CN111601310A - Voice print identification-based call encryption method and system and mobile terminal - Google Patents

Voice print identification-based call encryption method and system and mobile terminal Download PDF

Info

Publication number
CN111601310A
CN111601310A CN202010257507.0A CN202010257507A CN111601310A CN 111601310 A CN111601310 A CN 111601310A CN 202010257507 A CN202010257507 A CN 202010257507A CN 111601310 A CN111601310 A CN 111601310A
Authority
CN
China
Prior art keywords
call
encryption
communication
voiceprint
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010257507.0A
Other languages
Chinese (zh)
Other versions
CN111601310B (en
Inventor
肖龙源
李稀敏
刘晓葳
谭玉坤
叶志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Kuaishangtong Technology Co Ltd
Original Assignee
Xiamen Kuaishangtong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Kuaishangtong Technology Co Ltd filed Critical Xiamen Kuaishangtong Technology Co Ltd
Priority to CN202010257507.0A priority Critical patent/CN111601310B/en
Publication of CN111601310A publication Critical patent/CN111601310A/en
Application granted granted Critical
Publication of CN111601310B publication Critical patent/CN111601310B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/64Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
    • H04M1/65Recording arrangements for recording a message from the calling party
    • H04M1/656Recording arrangements for recording a message from the calling party for recording conversations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72433User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for voice messaging, e.g. dictaphones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/609Secret communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention provides a method, a system and a mobile terminal for encrypting a call based on voiceprint recognition, wherein the method comprises the following steps: when the communication is established between the user equipment and any communication equipment, acquiring the conversation voice of a communication equipment object user to carry out voiceprint extraction, obtaining voiceprint characteristics, and judging whether the voiceprint characteristics meet conversation encryption conditions or not; if so, recording the call between the user equipment and the communication equipment to obtain voice recording; acquiring an encrypted identifier of the voiceprint characteristic, and switching the communication mode between the user equipment and the communication equipment according to the encrypted identifier; and when the communication is judged to be finished, acquiring the voice record, and encrypting and storing the voice record according to the encryption identifier. The invention judges whether the communication between the current user equipment and the communication equipment is encrypted or not by judging whether the voiceprint characteristics meet the communication encryption condition or not, and further can judge the communication encryption aiming at public telephones, network telephones or telephone numbers which are not stored, thereby improving the accuracy of the communication encryption.

Description

Voice print identification-based call encryption method and system and mobile terminal
Technical Field
The invention belongs to the technical field of call encryption, and particularly relates to a call encryption method and system based on voiceprint recognition and a mobile terminal.
Background
Along with the popularization of intelligent terminals, more and more users use the intelligent terminals to complete voice calls, and along with the importance of the users on call security, more and more users put forward requirements on call voice encryption (for example, government agencies, high-tech enterprises and the like), more and more intelligent terminal manufacturers also begin to add the functions to the intelligent terminals produced by the intelligent terminal manufacturers.
In the use process of the existing call encryption method, the call encryption function is realized based on the encryption number preset by the user, but when a person needing call encryption communicates with the user by using a public telephone, a network telephone or an unstored telephone number, the call encryption cannot be effectively carried out, so that the call security is reduced.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a system and a mobile terminal for encrypting a call based on voiceprint recognition, and aims to solve the problem of low call security caused by the fact that a public telephone, a network telephone or an un-stored telephone number cannot be encrypted in the process of the existing call encryption method.
The embodiment of the invention is realized in such a way that a conversation encryption method based on voiceprint recognition comprises the following steps:
when communication is established between user equipment and any communication equipment, the conversation voice of the communication equipment object user is obtained;
voice print extraction is carried out on the call voice to obtain voice print characteristics, and whether the voice print characteristics meet call encryption conditions or not is judged;
when the voiceprint characteristics are judged to meet the call encryption conditions, recording the call between the user equipment and the communication equipment to obtain voice recording;
acquiring an encryption identifier of the voiceprint characteristic, and switching a call mode between the user equipment and the communication equipment according to the encryption identifier;
and when the communication between the user equipment and the communication equipment is judged to be finished, acquiring the voice record, and encrypting and storing the voice record according to the encryption identifier.
Further, the step of determining whether the voiceprint feature satisfies a call encryption condition includes:
matching the voiceprint characteristics with a voiceprint encryption table pre-stored locally;
and when the voiceprint characteristics are successfully matched with the voiceprint encryption table, judging that the voiceprint characteristics meet the call encryption condition.
Further, the step of switching the call mode between the user equipment and the communication equipment according to the encrypted identifier includes:
acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
Further, after the step of switching the call mode of the user equipment according to the target call mode, the method further includes:
and when the switched call mode is the headset mode or the normal mode, acquiring the call volume in the first identifier, and adjusting the volume of the user equipment according to the call volume.
Further, the step of encrypting and storing the voice recording according to the encryption identifier includes:
acquiring a second identifier stored in the encryption identifier, and matching the second identifier with a local pre-stored encryption policy database to obtain a target encryption policy;
acquiring a call display name and call display time stored in the target encryption strategy, and acquiring an encryption password of the voiceprint feature in the user equipment;
and storing the voice recording according to the call display name and the call display time, and encrypting the stored voice recording according to the encryption password.
Further, after the step of determining that the voiceprint feature satisfies the call encryption condition, the method further includes:
judging whether the voiceprint characteristics meet call callback conditions or not;
and when the voiceprint characteristics meet the call callback conditions, hanging up the communication between the user equipment and the communication equipment, and sending a communication callback prompt to the user equipment.
Another object of an embodiment of the present invention is to provide a call encryption system, including:
the voice acquisition module is used for acquiring the call voice of the communication equipment object user when the communication is established between the user equipment and any communication equipment;
the encryption judgment module is used for carrying out voiceprint extraction on the call voice to obtain voiceprint characteristics and judging whether the voiceprint characteristics meet call encryption conditions;
the voice recording module is used for recording the call between the user equipment and the communication equipment to obtain voice recording when the voiceprint characteristics are judged to meet the call encryption conditions;
the conversation switching module is used for acquiring the encrypted identifier of the voiceprint characteristic and switching the conversation mode between the user equipment and the communication equipment according to the encrypted identifier;
and the record storage module is used for acquiring the voice record when judging that the communication between the user equipment and the communication equipment is finished, and encrypting and storing the voice record according to the encryption identifier.
Further, the encryption judgment module is further configured to:
matching the voiceprint characteristics with a voiceprint encryption table pre-stored locally;
and when the voiceprint characteristics are successfully matched with the voiceprint encryption table, judging that the voiceprint characteristics meet the call encryption condition.
Further, the call switching module is further configured to:
acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
Another object of an embodiment of the present invention is to provide a mobile terminal, including a storage device and a processor, where the storage device is used to store a computer program, and the processor runs the computer program to make the mobile terminal execute the above-mentioned voice print recognition-based call encryption method.
According to the embodiment of the invention, whether the communication between the current user equipment and the communication equipment is encrypted is judged by judging whether the voiceprint characteristics meet the communication encryption condition, so that the communication encryption judgment can be carried out aiming at public telephones, network telephones or telephone numbers which are not stored, the accuracy of communication encryption is improved, and the safety of voice communication is effectively improved by carrying out mode switching and encryption storage on the communication mode and the voice record between the user equipment and the communication equipment according to the encryption identification.
Drawings
Fig. 1 is a flowchart of a call encryption method based on voiceprint recognition according to a first embodiment of the present invention;
fig. 2 is a flowchart of a call encryption method based on voiceprint recognition according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a call encryption system according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal according to a fourth embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Example one
Referring to fig. 1, a flowchart of a session encryption method based on voiceprint recognition according to a first embodiment of the present invention is shown, which includes the following steps:
step S10, when the user equipment establishes communication with any communication equipment, the communication voice of the communication equipment object user is obtained;
the user equipment and the communication equipment can be any devices with communication functions, such as a mobile phone, a tablet, a computer or wearable intelligent equipment, and the communication channel established between the user equipment and the communication equipment can be a wired channel or a wireless channel, when the wired channel is adopted for communication, calling is carried out in a mobile phone number-based mode, and when the wireless channel is adopted for communication, calling is carried out in a network conversation-based mode;
specifically, in this step, the user equipment may establish communication with any communication equipment in an active calling or called manner, preferably, in this step, the call voice of the user of the communication equipment object is obtained by obtaining the voice received by the user equipment, and further, in this step, the screenshot of the call voice may be performed by adopting a manner of intercepting the audio;
step S20, voice print extraction is carried out on the call voice to obtain voice print characteristics, and whether the voice print characteristics meet the call encryption conditions or not is judged;
the voiceprint feature may be an MFCC feature or a Kaldi feature, and the condition parameter in the call encryption condition may be set as required, for example, the condition parameter may be set as: judging whether the voiceprint feature is a preset feature or not, or judging whether the voiceprint feature carries a preset feature or not;
preferably, in this step, after the step of determining that the voiceprint feature satisfies the call encryption condition, the method further includes:
judging whether the voiceprint characteristics meet call callback conditions or not;
when the voiceprint feature is judged to meet the call callback condition, hanging up the communication between the user equipment and the communication equipment, and sending a communication callback prompt to the user equipment;
when the user equipment is in a call with the designated user, in order to prevent call contents from being monitored or overheard, the current communication is ended in a hang-up mode, and the user equipment is prompted to call back the designated user by sending a communication callback prompt, so that the user of the user equipment can call back the designated user under the condition that the call environment is not overheard, and the call safety is improved;
when the voiceprint feature is judged not to meet the call encryption condition, the encryption is not carried out aiming at the communication between the current user equipment and the communication equipment;
when the voiceprint feature is judged to meet the call encryption condition, executing step S30;
step S30, recording the call between the user equipment and the communication equipment to obtain voice recording;
the design of recording the call between the user equipment and the communication equipment effectively facilitates the subsequent storage of voice recording;
step S40, obtaining the encrypted identification of the voiceprint characteristic, and switching the communication mode between the user equipment and the communication equipment according to the encrypted identification;
the communication modes adopted by different call objects can be different, so that the current communication mode adopted by the user equipment is a hands-free mode when the encryption effect needs to be achieved on the communication between the call objects, and the security of communication encryption is further improved;
specifically, a target call mode corresponding to the voiceprint feature is stored in the encrypted identifier, and in the step, when the current call mode of the user equipment is judged not to be the target call mode, the call mode between the user equipment and the communication equipment is switched, so that the phenomenon that call contents are overheard due to an error call mode is prevented;
step S50, when the communication between the user equipment and the communication equipment is judged to be finished, the voice recording is obtained, and the voice recording is encrypted and stored according to the encryption identification;
the encryption strategies adopted by different encryption identifiers can be different, so that in the step, the target encryption strategy is inquired based on the encryption identifier, and the voice record is encrypted and stored based on the inquired target encryption strategy, so that the safety of the voice record storage is effectively improved;
in the embodiment, whether the communication between the current user equipment and the communication equipment is encrypted is judged by judging whether the voiceprint characteristics meet the communication encryption condition, so that the communication encryption judgment can be carried out aiming at public telephones, network telephones or telephone numbers which are not stored, the accuracy of communication encryption is improved, and the safety of voice communication is effectively improved by designing mode switching and encryption storage of a communication mode and voice recording between the user equipment and the communication equipment according to the encryption identification.
Example two
Referring to fig. 2, a flowchart of a session encryption method based on voiceprint recognition according to a second embodiment of the present invention is shown, which includes the following steps:
step S11, when the user equipment establishes communication with any communication equipment, the communication voice of the communication equipment object user is obtained;
when the communication channel is established on the user equipment, the user equipment is judged to be in a communication state with the corresponding communication equipment, and the communication channel can be established in a wired channel or wireless channel mode;
specifically, in the step, the communication voice of the communication equipment object user is obtained by obtaining the voice data received by the user equipment;
step S21, extracting voice print of the call voice to obtain voice print characteristics, and matching the voice print characteristics with a voice print encryption table pre-stored locally;
wherein, the voiceprint encryption table stores a plurality of different voiceprint characteristics, and the quantity and information of the voiceprint characteristics can be set according to the requirements of users;
for example, when the user completes communication with any contact, the voiceprint characteristics of the contact can be manually added to the voiceprint encryption table so as to ensure the matching between the subsequently acquired voiceprint characteristics and the voiceprint encryption table;
step S31, when the voiceprint feature is successfully matched with the voiceprint encryption table, the voiceprint feature is judged to meet the call encryption condition;
when the voiceprint feature is judged to be stored in the voiceprint encryption table, the voiceprint feature and the voiceprint encryption table are judged to be successfully matched;
preferably, the voiceprint feature is compared with the similarity stored in the voiceprint encryption table, and when the similarity comparison value is greater than the similarity threshold value, the currently obtained voiceprint feature is successfully matched with the voiceprint encryption table;
step S41, recording the call between the user equipment and the communication equipment to obtain voice recording;
step S51, obtaining the encrypted identification of the voiceprint characteristic, and obtaining the first identification stored in the encrypted identification;
obtaining the encrypted identifier by obtaining a matching result between the voiceprint feature and the voiceprint encryption table, wherein the encrypted identifier and the first identifier can be stored in a text, digital or image mode;
for example, when the first identifier is stored in a text manner, the first identifier may be a text such as "headset mode" or "hands-free mode";
step S61, determining whether the target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment;
the target communication mode is one of a hands-free mode, a headset mode or a normal mode, and in the step, the target communication mode can be obtained by transcoding the first identifier;
for example, when the first identifier is stored in a text manner, the target call mode is directly obtained according to the text corresponding to the first identifier, when the first identifier is stored in a digital manner, the first identifier needs to be matched with a transcoding table pre-stored locally to query the target call mode, and the transcoding table stores a plurality of corresponding relationships between different identifiers and corresponding target call modes;
when it is determined that the target call mode is not the same as the current call mode, performing step S51;
step S71, switching the call mode of the user equipment according to the target call mode;
preferably, in this step, after the step of switching the call mode of the user equipment according to the target call mode, the method further includes:
when the switched call mode is the headset mode or the normal mode, acquiring the call volume in the first identifier, and adjusting the volume of the user equipment according to the call volume;
step S81, when the communication between the user equipment and the communication equipment is judged to be finished, the voice recording is obtained, and a second identification stored in the encrypted identification is obtained;
it can be understood that the second identifier may also be stored in a form of characters, numbers, or images, and the second identifier is used for querying an encryption policy for a currently acquired voiceprint feature;
step S91, matching the second identifier with a local pre-stored encryption policy database to obtain a target encryption policy;
because the encryption grades needed to be adopted for different contacts are different, the encryption strategy database is arranged in the step to distinguish the encryption strategies of the different contacts, so that the call encryption can be carried out in a targeted manner, and the safety of the call is improved;
preferably, the number and the content of the encryption strategies stored in the encryption strategy database can be set according to requirements, and the encryption strategy database stores the corresponding relations between different identifications and corresponding encryption strategies;
step S101, obtaining a call display name and call display time stored in the target encryption strategy, and obtaining an encryption password of the voiceprint feature in the user equipment;
the call display name is used for carrying out name identification on a contact person in the current call, and the call display time is used for carrying out time identification on the communication time length between the user equipment and the communication equipment;
preferably, an encryption password table is stored locally in advance, and the corresponding relation between different voiceprint characteristics and corresponding encryption passwords is stored in the encryption password table, so that the call records of different contacts can be encrypted and set in a targeted manner;
step S111, storing the voice recording according to the call display name and the call display time, and encrypting the stored voice recording according to the encryption password;
in the embodiment, whether the communication between the current user equipment and the communication equipment is encrypted is judged by judging whether the voiceprint characteristics meet the communication encryption condition, so that the communication encryption judgment can be carried out aiming at public telephones, network telephones or telephone numbers which are not stored, the accuracy of communication encryption is improved, and the safety of voice communication is effectively improved by designing mode switching and encryption storage of a communication mode and voice recording between the user equipment and the communication equipment according to the encryption identification.
EXAMPLE III
Referring to fig. 3, a schematic structural diagram of a call encryption system 100 according to a third embodiment of the present invention is shown, including: pronunciation acquisition module 10, encryption judgment module 11, pronunciation recording module 12, conversation switch module 13 and recording storage module 14, wherein:
the voice acquiring module 10 is configured to acquire a call voice of a communication device object user when communication is established between user equipment and any communication device.
And the encryption judgment module 11 is configured to perform voiceprint extraction on the call voice to obtain a voiceprint feature, and judge whether the voiceprint feature meets a call encryption condition.
Wherein, the call switching module 11 is further configured to: acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
Further, the encryption judgment module 11 is further configured to: matching the voiceprint characteristics with a voiceprint encryption table pre-stored locally;
and when the voiceprint characteristics are successfully matched with the voiceprint encryption table, judging that the voiceprint characteristics meet the call encryption condition.
In addition, the encryption judging module 11 is further configured to: judging whether the voiceprint characteristics meet call callback conditions or not;
and when the voiceprint characteristics meet the call callback conditions, hanging up the communication between the user equipment and the communication equipment, and sending a communication callback prompt to the user equipment.
The voice recording module 12 is configured to record a call between the user equipment and the communication equipment to obtain a voice recording when it is determined that the voiceprint feature satisfies the call encryption condition;
and the call switching module 13 is configured to acquire an encrypted identifier of the voiceprint feature, and switch a call mode between the user equipment and the communication equipment according to the encrypted identifier.
Wherein, the call switching module 13 is further configured to: acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
Preferably, the call switching module 13 is further configured to: and when the switched call mode is the headset mode or the normal mode, acquiring the call volume in the first identifier, and adjusting the volume of the user equipment according to the call volume.
And the record storage module 14 is configured to, when it is determined that the communication between the user equipment and the communication equipment is finished, obtain the voice record, and encrypt and store the voice record according to the encryption identifier.
Wherein, the recording storage module 14 is further configured to: acquiring a second identifier stored in the encryption identifier, and matching the second identifier with a local pre-stored encryption policy database to obtain a target encryption policy;
acquiring a call display name and call display time stored in the target encryption strategy, and acquiring an encryption password of the voiceprint feature in the user equipment;
and storing the voice recording according to the call display name and the call display time, and encrypting the stored voice recording according to the encryption password.
In the embodiment, whether the communication between the current user equipment and the communication equipment is encrypted is judged by judging whether the voiceprint characteristics meet the communication encryption condition, so that the communication encryption judgment can be carried out aiming at public telephones, network telephones or telephone numbers which are not stored, the accuracy of communication encryption is improved, and the safety of voice communication is effectively improved by designing mode switching and encryption storage of a communication mode and voice recording between the user equipment and the communication equipment according to the encryption identification.
Example four
Referring to fig. 4, a mobile terminal 101 according to a fourth embodiment of the present invention includes a storage device and a processor, where the storage device is used to store a computer program, and the processor runs the computer program to make the mobile terminal 101 execute the above-mentioned call encryption method based on voiceprint recognition.
The present embodiment also provides a storage medium on which a computer program used in the above-mentioned mobile terminal 101 is stored, which when executed, includes the steps of:
when communication is established between user equipment and any communication equipment, the conversation voice of the communication equipment object user is obtained;
voice print extraction is carried out on the call voice to obtain voice print characteristics, and whether the voice print characteristics meet call encryption conditions or not is judged;
when the voiceprint characteristics are judged to meet the call encryption conditions, recording the call between the user equipment and the communication equipment to obtain voice recording;
acquiring an encryption identifier of the voiceprint characteristic, and switching a call mode between the user equipment and the communication equipment according to the encryption identifier;
and when the communication between the user equipment and the communication equipment is judged to be finished, acquiring the voice record, and encrypting and storing the voice record according to the encryption identifier. The storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is used as an example, in practical applications, the above-mentioned function distribution may be performed by different functional units or modules according to needs, that is, the internal structure of the storage device is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in a form of hardware, or may be implemented in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application.
Those skilled in the art will appreciate that the component structure shown in fig. 3 does not constitute a limitation of the call encryption system of the present invention and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components, and that the call encryption method based on voiceprint recognition in fig. 1-2 may also be implemented using more or fewer components than those shown in fig. 3, or some components in combination, or a different arrangement of components. The units, modules, etc. referred to herein are a series of computer programs that can be executed by a processor (not shown) in the target session encryption system and that are functionally configured to perform certain functions, and may be stored in a storage device (not shown) of the target session encryption system.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A conversation encryption method based on voiceprint recognition is characterized by comprising the following steps:
when communication is established between user equipment and any communication equipment, the conversation voice of the communication equipment object user is obtained;
voice print extraction is carried out on the call voice to obtain voice print characteristics, and whether the voice print characteristics meet call encryption conditions or not is judged;
when the voiceprint characteristics are judged to meet the call encryption conditions, recording the call between the user equipment and the communication equipment to obtain voice recording;
acquiring an encryption identifier of the voiceprint characteristic, and switching a call mode between the user equipment and the communication equipment according to the encryption identifier;
and when the communication between the user equipment and the communication equipment is judged to be finished, acquiring the voice record, and encrypting and storing the voice record according to the encryption identifier.
2. The method for encrypting a call based on voiceprint recognition according to claim 1, wherein the step of determining whether the voiceprint feature satisfies a call encryption condition comprises:
matching the voiceprint characteristics with a voiceprint encryption table pre-stored locally;
and when the voiceprint characteristics are successfully matched with the voiceprint encryption table, judging that the voiceprint characteristics meet the call encryption condition.
3. The method for encrypting the call based on the voiceprint recognition according to claim 1, wherein the step of switching the call mode between the user equipment and the communication equipment according to the encryption identifier comprises:
acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
4. The method for encrypting a call based on voiceprint recognition according to claim 3, wherein after the step of switching the call mode of the user equipment according to the target call mode, the method further comprises:
and when the switched call mode is the headset mode or the normal mode, acquiring the call volume in the first identifier, and adjusting the volume of the user equipment according to the call volume.
5. The method for encrypting a call based on voiceprint recognition according to claim 1, wherein the step of encrypting and storing the voice recording according to the encryption identifier comprises:
acquiring a second identifier stored in the encryption identifier, and matching the second identifier with a local pre-stored encryption policy database to obtain a target encryption policy;
acquiring a call display name and call display time stored in the target encryption strategy, and acquiring an encryption password of the voiceprint feature in the user equipment;
and storing the voice recording according to the call display name and the call display time, and encrypting the stored voice recording according to the encryption password.
6. A call encryption method based on voiceprint recognition according to claim 1, wherein after the step of judging that the voiceprint feature satisfies the call encryption condition, the method further comprises:
judging whether the voiceprint characteristics meet call callback conditions or not;
and when the voiceprint characteristics meet the call callback conditions, hanging up the communication between the user equipment and the communication equipment, and sending a communication callback prompt to the user equipment.
7. A call encryption system, the system comprising:
the voice acquisition module is used for acquiring the call voice of the communication equipment object user when the communication is established between the user equipment and any communication equipment;
the encryption judgment module is used for carrying out voiceprint extraction on the call voice to obtain voiceprint characteristics and judging whether the voiceprint characteristics meet call encryption conditions;
the voice recording module is used for recording the call between the user equipment and the communication equipment to obtain voice recording when the voiceprint characteristics are judged to meet the call encryption conditions;
the conversation switching module is used for acquiring the encrypted identifier of the voiceprint characteristic and switching the conversation mode between the user equipment and the communication equipment according to the encrypted identifier;
and the record storage module is used for acquiring the voice record when judging that the communication between the user equipment and the communication equipment is finished, and encrypting and storing the voice record according to the encryption identifier.
8. The call encryption system according to claim 7, wherein the encryption judgment module is further configured to:
matching the voiceprint characteristics with a voiceprint encryption table pre-stored locally;
and when the voiceprint characteristics are successfully matched with the voiceprint encryption table, judging that the voiceprint characteristics meet the call encryption condition.
9. The call encryption system according to claim 7, wherein the call handover module is further configured to:
acquiring a first identifier stored in the encrypted identifier, and judging whether a target communication mode corresponding to the first identifier is the same as the current communication mode of the user equipment, wherein the target communication mode is one of a hands-free mode, a headset mode or a normal mode;
and when the target call mode is judged not to be the same as the current call mode, switching the call modes of the user equipment according to the target call mode.
10. A mobile terminal, characterized by comprising a storage device for storing a computer program and a processor for executing the computer program to make the mobile terminal execute the voice print recognition-based call encryption method according to any one of claims 1 to 6.
CN202010257507.0A 2020-04-03 2020-04-03 Call encryption method and system based on voiceprint recognition and mobile terminal Active CN111601310B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010257507.0A CN111601310B (en) 2020-04-03 2020-04-03 Call encryption method and system based on voiceprint recognition and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010257507.0A CN111601310B (en) 2020-04-03 2020-04-03 Call encryption method and system based on voiceprint recognition and mobile terminal

Publications (2)

Publication Number Publication Date
CN111601310A true CN111601310A (en) 2020-08-28
CN111601310B CN111601310B (en) 2023-06-23

Family

ID=72190486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010257507.0A Active CN111601310B (en) 2020-04-03 2020-04-03 Call encryption method and system based on voiceprint recognition and mobile terminal

Country Status (1)

Country Link
CN (1) CN111601310B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113571068A (en) * 2021-07-27 2021-10-29 上海明略人工智能(集团)有限公司 Method and device for voice data encryption, electronic equipment and readable storage medium
CN113948092A (en) * 2021-09-01 2022-01-18 联通(广东)产业互联网有限公司 Target person identification method, system and device based on voiceprint and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010074391A (en) * 2008-09-17 2010-04-02 Oki Electric Ind Co Ltd Sound recorder, program, and sound recording/sound reproducing system
CN103916725A (en) * 2014-03-27 2014-07-09 上海华博信息服务有限公司 Bluetooth headset
US20150066509A1 (en) * 2013-08-30 2015-03-05 Hon Hai Precision Industry Co., Ltd. Electronic device and method for encrypting and decrypting document based on voiceprint techology
WO2015117333A1 (en) * 2014-07-16 2015-08-13 中兴通讯股份有限公司 Information processing method and apparatus, encryption device and computer storage medium
CN107872555A (en) * 2017-11-09 2018-04-03 广东欧珀移动通信有限公司 Call recording method, device, terminal device and computer-readable recording medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010074391A (en) * 2008-09-17 2010-04-02 Oki Electric Ind Co Ltd Sound recorder, program, and sound recording/sound reproducing system
US20150066509A1 (en) * 2013-08-30 2015-03-05 Hon Hai Precision Industry Co., Ltd. Electronic device and method for encrypting and decrypting document based on voiceprint techology
CN103916725A (en) * 2014-03-27 2014-07-09 上海华博信息服务有限公司 Bluetooth headset
WO2015117333A1 (en) * 2014-07-16 2015-08-13 中兴通讯股份有限公司 Information processing method and apparatus, encryption device and computer storage medium
CN107872555A (en) * 2017-11-09 2018-04-03 广东欧珀移动通信有限公司 Call recording method, device, terminal device and computer-readable recording medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113571068A (en) * 2021-07-27 2021-10-29 上海明略人工智能(集团)有限公司 Method and device for voice data encryption, electronic equipment and readable storage medium
CN113948092A (en) * 2021-09-01 2022-01-18 联通(广东)产业互联网有限公司 Target person identification method, system and device based on voiceprint and storage medium

Also Published As

Publication number Publication date
CN111601310B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN103152740B (en) A kind of anti-monitor method and system for mobile terminal
EP3542522B1 (en) Incoming call management method and apparatus
CN104159229B (en) Incoming call processing method and device
CN104660809A (en) Answer management method and device for incoming call of private contact person
CN111601310B (en) Call encryption method and system based on voiceprint recognition and mobile terminal
CN102917105A (en) Call information processing method and terminal equipment
CN1838699A (en) Method for limiting handset call or answer
CN104601818A (en) Method and device for switching operating systems in communication process
US20110244842A1 (en) Communications system, device with dialing function and method thereof
CN110708430A (en) Call management method, communication terminal and storage medium
CN106850931A (en) The method and mobile intelligent terminal of Barassment preventing telephone
US9854100B2 (en) Method and device for call forwarding
CN107920154A (en) The processing method and terminal of Stranger Calls
CN111343328B (en) Voice print recognition-based call management method and system and mobile terminal
CN104751848A (en) Call voice recognition method and call voice recognition device
CN107181851A (en) Call control method and device
CN104348948B (en) Information processing method and electronic equipment
CN102238292A (en) Seat login management method
CN103108084A (en) Anti-monitor method and system used for mobile terminal
CA2614644A1 (en) Method and system for presenting customized caller options via a communication device
WO2021164314A1 (en) Notification prompting method, server, and storage medium
CN108834149B (en) Processing method, processing equipment and system
CN114979992B (en) Call state determining method and device
CN115623430B (en) Telephone number labeling method, system, electronic equipment and server
CN113596253B (en) Emergency number dialing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant