CN108962239B - Rapid network distribution method and system based on voice masking - Google Patents

Rapid network distribution method and system based on voice masking Download PDF

Info

Publication number
CN108962239B
CN108962239B CN201810587558.2A CN201810587558A CN108962239B CN 108962239 B CN108962239 B CN 108962239B CN 201810587558 A CN201810587558 A CN 201810587558A CN 108962239 B CN108962239 B CN 108962239B
Authority
CN
China
Prior art keywords
voice
ssid
broadcast information
masking
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810587558.2A
Other languages
Chinese (zh)
Other versions
CN108962239A (en
Inventor
钟显华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taizhou Jiji Intellectual Property Operation Co.,Ltd.
Original Assignee
Taizhou Jiji Intellectual Property Operation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taizhou Jiji Intellectual Property Operation Co ltd filed Critical Taizhou Jiji Intellectual Property Operation Co ltd
Priority to CN201810587558.2A priority Critical patent/CN108962239B/en
Publication of CN108962239A publication Critical patent/CN108962239A/en
Application granted granted Critical
Publication of CN108962239B publication Critical patent/CN108962239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
    • G10L19/04Speech or audio signals analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis using predictive techniques
    • G10L19/16Vocoder architecture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a rapid network distribution method and system based on voice masking, wherein the method comprises the following steps: sending first voice broadcast information to wake up intelligent hardware; sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information; and sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and generating and returning voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password. The intelligent hardware carries out coding masking on the voice information of the distribution network and then transmits the voice information, and the network name and the password of the distribution network are encrypted, so that the distribution network information is prevented from being directly heard by a third party, and the safety is high; through voice coding transmission, a fault-tolerant mechanism is provided, voice recognition is not relied on, and the accuracy is better; and the distribution network speed is faster, and the experience is better.

Description

Rapid network distribution method and system based on voice masking
Technical Field
The invention relates to the technical field of networks, in particular to a rapid network distribution method and system based on voice masking
Background
With the continuous popularization of smart homes, the concept of smart homes developed to date in the household appliance industry is rapidly rolling up the whole industry, and nowadays, smart hardware products all depend on network services, and a device distribution network also becomes one of the most core functions of smart hardware.
Most of the existing technical schemes are based on a wireless connection mode such as Bluetooth, wifi and the like, a network is distributed through an intelligent terminal such as a mobile phone operation completion mode, the network is distributed through a wifi connection mode and a Bluetooth connection mode, the whole process needs a user to operate an intelligent device to enter a network distribution mode and complete the network distribution with the intelligent terminal in a matching mode, the intelligent device and the network distribution mode can be completed after frequent interaction and confirmation, the network distribution of intelligent hardware can be completed due to the fact that the problem of any one process possibly causes the failure of network access of the device, the operation process is complex, the intelligent device is required to be additionally added with a trigger mechanism to guarantee, the network is distributed through wifi ap or Bluetooth connection, wifi ap switching is designed, connection, Bluetooth scanning connection and other processes are long. The scheme of the voice distribution network also appears in the prior art, but the security of the current scheme of the voice distribution network is not high.
For example, a patent with publication number CN201610375670 discloses a network distribution method for voice, which relates to a network distribution method and comprises: searching and voice broadcasting wireless network names within a preset range; determining a target wireless network to be connected according to the voice input of a user; receiving network password information input by a user through voice; and connecting the target wireless network according to the network password information. The product voice prompt can be realized to carry out the connection configuration of the wireless network, and the high efficiency of the wireless network configuration connection can be effectively ensured. According to the invention, the network is directly distributed through intelligent hardware, and the SSID and the password of the network are directly transmitted through voice, so that the network is easily interfered by the environment and the success rate of the distribution network is not high, and meanwhile, the passwords of the SSID and the SSID are openly notified through voice, so that the SSID and the SSID password are easily leaked, and the security is not high.
Disclosure of Invention
The invention aims to provide a method and a system for rapidly distributing a network based on voice masking, aiming at the defects of the prior art, so that the network can be rapidly distributed for intelligent hardware, and the network distribution process is rapid and safe.
In order to achieve the purpose, the invention adopts the following technical scheme:
a rapid network distribution method based on voice masking comprises the following steps:
sending first voice broadcast information to wake up intelligent hardware;
sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and generating and returning voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
Preferably, the method further comprises the following steps:
searching and displaying SSID in a preset range;
and acquiring the SSID input by the user and the password of the SSID.
Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Correspondingly, a rapid network distribution system based on voice masking is also provided, which comprises:
the sending and awakening module is used for sending first voice broadcast information to awaken the intelligent hardware;
the sending prompting module is used for sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information and enters the distribution network mode;
and the sending distribution network module is used for sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware generates and returns voice broadcast information of successful/failed SSID connection for voice masking after receiving the SSID password.
Preferably, the method further comprises the following steps:
the searching and displaying module is used for searching and displaying the SSID within the preset range;
and the acquisition module is used for acquiring the SSID input by the user and the password of the SSID.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Compared with the prior art, the method has the advantages that the voice information of the distribution network is coded and masked and then transmitted to the intelligent hardware, the network name and the password of the distribution network are encrypted, the distribution network information is prevented from being directly heard by a third party, and the safety is high; through voice coding transmission, a fault-tolerant mechanism is provided, voice recognition is not relied on, and the accuracy is better; and the distribution network speed is faster, and the experience is better.
Drawings
Fig. 1 is a flowchart of a fast network distribution method based on voice masking according to an embodiment;
fig. 2 is a diagram illustrating a configuration of a fast distribution network system based on voice masking according to an embodiment;
fig. 3 is a flowchart of a fast network distribution method based on voice masking according to a second embodiment;
fig. 4 is a diagram of a configuration network system based on voice masking.
Detailed Description
The following are specific embodiments of the present invention and are further described with reference to the drawings, but the present invention is not limited to these embodiments.
Example one
The embodiment provides a fast network distribution method based on voice masking, as shown in fig. 1, including the steps of:
s11, sending first voice broadcast information to wake up intelligent hardware;
s12, sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and S13, sending the SSID and the SSID password to the intelligent hardware through the third voice broadcast information for voice masking, and generating and returning the voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
With the continuous popularization of smart homes, the concept of smart homes developed so far in the household appliance industry is rapidly rolling up the whole industry, the existing smart hardware products all depend on network services, the equipment distribution network also becomes one of the most core functions of the smart hardware, and most of the distribution networks of the smart hardware in the prior art have the defects of too complex distribution network process or low safety and the like.
The fast network distribution method based on voice masking provided by the embodiment completes network distribution by utilizing the intelligent APP to perform voice interaction with intelligent hardware.
Step S11, the intelligent device plays the awakening words to awaken the intelligent hardware, the intelligent hardware replies the device ready after receiving the voice broadcast information, and the round of interaction does not contain the voice information of the masking codes. For example: the mobile phone broadcasts a wake-up word 'magic rabbit' from tts (text To speech), and the intelligent hardware replies 'magic rabbit serving you'. In the preferred mode of this embodiment, the smart machine reports voice prompt user near intelligent hardware automatically to play the frame and confirm, the user reports voice message near intelligent hardware in order to improve intelligent hardware's the rate of clearness of listening to.
Step S12 the intelligent device (such as mobile phone) plays tts ' please enter distribution network mode ' with masking code voice information to prompt the intelligent hardware to enter distribution network mode, and the intelligent hardware replies tts ' magic rabbit ' with masking code voice information has already entered distribution network mode ' after receiving the prompt. The call is mainly used for exchanging keys between the intelligent equipment and the equipment to be networked. Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
The specific key information is as follows:
and the key and hash algorithm code of the sha security algorithm generated by the intelligent app is coded in the 'please enter the distribution network mode'.
The 'magic rabbit is already in a distribution network mode' and a sha public key generated by intelligent hardware and a selected hash algorithm are coded. The key and algorithm have been encrypted using the app's key.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Step S13, the intelligent device (such as a mobile phone) plays tts with the masking code voice information, such as 'please start networking now', the intelligent hardware to be networked (such as a sound box) starts to connect with the corresponding AP, and generates tts 'success/failure of connection route ssid' with the masking code voice information according to the result and broadcasts. The process mainly transmits the ssid and the password and feeds back the distribution network result, and the specific coding information is as follows:
the ssid and password are encoded in "please start networking now", and encrypted using the speaker public key.
The "success/failure of connection routing ssid" encodes the distribution network result and uses the public key encryption of the app side.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
The voice masking of the embodiment is based on controlling frequency bands of tts voice and coding signals, coding information such as ssid and password through voice signals, and masking the coding signals by noise, so that the aim of synchronously and safely transmitting information is fulfilled when a voice command is sent. The specific process is as follows:
after the tts voice command is generated, the tts voice frequency spectrum is limited within a certain range such as 20-1000hz through a band-pass filter. The highest cut-off frequency is denoted f0, the normalized amplitude of the control tts is a0 (range 0-1), and the commands and notes are encoded in advance, for example, with a length of 2bytes to encode all commands and results. If entering a distribution network: 0x 4755; and (3) network distribution success: 0x 4565. ssid fixes maximum length 32bytes ascii, password maximum 32bytes ascii, and complement 0 if insufficient.
Using a frequency signal of N times f0 (for simplicity of explanation, a sine wave of 4khz, for example, is selected here) as the carrier wave, the coded command is modulated, and if the carrier wave with no 16 cycles represents 1bit, 0 represents a carrier signal amplitude (e.g., 0), and 1 represents a carrier signal amplitude (e.g., 1). Meanwhile, in order to improve the anti-interference capability, the binary system of the data to be modulated is inverted, another frequency such as (Nf0+ f0) is used for modulation, finally the amplitude of the modulated signal is attenuated to A0-3DB, the adjustment method is not limited, higher frequency division multiple access and code division multiple access technologies can be used, and the selection is preferably limited according to the processing capability of the project cpu and the project factors.
Synthesizing the tts voice signal of the command language and the coded voice signal, adding a certain amount of white noise, and synthesizing the tts voice as seed code.
After the intelligent hardware speech recognition awakens the word and enters the distribution network instruction, the decoding module starts to work, and the principle of the decoding module is as follows:
the decoding module obtains the wake-up and command speech and passes through a band-pass filter, the frequency range is determined based on the encoded frequency range, such as N4, f 01 khz, the frequency range is changed to a lower limit frequency f 1-4.1-4 khz 3600hz, and an upper line frequency f 1-5 khz + 0.1-5 khz 5500hz.
Extracting two coded signals of 4k and 5k by using a plurality of narrow-band filters, decoding the signals according to a coding rule, restoring coded information, and correcting errors based on the two paths of information.
Correspondingly, the present embodiment further provides a fast network distribution system based on voice masking, as shown in fig. 2, including:
the sending and awakening module 11 is used for sending first voice broadcast information to awaken the intelligent hardware;
the sending prompting module 12 is configured to send second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information and enters the distribution network mode;
and the sending distribution network module 13 is configured to send the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware receives the SSID password and then generates and returns voice broadcast information of successful/failed SSID connection for voice masking.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
In the embodiment, the voice information of the distribution network of the intelligent hardware is coded and masked and then transmitted, and the network name and the password of the distribution network are encrypted, so that the distribution network information is prevented from being directly heard by a third party, and the safety is high; through voice coding transmission, a fault-tolerant mechanism is provided, voice recognition is not relied on, and the accuracy is better; and the distribution network speed is faster, and the experience is better.
Example two
The embodiment provides a fast network distribution method based on voice masking, which is different from the first embodiment in that the first embodiment further includes step S21 and step S22, and the method is implemented by autonomously searching and displaying a nearby network list through an intelligent APP, so that a user can select a network name of an intelligent hardware distribution network, and the method is favorable for orderly management of the intelligent hardware distribution network by the user, and as shown in fig. 3, the method includes the steps of:
s21, searching and displaying SSID in a preset range;
s22, acquiring an SSID (service set identifier) input by a user and a password of the SSID;
s23, sending first voice broadcast information to wake up intelligent hardware;
s24, sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
and S25, sending the SSID and the SSID password to the intelligent hardware through the third voice broadcast information for voice masking, and generating and returning the voice broadcast information of successful/failed SSID connection for voice masking after the intelligent hardware receives the SSID password.
Preferably, the second voice broadcast information for voice masking includes:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
Preferably, synchronizing the encryption public key and the hash algorithm to the second voice broadcast message comprises:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the step of sending the SSID and the SSID password through the third voice broadcast message for voice masking includes:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
Correspondingly, this embodiment further provides a fast network distribution system based on voice masking, as shown in fig. 4, including:
a search display module 21, configured to search and display SSIDs within a preset range;
the obtaining module 22 is configured to obtain an SSID input by a user and a password of the SSID.
The sending and awakening module 23 is configured to send first voice broadcast information to awaken the intelligent hardware;
the sending prompting module 24 is configured to send second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information to enter the distribution network mode;
and the sending distribution network module 25 is configured to send the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware receives the SSID password and then generates and returns voice broadcast information on success/failure of SSID connection for voice masking.
The difference from the first embodiment. The embodiment further comprises a search display module 21 and an acquisition module 22.
Preferably, the sending prompting module includes:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
Preferably, the synchronous synthesizing unit includes:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
Preferably, the distribution network sending module includes:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
According to the embodiment, the user can select the network name of the intelligent hardware distribution network by independently searching and displaying the nearby network list through the intelligent APP, and the ordered management of the user on the intelligent hardware distribution network is facilitated.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (10)

1. A rapid network distribution method based on voice masking is characterized by comprising the following steps:
sending first voice broadcast information to wake up intelligent hardware;
sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and enabling the intelligent hardware to enter the distribution network mode after receiving the second voice broadcast information;
the SSID and the SSID password are sent to the intelligent hardware through third voice broadcasting information for voice masking, and the intelligent hardware generates and returns voice broadcasting information of successful/failed SSID connection for voice masking after receiving the SSID password;
the voice mask is based on controlling the frequency bands of tts (text to speech) voice and encoded signals, encoding ssid and password by the voice signal, and masking the encoded signal with noise.
2. The fast network distribution method based on voice masking as claimed in claim 1, further comprising the steps of:
searching and displaying SSID in a preset range;
and acquiring the SSID input by the user and the password of the SSID.
3. The fast network distribution method based on voice masking as claimed in claim 1, wherein the second voice broadcasting information for voice masking comprises the steps of:
generating an encryption public key and encoding a Hash algorithm;
and synchronizing the encryption public key and the Hash algorithm into second voice broadcast information, and synthesizing the second voice broadcast information masked by the codes.
4. The fast network distribution method based on voice masking as claimed in claim 3, wherein synchronizing the encryption key and hash algorithm to the second voice broadcast message comprises the steps of:
and sending the encryption public key, the hash algorithm and the second voice broadcast information to an encoder, and encoding the encryption public key, the hash algorithm and the second voice broadcast information by the encoder and masking the encryption public key and the hash algorithm in the second voice broadcast information.
5. The fast network distribution method based on voice masking as claimed in claim 3, wherein the step of passing the SSID and the SSID password through the third voice broadcast message for voice masking comprises the steps of:
and encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm, and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
6. A rapid network distribution system based on voice masking is characterized by comprising:
the sending and awakening module is used for sending first voice broadcast information to awaken the intelligent hardware;
the sending prompting module is used for sending second voice broadcast information for voice masking to prompt the intelligent hardware to enter a distribution network mode, and the intelligent hardware receives the second voice broadcast information and enters the distribution network mode;
the sending distribution network module is used for sending the SSID and the SSID password to the intelligent hardware through third voice broadcast information for voice masking, and the intelligent hardware generates and returns voice broadcast information of successful/failed SSID connection for voice masking after receiving the SSID password;
the voice mask is based on controlling the frequency bands of tts (text to speech) voice and encoded signals, encoding ssid and password by the voice signal, and masking the encoded signal with noise.
7. The system for fast distribution network based on voice masking according to claim 6, further comprising:
the searching and displaying module is used for searching and displaying the SSID within the preset range;
and the acquisition module is used for acquiring the SSID input by the user and the password of the SSID.
8. The system for fast distribution network based on voice masking according to claim 6, wherein the prompt sending module comprises:
the generating unit is used for generating an encryption public key and encoding a Hash algorithm;
and the synchronous synthesis unit is used for synchronizing the encryption public key and the Hash algorithm into the second voice broadcast information and synthesizing the second voice broadcast information masked by the codes.
9. The fast network distribution method based on voice masking as claimed in claim 8, wherein the synchronous synthesis unit comprises:
and the sending element is used for sending the encryption public key, the hash algorithm and the second voice broadcast information to the encoder, and the encoder encodes the encryption public key, the hash algorithm and the second voice broadcast information and masks the encryption public key and the hash algorithm in the second voice broadcast information.
10. The fast network distribution method based on voice masking as claimed in claim 8, wherein the sending network distribution module comprises:
and the encryption unit is used for encrypting the SSID and the SSID password by using the encryption public key and the Hash algorithm and sending the encrypted SSID and the SSID password to the intelligent hardware through the masked third voice broadcast information.
CN201810587558.2A 2018-06-08 2018-06-08 Rapid network distribution method and system based on voice masking Active CN108962239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810587558.2A CN108962239B (en) 2018-06-08 2018-06-08 Rapid network distribution method and system based on voice masking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810587558.2A CN108962239B (en) 2018-06-08 2018-06-08 Rapid network distribution method and system based on voice masking

Publications (2)

Publication Number Publication Date
CN108962239A CN108962239A (en) 2018-12-07
CN108962239B true CN108962239B (en) 2021-07-09

Family

ID=64493502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810587558.2A Active CN108962239B (en) 2018-06-08 2018-06-08 Rapid network distribution method and system based on voice masking

Country Status (1)

Country Link
CN (1) CN108962239B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112118610B (en) * 2019-06-19 2023-08-22 杭州萤石软件有限公司 Network distribution method and system for wireless intelligent equipment
CN110400578B (en) * 2019-07-19 2022-05-17 广州市百果园信息技术有限公司 Hash code generation and matching method and device, electronic equipment and storage medium
CN110769419B (en) * 2019-10-21 2020-09-15 南京创维信息技术研究院有限公司 Voice network distribution method and system for intelligent equipment
CN113950038B (en) * 2021-09-30 2024-04-16 广州奥鹏能源科技有限公司 Energy storage equipment voice distribution network method, device and system
CN114158110A (en) * 2021-11-30 2022-03-08 四川虹美智能科技有限公司 Network distribution method of intelligent device, intelligent terminal and system
CN114241800B (en) * 2022-02-28 2022-05-27 天津市北海通信技术有限公司 Intelligent stop reporting auxiliary system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098123A (en) * 2010-09-08 2013-05-08 雅马哈株式会社 Sound masking device and sound masking method
CN105304089A (en) * 2014-07-18 2016-02-03 宝马股份公司 Fictitious shield method
CN106558303A (en) * 2015-09-29 2017-04-05 苏州天声学科技有限公司 Array sound mask device and sound mask method
CN106960673A (en) * 2017-02-08 2017-07-18 中国人民解放军信息工程大学 A kind of voice covering method and equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020092047A (en) * 2001-06-01 2002-12-11 주식회사 어니언소프트웨어 User evidence method for providing one-time password and apparatus for one-time password using that method
CN100550723C (en) * 2006-06-26 2009-10-14 南京邮电大学 Camouflage communication method based on speech recognition
CN101471769B (en) * 2007-12-28 2011-12-28 北京大唐高鸿数据网络技术有限公司 Enciphering/deciphering method for VoIP medium transmission
CN101577619B (en) * 2008-05-08 2013-05-01 吴志军 Real-time speech secret communication system based on information hiding
CN101345965A (en) * 2008-08-29 2009-01-14 中国电信股份有限公司 Encryption call method based on speech code stream and mobile terminal
KR20120064209A (en) * 2010-12-09 2012-06-19 유비벨록스(주) Method and terminal device for adjusting secret number
CN106686639A (en) * 2017-01-16 2017-05-17 上海智臻智能网络科技股份有限公司 Network configuration method and device for intelligent voice interaction equipment, and related equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103098123A (en) * 2010-09-08 2013-05-08 雅马哈株式会社 Sound masking device and sound masking method
CN105304089A (en) * 2014-07-18 2016-02-03 宝马股份公司 Fictitious shield method
CN106558303A (en) * 2015-09-29 2017-04-05 苏州天声学科技有限公司 Array sound mask device and sound mask method
CN106960673A (en) * 2017-02-08 2017-07-18 中国人民解放军信息工程大学 A kind of voice covering method and equipment

Also Published As

Publication number Publication date
CN108962239A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
CN108962239B (en) Rapid network distribution method and system based on voice masking
CN108366362B (en) MESH network and MESH equipment security network distribution method thereof
CN110753330B (en) Bluetooth pairing method and Bluetooth headset
CN101299632B (en) Synchronization and segment type detection method for data transmission via an audio communication system
US20130265857A1 (en) Device Association
CN105682253A (en) Method and equipment for communication establishment, terminal and computer readable storage medium
CN103117836A (en) Device association
CN101647312A (en) Techniques to increase coverage of push-to-talk wireless networks
US9301138B2 (en) Wireless communication apparatus, recording medium, and method
CN104955044B (en) Target network access and its guidance method and its corresponding terminal
JPH10112883A (en) Radio communication exchange system, exchange, public key management device, mobile terminal and mobile terminal recognizing method
CN104066152A (en) System and method for enabling devices to have access to wireless network
CN103248434A (en) Communication method for electronic device
CN104427471A (en) Method for automatically establishing connection of mobile network and terminal
CN106650849A (en) Data transmission method, device and system
CN107396074A (en) Wireless subscriber interface for vehicle projects
CN102291235A (en) Multi-interface safe key device and method
CN105208529A (en) Position prompt method and module of mobile terminal
RU2130234C1 (en) Fully automatic radio paging system which is compatible with voice and digital signals
CN102983963A (en) Encryption conversation method and conversation encryption device
CN109830242B (en) Method and system for coding communication by using audio
CN110719573B (en) Information transmission method and device, terminal equipment and storage medium
WO2015154460A1 (en) Audio data recording method and apparatus
CN106559588B (en) Method and device for uploading text information
CN110769419B (en) Voice network distribution method and system for intelligent equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190411

Address after: 201616 No. 3666 Sixian Road, Songjiang District, Shanghai

Applicant after: Shanghai Feixun Data Communication Technology Co., Ltd.

Address before: 610100 125 Longquan Street Park Road, Longquanyi District, Chengdu, Sichuan.

Applicant before: Sichuan fixun Information Technology Co., Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201102

Address after: No. 2-3167, zone a, Nonggang City, No. 2388, Donghuan Avenue, Hongjia street, Jiaojiang District, Taizhou City, Zhejiang Province

Applicant after: Taizhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Applicant before: Phicomm (Shanghai) Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant