CN105871842B - Voice encryption and decryption method, encryption and decryption device and terminal - Google Patents

Voice encryption and decryption method, encryption and decryption device and terminal Download PDF

Info

Publication number
CN105871842B
CN105871842B CN201610197068.2A CN201610197068A CN105871842B CN 105871842 B CN105871842 B CN 105871842B CN 201610197068 A CN201610197068 A CN 201610197068A CN 105871842 B CN105871842 B CN 105871842B
Authority
CN
China
Prior art keywords
voice
frame information
intensity
terminal
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610197068.2A
Other languages
Chinese (zh)
Other versions
CN105871842A (en
Inventor
蔡志富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610197068.2A priority Critical patent/CN105871842B/en
Priority to PCT/CN2016/092481 priority patent/WO2017166556A1/en
Publication of CN105871842A publication Critical patent/CN105871842A/en
Application granted granted Critical
Publication of CN105871842B publication Critical patent/CN105871842B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The embodiment of the invention discloses a voice encryption method, which can process voice frame information at different encryption levels through different voice intensities, thereby increasing the conversation safety of a terminal, reducing the load of the terminal caused by encryption, and enabling a user to independently select the levels of encrypted voice frame information and encrypted voice frame information by controlling the voice intensity of the user. The method provided by the embodiment of the invention comprises the following steps: the method comprises the steps that a first terminal obtains the voice intensity of a user in the current communication process; the first terminal encrypts the current voice frame information by using a key corresponding to the voice intensity and identifies the voice intensity at a target position of the voice frame information; and the first terminal sends the encrypted and identified voice frame information to the second terminal. The embodiment also correspondingly provides a voice decryption method, an encryption device, a decryption device and a terminal, so that two communication parties can communicate safely and independently control voice encryption.

Description

Voice encryption and decryption method, encryption and decryption device and terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a voice encryption and decryption method, an encryption and decryption apparatus, and a terminal.
Background
With the rapid development of communication technology, the way of information communication and communication through voice communication has become an essential part of people in work and life. However, voice communication is one of the most important communication methods, and a problem of user data leakage due to the fact that voice information is stolen by means such as eavesdropping is becoming serious, which causes great loss to users. Therefore, the security problem of voice communication becomes more and more important, and the user's requirement for the confidentiality of voice communication is also urgent.
In most of the existing terminals, because the voice encryption function is not added, the call is easy to eavesdrop, and the requirement of voice communication secrecy is difficult to realize from the terminal. Although some terminals adopt encryption technology, the process is too complicated, the load of a processor is increased, and a user cannot independently select encryption or non-encryption at the terminal, or even if the terminal provides multiple encryption levels, the user cannot independently select corresponding encryption levels.
Therefore, how to implement encryption of communication voice by a convenient method can enable a user to select whether to perform voice encryption according to own will, and the terminal can provide multiple encryption levels for the user to independently select corresponding encryption levels, which is a problem that needs to be continuously innovated and solved by technical personnel in the field.
Disclosure of Invention
The embodiment of the invention provides a voice encryption and decryption method, an encryption and decryption device and a terminal, which can process voice frame information at different encryption levels through different voice intensities, thereby increasing the conversation safety of the terminal, reducing the load of the terminal caused by encryption, and enabling a user to independently select the levels of encrypted voice frame information and encrypted voice frame information by controlling the voice intensity of the user.
In view of the above, a first aspect of the present invention provides a voice encryption method, which may include:
the method comprises the steps that a first terminal obtains the voice intensity of a user in the current communication process;
the first terminal encrypts the current voice frame information by using a key corresponding to the voice intensity and identifies the voice intensity at a target position of the voice frame information;
and the first terminal sends the encrypted and identified voice frame information to the second terminal.
With reference to the first aspect of the embodiment of the present invention, in a first implementation manner of the first aspect of the embodiment of the present invention, the encrypting, by the first terminal, the current speech frame information by using a key corresponding to the speech strength includes:
if the voice intensity is greater than or equal to the first high pitch threshold value, the first terminal utilizes a first secret key corresponding to the voice intensity to conduct low-level encryption on the current voice frame information;
or the like, or, alternatively,
if the voice intensity is smaller than the first high pitch threshold value and is larger than or equal to the first middle pitch threshold value, the first terminal performs medium encryption on the current voice frame information by using a second key corresponding to the voice intensity;
or the like, or, alternatively,
and if the voice intensity is smaller than the first middle-voice threshold value, the first terminal deeply encrypts the current voice frame information by using a third key corresponding to the voice intensity.
With reference to the first aspect of the embodiment of the present invention or the first implementation manner of the first aspect of the embodiment of the present invention, in a second implementation manner of the first aspect of the embodiment of the present invention, the length of the first key is smaller than the length of the second key, and the length of the second key is smaller than the length of the third key.
With reference to the first aspect of the embodiment of the present invention, in a third implementation manner of the first aspect of the embodiment of the present invention, before the first terminal encrypts the current speech frame information by using a key corresponding to the speech strength, the method further includes:
the first terminal judges whether the voice intensity is smaller than a second high pitch threshold value or not;
if yes, triggering the first terminal to encrypt the current voice frame information by using a key corresponding to the voice intensity, and identifying the voice intensity at the target position of the voice frame information.
With reference to the third implementation manner of the first aspect of the embodiment of the present invention, in a fourth implementation manner of the first aspect of the embodiment of the present invention, the encrypting, by the first terminal, the current speech frame information by using the key corresponding to the speech strength includes:
if the voice intensity is smaller than the second high pitch threshold value and is larger than or equal to the second middle pitch threshold value, the first terminal performs medium encryption on the current voice frame information by using a fourth key corresponding to the voice intensity;
or the like, or, alternatively,
and if the voice intensity is smaller than the second middle voice threshold value, the first terminal deeply encrypts the current voice frame information by using a fifth key corresponding to the voice intensity.
With reference to the fourth implementation manner of the first aspect of the embodiment of the present invention, in a fifth implementation manner of the first aspect of the embodiment of the present invention, the length of the fourth key is smaller than the length of the fifth key.
A second aspect of the present invention provides a method for decrypting speech, which may include:
the second terminal receives the voice frame information sent by the first terminal;
the second terminal analyzes whether the voice frame information comprises a voice intensity identifier;
and if so, the second terminal decrypts the voice frame information by using the key corresponding to the voice intensity identifier.
With reference to the second aspect of the embodiment of the present invention, in a first implementation manner of the second aspect of the embodiment of the present invention, the decrypting, by the second terminal, the voice frame information by using the key corresponding to the voice strength identifier includes:
if the voice intensity identification is the high-pitch intensity identification, the second terminal decrypts the voice frame information by using a first secret key corresponding to the high-pitch intensity identification;
or the like, or, alternatively,
if the voice intensity identifier is the middle voice intensity identifier, the second terminal decrypts the voice frame information by using a second key corresponding to the middle voice intensity identifier;
or the like, or, alternatively,
and if the voice intensity identifier is a bass intensity identifier, the second terminal decrypts the voice frame information by using a third key corresponding to the bass intensity identifier.
A third aspect of the present invention provides an encryption apparatus, which may include:
the acquisition module is used for acquiring the voice intensity of a user in the current communication process;
the encryption module is used for encrypting the current voice frame information by using a key corresponding to the voice intensity;
the identification module is used for identifying the voice intensity at the target position of the voice frame information;
and the sending module is used for sending the encrypted and identified voice frame information to the second terminal.
With reference to the third aspect of the embodiment of the present invention, in a first implementation manner of the third aspect of the embodiment of the present invention, the encryption module includes:
the first encryption unit is used for encrypting the current voice frame information in a low-level mode by using a first key corresponding to the voice intensity when the voice intensity is larger than or equal to a first high-pitch threshold value;
or the like, or, alternatively,
the second encryption unit is used for performing medium encryption on the current voice frame information by using a second key corresponding to the voice intensity when the voice intensity is smaller than a first high pitch threshold value and is greater than or equal to a first medium pitch threshold value;
or the like, or, alternatively,
and the third encryption unit is used for deeply encrypting the current voice frame information by using a third key corresponding to the voice intensity when the voice intensity is smaller than the first middle-pitch threshold value.
With reference to the first implementation manner of the third aspect of the embodiment of the present invention, in a second implementation manner of the third aspect of the embodiment of the present invention, the length of the first key is smaller than the length of the second key, and the length of the second key is smaller than the length of the third key.
With reference to the third aspect of the present invention, in a third implementation manner of the third aspect of the present invention, the encryption apparatus further includes:
the judging module is used for judging whether the voice intensity is smaller than a second high pitch threshold value or not;
and the triggering module is used for triggering the encryption module to encrypt the current voice frame information by using a key corresponding to the voice intensity when the judging module judges that the voice intensity is smaller than the second high pitch threshold value, and triggering the identification module to identify the voice intensity at the target position of the voice frame information.
With reference to the third implementation manner of the third aspect of the present invention, in a fourth implementation manner of the third aspect of the present invention, the encryption module includes:
the fourth encryption unit is used for performing medium encryption on the current voice frame information by using a fourth key corresponding to the voice intensity when the voice intensity is smaller than a second high pitch threshold value and is larger than or equal to a second medium pitch threshold value;
or the like, or, alternatively,
and the fifth encrypting unit is used for deeply encrypting the current voice frame information by using a fifth key corresponding to the voice intensity when the voice intensity is smaller than the second middle-pitch threshold value.
With reference to the fourth implementation of the third aspect of the present embodiment, in a fifth implementation of the third aspect of the present embodiment, the length of the fourth key is smaller than the length of the fifth key.
A fourth aspect of the present invention provides a decryption apparatus, which may include:
the receiving module is used for receiving voice frame information sent by a first terminal;
the analysis module is used for analyzing whether the voice frame information comprises a voice intensity identifier;
and the decryption module is used for decrypting the voice frame information by using a key corresponding to the voice intensity identifier if the voice frame information comprises the voice intensity identifier.
With reference to the fourth aspect of the present invention, in a first implementation manner of the fourth aspect of the present invention, the decryption module includes:
the first decryption unit is used for decrypting the voice frame information by using a first key corresponding to the high-tone strength identifier when the voice strength identifier is the high-tone strength identifier;
or the like, or, alternatively,
the second decryption unit is used for decrypting the voice frame information by using a second key corresponding to the middle voice strength identifier when the voice strength identifier is the middle voice strength identifier;
or the like, or, alternatively,
and the third decryption unit is used for decrypting the voice frame information by using a third key corresponding to the bass intensity identifier when the voice intensity identifier is the bass intensity identifier.
A fifth aspect of the embodiments of the present invention provides a terminal, including the encryption apparatus of the third aspect and/or the decryption apparatus of the fourth aspect of the embodiments.
According to the technical scheme, the embodiment of the invention has the following advantages:
in this embodiment, after the first terminal obtains the speech strength of the user in the current communication process, the speech frame information may be encrypted by using the key corresponding to the speech strength, the speech strengths are different, and the corresponding keys are different, so that different degrees of encryption of the speech frame information may be implemented, and the speech strength may be identified at the target position of the speech frame information, and different speech strengths may correspond to different speech strength identifiers, and then the encrypted and identified speech frame information is sent to the second terminal.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a voice encryption method according to an embodiment of the present invention;
FIG. 2 is a diagram of another embodiment of a voice encryption method according to the present invention;
FIG. 3 is a schematic diagram of an embodiment of a speech decryption method according to an embodiment of the present invention;
FIG. 4 is a diagram of an embodiment of an encryption apparatus in an embodiment of the present invention;
FIG. 5 is a diagram of another embodiment of an encryption apparatus according to an embodiment of the present invention;
fig. 6 is a schematic diagram of an embodiment of a decryption apparatus according to the embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a voice encryption and decryption method, an encryption and decryption device and a terminal, so that a user can autonomously control the voice intensity in the conversation process to perform encryption processing of different levels on voice frame information, the conversation safety of the terminal is improved, and the load of the terminal caused by complicated encryption is reduced.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It can be understood that, if the voice intensity of the user is divided into a high-pitched region, a middle-pitched region and a low-pitched region, in a general case, it can be defaulted that the call voice information does not relate to a confidential requirement if the voice intensity of the user during the call is in the high-pitched region, so that the terminal may not encrypt the call voice in the high-pitched region of the user, but does not exclude the user from having a requirement for encrypting the high-pitched region. For ease of understanding, the following describes specific flows of these two encryption scenarios in the embodiment of the present invention:
referring to fig. 1, an embodiment of a voice encryption method according to the embodiment of the present invention includes:
101. the method comprises the steps that a first terminal obtains the voice intensity of a user in the current communication process;
in this embodiment, the first terminal is a device capable of performing voice operation, and may include but is not limited to a smart phone, a tablet computer, and the like, and may implement voice communication by installing an application on the smart phone or the tablet computer, or by installing software. When the first terminal detects that the user is communicating, the voice intensity of the user in the current communication process can be acquired.
Specifically, in practical applications, the first terminal may obtain a sound signal of the user during the communication period by using, for example, a voice control sensor in units of a predetermined time length, that is, frames, and may calculate the voice intensity, such as a weighting operation, according to the waveform characteristics of the sound signal after performing processing of attenuating the ambient sound and emphasizing the voice of the user. It should be noted that, in this embodiment, the speech intensity of the user in the current communication process may also be obtained in other manners, or may also be an average speech intensity within a time duration of one frame or more, and may also be calculated by using other calculation manners, and this implementation in this market is only an example.
In this embodiment, the first terminal may be a calling party side or a called party side, and is not limited herein.
102. The first terminal encrypts the current voice frame information by using a key corresponding to the voice intensity and identifies the voice intensity at a target position of the voice frame information;
after the first terminal obtains the voice intensity of the user in the current communication process, the first terminal may determine a corresponding key according to the voice intensity, where the key may be stored in the first terminal, and the first terminal may encrypt the current voice frame information by using the determined key and may identify the voice intensity at a target position of the voice frame.
In this embodiment, the specific way for the first terminal to encrypt the current speech frame information by using the key corresponding to the speech strength may be as follows:
if the voice intensity is greater than or equal to the first high pitch threshold value, the first terminal utilizes a first secret key corresponding to the voice intensity to conduct low-level encryption on the current voice frame information;
or the like, or, alternatively,
if the voice intensity is smaller than the first high pitch threshold value and is larger than or equal to the first middle pitch threshold value, the first terminal performs medium encryption on the current voice frame information by using a second key corresponding to the voice intensity;
or the like, or, alternatively,
and if the voice intensity is smaller than the first middle-voice threshold value, the first terminal deeply encrypts the current voice frame information by using a third key corresponding to the voice intensity.
Specifically, in practical application, the first terminal may preset a voice intensity threshold value and further preset a key, and assuming that the terminal presets a first high-pitch threshold value and a first middle-pitch threshold value, the voice intensity of the user may be correspondingly divided into three regions, namely a high-pitch region, a middle-pitch region and a low-pitch region, and a first key, a second key and a third key corresponding to each voice intensity region. It will be appreciated that, since speech can be converted into a continuous digital signal, encryption algorithms such as AES, RAS, 3DES can be selected to obtain the key, in order to distinguish the encryption levels corresponding to the respective voice strength intervals, the lengths of the first key, the second key and the third key may be different, so as to indicate the complexity of different keys, wherein the length of the first key is smaller than that of the second key, the length of the second key is smaller than that of the third key, for example, the first key is 123, the security level is low, the second key is 12345, the security level is high, the third key is 12345678, the security level is highest, it is understood that the first treble threshold and the first midrange threshold in this embodiment may be set based on actual conditions, and lengths of the first key, the second key, and the third key may also be set based on actual conditions, which is only an example in this embodiment.
Therefore, if the speech intensity is greater than or equal to the first treble threshold, the first terminal uses the first key corresponding to the speech intensity to perform low-level encryption on the current speech frame information, that is, uses a mode such as 123 to interpolate the speech frame information to scramble the speech frame information; if the voice intensity is smaller than the first high pitch threshold value and greater than or equal to the first middle pitch threshold value, the first terminal uses the second key corresponding to the voice intensity to perform medium encryption on the current voice frame information, that is, uses a mode such as 12345 to interleave in the voice frame information to scramble the voice frame information; if the voice intensity is smaller than the first midrange threshold, the first terminal deeply encrypts the current voice frame information by using a third key corresponding to the voice intensity, that is, the voice frame information is scrambled by using a mode of interleaving in the voice frame information, such as 12345678. From the above, because of the different lengths of the keys, the degree of disorder of the voice frame information is different, thereby realizing different encryption levels of the voice frame information.
It should be noted that, in this embodiment, the first key, the second key, and the third key described above may be numbers, letters, characters, and the like, and the manner in which the first terminal performs encryption by using the key may also be other encryption types besides the scrambling described above, which is not limited herein.
It can be understood that, in this embodiment, the three high, medium, and low speech intensity regions divided by the first high tone threshold and the first medium tone threshold are used as an example to perform different encryption processing on the speech frame information, and in practical applications, the first terminal may further perform more detailed differentiation, for example, the medium speech region is divided into a high tone region and a low tone region, as long as a corresponding key may be preset for each differentiated speech intensity region.
Further, the first terminal may identify the voice intensity at the target position of the voice frame information, that is, make a high-tone intensity identifier corresponding to the first key, a middle-tone intensity identifier corresponding to the second key, or a low-tone intensity identifier corresponding to the third key at the target position of the voice frame information, so as to indicate the encryption level of the voice frame information received by the second terminal.
It should be noted that the first high-pitch threshold and the first middle-pitch threshold in this embodiment may be set based on actual statistical conditions before the first terminal leaves the factory.
103. And the first terminal sends the encrypted and identified voice frame information to the second terminal.
When the first terminal encrypts the current voice frame information by using the key corresponding to the voice intensity and identifies the voice intensity at the target position of the voice frame information, the encrypted and identified voice frame information can be encapsulated, and the encapsulated voice frame information is sent to the second terminal.
In this embodiment, the channel for transmitting the voice frame information may be a voice channel of a TDDLTE or FDDLTE network based on 4G communication, or may be another voice channel, which is not limited herein.
In this embodiment, the first terminal may encrypt the current voice frame information according to a key corresponding to the voice intensity of the user in the current communication process, that is, the user may control the voice intensity of the call to autonomously regulate the encryption level of the voice frame information, the stronger the voice of the user communication is, the lower the encryption level is, otherwise, the higher the encryption level is, the higher the security is, the requirement that the user needs to encrypt the privacy contents of different levels is fully met, and meanwhile, the load of the first terminal processor may also be reduced to a certain extent by autonomously regulating the encryption level.
Referring to fig. 2, another embodiment of the voice encryption method according to the embodiment of the present invention includes:
step 201 in this embodiment is the same as step 101 in the embodiment shown in fig. 1, and is not described here again.
202. The first terminal judges whether the voice intensity is smaller than a second high pitch threshold value, if not, step 203 is executed, and if yes, step 204 is executed;
in this embodiment, after the first terminal obtains the voice intensity of the user in the current communication process, it may be determined whether the voice intensity is greater than the second high pitch threshold.
Specifically, in practical applications, in order to reduce the load of the processor of the first terminal, the first terminal may preset a second high pitch threshold value, so as to determine whether the voice intensity of the user in the current communication process is smaller than the second high pitch threshold value, which means that if the voice intensity is greater than or equal to the second high pitch threshold value, the first terminal defaults to not need to perform security processing on the current communication voice of the user, and does not relate to user privacy security, otherwise, the first terminal needs to perform security processing.
It is understood that the second treble threshold in this embodiment may be set before the first terminal leaves the factory based on actual statistics.
203. Executing other processes;
if the terminal judges that the voice intensity is greater than or equal to the second high pitch threshold value, the voice intensity of the user is in a high pitch area divided by the second high pitch threshold value, and the user does not need to carry out confidentiality processing on the current voice frame information at this time, the first terminal can directly send the current voice frame information to the second terminal without carrying out any encryption processing on the current voice frame information or identifying the voice intensity at the target position of the voice frame information, and correspondingly, the second terminal does not need to correspondingly carry out decryption processing on the received voice frame information.
204. The first terminal encrypts the current voice frame information by using a key corresponding to the voice intensity and identifies the voice intensity at a target position of the voice frame information;
based on part of the contents described in the embodiment shown in fig. 1, in this embodiment, if the terminal determines that the speech intensity is smaller than the second high pitch threshold, it indicates that the user needs the first terminal to perform encryption processing on the current speech frame information at this time, so that the terminal can encrypt the current speech frame information by using the key corresponding to the speech intensity and identify the speech intensity at the target position of the speech frame information.
In this embodiment, the specific way for the first terminal to encrypt the current speech frame information by using the key corresponding to the speech strength may be as follows:
if the voice intensity is smaller than a second high pitch threshold value and is larger than or equal to a second middle pitch threshold value, the first terminal performs medium encryption on the current voice frame information by using a fourth key corresponding to the voice intensity;
or the like, or, alternatively,
and if the voice intensity is smaller than the second middle-voice threshold value, the first terminal deeply encrypts the current voice frame information by using a fifth key corresponding to the voice intensity.
Specifically, in practical application, it is assumed that the first terminal may further perform presetting of a second middle-pitch threshold and further perform presetting of a corresponding key, then the first terminal may use the second high-pitch threshold and the second middle-pitch threshold to correspondingly divide the voice intensity of the user into three regions, namely, a high-pitch region, a middle-pitch region and a low-pitch region, and in combination with the content described in step 203, the first terminal may preset a fourth key corresponding to the middle-pitch region and a fifth key corresponding to the low-pitch region according to the second high-pitch threshold and the second low-pitch threshold, where a length of the fourth key is smaller than a length of the fifth key, for example, the fourth key is 12345, the security is higher, the fifth key is 12345678, and the security is highest, where the lengths of the fourth key and the fifth key in this embodiment may be set based on an actual situation, which this embodiment is only exemplified.
Because the first terminal may not encrypt the current speech frame information when the user is in the high-pitch region in the current communication process, if the speech intensity is less than the second high-pitch threshold and greater than or equal to the second middle-pitch threshold, the first terminal uses the fourth key corresponding to the speech intensity to moderately encrypt the current speech frame information, that is, uses a mode such as 12345 to interleave the speech frame information to scramble the speech frame information; if the voice intensity is less than the second midrange threshold, the first terminal deeply encrypts the current voice frame information by using a fifth key corresponding to the voice intensity, that is, scrambles the voice frame information by using a method such as inserting 12345678 in the voice frame information. From the above, because the length of the fourth key is different from that of the fifth key, the degree of disorder of the voice frame information is different, thereby realizing different encryption levels of the voice frame information.
It should be noted that, in this embodiment, the fourth key and the fifth key described above may be numbers, letters, characters, and the like, and the way of encrypting by using the key by the first terminal may also be other encryption types besides the scrambling described above, which is not limited herein.
It can be understood that, in this embodiment, the middle and low voice intensity regions divided by the second high-pitch threshold and the second middle-pitch threshold are used to perform different encryption processes on the voice frame information, in practical applications, the first terminal may further perform more detailed differentiation, for example, the middle voice region is divided into the middle high-pitch region and the low high-pitch region, as long as a corresponding key can be preset for each of the distinguished voice intensity regions outside the voice intensity region that is not required to be encrypted.
Further, on the basis of the need to encrypt the current speech frame information, the first terminal may identify the speech intensity at the target position of the speech frame information, that is, make a mid-tone intensity identifier corresponding to the fourth key or a low-tone intensity identifier corresponding to the fifth key at the target position of the speech frame information, so as to indicate the encryption level of the speech frame information received by the second terminal, without making a high-tone intensity identifier at the target position of the speech frame information.
It should be noted that the second midrange threshold in this embodiment may also be set based on actual statistical conditions before the first terminal leaves the factory.
Based on the beneficial effects described in the foregoing embodiment, the first terminal in this embodiment does not encrypt the voice frame information in the high-pitch range, that is, it is default that when the user uses the voice intensity at or above the second high-pitch threshold to perform communication, privacy protection is not required to be performed on the call content, but when the user uses the voice intensity below the second high-pitch threshold to perform communication, the first terminal may automatically perform corresponding privacy protection on the call content according to the corresponding key, so as to reduce the load of the first terminal processor more effectively.
Step 205 in this embodiment is the same as step 103 in the embodiment shown in fig. 1, and is not described here again.
It should be noted that the first treble threshold and the first middle-pitched threshold in the embodiment shown in fig. 1 may be the same as or different from the second treble threshold and the second middle-pitched threshold corresponding to the embodiment shown in fig. 2, the second key and the third key in the embodiment shown in fig. 1 may be the same as or different from the fourth key and the fifth key corresponding to the embodiment shown in fig. 2, respectively, and the terminal may be set based on an actual situation, which is not limited herein.
In the above, the method for encrypting the voice is explained from the first terminal side, and the following describes a specific flow of the method for decrypting the voice from the second terminal side, referring to fig. 3, an embodiment of the method for decrypting the voice according to the embodiment of the present invention includes:
301. the second terminal receives the voice frame information sent by the first terminal;
in this embodiment, the second terminal is also a device capable of performing voice operation, and may include but not limited to a smart phone, a tablet computer, and the like, and may implement voice communication by installing an application on the smart phone or the tablet computer, or by installing software. When the first terminal detects that the user is communicating, the voice frame information sent by the first terminal can be received.
In this embodiment, the second terminal may be a calling party side or a called party side, and is not limited herein.
302. The second terminal analyzes whether the voice frame information includes the voice intensity identifier, if not, step 303 is executed, and if so, step 304 is executed;
after receiving the voice frame information sent by the first terminal, the second terminal may perform decoding processing on the voice frame information, and may analyze whether the voice frame information includes a voice intensity identifier.
Specifically, in practical application, the first terminal may perform the speech strength identifier at the target position of the speech frame information, so that after the second terminal receives the speech frame information, it may be possible to search whether the speech strength identifier is present at the target position of the speech frame.
303. Executing other processes;
if the second terminal does not analyze the voice frame information and does not include the voice intensity identifier, it indicates that the first terminal does not encrypt the voice frame, and the second terminal may not need to decrypt the voice frame information and may directly transmit the decoded voice frame information to the receiver.
304. And the second terminal decrypts the voice frame information by using the key corresponding to the voice intensity identifier.
If the second terminal analyzes the voice frame information and includes the voice intensity identifier, the second terminal may decrypt the voice frame information by using the key corresponding to the voice intensity identifier.
In this embodiment, the specific way for the second terminal to decrypt the voice frame information by using the key corresponding to the voice strength identifier may be:
if the voice intensity identification is the high-pitch intensity identification, the second terminal decrypts the voice frame information by using a first secret key corresponding to the high-pitch intensity identification;
or the like, or, alternatively,
if the voice intensity identifier is the middle voice intensity identifier, the second terminal decrypts the voice frame information by using a second key corresponding to the middle voice intensity identifier;
or the like, or, alternatively,
and if the voice intensity identifier is a bass intensity identifier, the second terminal decrypts the voice frame information by using a third key corresponding to the bass intensity identifier.
Specifically, in practical applications, assuming that the first terminal and the second terminal negotiate to divide the voice intensity of the user into a high-pitch region, a middle-pitch region and a low-pitch region, the second terminal may determine a corresponding voice intensity identifier, such as a high-pitch intensity identifier, a middle-pitch intensity identifier or a low-pitch intensity identifier, according to the actual situation that the voice frame information is encrypted by the first terminal. Then, the second terminal can determine a corresponding key according to the voice intensity identifier, and then decrypt the voice frame information by using the key, namely, if the voice intensity identifier is a high-pitch intensity identifier, the second terminal decrypts the voice frame information by using the first key corresponding to the high-pitch intensity identifier; if the voice intensity identifier is the middle voice intensity identifier, the second terminal decrypts the voice frame information by using a second key corresponding to the middle voice intensity identifier; and if the voice intensity identifier is a bass intensity identifier, the second terminal decrypts the voice frame information by using a third key corresponding to the bass intensity identifier. It can be understood that the first key, the second key, and the third key in this implementation may respectively correspond to the first key, the second key, and the third key described in the embodiment shown in fig. 1, and the second key and the third key may also respectively correspond to the fourth key and the fifth key in the embodiment shown in fig. 2, for the second terminal, only the corresponding key of the speech strength identifier is extracted from the speech frame information, and specifically, the content and the length of the key are determined by the first terminal based on actual situations.
For example, assuming that the second terminal analyzes the mid-tone strength identifier, the speech frame information is 20 bits, and the first terminal performs scrambling on the speech frame information using a second key such as 12345, for example, the first terminal performs scrambling on the 3 rd, 7 th, 10 th, 16 th and 19 th bits of the speech frame information, respectively, the terminal may extract the corresponding second key 12345 from the 3 rd, 7 th, 10 th, 16 th and 19 th bits of the speech frame information according to the mid-tone strength identifier, and may re-synthesize the decrypted speech frame information according to the target sequence, and may transmit the decrypted speech frame information to the handset. It should be noted that, in this embodiment, the length of the second key may be set based on actual situations, and this embodiment is only an example
It can be understood that the first key, the second key, and the third key are different and may be determined according to an encryption level of the first terminal, and the second key and the third key described above in this embodiment may be numbers, letters, characters, and the like, and the way that the second terminal performs decryption by using the key corresponding to the voice intensity may be determined according to other encryption types, besides the above-described scrambling and anti-scrambling, and is not limited herein.
In this embodiment, if the second terminal resolves that the speech frame information does not include the speech strength identifier, the speech frame information does not need to be decrypted, and after the second terminal resolves that the speech frame information includes the speech strength identifier, the key corresponding to the speech strength identifier can be used for decryption.
With reference to fig. 4, the following describes an encryption apparatus and a decryption apparatus in an embodiment of the present invention, where the voice encryption method and the voice decryption method in the embodiment of the present invention are described above, and an embodiment of the encryption apparatus in an embodiment of the present invention includes:
an obtaining module 401, configured to obtain a voice intensity of a user in a current communication process;
an encryption module 402, configured to encrypt current voice frame information by using a key corresponding to the voice intensity;
an identifying module 403, configured to identify the voice strength at a target position of the voice frame information;
a sending module 404, configured to send the encrypted and identified voice frame information to the second terminal.
In this embodiment, the encryption module 402 may further include:
the first encrypting unit 4021 is configured to perform low-level encryption on the current voice frame information by using a first key corresponding to the voice strength when the voice strength is greater than or equal to the first treble threshold;
or the like, or, alternatively,
the second encryption unit 4022 is configured to perform medium encryption on the current voice frame information by using a second key corresponding to the voice strength when the voice strength is less than the first high pitch threshold and is greater than or equal to the first medium pitch threshold;
or the like, or, alternatively,
the third encrypting unit 4023 is configured to perform deep encryption on the current speech frame information by using a third key corresponding to the speech strength when the speech strength is smaller than the first midrange threshold.
It should be noted that in this embodiment, only the encrypted and identified voice frame information is sent to the second terminal, so that in addition to the connection relationship shown in fig. 4, in this embodiment, the obtaining module 401 may be connected to the identifying module 403, the identifying module 403 may be connected to the encrypting module 402, and the encrypting module 402 may be connected to the sending module 404.
In this embodiment, the encryption module 402 may encrypt the current voice frame information according to a key corresponding to the voice intensity of the user in the current communication process, that is, the user may autonomously control the voice intensity of the call to regulate the encryption level of the voice frame information, the stronger the voice of the user communication is, the lower the encryption level is, otherwise, the higher the encryption level is, the higher the security is, the requirement that the user needs to encrypt the privacy contents of different levels is fully ensured, and meanwhile, the load of the first terminal processor may also be reduced to a certain extent by autonomously adjusting the encryption level.
Referring to fig. 5, another embodiment of an encryption apparatus according to the embodiment of the present invention includes:
the module 501 in this embodiment is the same as the module 401 in the embodiment shown in fig. 4, and is not described here again.
A judging module 502, configured to judge whether the voice intensity is smaller than a second high pitch threshold;
the module 503 in this embodiment is the same as the module 402 in the embodiment shown in fig. 4, and the module 504 is the same as the module 403 in the embodiment shown in fig. 4, which are not described again here.
The triggering module 505 is configured to, when the determining module 502 determines that the speech strength is smaller than the second treble threshold, trigger the encrypting module 503 to encrypt the speech frame information by using the key corresponding to the speech strength, and trigger the identifying module 504 to identify the speech strength at the target position of the speech frame information.
The module 506 in this embodiment is the same as the module 404 in the embodiment shown in fig. 4, and is not described here again.
In this embodiment, the encryption module 503 may further include:
a fourth encrypting unit 5031, configured to perform medium encryption on the current speech frame information by using a fourth key corresponding to the speech strength when the speech strength is smaller than the second high-pitch threshold and is greater than or equal to the second medium-pitch threshold;
or the like, or, alternatively,
a fifth encrypting unit 5032, configured to, when the voice strength is smaller than the second midrange threshold, deeply encrypt the current voice frame information by using a fifth key corresponding to the voice strength.
It should be noted that, in this embodiment, the triggering module 505 may trigger the encryption module 503 to perform a corresponding operation, or may also execute the identification module 504 to perform a corresponding operation, but only the encrypted and identified voice frame information is sent to the second terminal, so that in the embodiment shown in fig. 5, the identification module 504 may be connected to the encryption module 503, and the encryption module 503 may be connected to the sending module 506.
Based on the beneficial effects described in the embodiment shown in fig. 4, the encryption module 503 in this embodiment does not encrypt the voice frame information in the high-pitch range, that is, default to that when the user uses the high-pitch threshold or higher voice intensity for communication, the privacy protection is not needed to be performed on the call content, but when the user uses the voice intensity below the second high-pitch threshold for communication, the first terminal may automatically perform corresponding privacy protection on the call content according to the corresponding key, so as to more effectively reduce the load of the first terminal processor.
Referring to fig. 6, an embodiment of a decryption apparatus according to the embodiment of the present invention includes:
a receiving module 601, configured to receive voice frame information sent by a first terminal;
an analyzing module 602, configured to analyze whether the voice frame information includes a voice strength identifier;
the decryption module 603 is configured to decrypt the voice frame information by using a key corresponding to the voice strength identifier if the voice frame information includes the voice strength identifier.
In this embodiment, the decryption module 603 may further include:
a first decryption unit 6031, configured to decrypt the voice frame information with a first key corresponding to the high-pitch intensity identifier when the voice intensity identifier is the high-pitch intensity identifier;
or the like, or, alternatively,
a second decryption unit 6032, configured to decrypt the voice frame information with a second key corresponding to the middle-voice strength identifier when the voice strength identifier is the middle-voice strength identifier;
or the like, or, alternatively,
a third decryption unit 6033, configured to decrypt the voice frame information with a third key corresponding to the bass intensity flag when the voice intensity flag is the bass intensity flag.
In this embodiment, if the parsing module 602 parses that the voice frame information does not include the voice strength identifier, the decryption module 603 does not need to decrypt the voice frame information, and after the parsing module 602 parses that the voice frame information includes the voice strength identifier, the decryption module 603 may decrypt using the key corresponding to the voice strength identifier, and since different voice strength identifiers may correspond to different keys, the decryption module 603 may selectively decrypt different levels of the voice frame information, thereby avoiding the second terminal from always decrypting the voice frame information using the same high-strength decryption method, thereby greatly reducing the load of the second terminal processor, and simultaneously ensuring the communication security of both communication parties.
The terminal provided in this embodiment has all the beneficial effects of the encryption device and/or the decryption device by setting the encryption device and/or the decryption device in any of the above embodiments, and details are not repeated herein.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (17)

1. A method for encrypting speech, comprising:
the method comprises the steps that a first terminal obtains the voice intensity of a user in the current communication process;
the first terminal encrypts the current voice frame information by using the key corresponding to the voice intensity and identifies the voice intensity at the target position of the voice frame information;
the first terminal sends the encrypted and identified voice frame information to a second terminal;
the key level is inversely related to the speech intensity, and the encryption mode is to scramble the speech frame information by using the key to interleave in the speech frame information.
2. The voice encryption method of claim 1, wherein the encrypting the current voice frame information by the first terminal using the key corresponding to the voice strength comprises:
if the voice intensity is greater than or equal to a first high pitch threshold value, the first terminal utilizes a first key corresponding to the voice intensity to perform low-level encryption on the current voice frame information;
or the like, or, alternatively,
if the voice intensity is smaller than the first high pitch threshold value and is larger than or equal to a first middle pitch threshold value, the first terminal performs middle encryption on the current voice frame information by using a second key corresponding to the voice intensity;
or the like, or, alternatively,
if the voice intensity is smaller than the first midrange threshold value, the first terminal deeply encrypts the current voice frame information by using a third key corresponding to the voice intensity.
3. The voice encryption method according to claim 2, wherein the length of the first key is smaller than the length of the second key, and the length of the second key is smaller than the length of the third key.
4. The voice encryption method according to claim 1, wherein before the first terminal encrypts current voice frame information by using the key corresponding to the voice strength, the method further comprises:
the first terminal judges whether the voice intensity is smaller than a second high pitch threshold value;
if yes, triggering the first terminal to encrypt the current voice frame information by using a key corresponding to the voice intensity, and identifying the voice intensity at a target position of the voice frame information.
5. The voice encryption method of claim 4, wherein the encrypting the current voice frame information by the first terminal using the key corresponding to the voice strength comprises:
if the voice intensity is smaller than the second high pitch threshold value and is larger than or equal to a second middle pitch threshold value, the first terminal performs middle encryption on the current voice frame information by using a fourth key corresponding to the voice intensity;
or the like, or, alternatively,
if the voice intensity is smaller than the second middle-pitch threshold value, the first terminal deeply encrypts the current voice frame information by using a fifth key corresponding to the voice intensity.
6. The voice encryption method according to claim 5, wherein the length of the fourth key is smaller than the length of the fifth key.
7. A method for decrypting speech, comprising:
the second terminal receives the voice frame information sent by the first terminal;
the second terminal analyzes whether the voice frame information comprises a voice intensity identifier;
if so, the second terminal decrypts the voice frame information by using the key corresponding to the voice intensity identifier;
the level of the key is negatively related to the voice intensity, and the decryption mode is to re-synthesize the voice frame information after the key is extracted into the decrypted voice frame information according to a target sequence.
8. The speech decryption method of claim 7, wherein the second terminal decrypting the speech frame information by using the key corresponding to the speech strength indicator comprises:
if the voice intensity identification is a high-tone intensity identification, the second terminal decrypts the voice frame information by using a first secret key corresponding to the high-tone intensity identification;
or the like, or, alternatively,
if the voice intensity identifier is a middle voice intensity identifier, the second terminal decrypts the voice frame information by using a second key corresponding to the middle voice intensity identifier;
or the like, or, alternatively,
and if the voice intensity identifier is a bass intensity identifier, the second terminal decrypts the voice frame information by using a third key corresponding to the bass intensity identifier.
9. An encryption apparatus, comprising:
the acquisition module is used for acquiring the voice intensity of a user in the current communication process;
the encryption module is used for encrypting the current voice frame information by using the key corresponding to the voice intensity;
the identification module is used for identifying the voice intensity at the target position of the voice frame information;
the sending module is used for sending the encrypted and identified voice frame information to a second terminal;
the key level is inversely related to the speech intensity, and the encryption mode is to scramble the speech frame information by using the key to interleave in the speech frame information.
10. The encryption device of claim 9, wherein the encryption module comprises:
the first encryption unit is used for encrypting the current voice frame information in a low-level mode by using a first key corresponding to the voice intensity when the voice intensity is larger than or equal to a first high pitch threshold value;
or the like, or, alternatively,
a second encryption unit, configured to perform medium encryption on the current speech frame information by using a second key corresponding to the speech strength when the speech strength is smaller than the first high pitch threshold and is greater than or equal to a first medium pitch threshold;
or the like, or, alternatively,
and the third encryption unit is used for deeply encrypting the current voice frame information by using a third key corresponding to the voice intensity when the voice intensity is smaller than the first midrange threshold value.
11. The encryption apparatus according to claim 10, wherein the length of the first key is smaller than the length of the second key, and the length of the second key is smaller than the length of the third key.
12. The encryption device according to claim 9, further comprising:
the judging module is used for judging whether the voice intensity is smaller than a second high pitch threshold value or not;
and the triggering module is used for triggering the encryption module to encrypt the current voice frame information by using the key corresponding to the voice intensity when the judging module judges that the voice intensity is smaller than the second high pitch threshold value, and triggering the identification module to identify the voice intensity at the target position of the voice frame information.
13. The encryption device of claim 12, wherein the encryption module comprises:
a fourth encrypting unit, configured to perform medium encryption on the current speech frame information by using a fourth key corresponding to the speech strength when the speech strength is smaller than the second high pitch threshold and is greater than or equal to a second medium pitch threshold;
or the like, or, alternatively,
a fifth encrypting unit, configured to, when the speech strength is smaller than the second mid-range threshold, deeply encrypt the current speech frame information by using a fifth key corresponding to the speech strength.
14. The encryption apparatus according to claim 13, wherein the length of the fourth key is smaller than the length of the fifth key.
15. A decryption apparatus, comprising:
the receiving module is used for receiving voice frame information sent by a first terminal;
the analysis module is used for analyzing whether the voice frame information comprises a voice intensity identifier or not;
the decryption module is used for decrypting the voice frame information by using a key corresponding to the voice intensity identifier if the voice frame information comprises the voice intensity identifier;
the level of the key is negatively related to the voice intensity, and the decryption mode is to re-synthesize the voice frame information after the key is extracted into the decrypted voice frame information according to a target sequence.
16. The decryption apparatus according to claim 15, wherein the decryption module comprises:
the first decryption unit is used for decrypting the voice frame information by using a first key corresponding to the high-tone intensity identifier when the voice intensity identifier is the high-tone intensity identifier;
or the like, or, alternatively,
the second decryption unit is used for decrypting the voice frame information by using a second key corresponding to the middle-tone strength identifier when the voice strength identifier is the middle-tone strength identifier;
or the like, or, alternatively,
and the third decryption unit is used for decrypting the voice frame information by using a third key corresponding to the bass intensity identifier when the voice intensity identifier is the bass intensity identifier.
17. A terminal, characterized in that it comprises an encryption device according to any one of claims 9 to 14 and/or a decryption device according to any one of claims 15 to 16.
CN201610197068.2A 2016-03-31 2016-03-31 Voice encryption and decryption method, encryption and decryption device and terminal Active CN105871842B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610197068.2A CN105871842B (en) 2016-03-31 2016-03-31 Voice encryption and decryption method, encryption and decryption device and terminal
PCT/CN2016/092481 WO2017166556A1 (en) 2016-03-31 2016-07-30 Voice encryption and decryption method, encryption and decryption device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610197068.2A CN105871842B (en) 2016-03-31 2016-03-31 Voice encryption and decryption method, encryption and decryption device and terminal

Publications (2)

Publication Number Publication Date
CN105871842A CN105871842A (en) 2016-08-17
CN105871842B true CN105871842B (en) 2020-04-07

Family

ID=56627564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610197068.2A Active CN105871842B (en) 2016-03-31 2016-03-31 Voice encryption and decryption method, encryption and decryption device and terminal

Country Status (2)

Country Link
CN (1) CN105871842B (en)
WO (1) WO2017166556A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106534154B (en) * 2016-11-30 2019-09-13 Oppo广东移动通信有限公司 A kind of information ciphering method, device and terminal
CN110545176B (en) * 2019-08-23 2021-08-13 深圳数联天下智能科技有限公司 Encryption and decryption method and device and Internet of things system
CN112188414B (en) * 2020-09-23 2022-06-03 恒宝股份有限公司 Multi-group terminal secure interaction method and relay equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN101114450A (en) * 2007-07-20 2008-01-30 华中科技大学 Speech encoding selectivity encipher method
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN104766604A (en) * 2015-04-02 2015-07-08 努比亚技术有限公司 Voice data marking method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090169001A1 (en) * 2007-12-28 2009-07-02 Cisco Technology, Inc. System and Method for Encryption and Secure Transmission of Compressed Media
CN101764666B (en) * 2009-12-24 2013-06-26 中国电信股份有限公司 Speech encryption method and device and decryption method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN101114450A (en) * 2007-07-20 2008-01-30 华中科技大学 Speech encoding selectivity encipher method
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN104766604A (en) * 2015-04-02 2015-07-08 努比亚技术有限公司 Voice data marking method and device

Also Published As

Publication number Publication date
WO2017166556A1 (en) 2017-10-05
CN105871842A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN105871842B (en) Voice encryption and decryption method, encryption and decryption device and terminal
US10341305B2 (en) Encrypted communications method and communications terminal, and computer storage medium
US10469455B2 (en) Dynamic encryption method
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
Paik Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications
US20150215112A1 (en) User terminal device and secured communication method thereof
KR20200135128A (en) Symmetric quantum cryptography key based encryption device for voice communication
CN106685897B (en) Safe input method, device and system
EP1851897B1 (en) System and method for three-phase data encryption
CN105960811B (en) Subscriber terminal equipment and its guarded communication method
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
EP2809045A2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
EP4109811A1 (en) Secure device equipped with quantum-random-number-based quantum encryption chip and secure communication service provision method using same
CN107529159B (en) Access layer encryption, decryption and integrity protection method and device for broadband cluster downlink shared channel and security implementation method
CN108701195B (en) Data security protection method and device
KR100417125B1 (en) Method for Automatically Entering Secured Voice Communication Mode of Wireless Communication Terminal
CN103986711A (en) Data processing method for voice communication
CN108270917A (en) A kind of encryption smart mobile phone
CN105577631B (en) data transmission method and terminal
Merit et al. Securing speech in GSM networks using DES with Random Permutation and Inversion Algorithm
CN107079290B (en) Encrypted call method and terminal
KR20090024860A (en) Voice encrypted communication module for mobile communication terminal
CN108270916A (en) A kind of encryption method of smart mobile phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant