrypted institute's voice file for using described enciphered message.
7. terminal according to claim 6, is characterized in that, described terminal also comprises:
3rd acquiring unit, for obtaining the contact details of at least one communication user described, described contact details comprise at least one in communication user name and communication user contact method;
Transmitting element, for sending call connection request according to described contact details.
8. terminal according to claim 7, is characterized in that, described first judging unit comprises:
Second judging unit, for judging whether the communication user name of at least one communication user described belongs in the encrypting user collection of names pre-set;
3rd judging unit, if judge that the communication user name of at least one communication user described belongs in described encrypting user collection of names for described second judging unit, then judge that whether the communication user contact method of at least one communication user described is consistent with the contact method of the encrypting user pre-set;
4th judging unit, if judge that the communication user contact method of at least one communication user described is consistent with the contact method of the described encrypting user pre-set for described 3rd judging unit, then at least one communication user described in judging for described in the encrypting user encrypted of the needs that pre-set.
9. according to the terminal in claim 6 ~ 8 described in any one, it is characterized in that, described second acquisition unit comprises:
4th acquiring unit, if judge that at least one communication user described is described encrypting user for described first judging unit, obtain the state information that terminal is current, described state information comprises at least one in temporal information and positional information;
5th acquiring unit, for the mapping relations according to the state information prestored and enciphered message, obtains the enciphered message that the state information current with described terminal is corresponding.
10. according to the terminal in claim 6 ~ 8 described in any one, it is characterized in that, described second acquisition unit comprises:
6th acquiring unit, if judge that at least one communication user described is described encrypting user for described first judging unit, obtains the keyword collected in described call connection process;
7th acquiring unit, according to the mapping relations of described keyword and enciphered message, obtains the enciphered message that the keyword that collects at described call connection process with described 6th acquiring unit is corresponding.
CN201510409620.5A 2015-07-13 2015-07-13 Encryption method and terminal Pending CN105099670A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510409620.5A CN105099670A (en) 2015-07-13 2015-07-13 Encryption method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510409620.5A CN105099670A (en) 2015-07-13 2015-07-13 Encryption method and terminal

Publications (1)

Publication Number Publication Date
CN105099670A true CN105099670A (en) 2015-11-25

Family

ID=54579314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510409620.5A Pending CN105099670A (en) 2015-07-13 2015-07-13 Encryption method and terminal

Country Status (1)

Country Link
CN (1) CN105099670A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN113722743A (en) * 2021-09-14 2021-11-30 刘晓冰 File encryption and decryption method and related equipment and system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825865A (en) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 Automatic recording method and apparatus for communication terminal
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102202297A (en) * 2011-06-17 2011-09-28 深圳市五巨科技有限公司 Method and device for encrypting mobile terminals
CN103002109A (en) * 2012-11-20 2013-03-27 北京百度网讯科技有限公司 Contact person searching method and device for mobile terminal and mobile terminal
CN103067160A (en) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103414816A (en) * 2013-08-01 2013-11-27 深圳市卡迪尔通讯技术有限公司 Mobile phone intelligent recording and communication management method and device
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795834A (en) * 2012-10-29 2014-05-14 李丽 Recording method capable of uploading conversation recording file of smart phone and dedicated recording apparatus
US20140302823A1 (en) * 2013-04-08 2014-10-09 Xiaomi Inc. Method, device and mobile terminal for automatic recording
WO2014166230A1 (en) * 2013-04-08 2014-10-16 小米科技有限责任公司 Automatic recording method, apparatus, and mobile terminal
CN104113624A (en) * 2013-04-17 2014-10-22 程志刚 Recording method capable of uploading conversation recording files of fixed-line telephones and fixed-line telephone

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1825865A (en) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 Automatic recording method and apparatus for communication terminal
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102202297A (en) * 2011-06-17 2011-09-28 深圳市五巨科技有限公司 Method and device for encrypting mobile terminals
CN103795834A (en) * 2012-10-29 2014-05-14 李丽 Recording method capable of uploading conversation recording file of smart phone and dedicated recording apparatus
CN103002109A (en) * 2012-11-20 2013-03-27 北京百度网讯科技有限公司 Contact person searching method and device for mobile terminal and mobile terminal
CN103067160A (en) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
US20140302823A1 (en) * 2013-04-08 2014-10-09 Xiaomi Inc. Method, device and mobile terminal for automatic recording
WO2014166230A1 (en) * 2013-04-08 2014-10-16 小米科技有限责任公司 Automatic recording method, apparatus, and mobile terminal
CN104113624A (en) * 2013-04-17 2014-10-22 程志刚 Recording method capable of uploading conversation recording files of fixed-line telephones and fixed-line telephone
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103414816A (en) * 2013-08-01 2013-11-27 深圳市卡迪尔通讯技术有限公司 Mobile phone intelligent recording and communication management method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412907A (en) * 2016-09-14 2017-02-15 广东欧珀移动通信有限公司 Network access methods and system, and related devices
CN106412907B (en) * 2016-09-14 2020-02-14 Oppo广东移动通信有限公司 Network access method, related equipment and system
CN113722743A (en) * 2021-09-14 2021-11-30 刘晓冰 File encryption and decryption method and related equipment and system

Similar Documents

Publication Publication Date Title
US8478255B2 (en) Portable terminal device, address book transfer device, information display method and address book transfer method used in portable terminal device, and computer program
KR101907486B1 (en) Mobile computing system for providing execution environment having high secure ability
CN114827914B (en) Short message processing method and device and electronic equipment
CN104049849B (en) A kind of information processing method and corresponding electronic equipment
KR20050011013A (en) method for managing message
CN104008313A (en) Protecting method and device of privacy information
CN101656955A (en) Information processing apparatus, information processing method, information processing program and information processing system
CN104967758B (en) A kind of method and user terminal for controlling data transfer
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN105306737A (en) Information management method and user terminal
CN109787959B (en) Account information processing method and related device
CN105574437A (en) Method and device for protecting privacy information and electronic equipment
US20220366066A1 (en) Display method, display device, and electronic device
CN102917098A (en) Method and device for preventing important linkman from being wrongly deleted
CN107613091A (en) A kind of method and terminal for establishing communication
CN104158720A (en) Chatting record clearing method and system, and mobile terminal
CN105100449A (en) Picture sharing method and mobile terminal
EP2840818A1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN106203184A (en) A kind of keyboard output intent and terminal
CN107193662A (en) A kind of information synchronization method and mobile terminal based on dual system
CN105099670A (en) Encryption method and terminal
CN104378502A (en) Terminal unlocking method
CN105307078A (en) Sound box management method and user terminal
CN105072094B (en) A kind of method and car-mounted terminal of voice data encryption
CN106714147A (en) Privacy short message protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151125