CN113630426A - Private encryption method and system based on simultaneous interpretation - Google Patents

Private encryption method and system based on simultaneous interpretation Download PDF

Info

Publication number
CN113630426A
CN113630426A CN202111185344.0A CN202111185344A CN113630426A CN 113630426 A CN113630426 A CN 113630426A CN 202111185344 A CN202111185344 A CN 202111185344A CN 113630426 A CN113630426 A CN 113630426A
Authority
CN
China
Prior art keywords
data
module
superframe
audio
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111185344.0A
Other languages
Chinese (zh)
Other versions
CN113630426B (en
Inventor
张春裕
杨光阳
明德
张常华
朱正辉
赵定金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Baolun Electronics Co ltd
Original Assignee
Guangzhou Baolun Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Baolun Electronics Co Ltd filed Critical Guangzhou Baolun Electronics Co Ltd
Priority to CN202111185344.0A priority Critical patent/CN113630426B/en
Publication of CN113630426A publication Critical patent/CN113630426A/en
Priority to PCT/CN2021/133608 priority patent/WO2023060722A1/en
Application granted granted Critical
Publication of CN113630426B publication Critical patent/CN113630426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/80Responding to QoS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a private encryption method and a private encryption system based on simultaneous interpretation, wherein the method comprises the following steps: s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module; s2: the audio data is filtered through a compression module, down-sampled according to a preset proportion and compressed into compressed data; s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module; s4: judging whether encryption processing is needed, if not, sending the encrypted data to a decryption module, if so, encrypting the encrypted data, and then sending the encrypted data to the decryption module of the receiving host; s5: judging whether the superframe data is encrypted, if so, decrypting the superframe data by using a secret key, and sending the superframe data to a decompression module, and if not, sending the superframe data to the decompression module; s6: and decompressing the superframe data through a decompression module to obtain the audio data. In the invention, the audio data which are simultaneously translated by sound are encrypted so as to improve the controllability of the communication object and the confidentiality of information.

Description

Private encryption method and system based on simultaneous interpretation
Technical Field
The invention relates to the technical field of simultaneous interpretation and confidentiality, in particular to a private encryption method and system based on simultaneous interpretation.
Background
The infrared simultaneous interpretation system is widely used in large conference systems due to the advantages of strong confidentiality, strong anti-interference performance, no need of radio frequency permission and the like. The common infrared simultaneous interpretation systems in the market mainly have two types: the first is a system developed by a manufacturer by using a self-defined protocol, but different developers adopt different compression and decompression algorithms, modulation and demodulation algorithms and coding modes, so that the receiving host and the transmitting host of the system must be matched for use. The second is that the manufacturer develops according to IEC-61603-7-2003 standard protocol, which is different from the first system in that the signal compression and decompression algorithm, the coding and decoding mode and the modulation and demodulation algorithm of the system are all fixedly carried out in the standard protocol. The system enables developers to unify standards, so that all transmitting hosts and receiving hosts supporting the protocol can be used alternately, and the compatibility of the system is improved. However, in the first system or the second system, the receiving host actively receives the signal of the transmitting host without any authorization, and as long as the transmitting host transmits the signal, the receiving end can receive the signal at will without any limitation, so that the infrared simultaneous interpretation system cannot be effectively kept secret, and the audio information has no privacy in interpretation.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide a private encryption method based on simultaneous interpretation, which can solve the problem that the existing infrared simultaneous interpretation system cannot effectively keep secret on audio information, resulting in no privacy of the audio information during interpretation.
The invention also aims to provide a private encryption system based on simultaneous interpretation, which can solve the problem that the existing infrared simultaneous interpretation system cannot effectively keep secret on audio information, so that the audio information is not private in interpretation.
In order to achieve one of the above purposes, the technical scheme adopted by the invention is as follows:
a private encryption method based on simultaneous interpretation comprises the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
s2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
s4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
s5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
s6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
Preferably, the step S2 is specifically implemented by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
s22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
s23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
Preferably, the superframe data includes a synchronization code and a plurality of RS frames, the RS frames include a plurality of audio block fields, a data field, and an RS check code field, and the audio block fields include audio compression data, a scale factor, an audio mode, and a CRC check code.
Preferably, the step S4 is specifically implemented by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
s42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
s43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
s44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
s45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
Preferably, the encryption algorithm is an SM4 encryption algorithm.
Preferably, the mark sequence is 16-ary data.
Preferably, the step S5 is specifically implemented by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption management module, and judging whether the data field is a marker sequence, if so, performing S52, otherwise, performing S54;
s52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
s53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
s54: and sending the superframe data to a decompression module.
Preferably, the step S6 is specifically implemented by the following steps:
and extracting the audio block field in the superframe data through a decompression module, and decompressing the audio block field to obtain audio data.
In order to achieve the second purpose, the technical scheme adopted by the invention is as follows:
the utility model provides a private encryption system based on with pass and decipher, includes emission host, receiver and backend server, the emission host includes collection module, compression module, coding module and cryptographic module, the receiver includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, cryptographic module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected with coding module's input through compression module, coding module's output is connected with cryptographic module's input, cryptographic module's output and decryption management module's input are connected, decryption module's input and decompression module's input all are connected with decryption management module's output.
Preferably, the decryption management module further comprises an emission radiation panel and a reception radiation panel, and the output end of the encryption module is connected with the input end of the decryption management module sequentially through the emission radiation panel and the reception radiation panel.
Compared with the prior art, the invention has the beneficial effects that: the audio data are compressed through a compression module of the transmitting host, the audio data are optimized, the compressed audio data are packaged into superframe data by taking a superframe as a unit, then the superframe data are encrypted through an encryption algorithm selectively according to actual requirements, the infrared light is sent to a conference space in a form of infrared light, after the infrared light of the conference space is acquired by the receiving host, the encrypted superframe data and the unencrypted superframe data are identified through a decryption management module, the superframe data are decrypted by a decryption module and a prestored decryption key, corresponding audio data are acquired, encrypted transmission of the audio data in simultaneous interpretation is achieved, and privacy and confidentiality effects of the audio data are improved.
Drawings
Fig. 1 is a flowchart of the private encryption method based on simultaneous interpretation according to the present invention.
Fig. 2 is a schematic structural diagram of a private encryption system based on simultaneous interpretation in the present invention.
Fig. 3 is a schematic diagram illustrating an actual application of the compression module to compress audio data in this embodiment.
Fig. 4 is a schematic structural diagram of the superframe data in this embodiment.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The invention will be further described with reference to the accompanying drawings and the detailed description below:
as shown in fig. 1-4, in the present invention, the transmitting host and the receiving host communicate by infrared light, and preferably, the present invention further comprises a transmitting radiation panel and a receiving radiation panel, data information of the transmitting host passes through the transmitting radiation panel, sending the data information to the meeting space in the form of infrared light, so that the receiving host in the meeting space receives the data information of the transmitting host through the receiving radiation panel, further, generating a key of an encryption algorithm in advance, wherein the encryption key is held by the transmitting host or the user of the transmitting host, the decryption key is held by the receiving host or the user of the receiving host, when simultaneous interpretation is carried out, the transmitting host or the user of the transmitting host encrypts the information to be transmitted through the encryption key, and the receiving host or the user of the receiving host decrypts the acquired information through the encryption key.
The first embodiment is as follows:
as shown in fig. 1-4, a private encryption method based on simultaneous interpretation includes the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
specifically, the acquisition module acquires corresponding audio data through a microphone and other sound receiving devices or other ways, and in this embodiment, the audio data acquired by the acquisition module is 8 bits.
S2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
specifically, compress audio data through the compression module, optimize audio data to obtain better tone quality, in this embodiment, S2 specifically is realized by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
specifically, after the audio data enters the compression module, the audio data is divided into 4 paths and respectively enters 4 filters (h (0, n) ~ (3, n)) with the length of 40 for filtering processing.
S22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
specifically, the audio data after filtering is down-sampled in a ratio of 4:1, 4 data are down-sampled each time for 6 times, and 24 sampled data are compressed in one group.
S23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
Specifically, 4 data of each downsampling are compressed through an APCM algorithm and spliced into 22-bit audio compression data, so that a group of filtered sampling data can be compressed into 6 22-bit audio compression data, namely sub-band 1- sub-band 6 and 4 SF (scale factor) of 4 bits, and then the compression data are sent to an encoding module.
S3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
specifically, the superframe data includes 1 synchronization code and6 RS frames, the size of the synchronization code is 3 bytes, the size of the RS frame is 28 bytes, each RS frame includes two audio block fields with the size of 10 bytes, a data field with the size of 4 bytes and an RS check code field with the size of 4 bytes, each audio block field includes frequency compression data (3 sub-band data) with 66 bits of audio, a scale factor (2 SF) with 8 bits, an audio mode with 1bit and a CRC check code with 5 bits; the data field is mainly used for transmitting user application data, each RS frame just transmits compressed data compressed by an APCM algorithm once, each superframe can transmit compressed data compressed by the APCM algorithm 6 times, and the coding module transmits the superframe data to the encryption module after the compressed data are packaged.
S4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
specifically, the encryption module is configured to interact with the outside and encrypt corresponding data, and in this embodiment, the S4 is specifically implemented by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
specifically, the encryption module obtains a user instruction to determine whether to encrypt the superframe data, and preferably, the user can select whether to encrypt the superframe data and input an encryption key (the key length is 128 bits) by pressing a key. When the encryption is not selected, the encryption module does not process the superframe data and directly sends the superframe data to the modulation module. When the data is selected to be encrypted, the encryption module encrypts the superframe data.
S42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
specifically, when the superframe data does not need to be encrypted, the superframe data is directly sent to a modulation module for modulation, the modulated data is sent to a digital-to-analog conversion module, a digital-to-analog conversion module converts a digital signal into an analog signal, and then an emission radiation panel carries out electro-optical conversion, then the infrared light is emitted to the space in the form of infrared light, the receiving host machine receives the infrared light emitted by the emitting radiation panel through the receiving radiation panel, carries out photoelectric conversion on the receiving radiation panel, sends the converted electric signal to the filtering and amplifying module to filter and amplify the signal, then the signal enters an analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signal into a digital signal, the obtained digital signal is sent to a demodulation module, the demodulation module demodulates the signal, the demodulated signal is sent to a decoding module, the decoding module decodes the signal, and the decoded data is sent to a decryption management module.
S43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
specifically, an audio block field and an RS check code field of each RS frame are extracted through an encryption module, the audio block field and the RS check code word extracted from every two continuous RS frames form a 384-bit first sequence, the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is encrypted through an encryption algorithm, preferably, the encryption algorithm is an SM4 encryption algorithm which requires that an input secret key and data to be encrypted are 128 bits.
S44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
specifically, after the second sequence of each group of 128 bits is encrypted by the encryption module, a group of encrypted 128bit data is obtained, each three groups of encrypted 128bit data are recombined into a first sequence of 384 bits, and then the first sequence of 384 bits is divided into two third sequences of 192 bits.
S45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
Specifically, each 196-bit third sequence and the previously unencrypted data field are newly combined into an RS frame, and the data field in the first RS frame in each superframe data is modified into a 16-ary flag sequence, such as a 0x00FFAAAA (16-ary) sequence, and after encryption of a superframe is completed, the encrypted superframe data is sent to the modulation module. The modulation module modulates the superframe data, and the modulated data is sent to the digital-to-analog conversion module. The digital-to-analog conversion module converts digital signals into analog signals, the obtained analog signals are sent to the radiation panel for electro-optical conversion, then the infrared light is emitted to a space in the form of infrared light, the receiving host receives the infrared light emitted by the emission radiation panel through the receiving radiation panel, the receiving radiation panel is subjected to photoelectric conversion, the converted electric signals are sent to the filtering amplification module to filter and amplify the signals, then the signals enter the analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signals into digital signals, the obtained digital signals are sent to the demodulation module, the demodulation module demodulates the signals, the demodulated signals are sent to the decoding module, the decoding module decodes the signals, and the decoded data are sent to the decryption management module.
S5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
specifically, the decryption module is configured to interact with the outside and decrypt corresponding data, specifically, the encrypted and unencrypted superframe data are collected into the decryption module, and are identified and distinguished by the decryption module, in this embodiment, the step S5 is specifically implemented by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption module management block, judging whether the data field is a mark sequence, if so, performing S52, otherwise, performing S54;
specifically, the decryption management module extracts a data field in a first RS frame in each superframe data, determines whether the data field in the first RS frame in the superframe data is a flag sequence, that is, 0x00FFAAAA, and when the data field in the first RS frame is not 0x00FFAAAA, indicates that the superframe data is not encrypted, and sends the superframe data to the decompression module for decompression. When the data field in the first RS frame is 0x00FFAAAA, which indicates that the currently received superframe data is encrypted, the decryption module decrypts the superframe data.
S52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
specifically, the audio block field and the RS check code field in the RS frame in the superframe data are extracted through a decryption module, the fields extracted from every two continuous RS frames form a 384-bit first sequence, then the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is decrypted through a decryption key.
S53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
specifically, the second sequence of 128 bits after every three groups of encryption is newly formed into the first sequence of 384 bits, and then is divided into two third sequences of 196 bits, and the third sequence of each 196bit and the corresponding data field are newly formed into an RS frame.
S54: and sending the superframe data to a decompression module.
Specifically, the decrypted superframe data and unencrypted superframe data are both sent to the decompression module for decompression.
S6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
Specifically, the audio block field in the super-frame data is extracted through the decompression module, the audio block field is decompressed to obtain audio data, and the audio data is sent to an external audio player for playing.
Example two:
as shown in fig. 1-4, a private encryption system based on simultaneous interpretation, includes emission host, receiving host and backend server, emission host includes collection module, compression module, coding module and encryption module, receiving host includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, encryption module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected with coding module's input through compression module, coding module's output is connected with encryption module's input, encryption module's output and decryption management module's input are connected, decryption module's input and decompression module's input all are connected with decryption management module's output.
Preferably, the decryption management module further comprises an emission radiation panel and a reception radiation panel, and the output end of the encryption module is connected with the input end of the decryption management module sequentially through the emission radiation panel and the reception radiation panel.
In this embodiment, the acquisition module acquires corresponding audio data through a sound receiving device such as a microphone or other approaches, and in this embodiment, the audio data acquired by the acquisition module is 8 bits. After the audio data enters the compression module, the audio data is divided into 4 paths and respectively enters 4 filters (h (0, n) ~ (3, n)) with the length of 40 for filtering processing. The audio data after filtering processing is down-sampled according to the ratio of 4:1, 4 data are down-sampled every time, the down-sampling is performed for 6 times, and 24 sampling data are used as a group for compression. 4 data of each downsampling are compressed through an APCM algorithm and spliced into 22-bit audio compression data, so that a group of filtered sampling data can be compressed into 6 22-bit audio compression data which are respectively sub-band 1- sub-band 6 and 4 SF (scale factor) of 4 bits, and then the compression data are sent to a coding module. The superframe data comprises 1 synchronous code and6 RS frames, the size of the synchronous code is 3 bytes, the size of the RS frame is 28 bytes, each RS frame comprises two audio block fields with the size of 10 bytes, a data field with the size of 4 bytes and an RS check code field with the size of 4 bytes, and each audio block field comprises frequency compression data (3 sub-band data) of 66 bits of audio, a scaling factor (2 SF) of 8 bits, an audio mode of 1bit and a CRC check code of 5 bits; the data field is mainly used for transmitting user application data, each RS frame just transmits compressed data compressed by an APCM algorithm once, each superframe can transmit compressed data compressed by the APCM algorithm 6 times, and the coding module transmits the superframe data to the encryption module after the compressed data are packaged. The encryption module obtains the user's instruction to determine whether to encrypt the superframe data, preferably, the user can select whether to encrypt the superframe data and input an encryption key (the key length is 128 bits) by pressing a key. When the encryption is not selected, the encryption module does not process the superframe data and directly sends the superframe data to the modulation module. When the data is selected to be encrypted, the encryption module encrypts the superframe data. When the superframe data does not need to be encrypted, the superframe data is directly sent to a modulation module for modulation, the modulated data is sent to a digital-to-analog conversion module, a digital-to-analog conversion module converts a digital signal into an analog signal, and then an emission radiation panel carries out electro-optical conversion, then the infrared light is emitted to the space in the form of infrared light, the receiving host machine receives the infrared light emitted by the emitting radiation panel through the receiving radiation panel, carries out photoelectric conversion on the receiving radiation panel, sends the converted electric signal to the filtering and amplifying module to filter and amplify the signal, then the signal enters an analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signal into a digital signal, the obtained digital signal is sent to a demodulation module, the demodulation module demodulates the signal, the demodulated signal is sent to a decoding module, the decoding module decodes the signal, and the decoded data is sent to a decryption management module. The method comprises the steps of extracting an audio block field and an RS check code field of each RS frame through an encryption module, forming a 384-bit first sequence by the audio block field and the RS check code word extracted from every two continuous RS frames, dividing the sequence into 3 128-bit second sequences, and encrypting each 128-bit second sequence through an encryption algorithm, wherein the encryption algorithm is preferably an SM4 encryption algorithm which requires that an input secret key and data to be encrypted are 128 bits. And after the second sequence of each group of 128 bits is encrypted by the encryption module, a group of encrypted 128bit data is obtained, each three groups of encrypted 128bit data are recombined into a first sequence of 384 bits, and then the first sequence of 384 bits is divided into two third sequences of 192 bits. Combining the third 196bit sequence and the data field which is not encrypted before into an RS frame, modifying the data field in the first RS frame in each superframe data into a 16-system mark sequence, such as a 0x00FFAAAA (16-system) sequence, and sending the encrypted superframe data to a modulation module after finishing encrypting one superframe. The modulation module modulates the superframe data, and the modulated data is sent to the digital-to-analog conversion module. The digital-to-analog conversion module converts digital signals into analog signals, the obtained analog signals are sent to the radiation panel for electro-optical conversion, then the infrared light is emitted to a space in the form of infrared light, the receiving host receives the infrared light emitted by the emission radiation panel through the receiving radiation panel, the receiving radiation panel is subjected to photoelectric conversion, the converted electric signals are sent to the filtering amplification module to filter and amplify the signals, then the signals enter the analog-to-digital conversion module, the analog-to-digital conversion module converts the analog signals into digital signals, the obtained digital signals are sent to the demodulation module, the demodulation module demodulates the signals, the demodulated signals are sent to the decoding module, the decoding module decodes the signals, and the decoded data are sent to the decryption management module. The decryption management module extracts a data field in a first RS frame in each superframe data, and when it is determined whether the data field in the first RS frame in the superframe data is a flag sequence, i.e., 0x00ffaaa, and when the data field in the first RS frame is not 0x00ffaaa, it indicates that the superframe data is not encrypted, and the superframe data is sent to the decompression module for decompression. When the data field in the first RS frame is 0x00FFAAAA, which indicates that the currently received superframe data is encrypted, the decryption module decrypts the superframe data. The audio block field and the RS check code field in the RS frame in the superframe data are extracted through a decryption module, the fields extracted from every two continuous RS frames form a 384-bit first sequence, then the sequence is divided into 3 128-bit second sequences, and each 128-bit second sequence is decrypted through a decryption key. And newly forming the second sequence of 128 bits after each three groups of encryption into a first sequence of 384 bits, then segmenting into two third sequences of 196 bits, and newly forming an RS frame by each third sequence of 196 bits and the corresponding data field. And sending the decrypted superframe data and unencrypted superframe data to a decompression module for decompression. And extracting the audio block field in the superframe data through a decompression module, decompressing the audio block field to obtain audio data, and transmitting the audio data to an external audio player for playing.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.

Claims (10)

1. A private encryption method based on simultaneous interpretation is characterized by comprising the following steps:
s1: collecting audio data through a collection module of a transmitting host, and sending the audio data to a compression module;
s2: dividing the audio data into a plurality of paths by a compression module for filtering, down-sampling the audio data after filtering according to a preset proportion, and compressing into compressed data;
s3: the compressed data is packed by the coding module by taking a superframe as a unit to form superframe data, and the superframe data is sent to the encryption module;
s4: judging whether encryption processing is needed, if not, sending the superframe data to a decryption module of the receiving host, and executing S5, if so, encrypting the superframe data through an encryption algorithm, then sending the superframe data to a decryption management module of the receiving host, and executing S5;
s5: judging whether the superframe data is encrypted or not through the decryption management module, if so, calling a prestored decryption key through the decryption module to decrypt the superframe data, then sending the decrypted superframe data to the decompression module, and executing S6, otherwise, sending the superframe data to the decompression module, and executing S6;
s6: and extracting and decompressing the superframe data through a decompression module to obtain audio data.
2. The private encryption method based on simultaneous interpretation according to claim 1, wherein the S2 is specifically implemented by the following steps:
s21: dividing audio data into 4 paths, and respectively filtering the audio data by 4 filters;
s22: down-sampling the audio data after filtering processing according to the ratio of 4: 1;
s23: and compressing the down-sampled data by an APCM algorithm to form compressed data, wherein the compressed data comprises audio compressed data and a scale factor.
3. The private encryption method based on the simultaneous interpretation according to claim 2, wherein: the superframe data comprises a synchronization code and a plurality of RS frames, the RS frames comprise a plurality of audio block fields, a data field and an RS check code field, and the audio block fields comprise audio compression data, a scale factor, an audio mode and a CRC check code.
4. The private encryption method based on the simultaneous interpretation of claim 3, wherein: the S4 is specifically realized by the following steps:
s41: acquiring an instruction sent by a user, judging whether superframe data needs to be encrypted, if not, executing S42, and if so, executing S43;
s42: transmitting the superframe data to a decryption module of the receiving host and performing S5;
s43: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with equal information content, and encrypting the second sequences through an encryption algorithm;
s44: re-synthesizing the encrypted second sequences into a first sequence, and separating the first sequence into two third sequences with equal information content;
s45: synthesizing any third sequence and data field into an RS frame, and modifying the data field in the first RS frame in the superframe data into a mark sequence; and then to the decryption management module of the receiving host, and S5 is performed.
5. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the encryption algorithm is the SM4 encryption algorithm.
6. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the mark sequence is 16-ary data.
7. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the S5 is specifically realized by the following steps:
s51: extracting a data field in a first RS frame in superframe data through a decryption management module, and judging whether the data field is a marker sequence, if so, performing S52, otherwise, performing S54;
s52: extracting audio block fields and RS check code fields in every two continuous RS frames in superframe data through a decryption module to synthesize a first sequence, dividing the first sequence into a plurality of second sequences with the same information amount, and decrypting the second sequences through a pre-stored secret key;
s53: re-synthesizing the decrypted second sequences into a first sequence, dividing the first sequence into two third sequences with equal information content, and forming an RS frame by the third sequences and corresponding data fields;
s54: and sending the superframe data to a decompression module.
8. The private encryption method based on the simultaneous interpretation of claim 4, wherein: the S6 is specifically realized by the following steps:
and extracting the audio block field in the superframe data through a decompression module, and decompressing the audio block field to obtain audio data.
9. The utility model provides a private encryption system based on with pass through translation, a serial communication port, including emission host computer, receiver host computer and backend server, the emission host computer includes collection module, compression module, coding module and cryptographic module, the receiver host computer includes decryption management module, decryption module and decompresses the module, collection module, compression module, coding module, cryptographic module, decryption management module, decryption module and decompression module all are connected with backend server, collection module's output is connected through compression module and coding module's input, coding module's output is connected with cryptographic module's input, cryptographic module's output and decryption management module's input are connected, decryption module's input and the input of decompressing the module all are connected with decryption management module's output.
10. The private encryption system based on simultaneous interpretation of claim 9, wherein: the output end of the encryption module is connected with the input end of the decryption management module sequentially through the radiation emitting panel and the radiation receiving panel.
CN202111185344.0A 2021-10-12 2021-10-12 Private encryption method and system based on simultaneous interpretation Active CN113630426B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111185344.0A CN113630426B (en) 2021-10-12 2021-10-12 Private encryption method and system based on simultaneous interpretation
PCT/CN2021/133608 WO2023060722A1 (en) 2021-10-12 2021-11-26 Simultaneous interpretation-based private encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111185344.0A CN113630426B (en) 2021-10-12 2021-10-12 Private encryption method and system based on simultaneous interpretation

Publications (2)

Publication Number Publication Date
CN113630426A true CN113630426A (en) 2021-11-09
CN113630426B CN113630426B (en) 2022-03-08

Family

ID=78391206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111185344.0A Active CN113630426B (en) 2021-10-12 2021-10-12 Private encryption method and system based on simultaneous interpretation

Country Status (2)

Country Link
CN (1) CN113630426B (en)
WO (1) WO2023060722A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023060722A1 (en) * 2021-10-12 2023-04-20 广州市保伦电子有限公司 Simultaneous interpretation-based private encryption method and system

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1284818A (en) * 2000-09-29 2001-02-21 清华大学 Full digital conditioned receiving method for video broadcost in cable TV network
CN1700328A (en) * 2004-02-24 2005-11-23 索尼株式会社 Data processing apparatus, data processing method, reproducing apparatus, and reproducing method
CN101682721A (en) * 2007-04-13 2010-03-24 Lg电子株式会社 Digital broadcasting system and a data processing method
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN102356632A (en) * 2009-03-15 2012-02-15 Lg电子株式会社 Transmitting / receiving systems and broadcasting signal processing method
CN103220266A (en) * 2013-02-01 2013-07-24 北京邮电大学 Method for encrypting data in passive optical network (PON) based on network encoding
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment
CN203675288U (en) * 2014-01-10 2014-06-25 广州市比丽普电子有限公司 Infrared-ray wireless hearing multimedia teaching system and headset
CN103905116A (en) * 2014-03-26 2014-07-02 太仓微芯电子科技有限公司 Infrared LED wireless audio sending device, receiving device and transmitting system
CN106357623A (en) * 2016-08-30 2017-01-25 韦嘉志 Audio transmission system
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
US9800083B1 (en) * 2015-09-04 2017-10-24 Elijah Alexander Supper Audio signal conveying power supply
CN107786574A (en) * 2017-11-10 2018-03-09 芯盾(北京)信息技术有限公司 The voice communication Source Encryption system of mobile terminal
CN110148415A (en) * 2019-06-13 2019-08-20 方图智能(深圳)科技集团股份有限公司 A kind of double copies number simultaneous interpretation system
CN210325194U (en) * 2019-06-13 2020-04-14 方图智能(深圳)科技集团股份有限公司 Double-backup digital simultaneous interpretation system
US20200128307A1 (en) * 2012-06-26 2020-04-23 BTS Software Solutions, LLC Realtime Multimodel Lossless Data Compression System and Method
CN112218291A (en) * 2019-07-12 2021-01-12 海能达通信股份有限公司 Voice communication method, base station, mobile terminal, and computer-readable storage medium
CN113129911A (en) * 2021-03-19 2021-07-16 江门市华恩电子研究院有限公司 Audio signal coding compression and transmission method and electronic equipment
CN113314128A (en) * 2021-05-27 2021-08-27 哈尔滨海能达科技有限公司 Delayed access method, device and system for voice service and related products

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110881142A (en) * 2019-10-15 2020-03-13 平安科技(深圳)有限公司 Audio and video data encryption and decryption method and device based on rtmp and readable storage medium
CN113630426B (en) * 2021-10-12 2022-03-08 广州市保伦电子有限公司 Private encryption method and system based on simultaneous interpretation

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1284818A (en) * 2000-09-29 2001-02-21 清华大学 Full digital conditioned receiving method for video broadcost in cable TV network
CN1700328A (en) * 2004-02-24 2005-11-23 索尼株式会社 Data processing apparatus, data processing method, reproducing apparatus, and reproducing method
CN101682721A (en) * 2007-04-13 2010-03-24 Lg电子株式会社 Digital broadcasting system and a data processing method
CN102356632A (en) * 2009-03-15 2012-02-15 Lg电子株式会社 Transmitting / receiving systems and broadcasting signal processing method
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
US20200128307A1 (en) * 2012-06-26 2020-04-23 BTS Software Solutions, LLC Realtime Multimodel Lossless Data Compression System and Method
CN103220266A (en) * 2013-02-01 2013-07-24 北京邮电大学 Method for encrypting data in passive optical network (PON) based on network encoding
CN103402198A (en) * 2013-07-28 2013-11-20 浙江宏睿通信技术有限公司 Encryption parameter transmitting method of wireless communication terminal equipment
CN203675288U (en) * 2014-01-10 2014-06-25 广州市比丽普电子有限公司 Infrared-ray wireless hearing multimedia teaching system and headset
CN103905116A (en) * 2014-03-26 2014-07-02 太仓微芯电子科技有限公司 Infrared LED wireless audio sending device, receiving device and transmitting system
US9800083B1 (en) * 2015-09-04 2017-10-24 Elijah Alexander Supper Audio signal conveying power supply
CN106357623A (en) * 2016-08-30 2017-01-25 韦嘉志 Audio transmission system
CN106790281A (en) * 2017-02-23 2017-05-31 深圳市沃阳精密科技有限公司 A kind of end-to-end voice encryption device and encryption method towards intercom system
CN107786574A (en) * 2017-11-10 2018-03-09 芯盾(北京)信息技术有限公司 The voice communication Source Encryption system of mobile terminal
CN110148415A (en) * 2019-06-13 2019-08-20 方图智能(深圳)科技集团股份有限公司 A kind of double copies number simultaneous interpretation system
CN210325194U (en) * 2019-06-13 2020-04-14 方图智能(深圳)科技集团股份有限公司 Double-backup digital simultaneous interpretation system
CN112218291A (en) * 2019-07-12 2021-01-12 海能达通信股份有限公司 Voice communication method, base station, mobile terminal, and computer-readable storage medium
CN113129911A (en) * 2021-03-19 2021-07-16 江门市华恩电子研究院有限公司 Audio signal coding compression and transmission method and electronic equipment
CN113314128A (en) * 2021-05-27 2021-08-27 哈尔滨海能达科技有限公司 Delayed access method, device and system for voice service and related products

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林海元等: "基于无损压缩算法的文件加密标记的实现", 《浙江工业大学学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023060722A1 (en) * 2021-10-12 2023-04-20 广州市保伦电子有限公司 Simultaneous interpretation-based private encryption method and system

Also Published As

Publication number Publication date
CN113630426B (en) 2022-03-08
WO2023060722A1 (en) 2023-04-20

Similar Documents

Publication Publication Date Title
US7505443B2 (en) System and method for broadcasting application-specific information in wireless local area networks
CN207234973U (en) Video conferencing system based on quantum cryptography
EP3054611B1 (en) Visible light signal sending and reception processing method, transmission end, reception end, and system
CN113630426B (en) Private encryption method and system based on simultaneous interpretation
CN105471899A (en) End-to-end voice encryption communication method and device for mobile terminals
CN101153910B (en) Method and system for safe transmission of GPS locating information and GPS receiver
CN115150134A (en) Intelligent power grid data encryption transmission method and system
EP1587276A2 (en) Universal microphone for secure radio communication
CN109346092A (en) The system and method for voice encryption communication is carried out between a kind of communication terminal
CN113645613B (en) Cellular mobile network real-time voice encryption equipment and method
CN112118610B (en) Network distribution method and system for wireless intelligent equipment
KR20150071958A (en) Method and apparatus for secure voice call
EP1926275A1 (en) Method for data communication between user end devices
US20120263302A1 (en) Voice communication apparatus and method
JPH0637749A (en) Ciphering device
JPH08293856A (en) Speech ciphering communication equipment
CN111246470B (en) Intelligent sound box system and method based on hybrid cloud encryption
JP4459035B2 (en) Transmitter and method for generating communication frame
JP2003032382A (en) Voice communication device with caption
KR100434254B1 (en) Method for processing audio data, realized by enabling a transmitting side to encipher audio signals in a method of changing areas of audio data in predetermined order, and enabling a receiving side to decipher the enciphered audio data by receiving decoding information from a smart card
CN104348622A (en) VSAT remote station baseband equipment data processing method based on encryption and decryption
JP2003143123A (en) Cable television network system
JPS58104572A (en) Facsimile device
JP2015139008A (en) Encryption device, decryption device, encryption program and decryption program
CN111508112A (en) Vehicle locking and unlocking method and system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: No. 56 Nanli East Road, Shiqi Town, Panyu District, Guangzhou City, Guangdong Province, 510000

Patentee after: Guangdong Baolun Electronics Co.,Ltd.

Address before: No.19 Chuangyuan Road, Zhongcun street, Panyu District, Guangzhou, Guangdong 510000

Patentee before: GUANGZHOU ITC ELECTRONIC TECHNOLOGY Co.,Ltd.