CN107169374B - Encryption and decryption system and method based on voiceprint and voice recognition technology - Google Patents

Encryption and decryption system and method based on voiceprint and voice recognition technology Download PDF

Info

Publication number
CN107169374B
CN107169374B CN201710331175.4A CN201710331175A CN107169374B CN 107169374 B CN107169374 B CN 107169374B CN 201710331175 A CN201710331175 A CN 201710331175A CN 107169374 B CN107169374 B CN 107169374B
Authority
CN
China
Prior art keywords
voiceprint
encryption
module
voice
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710331175.4A
Other languages
Chinese (zh)
Other versions
CN107169374A (en
Inventor
杨佳
常清雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co Ltd filed Critical Sichuan Changhong Electric Co Ltd
Priority to CN201710331175.4A priority Critical patent/CN107169374B/en
Publication of CN107169374A publication Critical patent/CN107169374A/en
Application granted granted Critical
Publication of CN107169374B publication Critical patent/CN107169374B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an encryption and decryption system and method based on voiceprint and voice recognition technology, which mainly utilize an operation interface, an early warning module, a voice recording module, a voiceprint recognition module, a voice recognition module, an encryption and decryption module and a storage module to realize a voiceprint verification login process, a file encryption process and a file decryption process, and a user can enter the file encryption process and the file decryption process only after the voiceprint verification login process, wherein when a file is encrypted and decrypted, the voiceprint feature codes and voice content are required to be simultaneously synthesized to produce corresponding encryption passwords or decryption passwords, and then a plurality of encryption algorithms and corresponding decryption algorithms are comprehensively selected, so that the file is encrypted or decrypted. The invention combines biological characteristics with cryptography, generates a comprehensive key to decrypt the electronic file by synthesizing various encryption algorithms and decryption algorithms corresponding to the encryption algorithms through voiceprint recognition and voice recognition, and ensures the security of personal private information and data.

Description

Encryption and decryption system and method based on voiceprint and voice recognition technology
Technical Field
The invention relates to the technical field of file encryption and decryption in electronic equipment, in particular to an encryption and decryption system and method based on voiceprint and voice recognition technology.
Background
At present, a great deal of important information in work and life of people is generally stored in personal electronic equipment, especially a personal mobile phone in the form of electronic files; today, mobile intelligent terminals are rapidly developing, smart phones become an indispensable part of life and work of people, and intelligent terminals are more and more favored by consumers.
While users enjoy multifunctional mobile phone services, the security problem of important data in mobile devices, especially personal privacy data, is a problem that plagues people. It is reported that global Mobile Device Management (MDM) solutions, mainly offered by the suppliers mformations Technologies, were expressed day by day, and it was found through research that 82% of visitors had a fear of cheating with the information stored in their cell phones if they were lost or stolen. Meanwhile, 90% of the visitors worry about losing personal data after losing the mobile phone, and 72% of the visitors acknowledge that the personal information stored in the mobile phone is very important and difficult to replace. Even 40% of people indicate that a mobile phone is more afraid of being lost than a wallet. Because a mobile phone user carries the mobile phone to engage in various social activities, a large amount of important information and data are stored in the mobile phone, and the loss of the mobile phone is not less than a disaster to the user. The above information fully exposes people to concerns about data security issues. However, in the prior art, no really effective, safe and reliable method for protecting personal private information and important business secrets has been found for smart phones.
The invention combines biological characteristics with cryptography, provides an encryption and decryption system and method based on voiceprint and voice recognition technology, realizes the encryption protection of electronic files by voiceprint recognition and voice recognition and simultaneously comprehensively using various encryption algorithms, produces a comprehensive key to decrypt the electronic files, and ensures the security of personal private information and data by synthesizing decryption algorithms corresponding to various encryption algorithms through voiceprint recognition and voice recognition when decrypting the electronic files.
Disclosure of Invention
Aiming at the defects in the prior art, the invention aims to provide an encryption and decryption system based on voiceprint and voice recognition technology, which is used for carrying out encryption or decryption management on files in electronic equipment, and the encryption and decryption system at least comprises:
the system comprises an operation interface, an early warning module, a voice recording module, a voiceprint recognition module, a voice recognition module, an encryption and decryption module and a storage module; the operation interface is electrically connected with the early warning module; the voice recording module is electrically connected with the operation interface, the voiceprint recognition module is electrically connected with the early warning module and the voice recording module respectively, the voice recognition module is electrically connected with the voice recording module and the operation interface respectively, the encryption and decryption module is electrically connected with the voiceprint recognition module and the voice recognition module respectively, and the storage module is electrically connected with the encryption and decryption module, the voiceprint recognition module, the early warning module and the operation interface respectively;
the operation interface is used as an information transmission channel between the encryption and decryption system and a user, the storage module is used for storing information, the information comprises a user voiceprint feature code, the voice input module is used for inputting user voice information and voiceprint information, the voiceprint recognition module is used for recognizing and extracting the voiceprint feature code in the voiceprint information and matching and checking the voiceprint feature code with the user voiceprint feature code in the storage module, the voice recognition module is used for extracting voice content in the voice information and comparing and checking the voice content with text content input by the user in the operation interface, and the early warning module is used for checking the number of times of continuous checking failure of the current user and starting a system early warning flow.
Further, the system warning process is that the warning module locks the encryption and decryption system for n1 minutes, during which the user cannot perform any operation on the encryption and decryption system, where n1 is a real number greater than 0.
Furthermore, the electronic device at least comprises a mobile phone and a tablet computer.
Meanwhile, aiming at the encryption and decryption system based on the voiceprint and voice recognition technology, the invention also provides an encryption and decryption method based on the voiceprint and voice recognition technology, which comprises the encryption and decryption system based on the voiceprint and voice recognition technology, wherein:
the encryption and decryption system comprises:
the system comprises an operation interface, an early warning module, a voice recording module, a voiceprint recognition module, a voice recognition module, an encryption and decryption module and a storage module; the operation interface is electrically connected with the early warning module; the voice recording module is electrically connected with the operation interface, the voiceprint recognition module is electrically connected with the early warning module and the voice recording module respectively, the voice recognition module is electrically connected with the voice recording module and the operation interface respectively, the encryption and decryption module is electrically connected with the voiceprint recognition module and the voice recognition module respectively, and the storage module is electrically connected with the encryption and decryption module, the voiceprint recognition module, the early warning module and the operation interface respectively;
the operation interface is an information transmission channel between a system and a user, the storage module is used for storing information, the information comprises user voiceprint feature codes, the voice input module is used for acquiring user voice information and voiceprint information, the voiceprint recognition module is used for recognizing and extracting the voiceprint feature codes in the voiceprint information and matching and checking the voiceprint feature codes with the user voiceprint feature codes in the storage module, the voice recognition module is used for extracting voice content in the voice information and comparing and checking the voice content with text content input by the user in the operation interface, the early warning module is used for checking the number of times of continuous checking failure of the current user and starting a system early warning process, and the encryption and decryption module is used for encrypting or decrypting files;
the encryption and decryption method comprises a voiceprint verification login process, a file encryption process and a file decryption process, a user can enter the file encryption process and the file decryption process only after the voiceprint verification login process, and the specific method of the voiceprint verification login process comprises the following steps:
A101. a user enters the encryption and decryption system and selects to enter a voiceprint recording step A102 or a voiceprint login step A103, and records voice according to the prompt of the operation interface, and the voice recording module collects voiceprint information of the user;
A102. the voiceprint recognition module extracts the voiceprint feature codes in the voiceprint information and stores the voiceprint feature codes in the storage module, and meanwhile, a corresponding account is established for the user for storing the user information;
A103. the voiceprint recognition module extracts the voiceprint feature codes in the voiceprint information and performs matching verification with the user voiceprint feature codes stored in the storage module, if the voiceprint verification fails, the step A104 is carried out, if the voiceprint verification succeeds, the voiceprint login succeeds, and the user can perform other operations on the files in the account;
A104. the early warning module judges whether the user fails the continuous voiceprint verification for N1 times, if not, the step A101 is returned, otherwise, the system early warning process is entered;
the file encryption process comprises a voiceprint password generation process and an encrypted file process, and the specific method of the voiceprint password generation process comprises the following steps:
B101. the voice input module collects voice information and voiceprint information of the user according to the prompt, and the voiceprint recognition module extracts the voiceprint feature code in the voiceprint information and performs matching check with the voiceprint feature code of the login user stored in the storage module;
B102. if the voiceprint check fails, entering the step B103, otherwise, entering the step B104;
B103. the early warning module judges whether the user fails to continuously verify the voiceprint for N2 times, if not, the step B101 is returned, otherwise, the system early warning process is started;
B104. inputting the text content of the voice in an input box of the operation interface by a user, and identifying and outputting the voice content in the voice information by the voice identification module;
B105. the voice recognition module compares the voice content with the text content input by the user to judge whether the contents of the voice content and the text content are consistent, if so, the step B106 is carried out, otherwise, the step B101 is carried out;
B106. the encryption and decryption module combines the voiceprint feature code and the voice content into a voiceprint password and stores the voiceprint password;
the specific method for the encrypted file process comprises the following steps:
B201. a user selects a file to be encrypted, sets a corresponding voiceprint password for the file and selects an encryption algorithm;
B202. the encryption and decryption unit generates an encryption key according to the voiceprint password set by the user and the encryption algorithm, and encrypts the file in sections by using the encryption key;
the file decryption process comprises the following specific steps:
C101. a user selects an encrypted file to be decrypted and inputs voice according to password prompt information, and the voice input module acquires user voice information and voiceprint information;
C102. the voice recognition module recognizes and outputs voice content in the voice information, meanwhile, the voiceprint recognition module extracts voiceprint feature codes in the voiceprint information and carries out matching verification with user voiceprint feature codes stored in the storage module, if the voiceprint verification is successful, the step C104 is carried out, otherwise, the step C103 is carried out;
C103. the early warning module judges whether the user fails to continuously verify the voiceprint for N3 times, if not, the step C101 is returned, otherwise, the system early warning process is started;
C104. the encryption and decryption module combines the voiceprint feature code and the voice content into a decryption password;
C105. the encryption and decryption unit reads the encryption algorithm used when the file is encrypted, automatically selects the corresponding decryption algorithm, generates a decryption key according to the decryption password and the decryption algorithm, and decrypts the file by using the decryption key;
wherein N1, N2 and N3 are all positive integers.
Further, the system early warning process is that the early warning module locks the encryption and decryption system for n1 minutes, and during the locking period, a user cannot perform any operation on the encryption and decryption system; in the step a101, if the user selects to enter the voiceprint entry step a102, the voice needs to be entered N4 times according to the prompt; the voice recorded in the step B101 is a voice which is not less than N2 seconds and not more than N3 seconds, wherein N1, N2 and N3 are real numbers which are greater than 0, and N4 is a positive integer.
Further, the step a102 specifically includes:
a102-1, the voiceprint recognition module compares the extracted voiceprint feature code with the user voiceprint feature code stored in the storage module for verification, judges whether a user with the voiceprint feature code exists or not, if the verification result is that the user exists, the step A102-2 is carried out, otherwise, the step A102-3 is carried out;
a102-2, displaying prompt information on the operation interface, and judging that the user successfully logins in the voiceprint;
a102-3, storing the voiceprint feature code extracted by the voiceprint recognition module, and meanwhile, establishing a corresponding account for the user for storing the user information.
Further, when the user sets the voiceprint password in step B201, a new voiceprint password may be selected, and at this time, the voiceprint password generation process is entered, or the voiceprint password stored in the storage module may be directly used.
Further, the voiceprint password generation flow further includes step B107: the encryption and decryption unit sets an identification name for the voiceprint password; wherein the identification name is the password prompt information in the step C101; the encrypted file flow further includes step B203: and the encryption and decryption unit adds an encryption algorithm identifier corresponding to the used encryption algorithm into a header tag of the file.
Further, the file decryption process further includes step C106: the encryption and decryption unit clears the encryption algorithm identification in the head label of the file.
Further, the encryption algorithm in step B201 at least includes a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, and an ECC encryption algorithm.
Compared with the prior art, the invention has the advantages and beneficial effects that:
the invention combines biological characteristics with cryptography, provides an encryption and decryption system and method based on voiceprint and voice recognition technology, realizes the encryption protection of electronic files by voiceprint recognition and voice recognition and simultaneously comprehensively using various encryption algorithms, generates a comprehensive key to decrypt the electronic files by voiceprint recognition and voice recognition when decrypting the electronic files, and simultaneously synthesizes decryption algorithms corresponding to various encryption algorithms to generate the comprehensive key, thereby ensuring the security of personal private information and data.
Drawings
FIG. 1 is a schematic diagram of an encryption and decryption method based on voiceprint and speech recognition technologies according to the present invention;
FIG. 2 is a schematic diagram of an encryption and decryption system based on voiceprint and speech recognition techniques according to the present invention;
FIG. 3 is a schematic diagram of a voiceprint authentication login process according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a file encryption process according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a file decryption process according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples:
examples
As shown in fig. 1 and fig. 2, an encryption and decryption method based on voiceprint and voice recognition technology is loaded in an electronic device mainly in the form of an encryption and decryption system based on voiceprint and voice recognition technology for protecting information security of an electronic document of a user in the electronic device, the encryption and decryption system comprising:
the system comprises an operation interface, an early warning module, a voice recording module, a voiceprint recognition module, a voice recognition module, an encryption and decryption module and a storage module; the operation interface is electrically connected with the early warning module; the voice recording module is electrically connected with the operation interface, the voiceprint recognition module is electrically connected with the early warning module and the voice recording module respectively, the voice recognition module is electrically connected with the voice recording module and the operation interface respectively, the encryption and decryption module is electrically connected with the voiceprint recognition module and the voice recognition module respectively, and the storage module is electrically connected with the encryption and decryption module, the voiceprint recognition module, the early warning module and the operation interface respectively.
The operation interface is an information transmission channel between the system and the user, can display related prompt information to indicate the user to carry out related operation, and can also transmit the operation of the user back to the system; the storage module is mainly used for storing information, a special account is arranged in the storage module for each user to store the related identity information and file information of the user corresponding to the account, and a system file storage disc is also arranged to store system files; the voice input module is used for acquiring voice information and voiceprint information of a user, and after the user inputs voice to the electronic equipment according to the operation prompt of the operation interface, the voiceprint information and the voice information in the voice are extracted by the voice input module according to the system requirement; the voiceprint recognition module is used for recognizing and extracting voiceprint feature codes in the voiceprint information, and matching and checking the voiceprint feature codes with user voiceprint feature codes in the storage module, so that whether the current user is a registered system user is judged; the voice recognition module is used for extracting voice content in the voice information, and comparing and checking the voice content with text content input by a user in an operation interface so as to judge whether the voice input by the user is consistent with the text content input by the user; the early warning module is used for checking the number of times of continuous voiceprint verification failure of the current user, if the number of times of continuous voiceprint verification failure of the user reaches a certain number, the number is generally set to be 3, the current user is judged to be possibly a non-system user, potential safety hazards exist on system files, therefore, a system early warning process is started, all programs in the system are locked for a period of time, during the period, the user can not perform any operation on the system any more, after the locking time is over, the voiceprint verification login process is automatically returned, and generally the locking time is set to be 1 minute; the encryption and decryption module can combine the voiceprint feature codes and the voice contents extracted from the voice input by the user into voiceprint passwords and generate encryption keys by using the voiceprint feature codes and corresponding algorithm combinations selected by the user, so that files selected by the user are encrypted.
As shown in fig. 1 and 3, when a user enters the system of the present invention, the user first enters the voiceprint authentication login process of the system, that is, the two options of voiceprint login and voiceprint registration are displayed on the operation interface, the client can select to register or directly register according to whether the voiceprint information is registered, the system determines that the user entering the login procedure is not the user who uses for the first time, the user entering the registration procedure is for the first time, and the system enters the next step according to the specific user type.
If the user is a new user, the user must enter the voiceprint information of the user through the voice entry module when the user uses the mobile phone for the first time, and generally enters the voice information through a microphone of the mobile phone. When the voiceprint information is input, a user needs to select one phrase from phrases provided by default by a system displayed in an operation interface, the operation is carried out according to prompt of the operation interface, the phrase is narrated for 5 times by voice, a common voice input module can better identify the voice narrated by the Mandarin, after the input of the voiceprint information is finished, if the prompt operation is successful, the voiceprint information is input, a voiceprint feature code is extracted from the input voiceprint information by the voiceprint identification module and is stored in a safe storage space of a local storage module, and meanwhile, a corresponding account is set for the user to store relevant information of the user.
The user selects to enter a voiceprint registration program, the voiceprint recognition module extracts voiceprint feature codes from input voiceprint information to compare the voiceprint feature codes of the user, whether the current user is a registered new user is judged, if the user with the consistent voiceprint feature codes is found through comparison, prompt information which can be directly logged in is provided for the user on an operation interface, if the user with the consistent voiceprint feature codes is not found, the extracted voiceprint feature codes are stored in a safe storage space of a local storage module, and meanwhile, a corresponding account is set for the user to store relevant information of the user.
If the user is not a new user, the user must perform voiceprint authentication each time the user logs in for use. When voiceprint verification is carried out, a user needs to repeat phrases on an operation interface through voice according to prompt of the operation interface to carry out voiceprint information verification, a voiceprint recognition module extracts voiceprint feature codes from input voiceprint information and compares the voiceprint feature codes with the voiceprint feature codes in a safe storage space, if verification is successful, the user can carry out next operation in an application program, if verification fails, the user also has an opportunity to carry out voiceprint verification, generally, 3 times of voiceprint verification can be carried out, after 3 times of verification fails, an early warning module locks the application program for 1 minute, and the user cannot carry out any operation in the application program in the meantime.
As shown in fig. 1 and 4, if a user selects to encrypt a file after successfully verifying and logging in a voiceprint, the user enters a file encryption process of the system, the user needs to select the file to be encrypted first, then selects an encryption algorithm to be used from a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm and an ECC encryption algorithm provided by the system and sets a voiceprint encryption password, when setting the voiceprint encryption password, the user can select to directly use the voiceprint encryption password stored in a local secure storage space, or select to newly set a voiceprint encryption password for the file, if the user selects to newly set a voiceprint encryption password, the user needs to perform related operations according to an operation interface prompt, firstly the user needs to enter a section of voice, generally sets the time length of the voice to be not less than 2 seconds and not more than 10 seconds, and then the voiceprint identification module extracts the voiceprint feature code, comparing the voice print feature code with the voiceprint feature code in the safe storage space, if the voiceprint feature code is found to be inconsistent with the voiceprint feature code of the current login user stored in the system through comparison, displaying prompt information of the inconsistent voiceprint feature code on the operation interface, prompting to input voice again, generally, if the voiceprint feature code is obtained through continuous comparison for 3 times, locking the system for 1 minute through the early warning module, automatically returning to a voiceprint verification login program after 1 minute, if the voiceprint feature code is passed through comparison, prompting the user to input the text content of the voice in the input frame through the operation interface, firstly identifying the input voice through the voice identification module and outputting the identified content, then comparing the output result with the text content input by the user, judging whether the two contents are consistent, if not, displaying the prompt information of inconsistent contents and returning to the interface prompting to input the voice, if the two contents are consistent, the encryption and decryption module combines the voiceprint feature code and the voice content into a voiceprint password, preferably sets an identification name for the voiceprint password, is used as a password prompt to prompt a user of the corresponding voice content when decrypting the file, then combines the voiceprint password with an encryption algorithm selected by the user to generate an encryption key and encrypts the file in sections, generally the encryption key is a voiceprint encryption key or a voiceprint encryption key pair, and preferably uses a public key of the voiceprint encryption key or the voiceprint encryption key pair to encrypt the file in sections when encrypting the file. Finally, in order to quickly identify the encryption algorithm used by the file during decryption, an encryption algorithm identifier corresponding to the used encryption algorithm can be added to the header tag of the file.
As shown in fig. 1 and 5, if the user successfully logs in the system after voiceprint verification, then the user selects to decrypt the file, and enters the file decryption process of the system, the user first selects the file to be decrypted, the system displays password prompt information for the user on the operation interface according to the encrypted information of the file and the identification name of the voiceprint password used by the file, the user enters a section of corresponding voice according to the prompt, the voiceprint recognition module extracts the voiceprint feature code and compares the voiceprint feature code with the voiceprint feature code in the secure storage space, if the voiceprint feature code is found to be inconsistent with the voiceprint feature code of the current logged-in user stored in the system by comparison, the operation interface displays the prompt information that the voiceprint feature code is inconsistent, and prompts to enter the voice again, if the voiceprint feature code is generally inconsistent after continuous 3 times of comparison, the early warning module locks the system for 1 minute, and automatically returning a voiceprint verification login program after 1 minute, if the voiceprint feature codes are compared and passed, simultaneously carrying out content recognition on the recorded voice by the voice recognition module and outputting the recognized content, then combining the voiceprint feature codes and the content recognized by the voice into a voiceprint decryption password by the encryption and decryption module, automatically selecting an algorithm to be used during decryption according to an encryption algorithm identifier in a head label of the read file, converting the voiceprint decryption password into a voiceprint decryption key or a voiceprint decryption key pair with the key length required by the corresponding algorithm, preferentially decrypting the file by using a private key of the voiceprint decryption key or the voiceprint decryption key pair, and removing the encryption algorithm identifier in the head label of the file.
The encryption and decryption system and method based on the voiceprint and voice recognition technology guarantee the safety of personal important information and data of the user through the processes, reduce user operation steps, optimize user experience, and guarantee the safety and uniqueness of the secret key by utilizing voiceprint recognition and voice recognition.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (7)

1. An encryption and decryption method based on voiceprint and voice recognition technology is characterized by comprising an encryption and decryption system based on voiceprint and voice recognition technology, wherein the encryption and decryption system based on voiceprint and voice recognition technology at least comprises:
the system comprises an operation interface, an early warning module, a voice recording module, a voiceprint recognition module, a voice recognition module, an encryption and decryption module and a storage module; the operation interface is electrically connected with the early warning module; the voice recording module is electrically connected with the operation interface, the voiceprint recognition module is electrically connected with the early warning module and the voice recording module respectively, the voice recognition module is electrically connected with the voice recording module and the operation interface respectively, the encryption and decryption module is electrically connected with the voiceprint recognition module and the voice recognition module respectively, and the storage module is electrically connected with the encryption and decryption module, the voiceprint recognition module, the early warning module and the operation interface respectively;
the voice recognition module is used for extracting voice content in the voice information and comparing and checking the voice content with text content input by a user in the operation interface, the early warning module is used for checking the continuous checking failure times of the current user and starting a system early warning process, and the encryption and decryption module is used for encrypting or decrypting a file; the system early warning process is that the early warning module locks the encryption and decryption system for n1 minutes, and during the locking period, a user cannot perform any operation on the encryption and decryption system based on the voiceprint and voice recognition technology, wherein n1 is a real number greater than 0;
the encryption and decryption method comprises a voiceprint verification login process, a file encryption process and a file decryption process, a user can enter the file encryption process and the file decryption process only after the voiceprint verification login process, and the specific method of the voiceprint verification login process comprises the following steps:
A101. a user enters the encryption and decryption system based on the voiceprint and voice recognition technology, selects to enter a voiceprint recording step A102 or a voiceprint login step A103, and records voice according to the prompt of the operation interface, and the voice recording module collects voiceprint information of the user;
A102. the voiceprint recognition module extracts the voiceprint feature codes in the voiceprint information and stores the voiceprint feature codes in the storage module, and meanwhile, a corresponding account is established for the user for storing the user information;
A103. the voiceprint recognition module extracts the voiceprint feature codes in the voiceprint information and performs matching verification with the user voiceprint feature codes stored in the storage module, if the voiceprint verification fails, the step A104 is carried out, if the voiceprint verification succeeds, the voiceprint login succeeds, and the user can perform other operations on the files in the account;
A104. the early warning module judges whether the user fails the continuous voiceprint verification for N1 times, if not, the step A101 is returned, otherwise, the system early warning process is entered;
the file encryption process comprises a voiceprint password generation process and an encrypted file process, and the specific method of the voiceprint password generation process comprises the following steps:
B101. the voice input module collects voice information and voiceprint information of the user according to the prompt, and the voiceprint recognition module extracts the voiceprint feature code in the voiceprint information and performs matching check with the voiceprint feature code of the login user stored in the storage module;
B102. if the voiceprint check fails, entering the step B103, otherwise, entering the step B104;
B103. the early warning module judges whether the user fails to continuously verify the voiceprint for N2 times, if not, the step B101 is returned, otherwise, the system early warning process is started;
B104. inputting the text content of the voice in an input box of the operation interface by a user, and identifying and outputting the voice content in the voice information by the voice identification module;
B105. the voice recognition module compares the voice content with the text content input by the user to judge whether the contents of the voice content and the text content are consistent, if so, the step B106 is carried out, otherwise, the step B101 is carried out;
B106. the encryption and decryption module combines the voiceprint feature code and the voice content into a voiceprint password and stores the voiceprint password;
the specific method for the encrypted file process comprises the following steps:
B201. a user selects a file to be encrypted, sets a corresponding voiceprint password for the file and selects an encryption algorithm;
B202. the encryption and decryption unit generates an encryption key according to the voiceprint password set by the user and the encryption algorithm, and encrypts the file in sections by using the encryption key;
the file decryption process comprises the following specific steps:
C101. a user selects an encrypted file to be decrypted and inputs voice according to password prompt information, and the voice input module acquires user voice information and voiceprint information;
C102. the voice recognition module recognizes and outputs voice content in the voice information, meanwhile, the voiceprint recognition module extracts voiceprint feature codes in the voiceprint information and carries out matching verification with user voiceprint feature codes stored in the storage module, if the voiceprint verification is successful, the step C104 is carried out, otherwise, the step C103 is carried out;
C103. the early warning module judges whether the user fails to continuously verify the voiceprint for N3 times, if not, the step C101 is returned, otherwise, the system early warning process is started;
C104. the encryption and decryption module combines the voiceprint feature code and the voice content into a decryption password;
C105. the encryption and decryption unit reads the encryption algorithm used when the file is encrypted, automatically selects the corresponding decryption algorithm, generates a decryption key according to the decryption password and the decryption algorithm, and decrypts the file by using the decryption key;
wherein N1, N2 and N3 are all positive integers.
2. The encryption and decryption method based on voiceprint and speech recognition technology according to claim 1, wherein in the step a101, if the user selects to enter the voiceprint entry step a102, the voice needs to be entered N4 times according to the prompt; the voice recorded in the step B101 is a voice which is not less than N2 seconds and not more than N3 seconds, wherein N1, N2 and N3 are real numbers which are greater than 0, and N4 is a positive integer.
3. The encryption and decryption method based on voiceprint and speech recognition technology according to claim 1, wherein the step a102 specifically comprises:
a102-1, the voiceprint recognition module compares the extracted voiceprint feature code with the user voiceprint feature code stored in the storage module for verification, judges whether a user with the voiceprint feature code exists or not, if the verification result is that the user exists, the step A102-2 is carried out, otherwise, the step A102-3 is carried out;
a102-2, displaying prompt information on the operation interface, and judging that the user successfully logins in the voiceprint;
a102-3, storing the voiceprint feature code extracted by the voiceprint recognition module, and meanwhile, establishing a corresponding account for the user for storing the user information.
4. The encryption and decryption method based on voiceprint and speech recognition technology according to claim 1, wherein in step B201, when the user sets the voiceprint password, a new voiceprint password can be selected, and at this time, the voiceprint password generation process is entered, or the voiceprint password stored in the storage module can be directly used.
5. The encryption and decryption method based on voiceprint and speech recognition technology according to claim 1, wherein the voiceprint password generation flow further comprises step B107: the encryption and decryption unit sets an identification name for the voiceprint password; wherein the identification name is the password prompt information in the step C101;
the encrypted file flow further includes step B203: and the encryption and decryption unit adds an encryption algorithm identifier corresponding to the used encryption algorithm into a header tag of the file.
6. The encryption and decryption method based on voiceprint and speech recognition technology according to claim 5, wherein the file decryption process further comprises step C106: the encryption and decryption unit clears the encryption algorithm identification in the head label of the file.
7. The encryption and decryption method based on voiceprint and speech recognition technology according to any one of claims 1 to 6, wherein said encryption algorithm in said step B201 at least comprises DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, ECC encryption algorithm.
CN201710331175.4A 2017-05-11 2017-05-11 Encryption and decryption system and method based on voiceprint and voice recognition technology Active CN107169374B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710331175.4A CN107169374B (en) 2017-05-11 2017-05-11 Encryption and decryption system and method based on voiceprint and voice recognition technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710331175.4A CN107169374B (en) 2017-05-11 2017-05-11 Encryption and decryption system and method based on voiceprint and voice recognition technology

Publications (2)

Publication Number Publication Date
CN107169374A CN107169374A (en) 2017-09-15
CN107169374B true CN107169374B (en) 2020-04-28

Family

ID=59815876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710331175.4A Active CN107169374B (en) 2017-05-11 2017-05-11 Encryption and decryption system and method based on voiceprint and voice recognition technology

Country Status (1)

Country Link
CN (1) CN107169374B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107908951A (en) * 2017-11-20 2018-04-13 浪潮(北京)电子信息产业有限公司 A kind of method and device for protecting mobile platform data
CN107932519A (en) * 2017-11-22 2018-04-20 深圳悉罗机器人有限公司 Robot system, robot system control method and household electrical appliance group control method
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
CN108259171B (en) * 2018-01-12 2020-10-16 武汉斗鱼网络科技有限公司 Shader file protection method and device
CN108920927A (en) * 2018-07-30 2018-11-30 比奥香港有限公司 A kind of recording based on biological identification, speech playing method and equipment
CN109344587A (en) * 2018-08-09 2019-02-15 平安科技(深圳)有限公司 Case handling suggestion input method, device, computer equipment and storage medium
CN109614804B (en) * 2018-11-19 2021-04-27 中国地质大学(武汉) Bimodal biological characteristic encryption method, device and storage device
CN110084014A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 Data inputting method, device, computer equipment and storage medium
CN110309639A (en) * 2019-06-28 2019-10-08 温州科技职业学院 A kind of secrecy system based on Library management
CN110363639B (en) * 2019-07-08 2022-04-12 广东工贸职业技术学院 Financial management system based on artificial intelligence
CN110443018A (en) * 2019-07-30 2019-11-12 深圳力维智联技术有限公司 Method, terminal, system and readable storage medium storing program for executing based on Application on Voiceprint Recognition identity
CN110380856B (en) * 2019-08-15 2023-04-18 Oppo(重庆)智能科技有限公司 Terminal device and voice information processing method and device thereof, and storage medium
CN110677260B (en) 2019-09-29 2023-04-21 京东方科技集团股份有限公司 Authentication method, device, electronic equipment and storage medium
CN111128195A (en) * 2019-11-29 2020-05-08 合肥讯飞读写科技有限公司 Voiceprint control method of intelligent demonstrator, intelligent demonstrator and equipment
CN111698212B (en) * 2020-05-13 2022-08-02 成都深思科技有限公司 Unidirectional transmission method based on virtual receiving end
CN113282151A (en) * 2021-05-28 2021-08-20 罗鹏 Data encryption device with storage function based on big data technology
CN114756848B (en) * 2022-06-15 2022-09-02 国网浙江省电力有限公司 Engineering digital audit data processing method based on basic data acquisition model

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN104517066A (en) * 2014-12-16 2015-04-15 上海师范大学 Folder encrypting method
CN105160261A (en) * 2015-04-30 2015-12-16 北京车音网科技有限公司 File encryption and decryption method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN104517066A (en) * 2014-12-16 2015-04-15 上海师范大学 Folder encrypting method
CN105160261A (en) * 2015-04-30 2015-12-16 北京车音网科技有限公司 File encryption and decryption method and device

Also Published As

Publication number Publication date
CN107169374A (en) 2017-09-15

Similar Documents

Publication Publication Date Title
CN107169374B (en) Encryption and decryption system and method based on voiceprint and voice recognition technology
EP3435591B1 (en) 1:n biometric authentication, encryption, signature system
US20190384934A1 (en) Method and system for protecting personal information infringement using division of authentication process and biometric authentication
CN104903904B (en) Bar code authentication for resource request
CN107196922B (en) Identity authentication method, user equipment and server
US9800562B2 (en) Credential recovery
US8862888B2 (en) Systems and methods for three-factor authentication
US20160323272A1 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
US9882719B2 (en) Methods and systems for multi-factor authentication
US20190268160A1 (en) Method, Mobile Device, Terminal Device and System for Verifying Approval Signature
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN107370601B (en) Intelligent terminal, system and method integrating multiple security authentications
CN113824900B (en) Cloud video editing system
CN113055157B (en) Biological characteristic verification method and device, storage medium and electronic equipment
WO2015196642A1 (en) Data encryption method, decryption method and device
KR101721582B1 (en) System, method and computer program for non-face-to-face verification of user using voice data
CN104102858B (en) Application program cipher processing method, device and terminal
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
WO2002103535A1 (en) Qualification certifying method using variable certification information
JP2013539099A (en) Simplified method for personalizing smart cards and related devices
CN108446909A (en) A kind of electronic signature method based on biological characteristic electronic business card
CN104580255B (en) Authentication method and system of the identification equipment based on recognizable code stream to terminal device
KR101685042B1 (en) Method for Embodying Once Authentication Code by using Media Division
CN108280330A (en) Data output method and system
CN108492214B (en) Mobile terminal, server, management system and self-service check-in system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant