WO2012163127A1 - Procédé et système de traitement vocal - Google Patents

Procédé et système de traitement vocal Download PDF

Info

Publication number
WO2012163127A1
WO2012163127A1 PCT/CN2012/072195 CN2012072195W WO2012163127A1 WO 2012163127 A1 WO2012163127 A1 WO 2012163127A1 CN 2012072195 W CN2012072195 W CN 2012072195W WO 2012163127 A1 WO2012163127 A1 WO 2012163127A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice
text
encrypted
information
processing
Prior art date
Application number
PCT/CN2012/072195
Other languages
English (en)
Chinese (zh)
Inventor
王冲
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2012163127A1 publication Critical patent/WO2012163127A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Definitions

  • the present invention relates to voice communication security technologies, and in particular, to a voice processing method and system.
  • the above technical solution requires the user to manually trigger, the degree of intelligence is not high, and the above scheme is not high in security.
  • the present invention provides a speech processing method and system to overcome the problems of low intelligence and poor security of the existing information leakage prevention technology.
  • the present invention provides a voice processing method, the method comprising:
  • the method, wherein The step of performing encryption processing on the voice includes:
  • the speech is converted to text, and the text is encrypted.
  • the step of performing encryption processing on the text includes: saving the converted text as a text file every time the preset time length is reached, and performing encryption processing on the text file.
  • the method, wherein the sending the encrypted processed information comprises: sending the encrypted processed information by one or more short messages.
  • the method further includes: decrypting the received text file.
  • the invention also provides a speech processing system, the system comprising:
  • a receiving device configured to receive the input voice
  • Processing means configured to encrypt the voice when the volume of the voice is less than a preset threshold
  • the transmitting device is configured to transmit the encrypted information.
  • the processing device encrypts the voice in such a manner that the voice is converted into text and the text is encrypted.
  • the processing means encrypts the text in the following manner: converting the voice into text, and saving the converted text as a text file every time the preset duration is reached.
  • the system wherein: the sending device is configured to send the encrypted information in one or more short messages.
  • the system further includes: The decryption device is arranged to decrypt the received text file.
  • the above voice processing method and system can effectively prevent personal information from leaking and achieve the purpose of protecting information.
  • FIG. 1 is a structural diagram of a voice processing system according to an embodiment of the present invention
  • FIG. 2 is a flow chart of an embodiment of a secret call according to the present invention
  • FIG. 3 is a flow chart of an embodiment of a voice encrypted transmission process of the present invention.
  • the embodiment of the present invention provides a voice processing method, which is described from the perspective of a sending end.
  • the method includes: Step 1: receiving an input voice; and receiving, by the sending end, a voice input by a user;
  • Step 2 When the volume of the voice is less than a preset threshold, the voice is encrypted; the preset threshold may be dynamically set according to requirements;
  • Encrypting the voice includes: directly encrypting the voice and converting the voice into text, and encrypting the text; the encrypting the text includes: When the preset duration is long, the converted text is saved as a text file, and the text file is encrypted.
  • the method may further include: when the volume of the voice is greater than a preset threshold, transmitting the voice directly to the receiving end.
  • Step 3 Send the encrypted information. Send encrypted information in one or more SMS messages.
  • the method may further comprise: decrypting the received text file.
  • the present invention further provides a voice processing system, comprising: a receiving device, a processing device, and a transmitting device, wherein: the receiving device is configured to receive an input voice;
  • the processing device is configured to: when the volume of the voice is less than a preset threshold, encrypt the voice; and the sending device is configured to send the encrypted information.
  • the system can also include a detection device, the speech detection module of the detection device can detect the volume of the speech.
  • the processing device is configured to convert the voice into text and perform encryption processing on the text.
  • the processing device is configured to convert the voice into text, and save the converted text as a text file every time the preset duration is reached, and perform encryption processing on the text file.
  • the encrypted processed information is then sent by the transmitting device in one or more short messages.
  • the foregoing functions of the processing device may be performed by a voice conversion module, a text encryption module, and a text sending module; wherein, the voice conversion module converts the voice into text; and the text encryption module encrypts the text file; The sending module sends the encrypted text file to the receiving end, and sends the encrypted file to the receiving end.
  • the system further includes a decryption device for decrypting the received text file.
  • the decryption is performed by a text decryption module in the decryption device.
  • the processing device is further configured to send the voice when a volume of the voice is greater than a preset threshold.
  • the above system can effectively prevent the leakage of information during a voice call.
  • the implementation process can be seen in FIG. 2 and FIG. 3 , and details are not described herein again.
  • the above system can be located in a terminal, and the terminal has the following functions:
  • Voice call function It is able to make voice calls over the network, which is the premise of starting the information privacy function;
  • Voice detection function It can detect the volume of the voice input, and activate or deactivate the voice security function according to the volume;
  • voice conversion function can convert the voice information input by the user into text information
  • text encryption function can use the specified encryption method to encrypt text information
  • text sending function can send the encrypted text as a text message
  • Text decryption function The encrypted text information can be decrypted according to the previously agreed decryption method.
  • Step 201 A user initiates a voice call on the terminal, and establishes a voice call connection.
  • Step 202 After the voice call is established, the voice detection module is started.
  • Step 203 The voice detection module determines whether to enter the security mode according to the volume of the voice input by the user. If the voice volume is greater than the preset threshold, step 204 is performed. If the volume of the voice is less than the preset threshold, step 205 is performed; Set it on the terminal in advance;
  • Step 204 The voice encryption sending process is not started (or the activated voice encryption sending process is turned off), and a normal voice call is performed;
  • Step 205 Automatically start a voice encryption sending process.
  • the peer After the voice is encrypted and sent to the peer by SMS, the peer is docked. The received information is decrypted, and the peer can view the content of the message while talking according to its own needs, or view the content of the message after the call ends.
  • the security module is turned on or off, the user does not need to manually set, and also avoids information leakage to people who are closer.
  • Step 301 Start a voice conversion module, and convert a voice input by a user into text; at this time, the voice call module no longer sends a voice conversion.
  • Input information after the module is turned on ie, the user's voice input
  • Step 302 Determine whether the time of the voice conversion exceeds a preset time threshold, if the step is performed
  • the preset time threshold is set in advance in the terminal.
  • the preset time threshold can be adjusted as needed;
  • Step 303 Save the text as a separate file.
  • Step 304 Encrypt the saved independent file.
  • Step 305 Send the encrypted text to the other party of the voice call by using a short message.
  • the information is large, it can be split into multiple text messages for transmission.
  • the above process is performed until the text encryption module and the text transmission module are closed and the encrypted file is sent.
  • the method for triggering the encryption function of the invention is more intelligent (by detecting the input volume and switching the security mode at any time), and also avoids information leakage to a person who is close to the distance; on the encrypted object , encrypting the voice during the call; at the timing of the secret information, encrypting at the information input end, preventing the information from leaking during the network transmission; in the encryption method, using the text for encryption Voice encryption, optional encryption technology is more and more secure.
  • a program to instruct related hardware can be stored in a computer readable storage medium, such as read only. Memory, disk or disc, etc.
  • each module/unit in the foregoing embodiment may be implemented in the form of hardware, or may be implemented in the form of a software function module.
  • the invention is not limited to any specific form of combination of hardware and software.
  • the voice processing method and system according to the embodiments of the present invention can effectively prevent personal information from being leaked and achieve the purpose of protecting information.

Abstract

La présente invention concerne un procédé et un système de traitement vocal. Le procédé comprend les étapes suivantes : recevoir des données vocales d'entrée ; lorsque le volume des données vocales est inférieur à un seuil prédéfini, exécuter un traitement de cryptage sur les données vocales ; et envoyer des informations après le traitement de cryptage. Le procédé et le système de traitement vocal selon les modes de réalisation de la présente invention permettent d'empêcher efficacement une fuite des informations personnelles, réalisant ainsi l'objectif de protection des informations.
PCT/CN2012/072195 2011-06-02 2012-03-12 Procédé et système de traitement vocal WO2012163127A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110147236.4 2011-06-02
CN2011101472364A CN102811439A (zh) 2011-06-02 2011-06-02 语音处理方法及系统

Publications (1)

Publication Number Publication Date
WO2012163127A1 true WO2012163127A1 (fr) 2012-12-06

Family

ID=47234988

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/072195 WO2012163127A1 (fr) 2011-06-02 2012-03-12 Procédé et système de traitement vocal

Country Status (2)

Country Link
CN (1) CN102811439A (fr)
WO (1) WO2012163127A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743912B (zh) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 一种语音加密方法和语音发送终端
CN105871842B (zh) * 2016-03-31 2020-04-07 宇龙计算机通信科技(深圳)有限公司 一种语音加密及解密方法、加密及解密装置以及终端
CN114839891B (zh) * 2022-05-11 2023-03-07 海南创兴高科技有限公司 基于物联网的智能床头柜控制方法、计算机和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1636384A (zh) * 2002-02-20 2005-07-06 思科技术公司 进行带可选语音到文本转换的电话会议的方法和系统
CN1825865A (zh) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 通讯终端自动录音的方法和装置
WO2007135475A1 (fr) * 2006-05-24 2007-11-29 Al Hallami, Omran Application de transmission de signaux vocaux via un service de messages courts (sms), un service de messagerie multimédia (mms) et/ou un service général de radiocommunication par paquets (gprs)
CN102065169A (zh) * 2011-01-10 2011-05-18 长春卓尔信息安全产业股份有限公司 一种用于电话机加密的方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951601A (zh) * 2010-08-25 2011-01-19 中兴通讯股份有限公司 移动通讯网中加密语音通话的方法和系统、终端及网络侧

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1636384A (zh) * 2002-02-20 2005-07-06 思科技术公司 进行带可选语音到文本转换的电话会议的方法和系统
CN1825865A (zh) * 2006-03-10 2006-08-30 深圳市杰特电信控股有限公司 通讯终端自动录音的方法和装置
WO2007135475A1 (fr) * 2006-05-24 2007-11-29 Al Hallami, Omran Application de transmission de signaux vocaux via un service de messages courts (sms), un service de messagerie multimédia (mms) et/ou un service général de radiocommunication par paquets (gprs)
CN102065169A (zh) * 2011-01-10 2011-05-18 长春卓尔信息安全产业股份有限公司 一种用于电话机加密的方法及装置

Also Published As

Publication number Publication date
CN102811439A (zh) 2012-12-05

Similar Documents

Publication Publication Date Title
JP6938702B2 (ja) 通信保護を備えた聴覚装置および関連する方法
US10038676B2 (en) Call encryption systems and methods
TWI642288B (zh) Instant communication method and system
CN102740239B (zh) 媒体消息安全传输的方法和系统
WO2015117333A1 (fr) Procédé et appareil de traitement d'informations, dispositif de chiffrement et support d'enregistrement informatique
CN102638459A (zh) 认证信息传输系统、认证信息传输服务平台及传输方法
CN104393994B (zh) 一种音频数据安全传递方法、系统及终端
CN101909290A (zh) 一种实现语音通话加密的方法及系统及移动终端
CN102209318A (zh) 一种基于智能tf卡的手机实时加密通话方法及装置
WO2017161724A1 (fr) Procédé et dispositif de traitement vocal, et terminal
CN105553669A (zh) 一种基于标识认证的信息加密传输装置及方法及监管方法
WO2017080356A1 (fr) Procédé, dispositif et système de saisie sécurisée
WO2011020350A1 (fr) Terminal client de distribution de service, terminal sans fil et procédé de mise en œuvre de liaison
CN104065648A (zh) 一种语音通话的数据处理方法
WO2015143827A1 (fr) Méthode, appareil et système de communication pour protection de carnet d'adresses
WO2012163127A1 (fr) Procédé et système de traitement vocal
CN104284328A (zh) 一种加密手机通话内容的方法及装置
KR20160121828A (ko) 단말간 음성 및 데이터 통신시 도청을 방지하기 위한 분리형 비화장치 및 방법
CN108270917B (zh) 一种加密智能手机
WO2016146046A1 (fr) Procédé et dispositif d'accès à des données
WO2012024904A1 (fr) Procédé et système de pré-accès à une conférence téléphonique et dispositif côté réseau
US9467428B2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
WO2015124798A2 (fr) Procédé et système autorisant une opération validée par authentification pour un dispositif de traitement de données
Bagwe et al. Voice encryption and decryption in telecommunication
TW201117041A (en) Mutual authentication method of external storage devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12792075

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12792075

Country of ref document: EP

Kind code of ref document: A1