CN113630426A - Private encryption method and system based on simultaneous interpretation - Google Patents
Private encryption method and system based on simultaneous interpretation Download PDFInfo
- Publication number
- CN113630426A CN113630426A CN202111185344.0A CN202111185344A CN113630426A CN 113630426 A CN113630426 A CN 113630426A CN 202111185344 A CN202111185344 A CN 202111185344A CN 113630426 A CN113630426 A CN 113630426A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- superframe
- audio
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000006835 compression Effects 0.000 claims abstract description 35
- 238000007906 compression Methods 0.000 claims abstract description 35
- 230000006837 decompression Effects 0.000 claims abstract description 34
- 238000012545 processing Methods 0.000 claims abstract description 10
- 238000004891 communication Methods 0.000 claims abstract 2
- 230000005855 radiation Effects 0.000 claims description 30
- 238000001914 filtration Methods 0.000 claims description 20
- 238000005070 sampling Methods 0.000 claims description 10
- 230000002194 synthesizing effect Effects 0.000 claims description 3
- 239000003550 marker Substances 0.000 claims description 2
- 238000006243 chemical reaction Methods 0.000 description 24
- 238000010586 diagram Methods 0.000 description 3
- 230000003321 amplification Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003199 nucleic acid amplification method Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/80—Responding to QoS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a private encryption method and a private encryption system based on simultaneous interpretation, wherein the method comprises the following steps: s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module; s2: the audio data is filtered through a compression module, down-sampled according to a preset proportion and compressed into compressed data; s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module; s4: judging whether encryption processing is needed, if not, sending the encrypted data to a decryption module, if so, encrypting the encrypted data, and then sending the encrypted data to the decryption module of the receiving host; s5: judging whether the superframe data is encrypted, if so, decrypting the superframe data by using a secret key, and sending the superframe data to a decompression module, and if not, sending the superframe data to the decompression module; s6: and decompressing the superframe data through a decompression module to obtain the audio data. In the invention, the audio data which are simultaneously translated by sound are encrypted so as to improve the controllability of the communication object and the confidentiality of information.
Description
Technical Field
The invention relates to the technical field of simultaneous interpretation and confidentiality, in particular to a private encryption method and system based on simultaneous interpretation.
Background
The infrared simultaneous interpretation system is widely used in large conference systems due to the advantages of strong confidentiality, strong anti-interference performance, no need of radio frequency permission and the like. The common infrared simultaneous interpretation systems in the market mainly have two types: the first is a system developed by a manufacturer by using a self-defined protocol, but different developers adopt different compression and decompression algorithms, modulation and demodulation algorithms and coding modes, so that the receiving host and the transmitting host of the system must be matched for use. The second is that the manufacturer develops according to IEC-61603-7-2003 standard protocol, which is different from the first system in that the signal compression and decompression algorithm, the coding and decoding mode and the modulation and demodulation algorithm of the system are all fixedly carried out in the standard protocol. The system enables developers to unify standards, so that all transmitting hosts and receiving hosts supporting the protocol can be used alternately, and the compatibility of the system is improved. However, in the first system or the second system, the receiving host actively receives the signal of the transmitting host without any authorization, and as long as the transmitting host transmits the signal, the receiving end can receive the signal at will without any limitation, so that the infrared simultaneous interpretation system cannot be effectively kept secret, and the audio information has no privacy in interpretation.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide a private encryption method based on simultaneous interpretation, which can solve the problem that the existing infrared simultaneous interpretation system cannot effectively keep secret on audio information, resulting in no privacy of the audio information during interpretation.
The invention also aims to provide a private encryption system based on simultaneous interpretation, which can solve the problem that the existing infrared simultaneous interpretation system cannot effectively keep secret on audio information, so that the audio information is not private in interpretation.
In order to achieve one of the above purposes, the technical scheme adopted by the invention is as follows:
a private encryption method based on simultaneous interpretation comprises the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
s2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
s4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
s5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
s6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
Preferably, the step S2 is specifically implemented by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
s22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
s23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
Preferably, the superframe data includes a synchronization code and a plurality of RS frames, the RS frames include a plurality of audio block fields, a data field, and an RS check code field, and the audio block fields include audio compression data, a scale factor, an audio mode, and a CRC check code.
Preferably, the step S4 is specifically implemented by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
s42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
s43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
s44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
s45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
Preferably, the encryption algorithm is an SM4 encryption algorithm.
Preferably, the mark sequence is 16-ary data.
Preferably, the step S5 is specifically implemented by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption management module, and judging whether the data field is a marker sequence, if so, performing S52, otherwise, performing S54;
s52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
s53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
s54: and sending the superframe data to a decompression module.
Preferably, the step S6 is specifically implemented by the following steps:
and extracting the audio block field in the superframe data through a decompression module, and decompressing the audio block field to obtain audio data.
In order to achieve the second purpose, the technical scheme adopted by the invention is as follows:
the utility model provides a private encryption system based on with pass and decipher, includes emission host, receiver and backend server, the emission host includes collection module, compression module, coding module and cryptographic module, the receiver includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, cryptographic module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected with coding module's input through compression module, coding module's output is connected with cryptographic module's input, cryptographic module's output and decryption management module's input are connected, decryption module's input and decompression module's input all are connected with decryption management module's output.
Preferably, the decryption management module further comprises an emission radiation panel and a reception radiation panel, and the output end of the encryption module is connected with the input end of the decryption management module sequentially through the emission radiation panel and the reception radiation panel.
Compared with the prior art, the invention has the beneficial effects that: the audio data are compressed through a compression module of the transmitting host, the audio data are optimized, the compressed audio data are packaged into superframe data by taking a superframe as a unit, then the superframe data are encrypted through an encryption algorithm selectively according to actual requirements, the infrared light is sent to a conference space in a form of infrared light, after the infrared light of the conference space is acquired by the receiving host, the encrypted superframe data and the unencrypted superframe data are identified through a decryption management module, the superframe data are decrypted by a decryption module and a prestored decryption key, corresponding audio data are acquired, encrypted transmission of the audio data in simultaneous interpretation is achieved, and privacy and confidentiality effects of the audio data are improved.
Drawings
Fig. 1 is a flowchart of the private encryption method based on simultaneous interpretation according to the present invention.
Fig. 2 is a schematic structural diagram of a private encryption system based on simultaneous interpretation in the present invention.
Fig. 3 is a schematic diagram illustrating an actual application of the compression module to compress audio data in this embodiment.
Fig. 4 is a schematic structural diagram of the superframe data in this embodiment.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The invention will be further described with reference to the accompanying drawings and the detailed description below:
as shown in fig. 1-4, in the present invention, the transmitting host and the receiving host communicate by infrared light, and preferably, the present invention further comprises a transmitting radiation panel and a receiving radiation panel, data information of the transmitting host passes through the transmitting radiation panel, sending the data information to the meeting space in the form of infrared light, so that the receiving host in the meeting space receives the data information of the transmitting host through the receiving radiation panel, further, generating a key of an encryption algorithm in advance, wherein the encryption key is held by the transmitting host or the user of the transmitting host, the decryption key is held by the receiving host or the user of the receiving host, when simultaneous interpretation is carried out, the transmitting host or the user of the transmitting host encrypts the information to be transmitted through the encryption key, and the receiving host or the user of the receiving host decrypts the acquired information through the encryption key.
The first embodiment is as follows:
as shown in fig. 1-4, a private encryption method based on simultaneous interpretation includes the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
specifically, the acquisition module acquires corresponding audio data through a microphone and other sound receiving devices or other ways, and in this embodiment, the audio data acquired by the acquisition module is 8 bits.
S2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
specifically, compress audio data through the compression module, optimize audio data to obtain better tone quality, in this embodiment, S2 specifically is realized by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
specifically, after the audio data enters the compression module, the audio data is divided into 4 paths and respectively enters 4 filters (h (0, n) ~ (3, n)) with the length of 40 for filtering processing.
S22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
specifically, the audio data after filtering is down-sampled in a ratio of 4:1, 4 data are down-sampled each time for 6 times, and 24 sampled data are compressed in one group.
S23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
Specifically, 4 data of each downsampling are compressed through an APCM algorithm and spliced into 22-bit audio compression data, so that a group of filtered sampling data can be compressed into 6 22-bit audio compression data, namely sub-band 1- sub-band 6 and 4 SF (scale factor) of 4 bits, and then the compression data are sent to an encoding module.
S3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
specifically, the superframe data includes 1 synchronization code and6 RS frames, the size of the synchronization code is 3 bytes, the size of the RS frame is 28 bytes, each RS frame includes two audio block fields with the size of 10 bytes, a data field with the size of 4 bytes and an RS check code field with the size of 4 bytes, each audio block field includes frequency compression data (3 sub-band data) with 66 bits of audio, a scale factor (2 SF) with 8 bits, an audio mode with 1bit and a CRC check code with 5 bits; the data field is mainly used for transmitting user application data, each RS frame just transmits compressed data compressed by an APCM algorithm once, each superframe can transmit compressed data compressed by the APCM algorithm 6 times, and the coding module transmits the superframe data to the encryption module after the compressed data are packaged.
S4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
specifically, the encryption module is configured to interact with the outside and encrypt corresponding data, and in this embodiment, the S4 is specifically implemented by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
specifically, the encryption module obtains a user instruction to determine whether to encrypt the superframe data, and preferably, the user can select whether to encrypt the superframe data and input an encryption key (the key length is 128 bits) by pressing a key. When the encryption is not selected, the encryption module does not process the superframe data and directly sends the superframe data to the modulation module. When the data is selected to be encrypted, the encryption module encrypts the superframe data.
S42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
specifically, when the superframe data does not need to be encrypted, the superframe data is directly sent to a modulation module for modulation, the modulated data is sent to a digital-to-analog conversion module, a digital-to-analog conversion module converts a digital signal into an analog signal, and then an emission radiation panel carries out electro-optical conversion, then the infrared light is emitted to the space in the form of infrared light, the receiving host machine receives the infrared light emitted by the emitting radiation panel through the receiving radiation panel, carries out photoelectric conversion on the receiving radiation panel, sends the converted electric signal to the filtering and amplifying module to filter and amplify the signal, then the signal enters an analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signal into a digital signal, the obtained digital signal is sent to a demodulation module, the demodulation module demodulates the signal, the demodulated signal is sent to a decoding module, the decoding module decodes the signal, and the decoded data is sent to a decryption management module.
S43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
specifically, an audio block field and an RS check code field of each RS frame are extracted through an encryption module, the audio block field and the RS check code word extracted from every two continuous RS frames form a 384-bit first sequence, the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is encrypted through an encryption algorithm, preferably, the encryption algorithm is an SM4 encryption algorithm which requires that an input secret key and data to be encrypted are 128 bits.
S44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
specifically, after the second sequence of each group of 128 bits is encrypted by the encryption module, a group of encrypted 128bit data is obtained, each three groups of encrypted 128bit data are recombined into a first sequence of 384 bits, and then the first sequence of 384 bits is divided into two third sequences of 192 bits.
S45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
Specifically, each 196-bit third sequence and the previously unencrypted data field are newly combined into an RS frame, and the data field in the first RS frame in each superframe data is modified into a 16-ary flag sequence, such as a 0x00FFAAAA (16-ary) sequence, and after encryption of a superframe is completed, the encrypted superframe data is sent to the modulation module. The modulation module modulates the superframe data, and the modulated data is sent to the digital-to-analog conversion module. The digital-to-analog conversion module converts digital signals into analog signals, the obtained analog signals are sent to the radiation panel for electro-optical conversion, then the infrared light is emitted to a space in the form of infrared light, the receiving host receives the infrared light emitted by the emission radiation panel through the receiving radiation panel, the receiving radiation panel is subjected to photoelectric conversion, the converted electric signals are sent to the filtering amplification module to filter and amplify the signals, then the signals enter the analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signals into digital signals, the obtained digital signals are sent to the demodulation module, the demodulation module demodulates the signals, the demodulated signals are sent to the decoding module, the decoding module decodes the signals, and the decoded data are sent to the decryption management module.
S5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
specifically, the decryption module is configured to interact with the outside and decrypt corresponding data, specifically, the encrypted and unencrypted superframe data are collected into the decryption module, and are identified and distinguished by the decryption module, in this embodiment, the step S5 is specifically implemented by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption module management block, judging whether the data field is a mark sequence, if so, performing S52, otherwise, performing S54;
specifically, the decryption management module extracts a data field in a first RS frame in each superframe data, determines whether the data field in the first RS frame in the superframe data is a flag sequence, that is, 0x00FFAAAA, and when the data field in the first RS frame is not 0x00FFAAAA, indicates that the superframe data is not encrypted, and sends the superframe data to the decompression module for decompression. When the data field in the first RS frame is 0x00FFAAAA, which indicates that the currently received superframe data is encrypted, the decryption module decrypts the superframe data.
S52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
specifically, the audio block field and the RS check code field in the RS frame in the superframe data are extracted through a decryption module, the fields extracted from every two continuous RS frames form a 384-bit first sequence, then the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is decrypted through a decryption key.
S53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
specifically, the second sequence of 128 bits after every three groups of encryption is newly formed into the first sequence of 384 bits, and then is divided into two third sequences of 196 bits, and the third sequence of each 196bit and the corresponding data field are newly formed into an RS frame.
S54: and sending the superframe data to a decompression module.
Specifically, the decrypted superframe data and unencrypted superframe data are both sent to the decompression module for decompression.
S6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
Specifically, the audio block field in the super-frame data is extracted through the decompression module, the audio block field is decompressed to obtain audio data, and the audio data is sent to an external audio player for playing.
Example two:
as shown in fig. 1-4, a private encryption system based on simultaneous interpretation, includes emission host, receiving host and backend server, emission host includes collection module, compression module, coding module and encryption module, receiving host includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, encryption module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected with coding module's input through compression module, coding module's output is connected with encryption module's input, encryption module's output and decryption management module's input are connected, decryption module's input and decompression module's input all are connected with decryption management module's output.
Preferably, the decryption management module further comprises an emission radiation panel and a reception radiation panel, and the output end of the encryption module is connected with the input end of the decryption management module sequentially through the emission radiation panel and the reception radiation panel.
In this embodiment, the acquisition module acquires corresponding audio data through a sound receiving device such as a microphone or other approaches, and in this embodiment, the audio data acquired by the acquisition module is 8 bits. After the audio data enters the compression module, the audio data is divided into 4 paths and respectively enters 4 filters (h (0, n) ~ (3, n)) with the length of 40 for filtering processing. The audio data after filtering processing is down-sampled according to the ratio of 4:1, 4 data are down-sampled every time, the down-sampling is performed for 6 times, and 24 sampling data are used as a group for compression. 4 data of each downsampling are compressed through an APCM algorithm and spliced into 22-bit audio compression data, so that a group of filtered sampling data can be compressed into 6 22-bit audio compression data which are respectively sub-band 1- sub-band 6 and 4 SF (scale factor) of 4 bits, and then the compression data are sent to a coding module. The superframe data comprises 1 synchronous code and6 RS frames, the size of the synchronous code is 3 bytes, the size of the RS frame is 28 bytes, each RS frame comprises two audio block fields with the size of 10 bytes, a data field with the size of 4 bytes and an RS check code field with the size of 4 bytes, and each audio block field comprises frequency compression data (3 sub-band data) of 66 bits of audio, a scaling factor (2 SF) of 8 bits, an audio mode of 1bit and a CRC check code of 5 bits; the data field is mainly used for transmitting user application data, each RS frame just transmits compressed data compressed by an APCM algorithm once, each superframe can transmit compressed data compressed by the APCM algorithm 6 times, and the coding module transmits the superframe data to the encryption module after the compressed data are packaged. The encryption module obtains the user's instruction to determine whether to encrypt the superframe data, preferably, the user can select whether to encrypt the superframe data and input an encryption key (the key length is 128 bits) by pressing a key. When the encryption is not selected, the encryption module does not process the superframe data and directly sends the superframe data to the modulation module. When the data is selected to be encrypted, the encryption module encrypts the superframe data. When the superframe data does not need to be encrypted, the superframe data is directly sent to a modulation module for modulation, the modulated data is sent to a digital-to-analog conversion module, a digital-to-analog conversion module converts a digital signal into an analog signal, and then an emission radiation panel carries out electro-optical conversion, then the infrared light is emitted to the space in the form of infrared light, the receiving host machine receives the infrared light emitted by the emitting radiation panel through the receiving radiation panel, carries out photoelectric conversion on the receiving radiation panel, sends the converted electric signal to the filtering and amplifying module to filter and amplify the signal, then the signal enters an analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signal into a digital signal, the obtained digital signal is sent to a demodulation module, the demodulation module demodulates the signal, the demodulated signal is sent to a decoding module, the decoding module decodes the signal, and the decoded data is sent to a decryption management module. The method comprises the steps of extracting an audio block field and an RS check code field of each RS frame through an encryption module, forming a 384-bit first sequence by the audio block field and the RS check code word extracted from every two continuous RS frames, dividing the sequence into 3 128-bit second sequences, and encrypting each 128-bit second sequence through an encryption algorithm, wherein the encryption algorithm is preferably an SM4 encryption algorithm which requires that an input secret key and data to be encrypted are 128 bits. And after the second sequence of each group of 128 bits is encrypted by the encryption module, a group of encrypted 128bit data is obtained, each three groups of encrypted 128bit data are recombined into a first sequence of 384 bits, and then the first sequence of 384 bits is divided into two third sequences of 192 bits. Combining the third 196bit sequence and the data field which is not encrypted before into an RS frame, modifying the data field in the first RS frame in each superframe data into a 16-system mark sequence, such as a 0x00FFAAAA (16-system) sequence, and sending the encrypted superframe data to a modulation module after finishing encrypting one superframe. The modulation module modulates the superframe data, and the modulated data is sent to the digital-to-analog conversion module. The digital-to-analog conversion module converts digital signals into analog signals, the obtained analog signals are sent to the radiation panel for electro-optical conversion, then the infrared light is emitted to a space in the form of infrared light, the receiving host receives the infrared light emitted by the emission radiation panel through the receiving radiation panel, the receiving radiation panel is subjected to photoelectric conversion, the converted electric signals are sent to the filtering amplification module to filter and amplify the signals, then the signals enter the analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signals into digital signals, the obtained digital signals are sent to the demodulation module, the demodulation module demodulates the signals, the demodulated signals are sent to the decoding module, the decoding module decodes the signals, and the decoded data are sent to the decryption management module. The decryption management module extracts a data field in a first RS frame in each superframe data, and when it is determined whether the data field in the first RS frame in the superframe data is a flag sequence, i.e., 0x00ffaaa, and when the data field in the first RS frame is not 0x00ffaaa, it indicates that the superframe data is not encrypted, and the superframe data is sent to the decompression module for decompression. When the data field in the first RS frame is 0x00FFAAAA, which indicates that the currently received superframe data is encrypted, the decryption module decrypts the superframe data. The audio block field and the RS check code field in the RS frame in the superframe data are extracted through a decryption module, the fields extracted from every two continuous RS frames form a 384-bit first sequence, then the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is decrypted through a decryption key. And newly forming the second sequence of 128 bits after each three groups of encryption into a first sequence of 384 bits, then segmenting into two third sequences of 196 bits, and newly forming an RS frame by each third sequence of 196 bits and the corresponding data field. And sending the decrypted superframe data and unencrypted superframe data to a decompression module for decompression. And extracting the audio block field in the superframe data through a decompression module, decompressing the audio block field to obtain audio data, and transmitting the audio data to an external audio player for playing.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.
Claims (10)
1. A private encryption method based on simultaneous interpretation is characterized by comprising the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
s2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
s4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
s5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
s6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
2. The private encryption method based on simultaneous interpretation according to claim 1, wherein the S2 is specifically implemented by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
s22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
s23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
3. The private encryption method based on the simultaneous interpretation according to claim 2, wherein: the superframe data comprises a synchronization code and a plurality of RS frames, the RS frames comprise a plurality of audio block fields, a data field and an RS check code field, and the audio block fields comprise audio compression data, a scale factor, an audio mode and a CRC check code.
4. The private encryption method based on the simultaneous interpretation of claim 3, wherein: the S4 is specifically realized by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
s42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
s43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
s44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
s45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
5. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the encryption algorithm is the SM4 encryption algorithm.
6. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the mark sequence is 16-ary data.
7. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the S5 is specifically realized by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption management module, and judging whether the data field is a marker sequence, if so, performing S52, otherwise, performing S54;
s52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
s53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
s54: and sending the superframe data to a decompression module.
8. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the S6 is specifically realized by the following steps:
and extracting the audio block field in the superframe data through a decompression module, and decompressing the audio block field to obtain audio data.
9. The utility model provides a private encryption system based on with pass through translation, a serial communication port, including emission host computer, receiver host computer and backend server, the emission host computer includes collection module, compression module, coding module and cryptographic module, the receiver host computer includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, cryptographic module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected through compression module and coding module's input, coding module's output is connected with cryptographic module's input, cryptographic module's output and decryption management module's input are connected, decryption module's input and the input of decompressing the module all are connected with decryption management module's output.
10. The private encryption system based on simultaneous interpretation of claim 9, wherein: the output end of the encryption module is connected with the input end of the decryption management module sequentially through the radiation emitting panel and the radiation receiving panel.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111185344.0A CN113630426B (en) | 2021-10-12 | 2021-10-12 | Private encryption method and system based on simultaneous interpretation |
PCT/CN2021/133608 WO2023060722A1 (en) | 2021-10-12 | 2021-11-26 | Simultaneous interpretation-based private encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111185344.0A CN113630426B (en) | 2021-10-12 | 2021-10-12 | Private encryption method and system based on simultaneous interpretation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113630426A true CN113630426A (en) | 2021-11-09 |
CN113630426B CN113630426B (en) | 2022-03-08 |
Family
ID=78391206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111185344.0A Active CN113630426B (en) | 2021-10-12 | 2021-10-12 | Private encryption method and system based on simultaneous interpretation |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN113630426B (en) |
WO (1) | WO2023060722A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023060722A1 (en) * | 2021-10-12 | 2023-04-20 | 广州市保伦电子有限公司 | Simultaneous interpretation-based private encryption method and system |
Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1284818A (en) * | 2000-09-29 | 2001-02-21 | 清华大学 | Full digital conditioned receiving method for video broadcost in cable TV network |
CN1700328A (en) * | 2004-02-24 | 2005-11-23 | 索尼株式会社 | Data processing apparatus, data processing method, reproducing apparatus, and reproducing method |
CN101682721A (en) * | 2007-04-13 | 2010-03-24 | Lg电子株式会社 | Digital broadcasting system and a data processing method |
CN102223234A (en) * | 2011-06-17 | 2011-10-19 | 飞天诚信科技股份有限公司 | Electronic signature system and method based on audio communication |
CN102356632A (en) * | 2009-03-15 | 2012-02-15 | Lg电子株式会社 | Transmitting / receiving systems and broadcasting signal processing method |
CN103220266A (en) * | 2013-02-01 | 2013-07-24 | 北京邮电大学 | Method for encrypting data in passive optical network (PON) based on network encoding |
CN103402198A (en) * | 2013-07-28 | 2013-11-20 | 浙江宏睿通信技术有限公司 | Encryption parameter transmitting method of wireless communication terminal equipment |
CN203675288U (en) * | 2014-01-10 | 2014-06-25 | 广州市比丽普电子有限公司 | Infrared-ray wireless hearing multimedia teaching system and headset |
CN103905116A (en) * | 2014-03-26 | 2014-07-02 | 太仓微芯电子科技有限公司 | Infrared LED wireless audio sending device, receiving device and transmitting system |
CN106357623A (en) * | 2016-08-30 | 2017-01-25 | 韦嘉志 | Audio transmission system |
CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
US9800083B1 (en) * | 2015-09-04 | 2017-10-24 | Elijah Alexander Supper | Audio signal conveying power supply |
CN107786574A (en) * | 2017-11-10 | 2018-03-09 | 芯盾(北京)信息技术有限公司 | The voice communication Source Encryption system of mobile terminal |
CN110148415A (en) * | 2019-06-13 | 2019-08-20 | 方图智能(深圳)科技集团股份有限公司 | A kind of double copies number simultaneous interpretation system |
CN210325194U (en) * | 2019-06-13 | 2020-04-14 | 方图智能(深圳)科技集团股份有限公司 | Double-backup digital simultaneous interpretation system |
US20200128307A1 (en) * | 2012-06-26 | 2020-04-23 | BTS Software Solutions, LLC | Realtime Multimodel Lossless Data Compression System and Method |
CN112218291A (en) * | 2019-07-12 | 2021-01-12 | 海能达通信股份有限公司 | Voice communication method, base station, mobile terminal, and computer-readable storage medium |
CN113129911A (en) * | 2021-03-19 | 2021-07-16 | 江门市华恩电子研究院有限公司 | Audio signal coding compression and transmission method and electronic equipment |
CN113314128A (en) * | 2021-05-27 | 2021-08-27 | 哈尔滨海能达科技有限公司 | Delayed access method, device and system for voice service and related products |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110881142A (en) * | 2019-10-15 | 2020-03-13 | 平安科技(深圳)有限公司 | Audio and video data encryption and decryption method and device based on rtmp and readable storage medium |
CN113630426B (en) * | 2021-10-12 | 2022-03-08 | 广州市保伦电子有限公司 | Private encryption method and system based on simultaneous interpretation |
-
2021
- 2021-10-12 CN CN202111185344.0A patent/CN113630426B/en active Active
- 2021-11-26 WO PCT/CN2021/133608 patent/WO2023060722A1/en active Application Filing
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1284818A (en) * | 2000-09-29 | 2001-02-21 | 清华大学 | Full digital conditioned receiving method for video broadcost in cable TV network |
CN1700328A (en) * | 2004-02-24 | 2005-11-23 | 索尼株式会社 | Data processing apparatus, data processing method, reproducing apparatus, and reproducing method |
CN101682721A (en) * | 2007-04-13 | 2010-03-24 | Lg电子株式会社 | Digital broadcasting system and a data processing method |
CN102356632A (en) * | 2009-03-15 | 2012-02-15 | Lg电子株式会社 | Transmitting / receiving systems and broadcasting signal processing method |
CN102223234A (en) * | 2011-06-17 | 2011-10-19 | 飞天诚信科技股份有限公司 | Electronic signature system and method based on audio communication |
US20200128307A1 (en) * | 2012-06-26 | 2020-04-23 | BTS Software Solutions, LLC | Realtime Multimodel Lossless Data Compression System and Method |
CN103220266A (en) * | 2013-02-01 | 2013-07-24 | 北京邮电大学 | Method for encrypting data in passive optical network (PON) based on network encoding |
CN103402198A (en) * | 2013-07-28 | 2013-11-20 | 浙江宏睿通信技术有限公司 | Encryption parameter transmitting method of wireless communication terminal equipment |
CN203675288U (en) * | 2014-01-10 | 2014-06-25 | 广州市比丽普电子有限公司 | Infrared-ray wireless hearing multimedia teaching system and headset |
CN103905116A (en) * | 2014-03-26 | 2014-07-02 | 太仓微芯电子科技有限公司 | Infrared LED wireless audio sending device, receiving device and transmitting system |
US9800083B1 (en) * | 2015-09-04 | 2017-10-24 | Elijah Alexander Supper | Audio signal conveying power supply |
CN106357623A (en) * | 2016-08-30 | 2017-01-25 | 韦嘉志 | Audio transmission system |
CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
CN107786574A (en) * | 2017-11-10 | 2018-03-09 | 芯盾(北京)信息技术有限公司 | The voice communication Source Encryption system of mobile terminal |
CN110148415A (en) * | 2019-06-13 | 2019-08-20 | 方图智能(深圳)科技集团股份有限公司 | A kind of double copies number simultaneous interpretation system |
CN210325194U (en) * | 2019-06-13 | 2020-04-14 | 方图智能(深圳)科技集团股份有限公司 | Double-backup digital simultaneous interpretation system |
CN112218291A (en) * | 2019-07-12 | 2021-01-12 | 海能达通信股份有限公司 | Voice communication method, base station, mobile terminal, and computer-readable storage medium |
CN113129911A (en) * | 2021-03-19 | 2021-07-16 | 江门市华恩电子研究院有限公司 | Audio signal coding compression and transmission method and electronic equipment |
CN113314128A (en) * | 2021-05-27 | 2021-08-27 | 哈尔滨海能达科技有限公司 | Delayed access method, device and system for voice service and related products |
Non-Patent Citations (1)
Title |
---|
林海元等: "基于无损压缩算法的文件加密标记的实现", 《浙江工业大学学报》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023060722A1 (en) * | 2021-10-12 | 2023-04-20 | 广州市保伦电子有限公司 | Simultaneous interpretation-based private encryption method and system |
Also Published As
Publication number | Publication date |
---|---|
CN113630426B (en) | 2022-03-08 |
WO2023060722A1 (en) | 2023-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7505443B2 (en) | System and method for broadcasting application-specific information in wireless local area networks | |
CN207234973U (en) | Video conferencing system based on quantum cryptography | |
EP3054611B1 (en) | Visible light signal sending and reception processing method, transmission end, reception end, and system | |
CN113630426B (en) | Private encryption method and system based on simultaneous interpretation | |
CN105471899A (en) | End-to-end voice encryption communication method and device for mobile terminals | |
CN101153910B (en) | Method and system for safe transmission of GPS locating information and GPS receiver | |
CN115150134A (en) | Intelligent power grid data encryption transmission method and system | |
EP1587276A2 (en) | Universal microphone for secure radio communication | |
CN109346092A (en) | The system and method for voice encryption communication is carried out between a kind of communication terminal | |
CN113645613B (en) | Cellular mobile network real-time voice encryption equipment and method | |
CN112118610B (en) | Network distribution method and system for wireless intelligent equipment | |
KR20150071958A (en) | Method and apparatus for secure voice call | |
EP1926275A1 (en) | Method for data communication between user end devices | |
US20120263302A1 (en) | Voice communication apparatus and method | |
JPH0637749A (en) | Ciphering device | |
JPH08293856A (en) | Speech ciphering communication equipment | |
CN111246470B (en) | Intelligent sound box system and method based on hybrid cloud encryption | |
JP4459035B2 (en) | Transmitter and method for generating communication frame | |
JP2003032382A (en) | Voice communication device with caption | |
KR100434254B1 (en) | Method for processing audio data, realized by enabling a transmitting side to encipher audio signals in a method of changing areas of audio data in predetermined order, and enabling a receiving side to decipher the enciphered audio data by receiving decoding information from a smart card | |
CN104348622A (en) | VSAT remote station baseband equipment data processing method based on encryption and decryption | |
JP2003143123A (en) | Cable television network system | |
JPS58104572A (en) | Facsimile device | |
JP2015139008A (en) | Encryption device, decryption device, encryption program and decryption program | |
CN111508112A (en) | Vehicle locking and unlocking method and system, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: No. 56 Nanli East Road, Shiqi Town, Panyu District, Guangzhou City, Guangdong Province, 510000 Patentee after: Guangdong Baolun Electronics Co.,Ltd. Address before: No.19 Chuangyuan Road, Zhongcun street, Panyu District, Guangzhou, Guangdong 510000 Patentee before: GUANGZHOU ITC ELECTRONIC TECHNOLOGY Co.,Ltd. |