WO2015117333A1 - Information processing method and apparatus, encryption device and computer storage medium - Google Patents

Information processing method and apparatus, encryption device and computer storage medium Download PDF

Info

Publication number
WO2015117333A1
WO2015117333A1 PCT/CN2014/087166 CN2014087166W WO2015117333A1 WO 2015117333 A1 WO2015117333 A1 WO 2015117333A1 CN 2014087166 W CN2014087166 W CN 2014087166W WO 2015117333 A1 WO2015117333 A1 WO 2015117333A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
encryption
encrypted
encryption device
Prior art date
Application number
PCT/CN2014/087166
Other languages
French (fr)
Chinese (zh)
Inventor
任鹏
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015117333A1 publication Critical patent/WO2015117333A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0471Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/037Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic

Definitions

  • the present invention relates to encryption technologies, and in particular, to an information processing method and apparatus, an encryption device, and a computer storage medium.
  • the management software steals sensitive information due to its own authority
  • the software itself has artificial or unintentional loopholes, used by other software to launch attacks; for mobile phone enthusiasts, especially after the Root mobile phone, the application itself can enhance their own permissions without the user confirmation, An attack that cannot be completed before the upgrade is completed.
  • IMEI International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification Number
  • GPS Global Positioning System
  • mobile terminals are usually equipped with a variety of sensor devices, such as GPS, microphone (MIC), camera, etc., which can be used by attackers to steal private information such as user's location, sound, and images in real time.
  • embodiments of the present invention provide an information processing method and apparatus, an encryption device, and a computer storage medium.
  • An embodiment of the present invention provides an information processing method, including:
  • Determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal
  • Encryption related processing is performed on the information on the terminal.
  • the device that is determined to be connected to the peripheral interface of the terminal is an encryption device that matches the terminal, and includes:
  • the encrypting related processing on the information on the terminal includes at least one of the following:
  • Encryption-related functional settings are performed on the terminal.
  • the encrypting related information on the information on the terminal includes:
  • the encrypting and processing the information on the terminal includes:
  • the encrypted audio data is sent through the radio unit of the terminal.
  • the encrypting and processing the information on the terminal includes:
  • the voiceprint information of the user is collected by using the encryption device matched with the terminal, and the information to be encrypted is encrypted by using the collected voiceprint information.
  • the embodiment of the invention also discloses an information processing method, including:
  • the encryption device After the encryption device accesses the terminal through the peripheral interface of the terminal, the encryption device collects the voiceprint information of the user;
  • the encryption device encrypts the information that needs to be encrypted on the terminal that matches the user by using the collected voiceprint information of the user, or encrypts the collected voiceprint information of the user.
  • the embodiment of the invention further provides an information processing device, comprising: a determining unit and a processing unit; wherein
  • the determining unit is configured to determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, and determines that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal. Triggering the processing unit;
  • the processing unit is configured to perform encryption related processing on the information on the terminal after receiving the trigger of the determining unit.
  • the determining unit includes: a detecting module, a first determining module, and a second determining Fixed module; among them,
  • the detecting module is configured to trigger the first determining module when a device that accesses the terminal through the peripheral interface is detected;
  • the first determining module is configured to trigger the second determining module when determining that the accessed device is an encryption device
  • the second determining module is configured to trigger the processing unit when the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal, after receiving the trigger of the first determining module.
  • the processing unit includes: a recording module, a prompting module, and a deleting module;
  • the recording module is configured to: when the security time limit function is set on the terminal, record each use situation of the encryption device that matches the terminal, and start timing;
  • the prompting module is configured to prompt the user to perform a corresponding operation when the duration of the timing reaches a preset security time limit
  • the deleting module is configured to delete all the encrypted information on the terminal after receiving the indication that the user performs the operation within the preset duration.
  • the processing unit includes: a first shutdown module and a first control module; wherein
  • the first shutdown module is configured to close the microphone that is provided by the terminal when the encrypted audio data needs to be encrypted, and disable all recording and collection functions of the terminal;
  • the first control module is configured to collect audio data of the user by using the encryption device matched with the terminal, and perform encryption processing on the collected audio data; and pass the encrypted audio data to the radio unit of the terminal. issue.
  • the processing unit includes: a second shutdown module and a second control module; wherein
  • the second shutdown module is configured to close the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
  • the second control module is configured to collect the voiceprint information of the user by using the encryption device matched with the terminal, and perform encryption processing on the information that needs to be encrypted by using the collected voiceprint information.
  • An embodiment of the present invention further provides an encryption device, including: an acquisition unit and an encryption unit;
  • the collecting unit is configured to collect the voiceprint information of the user after the encryption device accesses the terminal through the peripheral interface of the terminal;
  • the encryption unit is configured to perform encryption processing on the information that needs to be encrypted on the terminal by using the collected voiceprint information of the user, or configured to perform encryption processing on the collected voiceprint information of the user.
  • the encryption device further includes: a storage unit configured to store important feature data of the user.
  • the encryption device further includes: a control unit configured to control work between the collection unit and the encryption unit.
  • control unit is further configured to control power of the encryption device.
  • An embodiment of the present invention further provides a computer storage medium, the computer storage medium comprising a set of instructions that, when executed, cause at least one processor to perform an information processing method as described above.
  • the information processing method and device, the encryption device, and the computer storage medium of the embodiment of the present invention encrypt the information on the terminal when the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal.
  • the encryption device is connected to the terminal through a terminal peripheral interface access form such as a headphone interface, a data interface, a near field communication (NFC, Near Field Communication) interface, a WIFI interface, or a Bluetooth interface.
  • a terminal peripheral interface access form such as a headphone interface, a data interface, a near field communication (NFC, Near Field Communication) interface, a WIFI interface, or a Bluetooth interface.
  • NFC Near Field Communication
  • WIFI Wireless Fidelity
  • FIG. 1 is a schematic flow chart of an information processing method according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart of a method for processing information in a terminal according to Embodiment 3 of the present invention
  • FIG. 3 is a schematic flowchart of a method for processing information in a terminal after the terminal is lost according to Embodiment 4 of the present invention
  • FIG. 4 is a schematic flowchart of a method for implementing a call process security protection according to Embodiment 5 of the present invention.
  • FIG. 5 is a schematic flowchart of a method for encrypting and processing data according to a voiceprint password according to Embodiment 6 of the present invention.
  • FIG. 6 is a schematic structural diagram of an information processing apparatus according to Embodiment 7 of the present invention.
  • FIG. 7 is a schematic structural diagram of an eighth encryption device according to an embodiment of the present invention.
  • FIG. 8a is a schematic diagram showing the appearance of an encryption device in an actual application according to Embodiment 8 of the present invention.
  • FIG. 8b is a schematic diagram of an internal integration module of an encryption device in an actual application according to Embodiment 8 of the present invention.
  • hard encryption refers to the software to be protected and the hardware encryption lock, some important information, such as encryption key, sensitive data, Authorization files, custom algorithms, etc. are stored in the encryption lock.
  • Hard encryption has the incomparable advantages of soft encryption, such as high encryption strength, good encryption performance, and encryption mode. Live and so on.
  • Soft encryption means: before the mobile terminal sends the information, first calls the information security module to encrypt the information to be sent, and then sends the encrypted information; after receiving the encrypted information, the receiver decrypts using the corresponding decryption software, thereby obtaining Received information.
  • the implementation of soft encryption has the advantages of existing standard security application programming interface (API, Application Programming Interface) products, convenient implementation, good compatibility, etc., but also has some shortcomings, such as: the key management is very complicated. This is also a problem in the implementation of security API products. From the perspective of several existing security API products, the key distribution protocol has defects; in addition, since the implementation of using software encryption is encrypted inside the user's computer, It is easy to provide an attacker with an opportunity to use an analysis program to track, decompile, etc. to attack.
  • API Application Programming Interface
  • the information on the terminal is subjected to encryption related processing.
  • the information processing method of the embodiment of the present invention includes the following steps:
  • Step 101 Determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal.
  • the hardware identifier of the encryption device When it is determined that the hardware identifier of the encryption device does not match the encrypted information identifier stored on the terminal, it indicates that the accessed encryption device is not an encryption device that matches the terminal. At this time, no operation is performed.
  • Step 102 Perform encryption related processing on the information on the terminal.
  • this step may include at least one of the following:
  • Encryption-related functional settings are performed on the terminal.
  • the corresponding operations on the encrypted information on the terminal may be: copying, migrating, deleting, decrypting, storing, etc.; all the encrypted information may be randomly transferred, and the original can still be replaced after the terminal is replaced.
  • the encrypted information is read, modified, and the like; for the existing encryption method, such as the T-card soft encryption mode, the solution of the embodiment of the present invention, the encrypted information is not restricted by the terminal, and can be migrated at any time, and the user replaces the terminal. After the encrypted information could not be read.
  • the function setting related to encryption on the terminal may be: setting a security time limit, whether to start an information security processing flow, and the like.
  • the encrypting related processing on the information on the terminal includes:
  • the user does not receive the indication that the operation is performed within the preset duration, it indicates that the terminal has been lost. After the encrypted information on the terminal is deleted, when the terminal is lost, the other party cannot obtain the encrypted information in the terminal. .
  • the information about the information on the terminal is encrypted, and specifically includes:
  • the encrypted audio data is sent through the radio unit of the terminal.
  • the receiving end needs to access an encryption device that matches the encryption device of the sending end.
  • the receiving end can decrypt the received audio data by using an encryption device connected to the receiving end. So that the receiving end can recognize the received audio data.
  • the encrypting and processing the information on the terminal specifically:
  • the voiceprint information of the user is collected by using the encryption device matched with the terminal, and the information to be encrypted is encrypted by using the collected voiceprint information.
  • the information encrypted by the collected voiceprint information can be arbitrarily transmitted, and the user only needs to decrypt by voiceprint information when using.
  • the encrypted information on the terminal may be sent by the radio unit of the terminal; correspondingly, the receiving end needs to access an encryption device matching the encryption device of the sending end, so that when receiving After receiving the encrypted information, the terminal may use the encryption device accessing the receiving end to decrypt the received information, so that the receiving end can recognize the received information.
  • the information processing method of the embodiment of the present invention when determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, performs encryption related processing on the information on the terminal, and the encryption device passes the terminal peripheral interface.
  • the encryption device With terminal access, because the encryption device needs to be used together, the information on the terminal can be encrypted and processed, that is, the form of hard encryption and software encryption is adopted, and the encryption reliability is higher, so that the individual in the terminal can be effectively guaranteed. Information security.
  • the encrypted information is operated accordingly; thus, all the encrypted information can be freely migrated, and the original encrypted information can still be read and modified after the terminal is replaced; the encryption related functional setting is performed on the terminal, when the terminal After the loss, the terminal needs to cooperate with the encryption device to obtain the encrypted information, and also deletes the encrypted information on the terminal, so that others cannot obtain the encrypted data in the terminal.
  • the encryption device and the terminal are separately arranged, so that even if the terminal is attacked, since the information on the terminal has been encrypted, the encrypted information on the terminal cannot be accessed; and the encryption device is separately set from the terminal, so that the encryption device can simultaneously.
  • the use of multiple terminals solves the shortcomings of many users currently using multiple terminals, and only one terminal has an encryption function; in addition, when the user has multiple terminals, as long as the encryption device is not lost, the terminal will be deleted if the terminal is lost.
  • the encrypted information on the lost terminal ensures the secure processing of the encrypted information after the terminal is lost.
  • the separate arrangement of the encryption device and the terminal makes the cost lower than the existing hard encryption terminal.
  • the MIC of the terminal is turned off, and all recording and collecting functions of the terminal are disabled, and the audio data is collected by using the encryption device, that is, all the audio data to be transmitted can only be
  • the encryption device collects and encrypts the data, and transmits it through the radio unit of the terminal.
  • the receiving end does not have a corresponding encryption device, the receiving end cannot recognize the encrypted audio data; the encryption device can be paired or used one-to-many.
  • the receiving end only needs to use the encryption device with the same identification code, so that the encrypted audio data can be clearly restored, and the content of the conversation between the two parties is ensured.
  • there are already encryption products on the market which are mostly integrated in the terminal.
  • the content of the call can be secure, it is limited to the fixed paired terminal.
  • the solution of the embodiment of the present invention can be used as long as the encryption device is successfully paired. A secure call is not restricted by the terminal being used.
  • the MIC of the terminal When the information is encrypted by the voiceprint password, the MIC of the terminal is turned off, and all recording and collection functions of the terminal are disabled, and the voiceprint information, that is, all voiceprint information is collected by using the encryption device. It can only be collected by an encryption device, thus ensuring the voiceprint recognition
  • the uniformity of the preparation ensures the minimum difference of the voiceprint information collected each time, and also ensures the safety during the collection of the voiceprint information.
  • the information processing method of the embodiment of the present invention includes: after the encryption device accesses the terminal through the peripheral interface of the terminal, the encryption device collects the voiceprint information of the user; and the encryption device uses the collected voiceprint information of the user to encrypt the terminal.
  • the information is encrypted; or the collected voiceprint information of the user is encrypted.
  • the voiceprint information may be audio information of the user.
  • the manner in which the encryption device encrypts the information that needs to be encrypted on the terminal by using the voiceprint information of the collected user may be referred to as a voiceprint encryption method
  • the encryption device encrypts the collected voiceprint information
  • the encryption algorithm of the encryption device encrypts the collected voiceprint information, so this method can be called hard encryption.
  • This embodiment uses a mobile phone as an example to describe a method for processing information in a terminal. As shown in FIG. 2, the method includes the following steps:
  • Step 201 Detect whether a device is connected to the mobile phone, if yes, go to step 202, otherwise, go to step 205;
  • the identification process is started.
  • Step 202 Determine whether the accessed device is an encryption device, if yes, proceed to step 203, otherwise, perform step 205;
  • each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
  • a unique identification code such as the IMEI as the unique identification code of each encryption device
  • Step 203 Determine whether the hardware identifier of the encryption device matches the saved encrypted information identifier. If yes, go to step 204, otherwise, go to step 205;
  • the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
  • the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
  • Step 204 Perform encryption-related processing on the information on the mobile phone
  • the hardware identifier of the encryption device matches the saved encryption information identifier
  • the information may be fed back to the user interface (UI, User Interface) of the mobile phone to prompt the user.
  • UI User Interface
  • the information on the mobile phone may be subjected to encryption related processing; wherein the processing related to encrypting the information on the mobile phone may include: performing any operation on the encrypted information in the mobile phone, The encrypted information is encrypted, and the supporting software is functionally set;
  • any operation is performed on the encrypted information in the mobile phone, such as copying, migrating, deleting, decrypting, storing, etc.
  • the operations involving information encryption and decryption are performed by an encryption device.
  • the information that needs to be encrypted and decrypted may include: text information, picture information, and the like.
  • Step 205 No operation is performed.
  • the supporting software monitors the encrypted device in real time, and once it detects that the encrypted device is pulled out, immediately stops all operations and closes Closed mobile phone LCD (Liquid Crystal Display), all encrypted information will not be able to be read and operated.
  • LCD Liquid Crystal Display
  • the supporting software can be installed on one or more mobile phones at the same time; the user only needs to pair with the encryption device when using the first time, so that a device can encrypt the information of multiple mobile phones.
  • a mobile phone is taken as an example to describe a method for processing information in a terminal after the terminal is lost. As shown in FIG. 3, the method includes the following steps:
  • Step 300 Set a security time limit function on the supporting software matched with the encryption device.
  • the user can set the security time limit on the supporting software, and set the security time limit function after setting the security time limit; wherein, the security time limit can be set as needed, for example, setting the security time limit to one week.
  • Step 301 After setting the security time limit function on the supporting software matched with the encryption device, the supporting software records the usage of each encryption device, and starts timing;
  • the usage of the recorded encryption device mainly includes: the usage time of the device is encrypted each time.
  • Step 302 When the duration of the timing reaches the set security time duration, the UI prompts the user that the security time limit has arrived, and prompts the user to perform the corresponding operation, and then proceeds to step 303;
  • the supporting software restarts timing when the time when the encryption device is currently used is longer than the time when the encryption device is used last time.
  • the security mechanism When the duration of the timing reaches the set security time limit, the security mechanism is activated, so that the user security time limit has been reached through the UI, prompting the user to perform the corresponding operation.
  • the prompt operation may be preset in the supporting software, for example, the short message notifies the preset security mobile phone, or uploads the encrypted information to a preset security email.
  • Step 303 After receiving the instruction that the user performs the operation within the preset time period, the supporting software Delete all encrypted information on your phone.
  • the user after the user is prompted, if the user does not receive an instruction to perform the operation within the preset time period, the user has not performed any operation. In this case, the mobile phone may be considered to be lost, and the user is unable to use the mobile phone.
  • the companion software will delete all encrypted information on the phone.
  • a mobile phone is taken as an example to describe a method for implementing security protection of a call process by encrypting voiceprint information. As shown in FIG. 4, the method includes the following steps:
  • Step 401 Detect whether a device is connected to the mobile phone, if yes, proceed to step 402, otherwise, perform step 409;
  • the identification process is started.
  • Step 402 Determine whether the accessed device is an encryption device, if yes, proceed to step 403, otherwise, perform step 409;
  • each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
  • a unique identification code such as the IMEI as the unique identification code of each encryption device
  • Step 403 Determine whether the hardware identifier of the encryption device matches the saved encryption information identifier, if yes, go to step 404, otherwise, go to step 409;
  • the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
  • the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
  • the performing related processing of the information on the mobile phone means: when the user initiates a voice call, encrypting the voice information.
  • Step 404 When the user initiates a voice call, it is determined whether to activate the call protection function, and if so, step 405 is performed, otherwise step 408 is performed;
  • the UI prompts the user whether to activate the call protection function, and after receiving the user's instruction to start the call protection function, step 405 is performed, and after receiving the instruction that the user does not activate the call protection function, step 408 is performed.
  • the call protection function can only be performed between two encrypted devices that have already been paired, that is, two mobile devices that have been paired are connected to the mobile phone as the sender and the mobile phone as the recipient.
  • Step 405 The supporting software turns off the MIC of the mobile phone, and disables all recording and collecting functions of the mobile phone, and then performs step 406;
  • the accessory software when receiving the indication that the user initiates the call protection function, the accessory software enters the call protection mode.
  • Step 406 After the call is established, the encryption device collects audio data of the user, and performs encryption processing on the collected audio data.
  • the encrypted audio data has no content to be recognized, and must be decrypted to be recognized.
  • Step 407 Send the encrypted audio data to the radio unit of the mobile phone
  • the hardware identifier of the encryption device corresponding to the encrypted audio data is read, and it is determined whether the read hardware identifier matches the hardware identifier of the local encryption device, and the matching is determined.
  • Decrypting the received audio data by using a local encryption device that is, restoring the received audio data, thereby identifying the audio data; determining When there is no match, the received audio data cannot be restored, and the received audio data cannot be recognized.
  • Both the calling party and the called party process the audio data in the above manner, so that the two communicating mobile phones establish an environment for encrypted calls.
  • Step 408 The mobile phone performs a normal voice call.
  • Step 409 No operation is performed.
  • the unique identification code of the encryption device can be sent to the pair to be matched by using the supporting software or generating a two-dimensional code.
  • the other is connected to the mobile phone with the encryption device, so that the two mobile phones with access to the encryption device are matched. Since the unique identification code of the encryption device needs to be used together with the encryption device, even if the unique identification code is intercepted by a third party, or the unique identification code is leaked, it cannot be used.
  • the supporting software can mark the corresponding names and permissions of the paired mobile phones with the encrypted device, and in this way, one-to-one or one-to-many pairing can be quickly realized.
  • the two mobile phones that have been paired with the encryption device can also send all the information except the audio data, such as picture information, short message information, and the like.
  • a mobile phone is taken as an example to describe a method for performing encryption related processing on data by a voiceprint password. As shown in FIG. 5, the method includes the following steps:
  • Step 501 Detect whether a device is connected to the mobile phone, if yes, go to step 502, otherwise, go to step 506;
  • the identification process is started.
  • Step 502 Determine whether the accessed device is an encryption device, if yes, go to step 503, otherwise, go to step 506;
  • each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
  • a unique identification code such as the IMEI as the unique identification code of each encryption device
  • Step 503 Determine whether the hardware identifier of the encryption device matches the saved encryption information identifier, if yes, go to step 504, otherwise, go to step 506;
  • the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
  • the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
  • the performing related processing of the information on the mobile phone refers to: performing encryption processing on the information.
  • Step 504 When it is determined that the voiceprint encryption mode is adopted, the supporting software turns off the MIC of the mobile phone, and disables all the recording and collecting functions of the mobile phone, and then performs step 505;
  • the encryption device may be in two encryption modes, namely a hard encryption mode and a voiceprint encryption mode; wherein, the hard encryption mode refers to: directly using an encryption algorithm of the encryption device to perform encryption processing; the voiceprint encryption method refers to: using acquisition The voiceprint information is encrypted.
  • Step 505 The encryption device collects the voiceprint information of the user, and encrypts the information that needs to be encrypted by using the collected voiceprint information.
  • the encrypted information has no way to identify the content, and must be decrypted before it can be recognized. do not.
  • the information that needs to be encrypted is successfully encrypted by voiceprint information, it can be transmitted between the mobile phone and the mobile phone, or between the mobile phone and the computer. Users only need to decrypt the voiceprint information.
  • Step 506 No operation is performed.
  • the present embodiment provides an information processing apparatus.
  • the apparatus includes: a determining unit 61 and a processing unit 62;
  • the determining unit 61 is configured to determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, and when determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal , trigger processing unit 62;
  • the processing unit 62 is configured to perform encryption related processing on the information on the terminal after receiving the trigger of the determining unit 61.
  • the determining unit 61 further includes: a detecting module, a first determining module, and a second determining module; wherein
  • a detecting module configured to trigger the first determining module when a device that accesses the terminal through the peripheral interface is detected
  • a first determining module configured to: when determining that the accessed device is an encrypted device, triggering a second determining module;
  • the second determining module is configured to trigger the processing unit 62 when it is determined that the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal after receiving the trigger of the first determining module.
  • the first determining module when it is determined that the accessed device is not an encrypted device, the first determining module does not perform any operation.
  • the encrypted device that is accessed is not the encryption device that matches the terminal.
  • the second determining module does not perform any operation.
  • the specific implementation of the encryption related processing on the information on the terminal may include at least one of the following:
  • Encryption-related functional settings are performed on the terminal.
  • the corresponding operations on the encrypted information on the terminal may be: copying, migrating, deleting, decrypting, storing, etc.; all the encrypted information may be randomly transferred, and the original can still be replaced after the terminal is replaced.
  • the encrypted information is read, modified, and the like; for the existing encryption method, such as the T-card soft encryption mode, the solution of the embodiment of the present invention, the encrypted information is not restricted by the terminal, and can be migrated at any time, and the user replaces the terminal. After the encrypted information could not be read.
  • the function setting related to encryption on the terminal may be: setting a security time limit, whether to start an information security processing flow, and the like.
  • the processing unit 62 includes: a recording module, a prompting module, and a deleting module;
  • a recording module configured to record each use situation of the encryption device that matches the terminal, and start timing
  • the prompting module is configured to prompt the user to perform corresponding operations when the duration of the timing reaches a preset security time limit
  • the module is deleted, and all the encrypted information on the terminal is deleted after the user does not receive the instruction to perform the operation within the preset duration.
  • the terminal does not receive the indication that the user performs the operation within the preset duration, it indicates that the terminal has been lost.
  • the deletion module deletes the encrypted information on the terminal, when the terminal is lost, the other party cannot obtain the already Encrypt information.
  • the processing unit 62 may include: a first shutdown module and a first control module; wherein
  • a first shutdown module configured to turn off the MIC that is provided by the terminal, and disable all recording and collection functions of the terminal
  • the first control module is configured to collect the audio data of the user by using the encryption device matched with the terminal, and perform encryption processing on the collected audio data; and send the encrypted audio data to the radio unit of the terminal.
  • the receiving end needs to access an encryption device that matches the encryption device of the sending end.
  • the receiving end can decrypt the received audio data by using an encryption device connected to the receiving end. So that the receiving end can recognize the received audio data.
  • the processing unit 62 may include: a second shutdown module and a second control module; wherein
  • a second shutdown module configured to turn off the MIC that is provided by the terminal, and disable all recording and collection functions of the terminal
  • the second control module is configured to collect the voiceprint information of the user by using the encryption device matched with the terminal, and perform encryption processing on the information that needs to be encrypted by using the collected voiceprint information.
  • the information encrypted by the collected voiceprint information can be arbitrarily transmitted, and the user only needs to decrypt by voiceprint information when using.
  • the encrypted information on the terminal may be sent by the radio unit of the terminal; correspondingly, the receiving end needs to access an encryption device matching the encryption device of the sending end, so that when receiving After receiving the encrypted information, the terminal may use the encryption device accessing the receiving end to decrypt the received information, so that the receiving end can recognize the received information.
  • the detecting module, the first determining module, the second determining module, the recording module, the deleting module, the first closing module, the first control module, the second closing module, and the second control module It can be implemented by a processor (CPU, Central Processing Unit), a digital signal processor (DSP) or a Field-Programmable Gate Array (FPGA) in the information processing device; the prompting module can be used in the information processing device Display implementation.
  • a processor Central Processing Unit
  • DSP digital signal processor
  • FPGA Field-Programmable Gate Array
  • the processing unit when the determining unit determines that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, the processing unit performs encryption related processing on the information on the terminal, and the encryption device Through the peripheral interface of the terminal and the terminal access, because the encryption device needs to be used together, the information on the terminal can be encrypted and processed, that is, the form of hard encryption and software encryption is adopted, and the encryption reliability is higher, so that the information can be effectively Ensure the security of personal information in the terminal.
  • the processing unit when it is determined that the encryption device matched with the terminal has accessed the terminal, the processing unit performs corresponding operations on the encrypted information on the terminal; thus, all the encrypted information can be freely migrated, and the original encryption can still be performed after the terminal is replaced.
  • the information is read and modified; the functional setting related to encryption is performed on the terminal. After the terminal is lost, the encrypted information can be obtained because the terminal needs to cooperate with the encryption device, and the encrypted information is also deleted. Encrypted information, so that others cannot obtain encrypted data in the terminal.
  • the encryption device and the terminal are separately arranged, so that even if the terminal is attacked, since the information on the terminal has been encrypted, the encrypted information on the terminal cannot be accessed; and the encryption device is separately set from the terminal, so that the encryption device can simultaneously.
  • the use of multiple terminals solves the shortcomings of many users currently using multiple terminals, and only one terminal has an encryption function; in addition, when the user has multiple terminals, as long as the encryption device is not lost, the terminal will be deleted if the terminal is lost.
  • the encrypted information on the lost terminal ensures the secure processing of the encrypted information after the terminal is lost.
  • the separate arrangement of the encryption device and the terminal makes the cost lower than the existing hard encryption terminal.
  • the first shutdown module turns off the MIC that is provided by the terminal, and disables all recording and collection functions of the terminal, and the first control module utilizes
  • the secret device collects audio data, that is, all audio data to be transmitted can only be collected and encrypted by the encryption device, and transmitted through the radio unit of the terminal.
  • the receiving end does not have a corresponding encryption device, the receiving end cannot The encrypted audio data is identified; the encryption device can be paired or used one-to-many, and the receiving end only needs to use the encryption device with the same identification code, so that the encrypted audio data can be clearly restored, and the content of the conversation between the two parties is ensured.
  • there are already encryption products on the market which are mostly integrated in the terminal.
  • the content of the call can be secure, it is limited to the fixed paired terminal.
  • the solution of the embodiment of the present invention can be used as long as the encryption device is successfully paired. A secure call is not restricted by the terminal being used.
  • the second shutdown module turns off the MIC that is provided by the terminal, and disables all recording and collection functions of the terminal, and the second control module uses the encryption device to collect the voiceprint.
  • Information that is, all voiceprint information can only be collected by the encryption device, thus ensuring the uniformity of the voiceprint recognition device, ensuring the minimum difference of the voiceprint information collected each time, and also ensuring the security during the voiceprint information collection process. .
  • the embodiment provides an encryption device.
  • the encryption device includes: an acquisition unit 71 and an encryption unit 72;
  • the collecting unit 71 is configured to collect the voiceprint information of the user after the encryption device accesses the terminal through the peripheral interface of the terminal;
  • the encryption unit 72 is configured to perform encryption processing on the information that needs to be encrypted on the terminal by using the collected voiceprint information of the user, or configured to perform encryption processing on the collected voiceprint information of the user.
  • the voiceprint information may be audio information of the user.
  • the encryption unit 72 uses the collected voiceprint information of the user to encrypt the information that needs to be encrypted on the terminal, which may be referred to as a voiceprint encryption method.
  • the encryption unit 72 encrypts the collected voiceprint information by using an encryption device.
  • the encryption algorithm of the own encrypts the collected voiceprint information, so this method can be called hard encryption.
  • the encryption device may further include: a storage unit configured to store important feature data of the user; the storage unit may serve as an extended data storage of the user; wherein the important feature data is determined according to a user's needs.
  • the encryption device may further include: a control unit configured to control operations between the units including the acquisition unit 71 and the encryption unit 72; and may be further configured to control power of the encryption device to supply power to the encryption device.
  • the acquisition unit 71 can be implemented by an MIC in an encryption device, and the encryption unit 72 and the control unit can be implemented by a CPU, a DSP or an FPGA in the encryption device, and the storage unit can be implemented by a memory in the encryption device.
  • the specifications of the encryption device conform to the standards of the peripheral interface of the mobile phone, such as a headphone interface, a USB interface, a WIFI interface, a Bluetooth interface, an NFC interface, etc., accordingly, the encryption device can be wired and wireless.
  • the terminal When connecting to a terminal, when a different interface is used, in order to implement the function of the voice device to collect voiceprint information, the terminal needs to support the related audio protocol corresponding to the adopted interface; for example, the selected interface is a USB interface. In order to implement the function of the voice device to collect voiceprint information, the terminal itself needs to support the function of audio transmission through the USB interface.
  • the terminal in order to implement the function of the voice device to collect voiceprint information, the terminal needs to support the terminal itself.
  • the shape of the encryption device can be made into various accessories, such as earrings and other wearing jewelry, or can be hung in the storage sleeve of the key chain, which is convenient for the user to carry around, and can also be stored separately from the terminal when the user does not use it, Security.
  • the encryption device is internally integrated with an audio module, a hardware encryption module, a storage module, and an integrated control module; respectively corresponding to the acquisition unit, the encryption unit, the storage unit, and the control unit in FIG.
  • the audio module collects audio information by using the MIC itself, and simultaneously distinguishes the voiceprint information
  • the hardware encryption module is the core component of the encryption device, and has built-in Ukey hard encryption information for users.
  • the main encryption algorithm can be placed inside the hardware encryption module to ensure the security of the user information, and all data is encrypted and decrypted by the hardware encryption module;
  • the storage module has a built-in memory for storing user information and information on the terminal, and the internal memory can be used as a user extended data storage to store important feature data;
  • An integrated control module that controls the power of the encryption device while controlling the operation between the modules.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. Instructions are provided for implementation The steps of a function specified in a block or blocks of a flow or a flow and/or a block diagram of a flow chart.

Abstract

Disclosed is an information processing method, comprising: determining a device which is accessed via a peripheral interface of a terminal to be an encryption device which is matched with the terminal; and conducting encryption related processing on information about the terminal. Also disclosed at the same time are an information processing apparatus, an electronic device and a computer storage medium.

Description

一种信息处理方法及装置、加密设备及计算机存储介质Information processing method and device, encryption device and computer storage medium 技术领域Technical field
本发明涉及加密技术,尤其涉及一种信息处理方法及装置、加密设备及计算机存储介质。The present invention relates to encryption technologies, and in particular, to an information processing method and apparatus, an encryption device, and a computer storage medium.
背景技术Background technique
当今社会,智能手机大规模普及的同时也带来了许多问题,其中有关手机安全问题最为重要。目前主要的安全威胁包括三个以下方面:In today's society, the large-scale popularization of smartphones has also brought many problems, among which mobile phone security issues are the most important. The main security threats currently include three aspects:
1、破坏系统安全机制,为其它的恶意代码攻击提供方便;1. Destroy the system security mechanism and provide convenience for other malicious code attacks;
2、管理软件由于自身的权限优势,进行敏感信息的窃取;2. The management software steals sensitive information due to its own authority;
3、软件自身存在人为的或者非有意的漏洞,被其它软件利用发动攻击;对于手机发烧友而言特别是Root后的手机,应用程序自身可以在不通过用户确认的情况下,提升自己的权限,完成提升前不可能完成的攻击操作。3, the software itself has artificial or unintentional loopholes, used by other software to launch attacks; for mobile phone enthusiasts, especially after the Root mobile phone, the application itself can enhance their own permissions without the user confirmation, An attack that cannot be completed before the upgrade is completed.
当手机的安全受到威胁时,用户手机上的移动设备国际身份码(IMEI,International Mobile Equipment Identity)、国际移动用户识别码(IMSI,International Mobile Subscriber Identification Number)、电话号码、短信息、联系人信息、全球定位系统(GPS,Global Positioning System)位置等个人信息可以被恶意软件随意窃取。此外,移动终端通常会装备多种传感器设备,比如GPS、麦克风(MIC)、摄像头等,攻击者可以借助这些传感器设备实时窃取用户的位置、声音、图像等隐私信息。When the security of the mobile phone is threatened, the mobile device international identity code (IMEI, International Mobile Equipment Identity), International Mobile Subscriber Identification Number (IMSI), telephone number, short message, contact information Personal information such as the location of the Global Positioning System (GPS) can be stolen by malicious software. In addition, mobile terminals are usually equipped with a variety of sensor devices, such as GPS, microphone (MIC), camera, etc., which can be used by attackers to steal private information such as user's location, sound, and images in real time.
因此,如何有效地保证移动终端中个人信息的安全性是目前亟待解决的问题。 Therefore, how to effectively ensure the security of personal information in a mobile terminal is an urgent problem to be solved.
发明内容Summary of the invention
为解决现有存在的技术问题,本发明实施例提供一种信息处理方法及装置、加密设备及计算机存储介质。In order to solve the existing technical problems, embodiments of the present invention provide an information processing method and apparatus, an encryption device, and a computer storage medium.
为达到上述目的,本发明实施例的技术方案是这样实现的:To achieve the above objective, the technical solution of the embodiment of the present invention is implemented as follows:
本发明实施例提供了一种信息处理方法,包括:An embodiment of the present invention provides an information processing method, including:
确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备;Determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal;
对所述终端上的信息进行加密相关处理。Encryption related processing is performed on the information on the terminal.
上述方案中,所述确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备,包括:In the above solution, the device that is determined to be connected to the peripheral interface of the terminal is an encryption device that matches the terminal, and includes:
检测到通过所述外围接口有设备接入所述终端;Detecting that a device is accessed by the peripheral interface through the peripheral interface;
确定接入的设备为加密设备;Determining that the accessed device is an encrypted device;
确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配。It is determined that the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal.
上述方案中,所述对所述终端上的信息进行加密相关处理,包括以下至少之一:In the above solution, the encrypting related processing on the information on the terminal includes at least one of the following:
对所述终端上的已加密信息进行相应操作;Performing corresponding operations on the encrypted information on the terminal;
采用所述与所述终端相匹配的加密设备对所述终端上的未加密信息进行加密;Encrypting the unencrypted information on the terminal by using the encryption device matched with the terminal;
在所述终端上进行加密相关的功能性设置。Encryption-related functional settings are performed on the terminal.
上述方案中,当在所述终端上设置安全时限功能时,所述对所述终端上的信息进行加密相关处理,包括:In the above solution, when the security time limit function is set on the terminal, the encrypting related information on the information on the terminal includes:
记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;Recording each use situation of the encryption device matched with the terminal, and starting timing;
当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;When the duration of the timing reaches the preset security time limit, the user is prompted to perform the corresponding operation;
当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已 加密的信息。After the user has not received the instruction to perform the operation within the preset duration, all the terminals on the terminal are deleted. Encrypted information.
上述方案中,通话过程中,当需要对传输的音频数据加密时,所述对所述终端上的信息进行加密相关处理,包括:In the above solution, during the call, when the transmitted audio data needs to be encrypted, the encrypting and processing the information on the terminal includes:
关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;Turn off the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;Acquiring audio data of the user by using the encryption device matched with the terminal, and performing encryption processing on the collected audio data;
将加密处理后的音频数据通过终端的射频单元发出。The encrypted audio data is sent through the radio unit of the terminal.
上述方案中,当通过声纹密码对信息进行加密处理时,所述对所述终端上的信息进行加密相关处理,包括:In the above solution, when the information is encrypted by the voiceprint cipher, the encrypting and processing the information on the terminal includes:
关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;Turn off the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理。The voiceprint information of the user is collected by using the encryption device matched with the terminal, and the information to be encrypted is encrypted by using the collected voiceprint information.
本发明实施例还公开了一种信息处理方法,包括:The embodiment of the invention also discloses an information processing method, including:
加密设备通过终端的外围接口接入所述终端后,加密设备采集用户的声纹信息;After the encryption device accesses the terminal through the peripheral interface of the terminal, the encryption device collects the voiceprint information of the user;
加密设备利用采集的用户的声纹信息对与自身匹配的终端上需要加密的信息进行加密处理;或者,将采集的用户的声纹信息进行加密处理。The encryption device encrypts the information that needs to be encrypted on the terminal that matches the user by using the collected voiceprint information of the user, or encrypts the collected voiceprint information of the user.
本发明实施例又提供了一种信息处理装置,包括:确定单元及处理单元;其中,The embodiment of the invention further provides an information processing device, comprising: a determining unit and a processing unit; wherein
所述确定单元,配置为确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备,并在确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,触发所述处理单元;The determining unit is configured to determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, and determines that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal. Triggering the processing unit;
所述处理单元,配置为收到所述确定单元的触发后,对所述终端上的信息进行加密相关处理。The processing unit is configured to perform encryption related processing on the information on the terminal after receiving the trigger of the determining unit.
上述方案中,所述确定单元包括:检测模块、第一确定模块及第二确 定模块;其中,In the above solution, the determining unit includes: a detecting module, a first determining module, and a second determining Fixed module; among them,
所述检测模块,配置为检测到通过所述外围接口有设备接入所述终端时,触发所述第一确定模块;The detecting module is configured to trigger the first determining module when a device that accesses the terminal through the peripheral interface is detected;
所述第一确定模块,配置为确定接入的设备为加密设备时,触发所述第二确定模块;The first determining module is configured to trigger the second determining module when determining that the accessed device is an encryption device;
所述第二确定模块,配置为收到第一确定模块的触发后,确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配时,触发所述处理单元。The second determining module is configured to trigger the processing unit when the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal, after receiving the trigger of the first determining module.
上述方案中,所述处理单元包括:记录模块、提示模块及删除模块;其中,In the above solution, the processing unit includes: a recording module, a prompting module, and a deleting module; wherein
所述记录模块,配置为当在所述终端上设置安全时限功能时,记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;The recording module is configured to: when the security time limit function is set on the terminal, record each use situation of the encryption device that matches the terminal, and start timing;
所述提示模块,配置为当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;The prompting module is configured to prompt the user to perform a corresponding operation when the duration of the timing reaches a preset security time limit;
所述删除模块,配置为当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已加密的信息。The deleting module is configured to delete all the encrypted information on the terminal after receiving the indication that the user performs the operation within the preset duration.
上述方案中,所述处理单元包括:第一关闭模块及第一控制模块;其中,In the above solution, the processing unit includes: a first shutdown module and a first control module; wherein
所述第一关闭模块,配置为通话过程中,当需要对传输的音频数据加密时关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;The first shutdown module is configured to close the microphone that is provided by the terminal when the encrypted audio data needs to be encrypted, and disable all recording and collection functions of the terminal;
所述第一控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;并将加密处理后的音频数据通过终端的射频单元发出。The first control module is configured to collect audio data of the user by using the encryption device matched with the terminal, and perform encryption processing on the collected audio data; and pass the encrypted audio data to the radio unit of the terminal. issue.
上述方案中,所述处理单元包括:第二关闭模块及第二控制模块;其中, In the above solution, the processing unit includes: a second shutdown module and a second control module; wherein
所述第二关闭模块,配置为关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;The second shutdown module is configured to close the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
所述第二控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理。The second control module is configured to collect the voiceprint information of the user by using the encryption device matched with the terminal, and perform encryption processing on the information that needs to be encrypted by using the collected voiceprint information.
本发明实施例又提供了一种加密设备,包括:采集单元及加密单元;其中,An embodiment of the present invention further provides an encryption device, including: an acquisition unit and an encryption unit;
所述采集单元,配置为加密设备通过终端的外围接口接入所述终端后,采集用户的声纹信息;The collecting unit is configured to collect the voiceprint information of the user after the encryption device accesses the terminal through the peripheral interface of the terminal;
所述加密单元,配置为利用采集的用户的声纹信息对终端上需要加密的信息进行加密处理;或者,配置为将采集的用户的声纹信息进行加密处理。The encryption unit is configured to perform encryption processing on the information that needs to be encrypted on the terminal by using the collected voiceprint information of the user, or configured to perform encryption processing on the collected voiceprint information of the user.
上述方案中,所述加密设备还包括:存储单元,配置为存储用户的重要特征数据。In the above solution, the encryption device further includes: a storage unit configured to store important feature data of the user.
上述方案中,所述加密设备还包括:控制单元,配置为控制所述采集单元及所述加密单元之间的工作。In the above solution, the encryption device further includes: a control unit configured to control work between the collection unit and the encryption unit.
上述方案中,所述控制单元,还配置为控制所述加密设备的电源。In the above solution, the control unit is further configured to control power of the encryption device.
本发明实施例还提供了一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行如上述的信息处理方法。An embodiment of the present invention further provides a computer storage medium, the computer storage medium comprising a set of instructions that, when executed, cause at least one processor to perform an information processing method as described above.
本发明实施例的信息处理方法及装置、加密设备及计算机存储介质,当确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,对所述终端上的信息进行加密相关处理,加密设备通过终端外围接口接入的形式如耳机接口、数据接口、近场通信(NFC,Near Field Communication)接口、WIFI接口、或蓝牙接口等方式与终端连接,由于需 要加密设备的配合使用,才能对终端上的信息进行加密相关处理,即采用了硬加密配合软件加密的形式,加密可靠性更高,如此,能有效地保证终端中个人信息的安全性。The information processing method and device, the encryption device, and the computer storage medium of the embodiment of the present invention encrypt the information on the terminal when the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal. Correlation processing, the encryption device is connected to the terminal through a terminal peripheral interface access form such as a headphone interface, a data interface, a near field communication (NFC, Near Field Communication) interface, a WIFI interface, or a Bluetooth interface. To encrypt the device, the information on the terminal can be encrypted and processed, that is, the form of hard encryption and software encryption is adopted, and the encryption reliability is higher. Thus, the security of the personal information in the terminal can be effectively ensured.
附图说明DRAWINGS
在附图(其不一定是按比例绘制的)中,相似的附图标记可在不同的视图中描述相似的部件。具有不同字母后缀的相似附图标记可表示相似部件的不同示例。附图以示例而非限制的方式大体示出了本文中所讨论的各个实施例。In the drawings, which are not necessarily to scale, the Like reference numerals with different letter suffixes may indicate different examples of similar components. The drawings generally illustrate the various embodiments discussed herein by way of example and not limitation.
图1为本发明实施例一信息处理方法流程示意图;1 is a schematic flow chart of an information processing method according to an embodiment of the present invention;
图2为本发明实施例三对终端中的信息进行处理的方法流程示意图;2 is a schematic flowchart of a method for processing information in a terminal according to Embodiment 3 of the present invention;
图3为本发明实施例四终端遗失后对终端中的信息进行处理的方法流程示意图;3 is a schematic flowchart of a method for processing information in a terminal after the terminal is lost according to Embodiment 4 of the present invention;
图4为本发明实施例五实现通话过程安全保护的方法流程示意图;4 is a schematic flowchart of a method for implementing a call process security protection according to Embodiment 5 of the present invention;
图5为本发明实施例六通过声纹密码对数据进行加密相关处理的方法流程示意图;FIG. 5 is a schematic flowchart of a method for encrypting and processing data according to a voiceprint password according to Embodiment 6 of the present invention; FIG.
图6为本发明实施例七信息处理装置结构示意图;6 is a schematic structural diagram of an information processing apparatus according to Embodiment 7 of the present invention;
图7为本发明实施例八加密设备结构示意图;7 is a schematic structural diagram of an eighth encryption device according to an embodiment of the present invention;
图8a为本发明实施例八实际应用中加密设备外形示意图;8a is a schematic diagram showing the appearance of an encryption device in an actual application according to Embodiment 8 of the present invention;
图8b本发明实施例八实际应用中加密设备内部集成模块示意图。FIG. 8b is a schematic diagram of an internal integration module of an encryption device in an actual application according to Embodiment 8 of the present invention.
具体实施方式detailed description
通常,对终端进行加密的方式可以分为硬加密和软加密两种实现方式;其中,硬加密是指要保护的软件与硬件加密锁绑定,一些重要信息,如加密密钥、敏感数据、授权文件、自定义算法等都存储在加密锁中。硬加密具有软加密不可比拟的优点,比如加密强度高、加密性能好、加密方式灵 活等。软加密是指:在移动终端发送信息前,先调用信息安全模块对待发送的信息进行加密,然后发送加密后的信息;接收方收到加密的信息后,使用相应的解密软件进行解密,从而得到接收的信息。软加密的实现方式具有:已有标准的安全应用程序编程接口(API,Application Programming Interface)产品、实现方便、兼容性好等优点,但同时也存在一些缺点,比如:密钥的管理很复杂,这也是安全API产品实现的一个难题,从已有的几个安全API产品来看,密钥分配协议均有缺陷;另外,由于使用软件加密的实现方式是在用户的计算机内部进行加密的,这样就容易给攻击者提供采用分析程序进行跟踪、反编译等手段进行攻击的机会。Generally, the way to encrypt a terminal can be divided into two modes: hard encryption and soft encryption. Among them, hard encryption refers to the software to be protected and the hardware encryption lock, some important information, such as encryption key, sensitive data, Authorization files, custom algorithms, etc. are stored in the encryption lock. Hard encryption has the incomparable advantages of soft encryption, such as high encryption strength, good encryption performance, and encryption mode. Live and so on. Soft encryption means: before the mobile terminal sends the information, first calls the information security module to encrypt the information to be sent, and then sends the encrypted information; after receiving the encrypted information, the receiver decrypts using the corresponding decryption software, thereby obtaining Received information. The implementation of soft encryption has the advantages of existing standard security application programming interface (API, Application Programming Interface) products, convenient implementation, good compatibility, etc., but also has some shortcomings, such as: the key management is very complicated. This is also a problem in the implementation of security API products. From the perspective of several existing security API products, the key distribution protocol has defects; in addition, since the implementation of using software encryption is encrypted inside the user's computer, It is easy to provide an attacker with an opportunity to use an analysis program to track, decompile, etc. to attack.
基于此,在本发明的各种实施例中:当确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,对所述终端上的信息进行加密相关处理。Based on this, in various embodiments of the present invention: when it is determined that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, the information on the terminal is subjected to encryption related processing.
实施例一Embodiment 1
本发明实施例信息处理方法,如图1所示,包括以下步骤:The information processing method of the embodiment of the present invention, as shown in FIG. 1 , includes the following steps:
步骤101:确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备;Step 101: Determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal.
具体地,检测到通过所述外围接口有设备接入所述终端;Specifically, detecting that a device accesses the terminal through the peripheral interface;
确定接入的设备为加密设备;Determining that the accessed device is an encrypted device;
确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配。It is determined that the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal.
其中,当确定接入的设备不为加密设备时,不进行任何操作。Wherein, when it is determined that the accessed device is not an encrypted device, no operation is performed.
当确定加密设备的硬件标识与所述终端上保存的加密信息标识不匹配时,说明接入的加密设备不是与所述终端相匹配的加密设备,此时,不进行任何操作。When it is determined that the hardware identifier of the encryption device does not match the encrypted information identifier stored on the terminal, it indicates that the accessed encryption device is not an encryption device that matches the terminal. At this time, no operation is performed.
步骤102:对所述终端上的信息进行加密相关处理。Step 102: Perform encryption related processing on the information on the terminal.
这里,本步骤的具体实现,可以包括以下至少之一: Here, the specific implementation of this step may include at least one of the following:
对所述终端上的已加密信息进行相应操作;Performing corresponding operations on the encrypted information on the terminal;
采用所述与所述终端相匹配的加密设备对所述终端上的未加密信息进行加密;Encrypting the unencrypted information on the terminal by using the encryption device matched with the terminal;
在所述终端上进行加密相关的功能性设置。Encryption-related functional settings are performed on the terminal.
其中,所述对所述终端上的已加密信息进行相应操作,可以是:拷贝、迁移、删除、解密、存储等;所有加密过的信息可随意迁移,更换终端后仍可以对这些原有的加密信息进行读取、修改等等;针对现有的加密方式,比如T卡软加密方式,本发明实施例的方案,加密后的信息不受终端的限制,可以随时迁移,解决了用户更换终端后加密信息无法读取的问题。The corresponding operations on the encrypted information on the terminal may be: copying, migrating, deleting, decrypting, storing, etc.; all the encrypted information may be randomly transferred, and the original can still be replaced after the terminal is replaced. The encrypted information is read, modified, and the like; for the existing encryption method, such as the T-card soft encryption mode, the solution of the embodiment of the present invention, the encrypted information is not restricted by the terminal, and can be migrated at any time, and the user replaces the terminal. After the encrypted information could not be read.
所述在所述终端上进行加密相关的功能性设置,可以是:设置安全时限、是否启动信息安全处理流程等。The function setting related to encryption on the terminal may be: setting a security time limit, whether to start an information security processing flow, and the like.
这里,当在所述终端上设置安全时限功能时,所述对所述终端上的信息进行加密相关处理,具体包括:Here, when the security time limit function is set on the terminal, the encrypting related processing on the information on the terminal includes:
记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;Recording each use situation of the encryption device matched with the terminal, and starting timing;
当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;When the duration of the timing reaches the preset security time limit, the user is prompted to perform the corresponding operation;
当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已加密的信息。After receiving the indication that the user performs the operation within the preset duration, all the encrypted information on the terminal is deleted.
其中,当预设时长内未收到用户进行操作的指示时,表明所述终端已遗失,删除所述终端上已有加密的信息后,当终端遗失时,他人无法获取终端中的已加密信息。If the user does not receive the indication that the operation is performed within the preset duration, it indicates that the terminal has been lost. After the encrypted information on the terminal is deleted, when the terminal is lost, the other party cannot obtain the encrypted information in the terminal. .
通话过程中,当需要对传输的音频数据加密时,所述对所述终端上的信息进行加密相关处理,具体包括:During the process of the call, when the audio data to be transmitted needs to be encrypted, the information about the information on the terminal is encrypted, and specifically includes:
关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能;Turning off the MIC that is provided by the terminal, and disabling all recording and collecting functions of the terminal;
利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采 集的音频数据进行加密处理;Acquiring user audio data by using the encryption device matched with the terminal, and collecting The set of audio data is encrypted;
将加密处理后的音频数据通过终端的射频单元发出。The encrypted audio data is sent through the radio unit of the terminal.
相应地,接收端需要接入与发送端的加密设备相匹配的加密设备,这样的话,当接收端收到加密的音频数据后,可以利用接入接收端的加密设备对收到的音频数据进行解密处理,从而使接收端可以识别出收到的音频数据。Correspondingly, the receiving end needs to access an encryption device that matches the encryption device of the sending end. In this way, after receiving the encrypted audio data, the receiving end can decrypt the received audio data by using an encryption device connected to the receiving end. So that the receiving end can recognize the received audio data.
当通过声纹密码对信息进行加密处理时,所述对所述终端上的信息进行加密相关处理,具体包括:When the information is encrypted by the voiceprint cipher, the encrypting and processing the information on the terminal, specifically:
关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能;Turning off the MIC that is provided by the terminal, and disabling all recording and collecting functions of the terminal;
利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理。The voiceprint information of the user is collected by using the encryption device matched with the terminal, and the information to be encrypted is encrypted by using the collected voiceprint information.
其中,采用采集的声纹信息加密后的信息可以任意传输,使用时用户只需要通过声纹信息进行解密即可。Among them, the information encrypted by the collected voiceprint information can be arbitrarily transmitted, and the user only needs to decrypt by voiceprint information when using.
当需要发送所述终端上的加密信息时,可以通过所述终端的射频单元发出已加密的信息;相应地,接收端需要接入与发送端的加密设备相匹配的加密设备,这样的话,当接收端收到加密的信息后,可以利用接入接收端的加密设备对收到的信息进行解密处理,从而使接收端可以识别出收到的信息。When the encrypted information on the terminal needs to be sent, the encrypted information may be sent by the radio unit of the terminal; correspondingly, the receiving end needs to access an encryption device matching the encryption device of the sending end, so that when receiving After receiving the encrypted information, the terminal may use the encryption device accessing the receiving end to decrypt the received information, so that the receiving end can recognize the received information.
本发明实施例的信息处理方法,当确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,对所述终端上的信息进行加密相关处理,加密设备通过终端外围接口与终端接入,由于需要加密设备的配合使用,才能对终端上的信息进行加密相关处理,即采用了硬加密配合软件加密的形式,加密可靠性更高,如此,能有效地保证终端中个人信息的安全性。The information processing method of the embodiment of the present invention, when determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, performs encryption related processing on the information on the terminal, and the encryption device passes the terminal peripheral interface. With terminal access, because the encryption device needs to be used together, the information on the terminal can be encrypted and processed, that is, the form of hard encryption and software encryption is adopted, and the encryption reliability is higher, so that the individual in the terminal can be effectively guaranteed. Information security.
另外,当确定与终端匹配的加密设备已接入终端时,对所述终端上的 已加密信息进行相应操作;这样,所有加密过的信息可随意迁移,更换终端后仍可对原加密过的信息进行读取和修改;在所述终端上进行加密相关的功能性设置,当终端遗失后,由于需要终端与加密设备配合使用,才能获取到加密的信息,并且还会删除终端上的加密信息,如此,他人是无法获取终端中的加密数据的。In addition, when it is determined that the encryption device that matches the terminal has accessed the terminal, The encrypted information is operated accordingly; thus, all the encrypted information can be freely migrated, and the original encrypted information can still be read and modified after the terminal is replaced; the encryption related functional setting is performed on the terminal, when the terminal After the loss, the terminal needs to cooperate with the encryption device to obtain the encrypted information, and also deletes the encrypted information on the terminal, so that others cannot obtain the encrypted data in the terminal.
加密设备与终端的分开设置,使得即使终端受到攻击时,由于终端上的信息已经进行加密,所以仍然无法访问终端上的加密信息;并且,加密设备与终端的分开设置,使得加密设备可以同时在多个终端上使用,解决了目前很多用户使用多个终端,且只有一个终端有加密功能的缺点;另外,当用户有多个终端时,只要加密设备未遗失,则有终端遗失时,会删除遗失的终端上的加密信息,保证了终端遗失后对加密信息的安全处理。The encryption device and the terminal are separately arranged, so that even if the terminal is attacked, since the information on the terminal has been encrypted, the encrypted information on the terminal cannot be accessed; and the encryption device is separately set from the terminal, so that the encryption device can simultaneously The use of multiple terminals solves the shortcomings of many users currently using multiple terminals, and only one terminal has an encryption function; in addition, when the user has multiple terminals, as long as the encryption device is not lost, the terminal will be deleted if the terminal is lost. The encrypted information on the lost terminal ensures the secure processing of the encrypted information after the terminal is lost.
加密设备与终端的分开设置,使得成本低于现有的硬加密终端。The separate arrangement of the encryption device and the terminal makes the cost lower than the existing hard encryption terminal.
当需要对传输的音频数据加密时,会关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能,而利用加密设备来采集音频数据,即所有要传输的音频数据只能通过加密设备进行采集并进行加密处理,并通过终端的射频单元发射出去,当接收端没有相对应的加密设备时,接收端将无法识别加密的音频数据;加密设备可配对或一对多使用,接收端只需要配套使用相同标识码的加密设备,就可清楚地还原加密过的音频数据,保证了双方通话内容的安全。目前市场上已有加密产品,大都集成在终端内部,虽然能保证通话内容安全,但仅限于固定配对的终端,本发明实施例的方案,只要加密设备相配对成功,用户无论使用任何手机都可以实现安全的通话,不受使用的终端的限制。When the transmitted audio data needs to be encrypted, the MIC of the terminal is turned off, and all recording and collecting functions of the terminal are disabled, and the audio data is collected by using the encryption device, that is, all the audio data to be transmitted can only be The encryption device collects and encrypts the data, and transmits it through the radio unit of the terminal. When the receiving end does not have a corresponding encryption device, the receiving end cannot recognize the encrypted audio data; the encryption device can be paired or used one-to-many. The receiving end only needs to use the encryption device with the same identification code, so that the encrypted audio data can be clearly restored, and the content of the conversation between the two parties is ensured. Currently, there are already encryption products on the market, which are mostly integrated in the terminal. Although the content of the call can be secure, it is limited to the fixed paired terminal. The solution of the embodiment of the present invention can be used as long as the encryption device is successfully paired. A secure call is not restricted by the terminal being used.
当通过声纹密码对信息进行加密处理时,会关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能,而利用加密设备来采集声纹信息,即所有的声纹信息只能通过加密设备进行采集,如此,保证了声纹识别设 备的统一,保证了每次采集的声纹信息差异最小,同时也保证声纹信息采集过程中的安全。When the information is encrypted by the voiceprint password, the MIC of the terminal is turned off, and all recording and collection functions of the terminal are disabled, and the voiceprint information, that is, all voiceprint information is collected by using the encryption device. It can only be collected by an encryption device, thus ensuring the voiceprint recognition The uniformity of the preparation ensures the minimum difference of the voiceprint information collected each time, and also ensures the safety during the collection of the voiceprint information.
实施例二Embodiment 2
本发明实施例信息处理方法,包括:加密设备通过终端的外围接口接入所述终端后,加密设备采集用户的声纹信息;加密设备利用采集的用户的声纹信息对所述终端上需要加密的信息进行加密处理;或者,将采集的用户的声纹信息进行加密处理。The information processing method of the embodiment of the present invention includes: after the encryption device accesses the terminal through the peripheral interface of the terminal, the encryption device collects the voiceprint information of the user; and the encryption device uses the collected voiceprint information of the user to encrypt the terminal. The information is encrypted; or the collected voiceprint information of the user is encrypted.
其中,所述声纹信息可以是用户的音频信息。The voiceprint information may be audio information of the user.
加密设备利用采集的用户的声纹信息对终端上需要加密的信息进行加密处理的方式可以称为声纹加密方式;The manner in which the encryption device encrypts the information that needs to be encrypted on the terminal by using the voiceprint information of the collected user may be referred to as a voiceprint encryption method;
由于加密设备将采集的声纹信息进行加密处理采用的是:加密设备自身的加密算法对采集的声纹信息进行加密处理,所以这种方式可以称为硬加密方式。Because the encryption device encrypts the collected voiceprint information, the encryption algorithm of the encryption device encrypts the collected voiceprint information, so this method can be called hard encryption.
实施例三Embodiment 3
本实施例以手机为例,描述对终端中的信息进行处理的方法,如图2所示,该方法包括以下步骤:This embodiment uses a mobile phone as an example to describe a method for processing information in a terminal. As shown in FIG. 2, the method includes the following steps:
步骤201:检测是否有设备接入手机中,如果是,则执行步骤202,否则,执行步骤205;Step 201: Detect whether a device is connected to the mobile phone, if yes, go to step 202, otherwise, go to step 205;
这里,当检测到有设备接入时,就启动了识别流程。Here, when it is detected that there is device access, the identification process is started.
步骤202:判断接入的设备是否是加密设备,如果是,则执行步骤203,否则,执行步骤205;Step 202: Determine whether the accessed device is an encryption device, if yes, proceed to step 203, otherwise, perform step 205;
这里,每个加密设备都具有唯一的一个标识码,如IMEI一样作为每个加密设备的唯一识别码,通过获取加密设备的唯一标识码来判断接入的设备是否加密设备。Here, each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
步骤203:判断加密设备的硬件标识与保存的加密信息标识是否匹配, 如果匹配,则执行步骤204,否则,执行步骤205;Step 203: Determine whether the hardware identifier of the encryption device matches the saved encrypted information identifier. If yes, go to step 204, otherwise, go to step 205;
这里,当确定接入的设备是加密设备时,会启动与手机上的与加密设备配套的配套软件,由配套软件来判断加密设备的硬件标识与保存的加密信息标识是否匹配。Here, when it is determined that the accessed device is an encryption device, the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
如果加密设备的硬件标识与保存的加密信息标识匹配,则表明接入的加密设备是与该手机匹配的加密设备,可以利用加密设备进行手机上的信息的相关处理,如果加密设备的硬件标识与保存的加密信息标识不匹配,则表明接入的加密设备不是与该手机匹配的加密设备,不能进行手机上的信息的相关处理。If the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
步骤204:对手机上的信息进行加密相关的处理;Step 204: Perform encryption-related processing on the information on the mobile phone;
这里,当加密设备的硬件标识与保存的加密信息标识匹配时,可以反馈信息到手机的用户界面(UI,User Interface)上,以提示用户。Here, when the hardware identifier of the encryption device matches the saved encryption information identifier, the information may be fed back to the user interface (UI, User Interface) of the mobile phone to prompt the user.
当用户看到提示信息后,可以对手机上的信息进行加密相关的处理;其中,所述对手机上的信息进行加密相关的处理可以包括:对手机内的已加密信息进行任何操作,对未加密的信息进行加密,对配套软件进行功能性设置等;After the user sees the prompt information, the information on the mobile phone may be subjected to encryption related processing; wherein the processing related to encrypting the information on the mobile phone may include: performing any operation on the encrypted information in the mobile phone, The encrypted information is encrypted, and the supporting software is functionally set;
这里,对手机内的已加密信息进行任何操作,比如:拷贝、迁移、删除、解密、存储等;Here, any operation is performed on the encrypted information in the mobile phone, such as copying, migrating, deleting, decrypting, storing, etc.
对配套软件进行功能性设置,比如:设置安全时限、是否启动信息安全处理流程等;Perform functional settings on the supporting software, such as setting the security time limit, whether to start the information security processing process, etc.
涉及信息加密和解密的操作由加密设备来执行。The operations involving information encryption and decryption are performed by an encryption device.
需要加密、解密的信息可以包括:文字信息、图片信息等。The information that needs to be encrypted and decrypted may include: text information, picture information, and the like.
步骤205:不进行任何操作。Step 205: No operation is performed.
这里,实际应用时,用户使用手机的过程中,配套软件会实时对加密设备进行监控,一旦检测到加密设备被拔出,则立刻停止所有操作,并关 闭手机的液晶显示器(LCD,Liquid Crystal Display),所有已加密的信息都将会无法被读取和操作。Here, in the actual application, during the process of using the mobile phone, the supporting software monitors the encrypted device in real time, and once it detects that the encrypted device is pulled out, immediately stops all operations and closes Closed mobile phone LCD (Liquid Crystal Display), all encrypted information will not be able to be read and operated.
实际应用时,配套软件可同时安装在一部或多部手机上;用户只需要在第一次使用时与本加密设备配对即可,如此,可实现一套设备对多部手机的信息进行加密相关操作。In actual application, the supporting software can be installed on one or more mobile phones at the same time; the user only needs to pair with the encryption device when using the first time, so that a device can encrypt the information of multiple mobile phones. Related operations.
实施例四Embodiment 4
本实施例以手机为例,描述终端遗失后对终端中的信息进行处理的方法,如图3所示,该方法包括以下步骤:In this embodiment, a mobile phone is taken as an example to describe a method for processing information in a terminal after the terminal is lost. As shown in FIG. 3, the method includes the following steps:
步骤300:在与加密设备配套的配套软件上设置安全时限功能;Step 300: Set a security time limit function on the supporting software matched with the encryption device.
这里,用户可以在配套软件上设置安全时限,设置安全时限后即设置了安全时限功能;其中,可以根据需要设置安全时限,比如设置安全时限为一周等。Here, the user can set the security time limit on the supporting software, and set the security time limit function after setting the security time limit; wherein, the security time limit can be set as needed, for example, setting the security time limit to one week.
步骤301:在与加密设备配套的配套软件上设置安全时限功能后,配套软件记录每次加密设备的使用情况,并开始计时;Step 301: After setting the security time limit function on the supporting software matched with the encryption device, the supporting software records the usage of each encryption device, and starts timing;
这里,记录的加密设备的使用情况主要包括:每次加密设备的使用时间。Here, the usage of the recorded encryption device mainly includes: the usage time of the device is encrypted each time.
步骤302:当计时的时长达到设置的安全时限的时长时,通过UI提示用户安全时限已到达,并提示用户进行相应的操作,之后执行步骤303;Step 302: When the duration of the timing reaches the set security time duration, the UI prompts the user that the security time limit has arrived, and prompts the user to perform the corresponding operation, and then proceeds to step 303;
这里,当当前使用加密设备的时间距离上一次使用加密设备的时间小于设置的安全时限时长时,配套软件会重新开始计时。Here, when the time when the encryption device is currently used is longer than the time when the encryption device is used last time, the supporting software restarts timing.
当计时的时长达到设置的安全时限的时长时,启动了安全机制,从而通过UI提上用户安全时限已到达,提示用户进行相应的操作。When the duration of the timing reaches the set security time limit, the security mechanism is activated, so that the user security time limit has been reached through the UI, prompting the user to perform the corresponding operation.
实际应用时,可以在配套软件上预先设置提示操作,比如:短信通知预先设置的安全手机,或者,将已加密信息上传至预先设置的安全邮箱等。In actual application, the prompt operation may be preset in the supporting software, for example, the short message notifies the preset security mobile phone, or uploads the encrypted information to a preset security email.
步骤303:当在预设时间段内未收到用户进行操作的指示后,配套软件 删除手机上所有的已加密信息。Step 303: After receiving the instruction that the user performs the operation within the preset time period, the supporting software Delete all encrypted information on your phone.
这里,提示用户后,如果在预设时间段内未收到用户进行操作的指示,说明用户未进行任何操作,这种情况下,可以认为手机已丢失,用户已经无法使用该手机,此时,配套软件会删除手机上所有的已加密信息。Here, after the user is prompted, if the user does not receive an instruction to perform the operation within the preset time period, the user has not performed any operation. In this case, the mobile phone may be considered to be lost, and the user is unable to use the mobile phone. The companion software will delete all encrypted information on the phone.
实施例五Embodiment 5
本实施例以手机为例,描述通过对声纹信息的加密,实现通话过程安全保护的方法,如图4所示,该方法包括以下步骤:In this embodiment, a mobile phone is taken as an example to describe a method for implementing security protection of a call process by encrypting voiceprint information. As shown in FIG. 4, the method includes the following steps:
步骤401:检测是否有设备接入手机中,如果是,则执行步骤402,否则,执行步骤409;Step 401: Detect whether a device is connected to the mobile phone, if yes, proceed to step 402, otherwise, perform step 409;
这里,当检测到有设备接入时,就启动了识别流程。Here, when it is detected that there is device access, the identification process is started.
步骤402:判断接入的设备是否是加密设备,如果是,则执行步骤403,否则,执行步骤409;Step 402: Determine whether the accessed device is an encryption device, if yes, proceed to step 403, otherwise, perform step 409;
这里,每个加密设备都具有唯一的一个标识码,如IMEI一样作为每个加密设备的唯一识别码,通过获取加密设备的唯一标识码来判断接入的设备是否加密设备。Here, each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
步骤403:判断加密设备的硬件标识与保存的加密信息标识是否匹配,如果匹配,则执行步骤404,否则,执行步骤409;Step 403: Determine whether the hardware identifier of the encryption device matches the saved encryption information identifier, if yes, go to step 404, otherwise, go to step 409;
这里,当确定接入的设备是加密设备时,会启动与手机上的与加密设备配套的配套软件,由配套软件来判断加密设备的硬件标识与保存的加密信息标识是否匹配。Here, when it is determined that the accessed device is an encryption device, the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
如果加密设备的硬件标识与保存的加密信息标识匹配,则表明接入的加密设备是与该手机匹配的加密设备,可以利用加密设备进行手机上的信息的相关处理,如果加密设备的硬件标识与保存的加密信息标识不匹配,则表明接入的加密设备不是与该手机匹配的加密设备,不能进行手机上的信息的相关处理。 If the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
其中,在本实施例中:所述进行手机上的信息的相关处理是指:当用户发起语音通话时,对语音信息进行加密处理。In this embodiment, the performing related processing of the information on the mobile phone means: when the user initiates a voice call, encrypting the voice information.
步骤404:当用户发起语音通话时,判断是否启动通话保护功能,如果是,则执行步骤405,否则执行步骤408;Step 404: When the user initiates a voice call, it is determined whether to activate the call protection function, and if so, step 405 is performed, otherwise step 408 is performed;
这里,当用户发起语音通话时,通过UI提示用户是否启动通话保护功能,收到用户启动通话保护功能的指示后,执行步骤405,收到用户不启动通话保护功能的指示后,执行步骤408。Here, when the user initiates a voice call, the UI prompts the user whether to activate the call protection function, and after receiving the user's instruction to start the call protection function, step 405 is performed, and after receiving the instruction that the user does not activate the call protection function, step 408 is performed.
通话保护功能只能在已经配对的两个加密设备之间进行,也就是说,作为发送方的手机和作为接收方的手机上插接有已经配对的两个加密设备。The call protection function can only be performed between two encrypted devices that have already been paired, that is, two mobile devices that have been paired are connected to the mobile phone as the sender and the mobile phone as the recipient.
步骤405:配套软件关闭手机自带的MIC,并禁用手机的所有录音及采集功能,之后执行步骤406;Step 405: The supporting software turns off the MIC of the mobile phone, and disables all recording and collecting functions of the mobile phone, and then performs step 406;
这里,当收到用户启动通话保护功能的指示时,配套软件进入通话保护模式。Here, when receiving the indication that the user initiates the call protection function, the accessory software enters the call protection mode.
步骤406:通话建立后,加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;Step 406: After the call is established, the encryption device collects audio data of the user, and performs encryption processing on the collected audio data.
这里,加密后的音频数据已经无法识别内容,必须经过解密处理才能被识别。Here, the encrypted audio data has no content to be recognized, and must be decrypted to be recognized.
进行加密处理的方式与多种,本发明实施例不对加密所采用的算法进行限定。There are many ways to perform the encryption process, and the embodiment of the present invention does not limit the algorithm used for encryption.
步骤407:将加密处理后的音频数据通过手机的射频单元发出;Step 407: Send the encrypted audio data to the radio unit of the mobile phone;
这里,当接收方收到的加密的音频数据后,读取加密的音频数据对应的加密设备的硬件标识,并判断读取的硬件标识是否与本地的加密设备的硬件标识相匹配,确定匹配时,利用本地的加密设备对接收的音频数据进行解密处理,即对收到的音频数据进行还原,从而识别出音频数据;确定 不匹配时,则无法对接收到的音频数据进行还原,进而无法识别收到的音频数据。Here, after the encrypted audio data received by the receiver, the hardware identifier of the encryption device corresponding to the encrypted audio data is read, and it is determined whether the read hardware identifier matches the hardware identifier of the local encryption device, and the matching is determined. Decrypting the received audio data by using a local encryption device, that is, restoring the received audio data, thereby identifying the audio data; determining When there is no match, the received audio data cannot be restored, and the received audio data cannot be recognized.
呼叫方和被叫方均采用上述方式处理音频数据,这样,两个正在通信的手机就建立了一个加密通话的环境。Both the calling party and the called party process the audio data in the above manner, so that the two communicating mobile phones establish an environment for encrypted calls.
步骤408:手机进行正常的语音通话;Step 408: The mobile phone performs a normal voice call.
步骤409:不进行任何操作。Step 409: No operation is performed.
需要说明的是:采用本发明实施例的方案,不仅可以实现一对一的安全通信,还可以实现一对多的安全通信,从而建立不同的加密语音或加密数据的传输,而一对多的安全通信过程中的加密数据实现一一对应,不会被其它手机识别,在实现一对多的安全通信时,加密设备的唯一标识码可以通过配套软件或生成二维码的方式发送到需要配对的另一个接入有加密设备的手机上,从而使这两个接入有加密设备的手机进行匹配。由于加密设备的唯一标识码需要和加密设备配套使用,所以即使发送唯一标识码被第三方截取,或唯一标识码被泄露,仍然无法使用。It should be noted that, by adopting the solution of the embodiment of the present invention, not only one-to-one secure communication but also one-to-many secure communication can be realized, thereby establishing different encrypted voice or encrypted data transmission, and one-to-many The encrypted data in the secure communication process has a one-to-one correspondence and is not recognized by other mobile phones. When implementing one-to-many secure communication, the unique identification code of the encryption device can be sent to the pair to be matched by using the supporting software or generating a two-dimensional code. The other is connected to the mobile phone with the encryption device, so that the two mobile phones with access to the encryption device are matched. Since the unique identification code of the encryption device needs to be used together with the encryption device, even if the unique identification code is intercepted by a third party, or the unique identification code is leaked, it cannot be used.
当实现一对多的安全通信时,配套软件可以标注配对的插接有加密设备的多个手机各自对应的名称和权限,通过这种方式,可以快速实现一对一或一对多的配对。When one-to-many secure communication is implemented, the supporting software can mark the corresponding names and permissions of the paired mobile phones with the encrypted device, and in this way, one-to-one or one-to-many pairing can be quickly realized.
同理,已配对的插接有加密设备的两个手机还可以发送除音频数据外的其它所有信息,比如:图片信息、短消息信息等。Similarly, the two mobile phones that have been paired with the encryption device can also send all the information except the audio data, such as picture information, short message information, and the like.
实施例六Embodiment 6
本实施例以手机为例,描述通过声纹密码对数据进行加密相关处理的方法,如图5所示,该方法包括以下步骤:In this embodiment, a mobile phone is taken as an example to describe a method for performing encryption related processing on data by a voiceprint password. As shown in FIG. 5, the method includes the following steps:
步骤501:检测是否有设备接入手机中,如果是,则执行步骤502,否则,执行步骤506;Step 501: Detect whether a device is connected to the mobile phone, if yes, go to step 502, otherwise, go to step 506;
这里,当检测到有设备接入时,就启动了识别流程。 Here, when it is detected that there is device access, the identification process is started.
步骤502:判断接入的设备是否是加密设备,如果是,则执行步骤503,否则,执行步骤506;Step 502: Determine whether the accessed device is an encryption device, if yes, go to step 503, otherwise, go to step 506;
这里,每个加密设备都具有唯一的一个标识码,如IMEI一样作为每个加密设备的唯一识别码,通过获取加密设备的唯一标识码来判断接入的设备是否加密设备。Here, each encryption device has a unique identification code, such as the IMEI as the unique identification code of each encryption device, and determines whether the accessed device encrypts the device by acquiring the unique identification code of the encryption device.
步骤503:判断加密设备的硬件标识与保存的加密信息标识是否匹配,如果匹配,则执行步骤504,否则,执行步骤506;Step 503: Determine whether the hardware identifier of the encryption device matches the saved encryption information identifier, if yes, go to step 504, otherwise, go to step 506;
这里,当确定接入的设备是加密设备时,会启动与手机上的与加密设备配套的配套软件,由配套软件来判断加密设备的硬件标识与保存的加密信息标识是否匹配。Here, when it is determined that the accessed device is an encryption device, the supporting software matched with the encryption device on the mobile phone is started, and the supporting software determines whether the hardware identifier of the encryption device matches the saved encrypted information identifier.
如果加密设备的硬件标识与保存的加密信息标识匹配,则表明接入的加密设备是与该手机匹配的加密设备,可以利用加密设备进行手机上的信息的相关处理,如果加密设备的硬件标识与保存的加密信息标识不匹配,则表明接入的加密设备不是与该手机匹配的加密设备,不能进行手机上的信息的相关处理。If the hardware identifier of the encryption device matches the saved encryption information identifier, it indicates that the encrypted device that is accessed is an encryption device that matches the mobile phone, and the encryption device can be used to process related information on the mobile phone, if the hardware identifier of the encryption device is If the stored encrypted information identifier does not match, it indicates that the encrypted device that is accessed is not an encrypted device that matches the mobile phone, and cannot process related information on the mobile phone.
其中,在本实施例中:所述进行手机上的信息的相关处理是指:对信息进行加密处理。In this embodiment, the performing related processing of the information on the mobile phone refers to: performing encryption processing on the information.
步骤504:当确定采用声纹加密方式时,配套软件关闭手机自带的MIC,并禁用手机的所有录音及采集功能,之后执行步骤505;Step 504: When it is determined that the voiceprint encryption mode is adopted, the supporting software turns off the MIC of the mobile phone, and disables all the recording and collecting functions of the mobile phone, and then performs step 505;
这里,加密设备可以两种加密方式,分别为硬加密方式和声纹加密方式;其中,硬加密方式是指:采用加密设备自身的加密算法直接进行加密处理;声纹加密方式是指:采用采集的声纹信息进行加密处理。Here, the encryption device may be in two encryption modes, namely a hard encryption mode and a voiceprint encryption mode; wherein, the hard encryption mode refers to: directly using an encryption algorithm of the encryption device to perform encryption processing; the voiceprint encryption method refers to: using acquisition The voiceprint information is encrypted.
步骤505:加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理;Step 505: The encryption device collects the voiceprint information of the user, and encrypts the information that needs to be encrypted by using the collected voiceprint information.
这里,加密后的信息已经无法识别内容,必须经过解密处理才能被识 别。Here, the encrypted information has no way to identify the content, and must be decrypted before it can be recognized. do not.
需要加密的信息利用声纹信息加密成功后,可以实现在手机与手机间,或手机与电脑间的传输。用户使用时只需要通过声纹信息进行解密即可。After the information that needs to be encrypted is successfully encrypted by voiceprint information, it can be transmitted between the mobile phone and the mobile phone, or between the mobile phone and the computer. Users only need to decrypt the voiceprint information.
步骤506:不进行任何操作。Step 506: No operation is performed.
实施例七Example 7
为实现实施例一的方法,本实施例提供了一种信息处理装置,如图6所示,该装置包括:确定单元61及处理单元62;其中,To implement the method of the first embodiment, the present embodiment provides an information processing apparatus. As shown in FIG. 6, the apparatus includes: a determining unit 61 and a processing unit 62;
确定单元61,配置为确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备,并在确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,触发处理单元62;The determining unit 61 is configured to determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, and when determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal , trigger processing unit 62;
处理单元62,配置为收到确定单元61的触发后,对所述终端上的信息进行加密相关处理。The processing unit 62 is configured to perform encryption related processing on the information on the terminal after receiving the trigger of the determining unit 61.
其中,确定单元61进一步包括:检测模块、第一确定模块及第二确定模块;其中,The determining unit 61 further includes: a detecting module, a first determining module, and a second determining module; wherein
检测模块,配置为检测到通过所述外围接口有设备接入所述终端时,触发第一确定模块;a detecting module, configured to trigger the first determining module when a device that accesses the terminal through the peripheral interface is detected;
第一确定模块,配置为确定接入的设备为加密设备时,触发第二确定模块;a first determining module, configured to: when determining that the accessed device is an encrypted device, triggering a second determining module;
第二确定模块,配置为收到第一确定模块的触发后,确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配时,触发处理单元62。The second determining module is configured to trigger the processing unit 62 when it is determined that the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal after receiving the trigger of the first determining module.
这里,当确定接入的设备不为加密设备时,第一确定模块不进行任何操作。Here, when it is determined that the accessed device is not an encrypted device, the first determining module does not perform any operation.
当确定加密设备的硬件标识与所述终端上保存的加密信息标识不匹配时,说明接入的加密设备不是与所述终端相匹配的加密设备,此时,第二确定模块不进行任何操作。 When it is determined that the hardware identifier of the encryption device does not match the encrypted information identifier stored on the terminal, the encrypted device that is accessed is not the encryption device that matches the terminal. At this time, the second determining module does not perform any operation.
所述终端上的信息进行加密相关处理的具体实现,可以包括以下至少之一:The specific implementation of the encryption related processing on the information on the terminal may include at least one of the following:
对所述终端上的已加密信息进行相应操作;Performing corresponding operations on the encrypted information on the terminal;
采用所述与所述终端相匹配的加密设备对所述终端上的未加密信息进行加密;Encrypting the unencrypted information on the terminal by using the encryption device matched with the terminal;
在所述终端上进行加密相关的功能性设置。Encryption-related functional settings are performed on the terminal.
其中,所述对所述终端上的已加密信息进行相应操作,可以是:拷贝、迁移、删除、解密、存储等;所有加密过的信息可随意迁移,更换终端后仍可以对这些原有的加密信息进行读取、修改等等;针对现有的加密方式,比如T卡软加密方式,本发明实施例的方案,加密后的信息不受终端的限制,可以随时迁移,解决了用户更换终端后加密信息无法读取的问题。The corresponding operations on the encrypted information on the terminal may be: copying, migrating, deleting, decrypting, storing, etc.; all the encrypted information may be randomly transferred, and the original can still be replaced after the terminal is replaced. The encrypted information is read, modified, and the like; for the existing encryption method, such as the T-card soft encryption mode, the solution of the embodiment of the present invention, the encrypted information is not restricted by the terminal, and can be migrated at any time, and the user replaces the terminal. After the encrypted information could not be read.
所述在所述终端上进行加密相关的功能性设置,可以是:设置安全时限、是否启动信息安全处理流程等。The function setting related to encryption on the terminal may be: setting a security time limit, whether to start an information security processing flow, and the like.
这里,当在所述终端上设置安全时限功能时,处理单元62包括:记录模块、提示模块及删除模块;其中,Here, when the security time limit function is set on the terminal, the processing unit 62 includes: a recording module, a prompting module, and a deleting module;
记录模块,配置为记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;a recording module, configured to record each use situation of the encryption device that matches the terminal, and start timing;
提示模块,配置为当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;The prompting module is configured to prompt the user to perform corresponding operations when the duration of the timing reaches a preset security time limit;
删除模块,配置为当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已加密的信息。The module is deleted, and all the encrypted information on the terminal is deleted after the user does not receive the instruction to perform the operation within the preset duration.
其中,当预设时长内未收到用户进行操作的指示时,表明所述终端已遗失,删除模块删除所述终端上已有加密的信息后,当终端遗失时,他人无法获取终端中的已加密信息。If the terminal does not receive the indication that the user performs the operation within the preset duration, it indicates that the terminal has been lost. After the deletion module deletes the encrypted information on the terminal, when the terminal is lost, the other party cannot obtain the already Encrypt information.
通话过程中,当需要对传输的音频数据加密时,处理单元62可以包括: 第一关闭模块及第一控制模块;其中,During the call, when it is required to encrypt the transmitted audio data, the processing unit 62 may include: a first shutdown module and a first control module; wherein
第一关闭模块,配置为关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能;a first shutdown module configured to turn off the MIC that is provided by the terminal, and disable all recording and collection functions of the terminal;
第一控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;并将加密处理后的音频数据通过终端的射频单元发出。The first control module is configured to collect the audio data of the user by using the encryption device matched with the terminal, and perform encryption processing on the collected audio data; and send the encrypted audio data to the radio unit of the terminal.
相应地,接收端需要接入与发送端的加密设备相匹配的加密设备,这样的话,当接收端收到加密的音频数据后,可以利用接入接收端的加密设备对收到的音频数据进行解密处理,从而使接收端可以识别出收到的音频数据。Correspondingly, the receiving end needs to access an encryption device that matches the encryption device of the sending end. In this way, after receiving the encrypted audio data, the receiving end can decrypt the received audio data by using an encryption device connected to the receiving end. So that the receiving end can recognize the received audio data.
当通过声纹密码对信息进行加密处理时,处理单元62可以包括:第二关闭模块及第二控制模块;其中,When the information is encrypted by the voiceprint password, the processing unit 62 may include: a second shutdown module and a second control module; wherein
第二关闭模块,配置为关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能;a second shutdown module configured to turn off the MIC that is provided by the terminal, and disable all recording and collection functions of the terminal;
第二控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理。The second control module is configured to collect the voiceprint information of the user by using the encryption device matched with the terminal, and perform encryption processing on the information that needs to be encrypted by using the collected voiceprint information.
其中,采用采集的声纹信息加密后的信息可以任意传输,使用时用户只需要通过声纹信息进行解密即可。Among them, the information encrypted by the collected voiceprint information can be arbitrarily transmitted, and the user only needs to decrypt by voiceprint information when using.
当需要发送所述终端上的加密信息时,可以通过所述终端的射频单元发出已加密的信息;相应地,接收端需要接入与发送端的加密设备相匹配的加密设备,这样的话,当接收端收到加密的信息后,可以利用接入接收端的加密设备对收到的信息进行解密处理,从而使接收端可以识别出收到的信息。When the encrypted information on the terminal needs to be sent, the encrypted information may be sent by the radio unit of the terminal; correspondingly, the receiving end needs to access an encryption device matching the encryption device of the sending end, so that when receiving After receiving the encrypted information, the terminal may use the encryption device accessing the receiving end to decrypt the received information, so that the receiving end can recognize the received information.
实际应用时,检测模块、第一确定模块、第二确定模块、记录模块、删除模块、第一关闭模块、第一控制模块、第二关闭模块及第二控制模块 可由信息处理装置中的处理器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)实现;提示模块可由信息处理装置中的显示器实现。In actual application, the detecting module, the first determining module, the second determining module, the recording module, the deleting module, the first closing module, the first control module, the second closing module, and the second control module It can be implemented by a processor (CPU, Central Processing Unit), a digital signal processor (DSP) or a Field-Programmable Gate Array (FPGA) in the information processing device; the prompting module can be used in the information processing device Display implementation.
本发明实施例的信息处理装置,当确定单元确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,处理单元对所述终端上的信息进行加密相关处理,加密设备通过终端外围接口与终端接入,由于需要加密设备的配合使用,才能对终端上的信息进行加密相关处理,即采用了硬加密配合软件加密的形式,加密可靠性更高,如此,能有效地保证终端中个人信息的安全性。In the information processing apparatus of the embodiment of the present invention, when the determining unit determines that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, the processing unit performs encryption related processing on the information on the terminal, and the encryption device Through the peripheral interface of the terminal and the terminal access, because the encryption device needs to be used together, the information on the terminal can be encrypted and processed, that is, the form of hard encryption and software encryption is adopted, and the encryption reliability is higher, so that the information can be effectively Ensure the security of personal information in the terminal.
另外,当确定与终端匹配的加密设备已接入终端时,处理单元对所述终端上的已加密信息进行相应操作;这样,所有加密过的信息可随意迁移,更换终端后仍可对原加密过的信息进行读取和修改;在所述终端上进行加密相关的功能性设置,当终端遗失后,由于需要终端与加密设备配合使用,才能获取到加密的信息,并且还会删除终端上的加密信息,如此,他人是无法获取终端中的加密数据的。In addition, when it is determined that the encryption device matched with the terminal has accessed the terminal, the processing unit performs corresponding operations on the encrypted information on the terminal; thus, all the encrypted information can be freely migrated, and the original encryption can still be performed after the terminal is replaced. The information is read and modified; the functional setting related to encryption is performed on the terminal. After the terminal is lost, the encrypted information can be obtained because the terminal needs to cooperate with the encryption device, and the encrypted information is also deleted. Encrypted information, so that others cannot obtain encrypted data in the terminal.
加密设备与终端的分开设置,使得即使终端受到攻击时,由于终端上的信息已经进行加密,所以仍然无法访问终端上的加密信息;并且,加密设备与终端的分开设置,使得加密设备可以同时在多个终端上使用,解决了目前很多用户使用多个终端,且只有一个终端有加密功能的缺点;另外,当用户有多个终端时,只要加密设备未遗失,则有终端遗失时,会删除遗失的终端上的加密信息,保证了终端遗失后对加密信息的安全处理。The encryption device and the terminal are separately arranged, so that even if the terminal is attacked, since the information on the terminal has been encrypted, the encrypted information on the terminal cannot be accessed; and the encryption device is separately set from the terminal, so that the encryption device can simultaneously The use of multiple terminals solves the shortcomings of many users currently using multiple terminals, and only one terminal has an encryption function; in addition, when the user has multiple terminals, as long as the encryption device is not lost, the terminal will be deleted if the terminal is lost. The encrypted information on the lost terminal ensures the secure processing of the encrypted information after the terminal is lost.
加密设备与终端的分开设置,使得成本低于现有的硬加密终端。The separate arrangement of the encryption device and the terminal makes the cost lower than the existing hard encryption terminal.
当需要对传输的音频数据加密时,第一关闭模块会关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能,而第一控制模块利用加 密设备来采集音频数据,即所有要传输的音频数据只能通过加密设备进行采集并进行加密处理,并通过终端的射频单元发射出去,当接收端没有相对应的加密设备时,接收端将无法识别加密的音频数据;加密设备可配对或一对多使用,接收端只需要配套使用相同标识码的加密设备,就可清楚地还原加密过的音频数据,保证了双方通话内容的安全。目前市场上已有加密产品,大都集成在终端内部,虽然能保证通话内容安全,但仅限于固定配对的终端,本发明实施例的方案,只要加密设备相配对成功,用户无论使用任何手机都可以实现安全的通话,不受使用的终端的限制。When the transmitted audio data needs to be encrypted, the first shutdown module turns off the MIC that is provided by the terminal, and disables all recording and collection functions of the terminal, and the first control module utilizes The secret device collects audio data, that is, all audio data to be transmitted can only be collected and encrypted by the encryption device, and transmitted through the radio unit of the terminal. When the receiving end does not have a corresponding encryption device, the receiving end cannot The encrypted audio data is identified; the encryption device can be paired or used one-to-many, and the receiving end only needs to use the encryption device with the same identification code, so that the encrypted audio data can be clearly restored, and the content of the conversation between the two parties is ensured. Currently, there are already encryption products on the market, which are mostly integrated in the terminal. Although the content of the call can be secure, it is limited to the fixed paired terminal. The solution of the embodiment of the present invention can be used as long as the encryption device is successfully paired. A secure call is not restricted by the terminal being used.
当通过声纹密码对信息进行加密处理时,第二关闭模块会关闭所述终端自带的MIC,并禁用所述终端的所有录音及采集功能,而第二控制模块利用加密设备来采集声纹信息,即所有的声纹信息只能通过加密设备进行采集,如此,保证了声纹识别设备的统一,保证了每次采集的声纹信息差异最小,同时也保证声纹信息采集过程中的安全。When the information is encrypted by the voiceprint password, the second shutdown module turns off the MIC that is provided by the terminal, and disables all recording and collection functions of the terminal, and the second control module uses the encryption device to collect the voiceprint. Information, that is, all voiceprint information can only be collected by the encryption device, thus ensuring the uniformity of the voiceprint recognition device, ensuring the minimum difference of the voiceprint information collected each time, and also ensuring the security during the voiceprint information collection process. .
实施例八Example eight
为实现实施例二的方法,本实施例提供一种加密设备,如图7所示,该加密设备包括:采集单元71及加密单元72;其中,To implement the method of the second embodiment, the embodiment provides an encryption device. As shown in FIG. 7, the encryption device includes: an acquisition unit 71 and an encryption unit 72;
采集单元71,配置为加密设备通过终端的外围接口接入所述终端后,采集用户的声纹信息;The collecting unit 71 is configured to collect the voiceprint information of the user after the encryption device accesses the terminal through the peripheral interface of the terminal;
加密单元72,配置为利用采集的用户的声纹信息对终端上需要加密的信息进行加密处理;或者,配置为将采集的用户的声纹信息进行加密处理。The encryption unit 72 is configured to perform encryption processing on the information that needs to be encrypted on the terminal by using the collected voiceprint information of the user, or configured to perform encryption processing on the collected voiceprint information of the user.
其中,所述声纹信息可以是用户的音频信息。The voiceprint information may be audio information of the user.
加密单元72利用采集的用户的声纹信息对终端上需要加密的信息进行加密处理的方式可以称为声纹加密方式;由于加密单元72将采集的声纹信息进行加密处理采用的是:加密设备自身的加密算法对采集的声纹信息进行加密处理,所以这种方式可以称为硬加密方式。 The encryption unit 72 uses the collected voiceprint information of the user to encrypt the information that needs to be encrypted on the terminal, which may be referred to as a voiceprint encryption method. The encryption unit 72 encrypts the collected voiceprint information by using an encryption device. The encryption algorithm of the own encrypts the collected voiceprint information, so this method can be called hard encryption.
该加密设备还可以包括:存储单元,配置为存储用户的重要特征数据;存储单元可作为用户的扩展数据存储器;其中,所述重要特征数据根据用户的需要来确定。The encryption device may further include: a storage unit configured to store important feature data of the user; the storage unit may serve as an extended data storage of the user; wherein the important feature data is determined according to a user's needs.
该加密设备还可以包括:控制单元,配置为控制包括采集单元71及加密单元72的各单元之间的工作;还可以配置为控制该加密设备的电源,以便给该加密设备供电。The encryption device may further include: a control unit configured to control operations between the units including the acquisition unit 71 and the encryption unit 72; and may be further configured to control power of the encryption device to supply power to the encryption device.
实际应用时,采集单元71可由加密设备中的MIC实现,加密单元72及控制单元可由加密设备中的CPU、DSP或FPGA实现,存储单元可由加密设备中的存储器实现。In practical applications, the acquisition unit 71 can be implemented by an MIC in an encryption device, and the encryption unit 72 and the control unit can be implemented by a CPU, a DSP or an FPGA in the encryption device, and the storage unit can be implemented by a memory in the encryption device.
实际应用时,如图8a所示,加密设备的规格符合手机外围接口标准,例如耳机接口、USB接口、WIFI接口、蓝牙接口、NFC接口等,相应地,加密设备可以通过有线和无线两类方式与终端连接,当采用不同的接口时,为了实现加密设备采集声纹信息的功能,需要终端同时支持采用的接口所对应的相关音频协议;举个例子来说,假设选择的接口为USB接口,为了实现加密设备采集声纹信息的功能,则需要终端自身支持通过USB接口音频传输的功能;假设选择的接口为WIFI接口时,为了实现加密设备采集声纹信息的功能,则需要终端自身支持通过WIFI接口传输音频的功能。加密设备的外形可以作成各种饰品,比如:耳环等佩戴首饰,也可挂在钥匙链上的收纳套内,方便用户随身携带,同时在用户不使用的时候,也可与终端分开保存,增加了安全性。In practical application, as shown in Figure 8a, the specifications of the encryption device conform to the standards of the peripheral interface of the mobile phone, such as a headphone interface, a USB interface, a WIFI interface, a Bluetooth interface, an NFC interface, etc., accordingly, the encryption device can be wired and wireless. When connecting to a terminal, when a different interface is used, in order to implement the function of the voice device to collect voiceprint information, the terminal needs to support the related audio protocol corresponding to the adopted interface; for example, the selected interface is a USB interface. In order to implement the function of the voice device to collect voiceprint information, the terminal itself needs to support the function of audio transmission through the USB interface. If the selected interface is a WIFI interface, in order to implement the function of the voice device to collect voiceprint information, the terminal needs to support the terminal itself. The function of transmitting audio on the WIFI interface. The shape of the encryption device can be made into various accessories, such as earrings and other wearing jewelry, or can be hung in the storage sleeve of the key chain, which is convenient for the user to carry around, and can also be stored separately from the terminal when the user does not use it, Security.
实际应用时,如图8b所示,加密设备的内部集成有音频模块、硬件加密模块、存储模块以及集成控制模块;分别对应图7中的采集单元、加密单元、存储单元及控制单元。In actual application, as shown in FIG. 8b, the encryption device is internally integrated with an audio module, a hardware encryption module, a storage module, and an integrated control module; respectively corresponding to the acquisition unit, the encryption unit, the storage unit, and the control unit in FIG.
其中,音频模块,通过自带MIC的采集音频信息,同时分辨声纹信息;The audio module collects audio information by using the MIC itself, and simultaneously distinguishes the voiceprint information;
硬件加密模块是加密设备的核心部件,内置有Ukey硬加密信息,用户 可以把主要加密算法放到硬件加密模块内部,从而保证用户信息的安全,所有数据通过硬件加密模块进行加密、解密;The hardware encryption module is the core component of the encryption device, and has built-in Ukey hard encryption information for users. The main encryption algorithm can be placed inside the hardware encryption module to ensure the security of the user information, and all data is encrypted and decrypted by the hardware encryption module;
存储模块,内置有存储器,可存储用户的信息以及终端上的信息,内部存储器可作为用户扩展数据存储器,存放重要特征数据;The storage module has a built-in memory for storing user information and information on the terminal, and the internal memory can be used as a user extended data storage to store important feature data;
集成控制模块,控制加密设备的电源,同时控制各模块间的工作。An integrated control module that controls the power of the encryption device while controlling the operation between the modules.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现 在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. Instructions are provided for implementation The steps of a function specified in a block or blocks of a flow or a flow and/or a block diagram of a flow chart.
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。 The above is only the preferred embodiment of the present invention and is not intended to limit the scope of the present invention.

Claims (17)

  1. 一种信息处理方法,所述方法包括:An information processing method, the method comprising:
    确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备;Determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal;
    对所述终端上的信息进行加密相关处理。Encryption related processing is performed on the information on the terminal.
  2. 根据权利要求1所述的方法,其中,所述确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备,包括:The method of claim 1, wherein the determining that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal comprises:
    检测到通过所述外围接口有设备接入所述终端;Detecting that a device is accessed by the peripheral interface through the peripheral interface;
    确定接入的设备为加密设备;Determining that the accessed device is an encrypted device;
    确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配。It is determined that the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal.
  3. 根据权利要求1所述的方法,其中,所述对所述终端上的信息进行加密相关处理,包括以下至少之一:The method according to claim 1, wherein said encrypting related information on said terminal comprises at least one of:
    对所述终端上的已加密信息进行相应操作;Performing corresponding operations on the encrypted information on the terminal;
    采用所述与所述终端相匹配的加密设备对所述终端上的未加密信息进行加密;Encrypting the unencrypted information on the terminal by using the encryption device matched with the terminal;
    在所述终端上进行加密相关的功能性设置。Encryption-related functional settings are performed on the terminal.
  4. 根据权利要求1所述的方法,其中,当在所述终端上设置安全时限功能时,所述对所述终端上的信息进行加密相关处理,包括:The method according to claim 1, wherein when the security time limit function is set on the terminal, the encrypting related information on the information on the terminal includes:
    记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;Recording each use situation of the encryption device matched with the terminal, and starting timing;
    当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;When the duration of the timing reaches the preset security time limit, the user is prompted to perform the corresponding operation;
    当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已加密的信息。After receiving the indication that the user performs the operation within the preset duration, all the encrypted information on the terminal is deleted.
  5. 根据权利要求1所述的方法,其中,通话过程中,当需要对传输的音频数据加密时,所述对所述终端上的信息进行加密相关处理,包括: The method according to claim 1, wherein during the call, when the transmitted audio data needs to be encrypted, the encrypting related information on the information on the terminal includes:
    关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;Turn off the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
    利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;Acquiring audio data of the user by using the encryption device matched with the terminal, and performing encryption processing on the collected audio data;
    将加密处理后的音频数据通过终端的射频单元发出。The encrypted audio data is sent through the radio unit of the terminal.
  6. 根据权利要求1所述的方法,其中,当通过声纹密码对信息进行加密处理时,所述对所述终端上的信息进行加密相关处理,包括:The method of claim 1, wherein the encrypting the information on the terminal when the information is encrypted by the voiceprint cipher comprises:
    关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;Turn off the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
    利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处理。The voiceprint information of the user is collected by using the encryption device matched with the terminal, and the information to be encrypted is encrypted by using the collected voiceprint information.
  7. 一种信息处理方法,所述方法包括:An information processing method, the method comprising:
    加密设备通过终端的外围接口接入所述终端后,加密设备采集用户的声纹信息;After the encryption device accesses the terminal through the peripheral interface of the terminal, the encryption device collects the voiceprint information of the user;
    加密设备利用采集的用户的声纹信息对与自身匹配的终端上需要加密的信息进行加密处理;或者,将采集的用户的声纹信息进行加密处理。The encryption device encrypts the information that needs to be encrypted on the terminal that matches the user by using the collected voiceprint information of the user, or encrypts the collected voiceprint information of the user.
  8. 一种信息处理装置,所述装置包括:确定单元及处理单元;其中,An information processing apparatus, the apparatus comprising: a determining unit and a processing unit; wherein
    所述确定单元,配置为确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备,并在确定通过终端的外围接口接入的设备为与所述终端相匹配的加密设备时,触发所述处理单元;The determining unit is configured to determine that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal, and determines that the device accessed through the peripheral interface of the terminal is an encryption device that matches the terminal. Triggering the processing unit;
    所述处理单元,配置为收到所述确定单元的触发后,对所述终端上的信息进行加密相关处理。The processing unit is configured to perform encryption related processing on the information on the terminal after receiving the trigger of the determining unit.
  9. 根据权利要求8所述的装置,其中,所述确定单元包括:检测模块、第一确定模块及第二确定模块;其中,The apparatus according to claim 8, wherein the determining unit comprises: a detecting module, a first determining module, and a second determining module; wherein
    所述检测模块,配置为检测到通过所述外围接口有设备接入所述终端时,触发所述第一确定模块;The detecting module is configured to trigger the first determining module when a device that accesses the terminal through the peripheral interface is detected;
    所述第一确定模块,配置为确定接入的设备为加密设备时,触发所述 第二确定模块;The first determining module is configured to: when the determined access device is an encrypted device, trigger the Second determining module;
    所述第二确定模块,配置为收到第一确定模块的触发后,确定加密设备的硬件标识与所述终端上保存的加密信息标识匹配时,触发所述处理单元。The second determining module is configured to trigger the processing unit when the hardware identifier of the encryption device matches the encrypted information identifier saved on the terminal, after receiving the trigger of the first determining module.
  10. 根据权利要求8所述的装置,其中,所述处理单元包括:记录模块、提示模块及删除模块;其中,The device according to claim 8, wherein the processing unit comprises: a recording module, a prompting module, and a deleting module; wherein
    所述记录模块,配置为当在所述终端上设置安全时限功能时,记录所述与所述终端相匹配的加密设备的每次使用情况,并开始计时;The recording module is configured to: when the security time limit function is set on the terminal, record each use situation of the encryption device that matches the terminal, and start timing;
    所述提示模块,配置为当计时的时长达到预设的安全时限的时长时,提示用户进行相应的操作;The prompting module is configured to prompt the user to perform a corresponding operation when the duration of the timing reaches a preset security time limit;
    所述删除模块,配置为当预设时长内未收到用户进行操作的指示后,删除所述终端上所有已加密的信息。The deleting module is configured to delete all the encrypted information on the terminal after receiving the indication that the user performs the operation within the preset duration.
  11. 根据权利要求8所述的装置,其中,所述处理单元包括:第一关闭模块及第一控制模块;其中,The apparatus according to claim 8, wherein the processing unit comprises: a first shutdown module and a first control module; wherein
    所述第一关闭模块,配置为通话过程中,当需要对传输的音频数据加密时关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;The first shutdown module is configured to close the microphone that is provided by the terminal when the encrypted audio data needs to be encrypted, and disable all recording and collection functions of the terminal;
    所述第一控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的音频数据,并对采集的音频数据进行加密处理;并将加密处理后的音频数据通过终端的射频单元发出。The first control module is configured to collect audio data of the user by using the encryption device matched with the terminal, and perform encryption processing on the collected audio data; and pass the encrypted audio data to the radio unit of the terminal. issue.
  12. 根据权利要求8所述的装置,其中,所述处理单元包括:第二关闭模块及第二控制模块;其中,The apparatus according to claim 8, wherein the processing unit comprises: a second shutdown module and a second control module; wherein
    所述第二关闭模块,配置为关闭所述终端自带的麦克,并禁用所述终端的所有录音及采集功能;The second shutdown module is configured to close the microphone that is provided by the terminal, and disable all recording and collection functions of the terminal;
    所述第二控制模块,配置为利用所述与所述终端相匹配的加密设备采集用户的声纹信息,并利用采集的声纹信息对需要加密的信息进行加密处 理。The second control module is configured to collect the voiceprint information of the user by using the encryption device matched with the terminal, and encrypt the information that needs to be encrypted by using the collected voiceprint information. Reason.
  13. 一种加密设备,所述加密设备包括:采集单元及加密单元;其中,An encryption device, the encryption device includes: an acquisition unit and an encryption unit;
    所述采集单元,配置为加密设备通过终端的外围接口接入所述终端后,采集用户的声纹信息;The collecting unit is configured to collect the voiceprint information of the user after the encryption device accesses the terminal through the peripheral interface of the terminal;
    所述加密单元,配置为利用采集的用户的声纹信息对终端上需要加密的信息进行加密处理;或者,配置为将采集的用户的声纹信息进行加密处理。The encryption unit is configured to perform encryption processing on the information that needs to be encrypted on the terminal by using the collected voiceprint information of the user, or configured to perform encryption processing on the collected voiceprint information of the user.
  14. 根据权利要求13所述的加密设备,其中,所述加密设备还包括:存储单元,配置为存储用户的重要特征数据。The encryption device according to claim 13, wherein the encryption device further comprises: a storage unit configured to store important feature data of the user.
  15. 根据权利要求13所述的加密设备,其中,所述加密设备还包括:控制单元,配置为控制所述采集单元及所述加密单元之间的工作。The encryption device according to claim 13, wherein the encryption device further comprises: a control unit configured to control an operation between the collection unit and the encryption unit.
  16. 根据权利要求15所述的加密设备,其中,所述控制单元,还配置为控制所述加密设备的电源。The encryption device according to claim 15, wherein said control unit is further configured to control a power source of said encryption device.
  17. 一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行如权利要求1至6任一项所述的信息处理方法或执行如权利要求7所述的信息处理方法。 A computer storage medium comprising a set of instructions that, when executed, cause at least one processor to perform the information processing method of any one of claims 1 to 6 or perform the method of claim 7 The information processing method described.
PCT/CN2014/087166 2014-07-16 2014-09-23 Information processing method and apparatus, encryption device and computer storage medium WO2015117333A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410337525.4A CN104158657A (en) 2014-07-16 2014-07-16 Information processing method and device, as well as encryption equipment
CN201410337525.4 2014-07-16

Publications (1)

Publication Number Publication Date
WO2015117333A1 true WO2015117333A1 (en) 2015-08-13

Family

ID=51884071

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087166 WO2015117333A1 (en) 2014-07-16 2014-09-23 Information processing method and apparatus, encryption device and computer storage medium

Country Status (2)

Country Link
CN (1) CN104158657A (en)
WO (1) WO2015117333A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933647A (en) * 2019-11-28 2020-03-27 长城汽车股份有限公司 Vehicle-mounted Bluetooth control method and system and vehicle
CN111356044A (en) * 2018-12-20 2020-06-30 Gn 奥迪欧有限公司 Audio communication system and method of operating an audio communication system
CN111601310A (en) * 2020-04-03 2020-08-28 厦门快商通科技股份有限公司 Voice print identification-based call encryption method and system and mobile terminal
CN111756532A (en) * 2020-06-08 2020-10-09 西安万像电子科技有限公司 Data transmission method and device

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792097A (en) * 2014-12-24 2016-07-20 希姆通信息技术(上海)有限公司 Information sending terminal, receiving terminal and information transmission system
CN110059452B (en) * 2016-10-14 2020-12-22 杭州优稳自动化系统有限公司 Softdog device
CN106487659B (en) * 2016-10-20 2022-12-20 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information encryption device and terminal
CN108601008A (en) * 2018-05-04 2018-09-28 济南浪潮高新科技投资发展有限公司 It is a kind of based on encryption device of the quantum true random number with bluetooth
CN108696351A (en) * 2018-05-04 2018-10-23 济南浪潮高新科技投资发展有限公司 A kind of encryption device based on quantum true random number
CN108429969B (en) * 2018-05-28 2019-12-03 Oppo广东移动通信有限公司 Audio frequency playing method, device, terminal, earphone and readable storage medium storing program for executing
CN108924144B (en) * 2018-07-13 2020-12-22 Oppo广东移动通信有限公司 Data acquisition method, data acquisition system, terminal and diagnosis tool
CN109492384B (en) * 2018-09-26 2021-07-20 成都卫士通信息产业股份有限公司 Method for receiving entity access and accessing password device, password device and entity

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221519A (en) * 2008-01-02 2008-07-16 青岛海信移动通信技术股份有限公司 Read-write debugging method for flash memory device in processor system
CN203313411U (en) * 2013-06-08 2013-11-27 山东量子科学技术研究院有限公司 Plug-and-play type portable secure communication device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100426220C (en) * 2001-12-29 2008-10-15 中兴通讯股份有限公司 Device for realizing software down loading using single-chip processor in communication system and its method
US7970143B2 (en) * 2005-08-05 2011-06-28 Hewlett-Packard Development Company, L.P. System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system
CN100461105C (en) * 2007-02-01 2009-02-11 中兴通讯股份有限公司 Update and repair method of intellectualized equipment and system thereof
CN102436568B (en) * 2010-09-29 2014-12-17 苏州慧尔科技发展有限公司 Computer external encryption device with storage function and encryption and decryption method utilizing same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221519A (en) * 2008-01-02 2008-07-16 青岛海信移动通信技术股份有限公司 Read-write debugging method for flash memory device in processor system
CN203313411U (en) * 2013-06-08 2013-11-27 山东量子科学技术研究院有限公司 Plug-and-play type portable secure communication device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111356044A (en) * 2018-12-20 2020-06-30 Gn 奥迪欧有限公司 Audio communication system and method of operating an audio communication system
CN111356044B (en) * 2018-12-20 2023-11-21 Gn 奥迪欧有限公司 Audio communication system and method of operating an audio communication system
CN110933647A (en) * 2019-11-28 2020-03-27 长城汽车股份有限公司 Vehicle-mounted Bluetooth control method and system and vehicle
CN110933647B (en) * 2019-11-28 2022-09-30 长城汽车股份有限公司 Vehicle-mounted Bluetooth control method and system and vehicle
CN111601310A (en) * 2020-04-03 2020-08-28 厦门快商通科技股份有限公司 Voice print identification-based call encryption method and system and mobile terminal
CN111756532A (en) * 2020-06-08 2020-10-09 西安万像电子科技有限公司 Data transmission method and device

Also Published As

Publication number Publication date
CN104158657A (en) 2014-11-19

Similar Documents

Publication Publication Date Title
WO2015117333A1 (en) Information processing method and apparatus, encryption device and computer storage medium
JP6938702B2 (en) Hearing devices with communication protection and related methods
US10038676B2 (en) Call encryption systems and methods
CN104486083A (en) Supervisory video processing method and device
WO2015158043A1 (en) Method, terminal and system for protecting terminal security
WO2013078796A1 (en) Mobile phone and communication method thereof
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
JP2021007233A (en) Device and related method for secure hearing device communication
JP6397046B2 (en) Address book protection method, apparatus and communication system
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
JP2016129010A (en) Hearing device with service mode and related method
CN105681365B (en) Method and apparatus for file transmission
CN104852800A (en) Data transmission method and device
WO2011088660A1 (en) Method and apparatus for protecting cell-phone information content
JP6349712B2 (en) Mobile device setting method
KR20160121828A (en) Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
WO2015090055A1 (en) Method, device and apparatus for storing and reading data
WO2016146046A1 (en) Data access method and device
CN108270917B (en) Encrypted smart phone
CN104703175B (en) Data security protection method and device for mobile terminal
JP2007113245A (en) Control system and portable terminal
JP6061617B2 (en) Mobile communication terminal and terminal control program
CN104038932B (en) A kind of safety equipment
TWI433526B (en) An equipment and method for automatic defense the mobile phone
KR101049174B1 (en) Hands free with security function and control method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14881570

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14881570

Country of ref document: EP

Kind code of ref document: A1