CN113225310A - Voice encryption method, device, system, electronic equipment and storage medium - Google Patents

Voice encryption method, device, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN113225310A
CN113225310A CN202110309979.0A CN202110309979A CN113225310A CN 113225310 A CN113225310 A CN 113225310A CN 202110309979 A CN202110309979 A CN 202110309979A CN 113225310 A CN113225310 A CN 113225310A
Authority
CN
China
Prior art keywords
voice
voice information
encryption
terminal
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110309979.0A
Other languages
Chinese (zh)
Inventor
郑文芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN202110309979.0A priority Critical patent/CN113225310A/en
Publication of CN113225310A publication Critical patent/CN113225310A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a system, an electronic device, and a computer-readable storage medium for voice encryption. The method comprises the following steps: acquiring voice information; when a preset encryption operation is triggered, encrypting the voice information and outputting an encrypted password; and sending the encrypted voice information to the second terminal. Receiving voice information sent by a first terminal; when voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information. According to the technical scheme, the sent voice information is encrypted independently, and the safety when the voice information is listened to is improved.

Description

Voice encryption method, device, system, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a voice encryption method, a voice encryption device, a voice encryption system, electronic equipment and a storage medium.
Background
Characters, voice, images and the like are basic ways for people to communicate with each other, and are effective means for acquiring public information and confidential information. Voice information has a great proportion, and in the modern digital information interconnection, the position of voice information interaction is very important. It is extremely important to ensure the security of voice information for countries, society, companies, and individuals.
Currently, people can send and receive voice information through instant messaging applications (WeChat, WhatsApp, QQ, skype and the like) installed on terminals (such as mobile terminals like mobile phones, tablet computers, palm computers, personal digital assistants, intelligent wearable devices and the like). For example, after recording the voice message, the sender directly sends the voice message to the receiver, and the receiver can directly play the voice message by clicking to play after receiving the voice message. For most people, it is a normal matter to listen to voice information in public places, however, the voice information listened to in public places is inevitably stolen by someone with worry, and important or confidential voice information is easily leaked.
Disclosure of Invention
In view of the above, it is necessary to provide a voice encryption method, apparatus, system, electronic device and computer readable storage medium for autonomously encrypting transmitted voice information and improving security when listening to the voice information.
The embodiment of the application provides a voice encryption method, which is applied to a first terminal and comprises the following steps:
acquiring voice information;
when a preset encryption operation is triggered, encrypting the voice information and outputting an encrypted password;
and sending the encrypted voice information to the second terminal.
In one embodiment, obtaining voice information comprises:
when a user is detected to press a voice recording key, acquiring external environment sound to obtain a voice signal;
triggering a preset encryption operation, comprising:
in the process of pressing the voice recording key, detecting that a pressing point of a user slides to an encryption key from the voice recording key, and finishing pressing operation at the encryption key; alternatively, the first and second electrodes may be,
and after the voice recording key is pressed, detecting that the user clicks an encryption confirmation key.
In one embodiment, encrypting the voice information and outputting an encrypted password comprises:
generating a secret key by adopting a preset encryption algorithm;
generating the encrypted password based on the key;
and displaying the encrypted password.
In one embodiment, generating the key using a predetermined encryption algorithm includes:
generating a 64-bit binary key by adopting a data encryption standard DES encryption algorithm;
generating the encrypted password based on the key, including:
randomly selecting a section of binary key from the 64-bit binary key;
and carrying out decimal or hexadecimal conversion on the section of binary key to obtain the encrypted password.
The embodiment of the application provides a voice encryption method, which is applied to a second terminal and comprises the following steps:
receiving voice information sent by a first terminal;
when voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface;
and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
In one embodiment, after decrypting and playing the voice information, the method further comprises:
and automatically encrypting the voice information based on the encryption password.
In one embodiment, after receiving the voice information sent by the first terminal, the method further comprises:
displaying a voice bar corresponding to the voice information;
if the voice information is encrypted, displaying an encryption identifier behind the voice bar.
The embodiment of the application provides a voice encryption device, which is applied to a first terminal and comprises:
the voice information acquisition module is used for acquiring voice information;
the voice information encryption module is used for encrypting the voice information and outputting an encryption password when a preset encryption operation is triggered;
and the voice information sending module is used for sending the encrypted voice information to the second terminal.
The embodiment of the application provides a voice encryption device, which is applied to a second terminal and comprises:
the voice information receiving module is used for receiving voice information sent by the first terminal;
the password input interface display module is used for displaying an encrypted password input interface if the voice information is encrypted when the voice playing operation is detected;
and the voice information decryption module is used for decrypting and playing the voice information if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal.
The embodiment of the application provides a voice encryption system, which comprises a first terminal and a second terminal, wherein the first terminal is in communication connection with the second terminal;
the first terminal is used for acquiring voice information; when a preset encryption operation is triggered, encrypting the voice information and outputting an encrypted password; sending the encrypted voice information to a second terminal;
the second terminal is used for receiving the voice information sent by the first terminal; when voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
An embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the voice encryption method provided in any embodiment of the present application when executing the computer program.
The embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of a voice encryption method provided in any embodiment of the present application.
According to the voice encryption method, the voice encryption device, the voice encryption system, the electronic equipment and the computer readable storage medium, after the voice information is obtained by the first terminal, when the preset encryption operation is triggered, the voice information is encrypted and an encryption password is output, and then the encrypted voice information is sent to the second terminal; and after the second terminal receives the voice message, if the voice message is encrypted, displaying an encryption password input interface before playing the voice message, and playing the voice message only after the verification of the encryption password is passed. Therefore, when the first terminal triggers the preset encryption operation, the voice information is encrypted and then sent, selective encryption of the voice information to be sent is achieved, and then when the second terminal carries out voice playing operation on the encrypted voice information, the encryption password input interface is displayed, so that the importance or confidentiality of the voice information received by the receiving party is prompted, the receiving party listens to the voice information in a safe environment, and the safety of listening to the voice information is improved.
Drawings
FIG. 1 is a flow diagram illustrating a method for encrypting speech according to one embodiment;
FIG. 2 is a schematic diagram of a user interface for triggering a predetermined encryption operation in one embodiment;
FIG. 3 is a schematic diagram of a user interface for generating an encryption password in one embodiment;
FIG. 4 is a flow diagram illustrating another method for encrypting speech according to one embodiment;
FIG. 5 is a diagram of an encryption password entry interface in one embodiment;
FIG. 6 is a block diagram showing the structure of a speech encryption apparatus according to an embodiment;
FIG. 7 is a block diagram of another embodiment of a voice encryption apparatus;
FIG. 8 is a diagram illustrating the internal architecture of an electronic device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The first terminal and the second terminal related to the embodiment of the application perform voice communication through the installed instant messaging application, and the instant messaging application may be but is not limited to WeChat, WhatsApp, QQ and skype, as long as the same instant messaging application is installed on the first terminal and the second terminal. It is to be understood that "first" in the first terminal and "second" in the second terminal are not limitations on the number of terminals, and in the embodiments of the present application, peer-to-peer communication, point-to-many communication, and many-to-many communication may be implemented.
In one embodiment, as shown in fig. 1, a voice encryption method is provided, and this embodiment is exemplified by applying the method to a terminal, which may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
In this embodiment, the method is applied to the first terminal, and includes the following steps:
s110: and acquiring voice information.
In an embodiment of the present application, an interface of an instant messaging application may display a voice recording key, and perform voice recording by pressing (continuously touching) the voice recording key for a long time, and release the voice recording key to complete voice recording, thereby obtaining recorded voice information; or the voice recording can be performed by clicking the voice recording key, and the voice recording is completed by clicking the voice recording key again, so that the recorded voice information is acquired. In addition, the embodiment of the application can also acquire the voice information through a voice recognition technology. For example, after the instant messaging application is opened, voice recording is performed when a voice command related to voice recording is received, and voice recording is finished when a voice command related to voice recording ending is received. The above scheme for acquiring the voice information is only an exemplary illustration, and the present application does not limit this.
S120: and when the preset encryption operation is triggered, encrypting the voice information and outputting an encryption password.
In an embodiment of the present application, recording a voice by long pressing a voice recording key, specifically, acquiring voice information includes: when detecting that the user presses the voice recording key, acquiring external environment sound to obtain a voice signal.
Correspondingly, triggering the preset encryption operation may include: during the process of pressing the voice recording key, it is detected that the pressing point of the user slides from the voice recording key to the encryption key, and the pressing operation is finished at the encryption key.
For example, referring to fig. 2, when the user presses the voice recording key (the lowermost sound wave icon area in fig. 2), the first terminal may detect the pressing operation of the voice recording key area, and collect the external environment sound through the microphone, and at the same time, the user interface may display the encryption key, for example, the encryption key is located at the "secret" word in fig. 2. In the scheme, in the voice recording process, the user keeps pressing the voice recording key, and after the user records voice, if the user wants to encrypt the voice information, the user can slide the finger from the voice recording key to the encryption key and then release the finger, namely, the finger leaves the screen of the first terminal from the encryption key. In the process, the first terminal can detect that the user pressing point slides to the encryption key from the voice recording key, and the pressing operation is finished at the encryption key, so that the preset encryption operation is judged to be triggered. In addition, with continued reference to fig. 2, during pressing the voice recording key, the user interface may further display a cancel key (located at the "X" symbol in fig. 2 for canceling the transmission of the currently recorded voice message) and a text switching key (located at the "text" word in fig. 2 for converting the currently recorded voice message into text message for transmission). Similarly, when the first terminal detects that the user presses the point and slides from the voice recording key to the cancel key, and the pressing operation is finished at the cancel key, the sending of the voice message is cancelled; when the first terminal detects that the user presses the point and slides from the voice recording key to the character switching key and the pressing operation is finished at the character switching key, the voice information is converted into character information. Optionally, if the user does not want to encrypt the voice information, the voice recording key is released after the voice is recorded, and then the voice information can be sent.
In an embodiment of the present application, triggering the preset encryption operation may also include: and after the voice recording key is pressed, detecting that the user clicks an encryption confirmation key. Unlike the above-described embodiment, in this embodiment, when the first terminal detects that the pressing operation is finished at the voice recording key (i.e., the voice recording key is released after the voice is recorded), the first terminal does not transmit the voice message, but displays a prompt message indicating whether to confirm the encrypted transmission of the voice message on the user interface. For example, when the first terminal detects that the pressing operation is finished at the voice recording key, related text prompt information such as 'whether to confirm to encrypt and send voice information' and 'No' selection keys are displayed on the user interface, when the first terminal detects that the user clicks the 'yes' key, the first terminal judges that the user clicks the encryption confirmation key to encrypt the voice information, and when the first terminal detects that the user clicks the 'No' key, the voice information is directly sent.
In the embodiment of the application, the first terminal can directly encrypt the voice information based on the user-defined encryption password through the information encryption tool, can also calculate a group of encryption passwords by adopting a preset encryption algorithm, and then encrypts the voice information based on the calculated encryption password through the information encryption tool.
In an embodiment of the present application, encrypting voice information and outputting an encryption password may include:
s121: and generating a secret key by adopting a preset encryption algorithm.
The preset encryption algorithm may be, but is not limited to, a DES encryption algorithm, an IDEA encryption algorithm, or an RSA encryption algorithm. The preset encryption algorithm is not limited as long as a secret key can be generated.
S122: an encryption password is generated based on the key.
Based on S121, in a specific embodiment, the preset encryption algorithm is a DES encryption algorithm. At this time, generating the key by using the preset encryption algorithm may include: the 64-bit binary key is generated by adopting a data encryption standard DES encryption algorithm. Accordingly, generating an encryption password based on the key may include: randomly selecting a section of binary key from 64-bit binary keys; and carrying out decimal or hexadecimal conversion on the binary key to obtain the encrypted password.
For example, the first terminal may select a key with a required number of digits from 64-bit binary keys according to the number of digits of an encryption password defined by a user or the number of digits of a default encryption password of the system, convert the key into a decimal number or a hexadecimal number, and obtain the converted decimal number or the hexadecimal number as the encryption password. For example, the number of bits of the encrypted password is 4, and a 16-bit key is selected from 64-bit binary keys, such as 0001001001001000, and is decimal-converted to 4680, which is the encrypted password 4680, or hexadecimal-converted to 1248, which is the encrypted password 1248. In addition, a key with the number less than the required number of digits can be selected from the 64-bit binary key, and finally 0 is supplemented in front of the converted decimal number or hexadecimal number so as to meet the user-defined number of digits of the encryption password or the default number of digits of the encryption password of the system. For example, the number of bits of the encrypted password is 6, and a 16-bit key is still selected from 64-bit binary keys, such as 0001001001001000, and is decimal-converted to obtain 4680, which is 004680, or hexadecimal-converted to obtain 1248, which is 001248.
S123: and displaying the encrypted password.
Referring to fig. 3, after the encryption is successful, the first terminal may display the "voice encrypted" associated text information and the encryption password on the user interface. By displaying the encryption password, the sender can obtain the encryption password more visually, and the receiver is convenient to be informed of the encryption password.
In addition, in order to ensure the safety of the voice information transmission process, a preset encryption algorithm can be adopted to realize the encryption of the voice information transmission process.
S130: and sending the encrypted voice information to the second terminal.
In an embodiment of the present application, after the encrypted password is displayed for a preset time (e.g., 5 seconds), the encrypted voice message may be directly sent to the second terminal. In another embodiment of the present application, a transmission confirmation key, a transmission cancel key, and a primitive tone transmission key are displayed together with the encrypted password. After the first terminal detects that a user clicks a sending confirmation key, sending the encrypted voice information to the second terminal; when the first terminal detects that the user clicks a sending cancel key, the sending of the voice information is cancelled; and when the first terminal detects that the user clicks the original voice sending key, sending the unencrypted voice information to the second terminal.
In the embodiment, when the preset encryption operation is triggered by the first terminal, the voice information is encrypted and then transmitted, so that the voice information to be transmitted is selectively encrypted, and then when the encrypted voice information is subjected to voice playing operation through the second terminal, the encryption password input interface is displayed, so that the importance or confidentiality of the voice information received by the receiver is prompted, the receiver can listen to the voice information in a safe environment, and the safety of listening to the voice information is improved.
In one embodiment, as shown in fig. 4, a voice encryption method is provided, and in this embodiment, the method is applied to a second terminal, and includes the following steps:
s210: and receiving voice information sent by the first terminal.
In an embodiment of the present application, after the second terminal receives the voice message sent by the first terminal, the corresponding instant messaging application on the second terminal is opened and the chat interface of the sender is entered, and the voice message is displayed on the chat interface in a form of a voice bar, that is, the voice bar corresponding to the voice message is displayed.
S220: and when the voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface.
In an implementation manner of the embodiment of the present application, referring to fig. 5, when the second terminal detects a click operation of a user on a voice bar corresponding to a to-be-played voice signal, it is determined that a voice playing operation is detected, and if the voice information is encrypted, an encrypted password input interface is displayed. For example, the encryption password input interface may display a security prompt and an encryption password input box.
Optionally, if the voice information is encrypted, the encrypted identification is displayed after the voice bar. For example, after receiving the voice message sent by the first terminal, if the voice message is encrypted, an icon of a locked lock is displayed after a voice bar corresponding to the voice message. Therefore, whether the voice information is encrypted or not can be intuitively confirmed before the user performs the voice playing operation.
S230: and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
In the above embodiment, the voice message sent by the first terminal is received by the second terminal, and if the voice message is encrypted by the first terminal, the second terminal displays the encryption password input interface when performing voice playing operation on the encrypted voice message, so as to remind the receiving party of the importance or confidentiality of the received voice message, so that the receiving party can listen to the voice message in a safe environment, and the security of listening to the voice message is improved.
On the basis of the foregoing embodiment, in an embodiment of the present application, after decrypting and playing the voice information, the method further includes: and automatically encrypting the voice information based on the encryption password.
Considering that the user generally does not actively delete the voice message after listening to the voice message, the voice message is retained, and the voice message can be played again by browsing the chat log. Therefore, in order to ensure that important or secret voice information stored in the chat records cannot be stolen by others, after the encrypted voice information is played each time, the voice information is automatically encrypted by using the encryption password (the original encryption password).
In one embodiment, as shown in fig. 6, there is provided a voice encryption apparatus, which includes a voice information acquisition module 301, a voice information encryption module 302, and a voice information transmission module 303;
the voice information acquiring module 301 is configured to acquire voice information;
the voice information encryption module 302 is used for encrypting the voice information and outputting an encryption password when a preset encryption operation is triggered;
and a voice information sending module 303, configured to send the encrypted voice information to the second terminal.
In an embodiment of the present application, the voice information obtaining module 301 is specifically configured to: when a user is detected to press a voice recording key, acquiring external environment sound to obtain a voice signal;
triggering a preset encryption operation, comprising:
in the process of pressing the voice recording key, detecting that a pressing point of a user slides to an encryption key from the voice recording key, and finishing pressing operation at the encryption key; alternatively, the first and second electrodes may be,
and after the voice recording key is pressed, detecting that the user clicks an encryption confirmation key.
In an embodiment of the present application, the voice information encryption module 302 includes:
the key generation unit is used for generating a key by adopting a preset encryption algorithm;
a password generation unit configured to generate an encrypted password based on the key;
and the password display unit is used for displaying the encrypted password.
In an embodiment of the present application, the key generation unit is specifically configured to:
generating a 64-bit binary key by adopting a data encryption standard DES encryption algorithm;
the password generation unit is specifically configured to:
randomly selecting a section of binary key from 64-bit binary keys;
and carrying out decimal or hexadecimal conversion on the binary key to obtain the encrypted password.
For the specific limitations of the voice encryption apparatus, reference may be made to the above limitations of the voice encryption method, which will not be described herein again. The various modules in the voice encryption apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent of a processor in the electronic device, or can be stored in a memory in the electronic device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, as shown in fig. 7, there is provided a voice encryption apparatus, which includes a voice information receiving module 401, a password input interface display module 402, and a voice information decryption module 403;
the voice information receiving module 401 is configured to receive voice information sent by a first terminal;
a password input interface display module 402, configured to, when a voice playing operation is detected, display an encrypted password input interface if the voice information is encrypted;
and a voice information decryption module 403, configured to decrypt and play the voice information if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal.
In an embodiment of the present application, the voice encryption apparatus further includes an automatic encryption module, configured to automatically encrypt the voice information based on an encryption password after decrypting and playing the voice information.
In an embodiment of the present application, the voice encryption apparatus further includes:
the voice bar display module is used for displaying a voice bar corresponding to the voice information after receiving the voice information sent by the first terminal;
and the encrypted identifier display module is used for displaying the encrypted identifier behind the voice bar if the voice information is encrypted.
For the specific limitations of the voice encryption apparatus, reference may be made to the above limitations of the voice encryption method, which will not be described herein again. The various modules in the voice encryption apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent of a processor in the electronic device, or can be stored in a memory in the electronic device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a voice encryption system is provided and comprises a first terminal and a second terminal, wherein the first terminal is in communication connection with the second terminal;
the first terminal is used for acquiring voice information; when the preset encryption operation is triggered, encrypting the voice information and outputting an encryption password; sending the encrypted voice information to a second terminal;
the second terminal is used for receiving the voice information sent by the first terminal; when voice playing operation is detected, if voice information is encrypted, an encrypted password input interface is displayed; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
In the above embodiment, after the first terminal acquires the voice information, when the preset encryption operation is triggered, the first terminal encrypts the voice information and outputs an encryption password, and then sends the encrypted voice information to the second terminal; and after the second terminal receives the voice message, if the voice message is encrypted, displaying an encryption password input interface before playing the voice message, and playing the voice message only after the verification of the encryption password is passed. Therefore, when the first terminal triggers the preset encryption operation, the voice information is encrypted and then sent, selective encryption of the voice information to be sent is achieved, and then when the second terminal carries out voice playing operation on the encrypted voice information, the encryption password input interface is displayed, so that the importance or confidentiality of the voice information received by the receiving party is prompted, the receiving party listens to the voice information in a safe environment, and the safety of listening to the voice information is improved.
In one embodiment, an electronic device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The electronic device comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the electronic device is configured to provide computing and control capabilities. The memory of the electronic equipment comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the electronic device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, Near Field Communication (NFC) or other technologies. The computer program is executed by a processor to implement a voice encryption method. The display screen of the electronic equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the electronic equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the electronic equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the structure shown in fig. 8 is a block diagram of only a portion of the structure relevant to the present disclosure, and does not constitute a limitation on the electronic device to which the present disclosure may be applied, and that a particular electronic device may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
In one embodiment, the voice encryption apparatus provided in the present application may be implemented in the form of a computer program, and the computer program may be run on an electronic device as shown in fig. 8. The memory of the electronic device can store various program modules constituting the voice encryption device, such as a voice information acquisition module 301, a voice information encryption module 302 and a voice information transmission module 303 shown in fig. 6; or a voice message receiving module 401, a password input interface display module 402 and a voice message decryption module 403 shown in fig. 7. The respective program modules constitute computer programs that cause the processors to execute the steps in the voice encryption method of the embodiments of the present application described in the present specification.
For example, the electronic device shown in fig. 8 may execute step S110 through the voice information acquiring module 301 in the voice encryption apparatus shown in fig. 6. The electronic device may perform step S120 through the voice information encryption module 302. The electronic device may perform step S130 through the voice information transmitting module 303. Alternatively, the electronic device shown in fig. 8 may perform step S210 through the voice information receiving module 401 in the voice encryption apparatus shown in fig. 7. The electronic device may perform step S220 through the password input interface display module 402. The electronic device may perform step S230 through the voice information decryption module 403.
In one embodiment, an electronic device is provided, comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: acquiring voice information; when the preset encryption operation is triggered, encrypting the voice information and outputting an encryption password; and sending the encrypted voice information to the second terminal. Alternatively, the processor implements the following steps when executing the computer program: receiving voice information sent by a first terminal; when voice playing operation is detected, if voice information is encrypted, an encrypted password input interface is displayed; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when a user is detected to press a voice recording key, acquiring external environment sound to obtain a voice signal; if the situation that a user presses a point to slide from the voice recording key to the encryption key and the pressing operation is finished at the encryption key is detected in the process of pressing the voice recording key, determining to trigger the preset encryption operation; or if the user is detected to click the encryption confirmation key after the voice recording key is pressed, determining to trigger the preset encryption operation.
In one embodiment, the processor, when executing the computer program, further performs the steps of: generating a 64-bit binary key by adopting a data encryption standard DES encryption algorithm; randomly selecting a section of binary key from 64-bit binary keys; and carrying out decimal or hexadecimal conversion on the binary key to obtain the encrypted password.
In one embodiment, the processor, when executing the computer program, further performs the steps of: after the voice information is decrypted and played, the voice information is automatically encrypted based on the encryption password.
In one embodiment, the processor, when executing the computer program, further performs the steps of: after receiving voice information sent by a first terminal, displaying a voice bar corresponding to the voice information; if the voice information is encrypted, the encryption identification is displayed after the voice bar.
In the above embodiment, after the first terminal acquires the voice information, when the preset encryption operation is triggered, the first terminal encrypts the voice information and outputs an encryption password, and then sends the encrypted voice information to the second terminal; and after the second terminal receives the voice message, if the voice message is encrypted, displaying an encryption password input interface before playing the voice message, and playing the voice message only after the verification of the encryption password is passed. Therefore, when the first terminal triggers the preset encryption operation, the voice information is encrypted and then sent, selective encryption of the voice information to be sent is achieved, and then when the second terminal carries out voice playing operation on the encrypted voice information, the encryption password input interface is displayed, so that the importance or confidentiality of the voice information received by the receiving party is prompted, the receiving party listens to the voice information in a safe environment, and the safety of listening to the voice information is improved.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring voice information; when the preset encryption operation is triggered, encrypting the voice information and outputting an encryption password; and sending the encrypted voice information to the second terminal. Or receiving voice information sent by the first terminal; when voice playing operation is detected, if voice information is encrypted, an encrypted password input interface is displayed; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
In one embodiment, the computer program when executed by the processor further performs the steps of: when a user is detected to press a voice recording key, acquiring external environment sound to obtain a voice signal; if the situation that a user presses a point to slide from the voice recording key to the encryption key and the pressing operation is finished at the encryption key is detected in the process of pressing the voice recording key, determining to trigger the preset encryption operation; or if the user is detected to click the encryption confirmation key after the voice recording key is pressed, determining to trigger the preset encryption operation.
In one embodiment, the computer program when executed by the processor further performs the steps of: generating a 64-bit binary key by adopting a data encryption standard DES encryption algorithm; randomly selecting a section of binary key from 64-bit binary keys; and carrying out decimal or hexadecimal conversion on the binary key to obtain the encrypted password.
In one embodiment, the computer program when executed by the processor further performs the steps of: after the voice information is decrypted and played, the voice information is automatically encrypted based on the encryption password.
In one embodiment, the computer program when executed by the processor further performs the steps of: after receiving voice information sent by a first terminal, displaying a voice bar corresponding to the voice information; if the voice information is encrypted, the encryption identification is displayed after the voice bar.
In the above embodiment, after the first terminal acquires the voice information, when the preset encryption operation is triggered, the first terminal encrypts the voice information and outputs an encryption password, and then sends the encrypted voice information to the second terminal; and after the second terminal receives the voice message, if the voice message is encrypted, displaying an encryption password input interface before playing the voice message, and playing the voice message only after the verification of the encryption password is passed. Therefore, when the first terminal triggers the preset encryption operation, the voice information is encrypted and then sent, selective encryption of the voice information to be sent is achieved, and then when the second terminal carries out voice playing operation on the encrypted voice information, the encryption password input interface is displayed, so that the importance or confidentiality of the voice information received by the receiving party is prompted, the receiving party listens to the voice information in a safe environment, and the safety of listening to the voice information is improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM is available in many forms, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), and the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A voice encryption method is applied to a first terminal, and is characterized by comprising the following steps:
acquiring voice information;
when a preset encryption operation is triggered, encrypting the voice information and outputting an encrypted password;
and sending the encrypted voice information to the second terminal.
2. The method of claim 1, wherein obtaining voice information comprises:
when a user is detected to press a voice recording key, acquiring external environment sound to obtain a voice signal;
triggering a preset encryption operation, comprising:
in the process of pressing the voice recording key, detecting that a pressing point of a user slides to an encryption key from the voice recording key, and finishing pressing operation at the encryption key; alternatively, the first and second electrodes may be,
and after the voice recording key is pressed, detecting that the user clicks an encryption confirmation key.
3. The method of claim 1, wherein encrypting the voice information and outputting an encrypted password comprises:
generating a secret key by adopting a preset encryption algorithm;
generating the encrypted password based on the key;
and displaying the encrypted password.
4. The method of claim 3, wherein generating the key using a predetermined encryption algorithm comprises:
generating a 64-bit binary key by adopting a data encryption standard DES encryption algorithm;
generating the encrypted password based on the key, including:
randomly selecting a section of binary key from the 64-bit binary key;
and carrying out decimal or hexadecimal conversion on the section of binary key to obtain the encrypted password.
5. A voice encryption method is applied to a second terminal, and is characterized by comprising the following steps:
receiving voice information sent by a first terminal;
when voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface;
and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
6. The method of claim 5, wherein after decrypting and playing the voice information, the method further comprises:
and automatically encrypting the voice information based on the encryption password.
7. The method of claim 5, wherein after receiving the voice message sent by the first terminal, the method further comprises:
displaying a voice bar corresponding to the voice information;
if the voice information is encrypted, displaying an encryption identifier behind the voice bar.
8. A voice encryption device is applied to a first terminal, and is characterized by comprising:
the voice information acquisition module is used for acquiring voice information;
the voice information encryption module is used for encrypting the voice information and outputting an encryption password when a preset encryption operation is triggered;
and the voice information sending module is used for sending the encrypted voice information to the second terminal.
9. A voice encryption device applied to a second terminal is characterized by comprising:
the voice information receiving module is used for receiving voice information sent by the first terminal;
the password input interface display module is used for displaying an encrypted password input interface if the voice information is encrypted when the voice playing operation is detected;
and the voice information decryption module is used for decrypting and playing the voice information if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal.
10. A voice encryption system is characterized by comprising a first terminal and a second terminal, wherein the first terminal is in communication connection with the second terminal;
the first terminal is used for acquiring voice information; when a preset encryption operation is triggered, encrypting the voice information and outputting an encrypted password; sending the encrypted voice information to a second terminal;
the second terminal is used for receiving the voice information sent by the first terminal; when voice playing operation is detected, if the voice information is encrypted, displaying an encrypted password input interface; and if the password input through the encrypted password input interface is consistent with the encrypted password generated by the first terminal, decrypting and playing the voice information.
11. An electronic device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 4 when executing the computer program or implements the steps of the method of any one of claims 5 to 7 when executing the computer program.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4, or which, when being executed by a processor, carries out the steps of the method of any one of claims 5 to 7.
CN202110309979.0A 2021-03-23 2021-03-23 Voice encryption method, device, system, electronic equipment and storage medium Pending CN113225310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110309979.0A CN113225310A (en) 2021-03-23 2021-03-23 Voice encryption method, device, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110309979.0A CN113225310A (en) 2021-03-23 2021-03-23 Voice encryption method, device, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113225310A true CN113225310A (en) 2021-08-06

Family

ID=77083859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110309979.0A Pending CN113225310A (en) 2021-03-23 2021-03-23 Voice encryption method, device, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113225310A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150215112A1 (en) * 2014-01-29 2015-07-30 Samsung Electronics Co., Ltd. User terminal device and secured communication method thereof
CN104837122A (en) * 2015-04-02 2015-08-12 努比亚技术有限公司 Multi-party communication method, terminal and system
CN106330438A (en) * 2016-10-25 2017-01-11 公安部第三研究所 Initiative negotiation encryption analog voice communication method
CN106412856A (en) * 2016-09-28 2017-02-15 上海斐讯数据通信技术有限公司 Encryption method and terminal after reading voice message
CN106782498A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Voice messaging player method, device and terminal
CN107194268A (en) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 A kind of information processing method, device, computer installation and readable storage medium storing program for executing
CN110380856A (en) * 2019-08-15 2019-10-25 Oppo(重庆)智能科技有限公司 Terminal device and its voice information processing method, device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150215112A1 (en) * 2014-01-29 2015-07-30 Samsung Electronics Co., Ltd. User terminal device and secured communication method thereof
CN104837122A (en) * 2015-04-02 2015-08-12 努比亚技术有限公司 Multi-party communication method, terminal and system
CN106412856A (en) * 2016-09-28 2017-02-15 上海斐讯数据通信技术有限公司 Encryption method and terminal after reading voice message
CN106330438A (en) * 2016-10-25 2017-01-11 公安部第三研究所 Initiative negotiation encryption analog voice communication method
CN106782498A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 Voice messaging player method, device and terminal
CN107194268A (en) * 2017-06-30 2017-09-22 珠海市魅族科技有限公司 A kind of information processing method, device, computer installation and readable storage medium storing program for executing
CN110380856A (en) * 2019-08-15 2019-10-25 Oppo(重庆)智能科技有限公司 Terminal device and its voice information processing method, device and storage medium

Similar Documents

Publication Publication Date Title
CN103458382B (en) Hardware encryption transmission and storage method and system for mobile phone private short message
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
JP3917330B2 (en) Common key sharing method
WO2016045469A1 (en) Information encryption method and mobile terminal
EP3299990A1 (en) Electronic device server and method for communicating with server
CN107395610B (en) Communication authentication method, first terminal and second terminal
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN103929307A (en) Password input method, intelligent secret key device and client device
CN112003696B (en) SM9 key generation method, system, electronic equipment, device and storage medium
CN103095457A (en) Login and verification method for application program
CN103548300A (en) Encryption device, encryption method and encryption program
CN102737441A (en) Self-service terminal password input device
CN108900553B (en) Communication method, device and computer readable storage medium
CN104768148A (en) Message encryption method and device
KR20180019494A (en) A primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
CN105915336A (en) Object cooperative decryption method and device thereof
CN110417740B (en) User data processing method, intelligent terminal, server and storage medium
CN106709362A (en) File encryption method and device and file decryption method and device
CN109120576B (en) Data sharing method and device, computer equipment and storage medium
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN107147636A (en) E-mail transmission method and device
CN111275855A (en) Door lock control method, device and system, electronic equipment and storage medium
CN110826097A (en) Data processing method and electronic equipment
CN113225310A (en) Voice encryption method, device, system, electronic equipment and storage medium
CN105072094A (en) Voice data encryption method and vehicle-mounted terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210806

RJ01 Rejection of invention patent application after publication