WO2017063438A1 - 一种语音加密方法、系统和装置 - Google Patents

一种语音加密方法、系统和装置 Download PDF

Info

Publication number
WO2017063438A1
WO2017063438A1 PCT/CN2016/093968 CN2016093968W WO2017063438A1 WO 2017063438 A1 WO2017063438 A1 WO 2017063438A1 CN 2016093968 W CN2016093968 W CN 2016093968W WO 2017063438 A1 WO2017063438 A1 WO 2017063438A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice
voice data
public key
server
encrypted
Prior art date
Application number
PCT/CN2016/093968
Other languages
English (en)
French (fr)
Inventor
周文
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017063438A1 publication Critical patent/WO2017063438A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • Embodiments of the present invention relate to, but are not limited to, voice communication technologies, and in particular, to a voice encryption method, system, and terminal.
  • the smart terminal includes a smart phone and a tablet.
  • voice information exchange is a common communication method, and the risk of voice data being intercepted is also exposed.
  • the voice call modes in the current mobile office system mainly include the following: (1) Directly making a call through the carrier network to implement a voice call. In this way, the carrier network is used to implement voice communication, which is easy to be monitored by radio. (2) Make a network call through the data network. In this way, VoIP faces the threat of insecure hotspots, and voice messages are easily eavesdropped. (3) Realizing short message voice calls through various mobile phone applications. This method is similar to WeChat voice short message, and the third-party company server saves the voice information of both communication parties, which is easy to be cracked and has security risks.
  • the technical problem to be solved by the embodiments of the present invention is to provide a voice encryption method, system, and terminal, which are used to solve the problem of low security of voice communication and narrow application range of voice encryption mode in the prior art.
  • an embodiment of the present invention provides a voice encryption method, including:
  • the transmitted voice data is encrypted by the recipient public key, so that the receiver uses the private key of the user. Decrypt the received voice data.
  • the encrypting the sent voice data by using the receiver public key includes:
  • the sender acquires the recipient public key from a server
  • the sender encrypts the transmitted voice data by using the receiver public key, and transmits the encrypted voice data to the receiver.
  • the encrypting the sent voice data by using the receiver public key includes:
  • the sender encrypts the transmitted voice data by using its own private key, and sends the encrypted voice data to the server;
  • the server decrypts the voice data by using a sender public key
  • the server encrypts the voice data by using the recipient public key, and transmits the encrypted voice data to the receiver.
  • the method before the encrypting the sent voice data by using the receiver public key, the method further includes:
  • the sender determines whether it is necessary to encrypt the transmitted voice data, and if so, encrypts the transmitted voice data by using the recipient public key.
  • the determining whether the voice data to be sent needs to be encrypted includes:
  • the sending direction server queries whether the number of the receiving party is in the enterprise mobile office address book, and if so, encrypts the sent voice data; otherwise, no encryption is needed.
  • the method further includes: the sender and the receiver generate an asymmetrically encrypted public key and a private key, and generate the generated public key Upload to the server.
  • the embodiment of the present invention further provides a voice encryption system, including a server and a plurality of terminals, wherein the server is respectively connected to the plurality of terminals; the server stores a public key of each terminal, and each terminal stores its own Private key
  • the voice data is encrypted by using a public key of the receiver, and after receiving the encrypted voice data, the receiver decrypts by using the private key of the receiver; or
  • the voice data is encrypted by using a sender private key and sent to a server, and the server uses the hair
  • the sender public key decrypts the received voice data; the server encrypts the decrypted voice data by using the receiver public key, and transmits the encrypted voice data to the receiver.
  • the sender includes:
  • a first public key obtaining module configured to acquire a public key of the receiver from the server
  • the first voice encryption module is configured to encrypt the voice data by using the obtained public key
  • the first data transmission module is configured to send the encrypted voice data to the recipient.
  • the sender includes:
  • the second voice encryption module is configured to encrypt the voice data by using the private key thereof;
  • a second data transmission module configured to send the encrypted voice data to the server
  • the server includes:
  • the first voice decryption module is configured to decrypt the voice data sent by the sender by using a sender public key
  • a third voice encryption module configured to encrypt the voice data by using a receiver public key
  • the third data transmission module is configured to send the encrypted voice data to the receiver.
  • the sender further includes a number querying module, configured to query the server whether the number of the recipient is in the enterprise mobile office address book.
  • the terminal includes a key generation module configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server.
  • a key generation module configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server.
  • the embodiment of the present invention further provides a terminal, including a key generation module, a voice encryption module, a voice transmission module, and a number query module, where
  • a key generation module configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • the voice encryption module is configured to encrypt the voice data by using the obtained public key, or encrypt the voice data by using the private key of the terminal;
  • the voice transmission module is configured to send the voice data encrypted by using the obtained public key to the receiver, or send the voice data encrypted by using the private key of the terminal where the terminal is located to the server.
  • the method further includes: a public key obtaining module, configured to acquire the public key of the receiver from the server.
  • a public key obtaining module configured to acquire the public key of the receiver from the server.
  • the method further includes: a number querying module, configured to query the server whether the number of the recipient is in the enterprise mobile office address book.
  • An embodiment of the present invention further provides a terminal, including a key generation module and a voice decryption module, where
  • a key generation module configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • the voice decryption module is configured to decrypt the received encrypted voice data by using its own private key.
  • the embodiment of the invention further provides a terminal, including:
  • a key generation module configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • a voice encryption module configured to encrypt voice data by using a private key of the user or a public key of the other party for voice transmission;
  • a voice transmission module configured to send encrypted voice data to a server or another party terminal for voice transmission
  • the voice decryption module is configured to decrypt the received encrypted voice data by using its own private key.
  • the terminal further includes a public key obtaining module, configured to acquire, from the server, a public key of the other terminal that performs voice transmission.
  • a public key obtaining module configured to acquire, from the server, a public key of the other terminal that performs voice transmission.
  • the terminal further includes a number querying module, configured to query the server whether the number of the other terminal that performs the voice transmission is in the enterprise mobile office address book.
  • the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions for performing any of the above voice encryption methods.
  • the voice data is encrypted, and the encryption and decryption adopt different manners, so that the whole process of the voice data from the terminal to the receiving is highly secure, and the voice security problem in the enterprise mobile office is solved.
  • the key of the call is obtained through the enterprise office server, and the operator network is not required to be modified, and the signaling and channel overhead are not involved.
  • the encryption and decryption of the voice does not need to cooperate with the encryption signaling of the operator.
  • the terminal does not require custom development.
  • FIG. 1 is a schematic structural diagram of a voice encryption system according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic structural diagram of a terminal according to Embodiment 2 of the present invention.
  • FIG. 3 is a flowchart of a voice encryption method according to Embodiment 3 of the present invention.
  • FIG. 4 is a flowchart of a sender voice communication according to Embodiment 3 of the present invention.
  • FIG. 5 is a flow chart of receiving party voice communication according to Embodiment 3 of the present invention.
  • FIG. 6 is a flowchart of server service processing according to Embodiment 3 of the present invention.
  • FIG. 7 is a flowchart of a voice encryption method according to Embodiment 5 of the present invention.
  • the inventors have found that the existing encryption technology involves the design of the signaling flow on the network side and the customized development of the terminal.
  • the non-CDMA2000 user cannot use this technology, and the non-customized encrypted mobile phone cannot be used.
  • voice calls are no longer limited to operators. For this reason, it is necessary to expand the voice encryption method to accommodate all carrier users and all intelligent terminals, even if they are owed by mobile phones.
  • you can also Voice encryption is used by other networks such as wifi, and in this case, existing encryption techniques cannot be applied.
  • the voice encryption system includes a server 11 and a plurality of terminals.
  • the voice encryption system includes a server 11 and a plurality of terminals.
  • enterprises will deploy back-end servers to manage enterprise employee information, emails, services and other information.
  • the server is further configured to: collect and manage the public key of the terminal, and respond to the public key request of the calling terminal (the calling party shown in the figure), and actively send the public key to the called terminal (as shown in the figure). The called party).
  • the enterprise mobile office software is installed on the terminal, and the software is set to generate an asymmetric key, interact with the server, and voice call.
  • This embodiment takes two terminals: the sender 12 and the receiver 13 as an example.
  • the server 11 is connected to the sender 12 and the receiver 13, respectively; the server 11 stores the public key of the sender 12 and the receiver 13, and the sender 12 and the receiver 13 respectively store their own private key.
  • Voice data transmission is performed between the sender 12 and the receiver 13, the voice data is encrypted by the public key of the receiver 13, and after receiving the encrypted voice data, the receiver 13 decrypts with its own private key.
  • the voice data is encrypted by the sender private key and sent to the server, and the server decrypts the received voice data by using the sender public key; the server encrypts the decrypted voice data by using the receiver public key, and encrypts the encrypted voice data.
  • Voice data is sent to the recipient.
  • the sender includes: a first public key obtaining module configured to acquire the public key of the receiver from the server; the first voice encryption module is configured to encrypt the voice data by using the obtained public key; the first data transmission module , configured to send the encrypted voice data to the recipient;
  • the sender includes a second voice encryption module, configured to encrypt the voice data by using the private key thereof; the second data transmission module is configured to send the encrypted voice data to the server; correspondingly, the server includes: a first voice decryption module, And configured to decrypt the voice data sent by the sender by using a sender public key; the third voice encryption module is configured to encrypt the voice data by using a receiver public key; and the third data transmission module is configured to encrypt Voice data is sent to receive square.
  • Both the sender 12 and the receiver 13 include a key generation module configured to generate an asymmetrically encrypted public and private key and upload the generated public key to the server 11.
  • both the calling party and the called party act as the sender and receiver of the voice, encrypt the voice by using the public key of the other party, decrypt the voice by using the private key of the party, and complete the encrypted call process.
  • the sender 12 initiates a call with the called party 13 as an example.
  • the terminal is the sender 12
  • the key generation module 21, the voice encryption module 22, the voice transmission module 23, and the number query module 26 are included.
  • the key generation module 21 is configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • the voice encryption module 22 is configured to encrypt the voice data by using the obtained public key
  • the voice transmission module 23 is arranged to transmit the encrypted voice data to the receiver 13.
  • the sender further includes a public key acquisition module 25 configured to acquire the public key of the recipient 13 from the server 11.
  • the sender further includes a number query module 26 configured to query the server 11 whether the number of the recipient 13 is in the corporate mobile office directory.
  • the terminal when the terminal is the receiver 13, at least the key generation module 21 and the voice decryption module 24 are included, where
  • the key generation module 21 is configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • the voice decryption module 24 is arranged to decrypt the received encrypted voice data using its own private key.
  • the structure of a terminal in the embodiment of the present invention is as shown in FIG. 2.
  • the terminal in this embodiment can be used as a sender or a receiver.
  • the terminal includes a key generation module 21, a voice encryption module 22, and a voice.
  • the key generation module 21 is connected to the voice encryption module 22 and the voice decryption module 24, respectively.
  • the encryption module 22 is connected to the public key acquisition module 25 and the voice transmission module 23, respectively, and the number query module 26 is connected to the public key acquisition module 25.
  • the key generation module 21 is configured to generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server;
  • the voice encryption module 22 is configured to encrypt the voice data by using the private key of the user or the public key of the other terminal for voice transmission;
  • the voice transmission module 23 is configured to send the encrypted voice data to the server or the other terminal that performs the voice transmission;
  • the voice decryption module 24 is configured to decrypt the received encrypted voice data by using its own private key
  • the public key obtaining module 25 is configured to acquire, from the server, a public key of the other terminal that performs voice transmission;
  • the number querying module 26 is configured to query the server whether the number of the other terminal that performs the voice transmission is in the enterprise mobile office directory.
  • the voice transmission module 23, the public key acquisition module 25, and the number query module 26 are integrated in the mobile office application software, and the mobile office application software provides necessary office application functions, and also supports connection with the server, and the network is unblocked. Upload and download the public key under the premise, and support voice communication.
  • the key generation module 21 is a program module that is attached to the mobile office application. The key generation module 21 can automatically generate a pair of asymmetric password pairs, that is, a public key and a private key. The data encrypted by the public key can only be used by the corresponding private. Key decryption, data encrypted with the private key can only be decrypted with the corresponding public key, where the public key can be made public.
  • the voice encryption module 22 is a program module that is attached to the mobile office application.
  • the module can acquire the microphone voice data of the terminal, encrypt the voice data by using the public key of the receiver, and then send the encryption after the encryption is completed.
  • the voice decryption module 24 is a program module that is attached to the mobile office application. The module can accept the encrypted voice data, decrypt the voice data by using the public key of the voice sender, and play the decrypted voice.
  • FIG. 3 When the voice encryption system of the embodiment 1 and the terminal of the embodiment 2 are used, a voice encryption method according to an embodiment of the present invention is shown in FIG. 3, and the method includes the following steps:
  • Step s301 the sender and the receiver respectively generate an asymmetrically encrypted public key and a private key, and The public key is uploaded to the server.
  • a pair of unique asymmetric encryption keys are generated by the mobile office software on the mobile phone, and the data encrypted by the public key can only be decrypted by the corresponding private key, and the data encrypted by the private key only has the corresponding public key. Can be decrypted.
  • the public key is sent to the server and is kept by the server.
  • the private key is kept by the terminal and updated periodically.
  • step s302 it is determined whether the transmitted voice data needs to be encrypted. If yes, the process proceeds to step s303, otherwise the non-encrypted communication is initiated and the process ends.
  • the process of determining whether to encrypt the sent voice data in the step includes: querying the server whether the number of the receiver is in the enterprise mobile office address book, and if so, encrypting the sent voice data; if receiving The party number is not in the corporate mobile office directory, and no encryption is required.
  • the mobile office software receives the enterprise mobile office address book delivered by the server, and the call with all the numbers in the address book can be set to be an encrypted call.
  • step s303 the sender obtains the recipient public key from the server.
  • the mobile office software detects whether the owner of the terminal is ready to use the call function in the background of the terminal, and if it is in the phone with the enterprise address book, obtains the public key for dialing the called party from the enterprise server, and proceeds to step s304. If you are calling in a non-business directory, you can dial directly without encryption and end the process.
  • step s304 the sender encrypts the transmitted voice data by using the receiver public key, and sends the encrypted voice data to the receiver.
  • step s305 after receiving the encrypted voice data, the receiver decrypts by using its own private key.
  • the called party also receives the calling party public key delivered by the server.
  • both the calling party and the called party encrypt the voice data with the public key of the other party, decrypt the voice data with the private key of the party, and complete the encrypted call flow.
  • Step s401 start the mobile office application software and monitor whether the owner is calling or sending voice information in the background, and the terminal can determine whether the user wants to use voice communication by monitoring the dialing message or the microphone data.
  • step s402 an asymmetric key pair is generated.
  • the key generation module 21 is generated periodically after startup. Key pair and upload the public key to the mobile office server management.
  • Step s403 to step s404 after listening to the voice communication behavior of the owner, first determine whether the called party is in the enterprise mobile office address book, and if yes, indicating that the communication content involves the enterprise member, and the encryption process is required, and the process proceeds to step s406. If not, it means that encryption processing is not required, and the process proceeds to step s405.
  • the judgment in this step is completed by the office software client querying the server.
  • the called party number is queried, it indicates that this number needs to be encrypted.
  • step s405 non-encrypted communication is initiated. End this process.
  • step s406 the public key of the called party is obtained.
  • the server informs the calling party that the called number needs to be encrypted
  • the called public key is sent to the calling party.
  • the calling party obtains the public key, it proceeds to step s407. If the acquisition of the called public key fails, the communication mode is the default non-encrypted mode, and the process ends.
  • step s407 the terminal microphone voice data is acquired.
  • step s408 the called public key is used to encrypt and then the voice is sent.
  • the flow of the receiver voice communication in this embodiment is as shown in FIG. 5, and the process includes the following steps:
  • step s501 to s502 since the called number belongs to the same enterprise mobile office data center management, after the mobile office application software is started on the terminal, an asymmetric password pair is generated, and the public key is sent to the data center server.
  • Step s503 to s504 determining whether the mobile office application client monitors whether the terminal receives the incoming call information or other voice receiving message, and once detected, determines whether the public number of the calling number delivered by the server is received, and if received, the call is indicated.
  • the encryption method may be adopted, and the process proceeds to step s506; otherwise, the process proceeds to step s505.
  • step s505 the call is received in a non-encrypted manner. End this process.
  • step s506 the encrypted public key of the calling number is obtained from the server. This behavior is initiated by the server and passively received by the called terminal. Since the mobile office software client has been connected to the server in the background, the public key acquisition and receiving calls can be processed in parallel.
  • step s507 the encrypted voice data is received, and the received voice is decrypted using the private key of the machine.
  • Step s508 to s509 when the called party wants to send voice information, the voice data is encrypted by the calling party public key sent by the server. Similarly, after the calling party receives the called party's voice, it decrypts it with its own private key.
  • server service processing in this embodiment is as shown in FIG. 6, and the process includes the following steps:
  • the enterprise mobile office data center receives and saves the report information of all the terminals monitored by the center, including the encrypted public key reported by the terminal, and the server manages the public key sent by all the terminals.
  • the server monitors in real time whether the terminal has a request to obtain the public key of the specified number. Once the request is valid, it proceeds to step s603.
  • Step s603 determining whether the designated number is in the enterprise mobile office address book, indicating that the communication content involves the enterprise member, and requires encryption processing, and proceeds to step s604;
  • Step s604 to s605 the public key of the called number specified in the request is delivered to the calling party, and the calling party public key is delivered to the called party.
  • the caller is prompted that the encrypted call cannot be implemented.
  • the calling party can implement an encrypted call.
  • the server is required to be the dispatcher of the public key, and the encryption and decryption are completed on the terminal, and the voice data transmitted by the air interface is encrypted in the whole process.
  • This embodiment describes a voice encryption system similar to that of Embodiment 1, except that the composition of the sender and the server has the following changes:
  • the sender includes a voice encryption module and a data transmission module; the voice encryption module is configured to encrypt voice data by using a private key thereof; and the data transmission module is configured to send the encrypted voice data to the server;
  • the server includes a voice decryption module, a voice encryption module, and a data transmission module; the voice decryption module is configured to decrypt the voice data sent by the sender by using a sender public key; and the voice encryption module is configured to use the receiver public key pair The voice data is encrypted; the data transmission module is configured to send the encrypted voice data to the receiver.
  • FIG. 7 a voice encryption method according to an embodiment of the present invention is shown in FIG. 7, and the method includes the following steps:
  • step s701 the sender and the receiver generate an asymmetrically encrypted public key and a private key, and upload the generated public key to the server.
  • Step s702 determining whether it is necessary to encrypt the transmitted voice data, and if so, then moving At step s703, otherwise non-encrypted communication is initiated.
  • step s703 the sender encrypts the sent voice data by using its own private key, and sends the encrypted voice data to the server.
  • step s704 the server decrypts the voice data by using the sender public key.
  • step s705 the server encrypts the voice data by using the receiver public key, and sends the encrypted voice data to the receiver.
  • step s706 after receiving the encrypted voice data, the receiver decrypts by using its own private key.
  • the server is used as a voice relay station, and the server receives the voice data encrypted by the sender with the private key, decrypts the data on the server, and then encrypts the data with the public key of the receiver, thereby reducing the acquisition of both parties in the encryption process.
  • the cost of the other party's public key is used as a voice relay station, and the server receives the voice data encrypted by the sender with the private key, decrypts the data on the server, and then encrypts the data with the public key of the receiver, thereby reducing the acquisition of both parties in the encryption process. The cost of the other party's public key.
  • the embodiment of the present invention may also adopt a symmetric encryption mode, and the receiving party obtains the encrypted password of the sender through the server before the call, and then both parties use the password to encrypt and decrypt the voice.
  • the voice data is encrypted, and the encryption and decryption adopt different manners, so that the whole process of the voice data from the terminal to the receiving is highly secure, and the voice security problem in the enterprise mobile office is solved.
  • the key of the call is obtained through the enterprise office server, and the operator network is not required to be modified, and the signaling and channel overhead are not involved.
  • the encryption and decryption of the voice does not need to cooperate with the encryption signaling of the operator.
  • the terminal does not require customized development, and the existing smart terminal can also perform the functions of the present invention. Therefore, the embodiment of the present invention makes good use of the network conditions of the enterprise mobile office to meet the high requirements of the enterprise office for information security.
  • the disclosed technical contents may be implemented in other manners.
  • the device embodiments described above are only schematic.
  • the division of the unit may be a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or may be Integrate into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, unit or module. It can be in electrical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk, and the like. .
  • the voice encryption method provided by the embodiment of the present invention includes: encrypting the transmitted voice data by using the receiver public key; and after receiving the encrypted voice data, the receiver uses the private key to perform decryption.
  • the embodiment of the invention also discloses a voice encryption system and a terminal.
  • the voice data is encrypted, and the encryption and decryption adopt different manners, so that the whole process of the voice data from the terminal to the receiving is highly secure, and the voice security problem in the enterprise mobile office is solved.
  • the key of both parties of the call is obtained through the corporate office service.
  • the server does not need to make any changes to the carrier network, and does not involve signaling and channel overhead.
  • the encryption and decryption of the voice does not need to cooperate with the encryption signaling of the operator, so the terminal does not need customized development, and the existing intelligent terminal also
  • the functions of the embodiments of the present invention can be completed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种语音加密方法,所述方法包括以下步骤:利用接收方公钥对发送的语音数据进行加密;所述接收方接收到加密的语音数据后,利用本身私钥进行解密。本发明还公开了一种语音加密系统及终端。本发明通过对语音数据进行加密,且加密和解密采用不相同秘钥的方式,使得语音数据从终端发出到接收的整个过程具有高安全性,解决了企业移动办公中的语音安全问题。而且本发明通话双方的密钥获取通过企业办公服务器,不需要运营商网络做任何改动,不涉及信令和信道开销;另外,语音的加密解密不需要配合运营商的加密信令,因此终端不需要定制化开发,现有的智能终端亦能完成本发明的功能。

Description

一种语音加密方法、系统和装置 技术领域
本发明实施例涉及但不限于语音通信技术,尤指一种语音加密方法、系统和终端。
背景技术
随着移动互联网的发展,各企业为适应时代发展,增加企业办公的灵活性,相继使用移动办公系统,移动办公系统包括移动办公服务器、智能终端以及各类移动办公业务应用。其中,智能终端包括智能手机和平板。移动办公系统在为企业办公带来便利性时,也会有巨大的信息泄露风险。其中语音信息交流又是人们常用的交流方式,同样面临语音数据被监听被泄露的风险。
当前移动办公系统中的语音通话方式主要有以下几种:(1)通过运营商网络,直接拨打电话,实现语音通话。这种方式利用运营商网络实现语音通讯,易被无线电监听。(2)通过数据网络,拨打网络电话。这种方式中网络电话面临不安全热点的威胁,语音信息很容易被窃听。(3)通过各类手机应用,实现短消息式的语音通话。这种方式类似微信的语音短消息,第三方公司服务器保存通讯双方的语音信息,很容易被破解,存在安全隐患。
现在有CDMA2000的加密通话规范,通话双方可通过CDMA网络建立起加密通话,启动加密通话时需要运营商网络通过一组标准的呼叫信令建立特定的空口业务信道,终端需要有定制开发来适应网络侧的信令交互需求,整个过程需要终端与运营商密钥管理中心交换密钥,此过程采用短信方式。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例要解决的技术问题是提供一种语音加密方法、系统和终端,用以解决现有技术的语音通讯安全性低、语音加密方式应用范围窄的问题。
为解决上述技术问题,本发明实施例提供一种语音加密方法,包括:
利用接收方公钥对发送的语音数据进行加密,以使接收方利用本身私钥 对接收到的语音数据进行解密。
可选地,所述利用接收方公钥对发送的语音数据进行加密包括:
所述发送方从服务器获取所述接收方公钥;
所述发送方利用所述接收方公钥对发送的所述语音数据进行加密,并将加密的语音数据发送给所述接收方。
可选地,所述利用接收方公钥对发送的语音数据进行加密包括:
所述发送方利用本身私钥对发送的语音数据进行加密,并将加密的语音数据发送给服务器;
服务器利用发送方公钥对所述语音数据进行解密;
服务器利用所述接收方公钥对所述语音数据进行加密,并将加密的语音数据发送给所述接收方。
可选地,所述利用接收方公钥对发送的语音数据进行加密之前,还包括:
所述发送方判断是否需要对发送的语音数据进行加密,如果是,则利用接收方公钥对发送的语音数据进行加密。
可选地,所述判断是否需要对发送的语音数据进行加密包括:
所述发送方向服务器查询所述接收方的号码是否在企业移动办公通讯录中,如果是,则需要对发送的语音数据进行加密;否则不需要加密。
可选地,所述发送方利用接收方公钥对发送的语音数据进行加密之前还包括:所述发送方和所述接收方生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器。
本发明实施例还提供一种语音加密系统,包括服务器和多个终端,所述服务器分别与所述多个终端连接;所述服务器存储有每个终端的公钥,每个终端存储有本身的私钥;
所述终端中的发送方与接收方之间进行语音数据传输,
所述语音数据利用接收方公钥进行加密,接收方接收到加密的语音数据后,利用本身私钥进行解密;或者,
所述语音数据利用发送方私钥进行加密后发送给服务器,服务器利用发 送方公钥对接收到的语音数据进行解密;服务器利用接收方公钥对解密后的语音数据进行加密,并将加密的语音数据发送给接收方。
可选地,所述发送方包括:
第一公钥获取模块,设置为从所述服务器获取所述接收方的公钥;
第一语音加密模块,设置为利用获取的公钥对语音数据进行加密;
第一数据传输模块,设置为将加密的语音数据发送给所述接收方。
可选地,所述发送方包括:
第二语音加密模块,设置为利用本身私钥对语音数据进行加密;
第二数据传输模块,设置为将加密的语音数据发送给服务器;
所述服务器包括:
第一语音解密模块,设置为利用发送方公钥对所述发送方发送的语音数据进行解密;
第三语音加密模块,设置为利用接收方公钥对所述语音数据进行加密;
第三数据传输模块,设置为将加密的语音数据发送给接收方。
可选地,所述发送方还包括号码查询模块,设置为向服务器查询所述接收方的号码是否在企业移动办公通讯录中。
可选地,所述终端包括密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器。
本发明实施例又提供一种终端,包括密钥生成模块、语音加密模块、语音传输模块和号码查询模块,其中,
密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音加密模块,设置为利用获取的公钥对语音数据进行加密,或者利用所在终端自身私钥对语音数据进行加密;
语音传输模块,设置为将利用获得的公钥加密的语音数据发送给所述接收方,或者将利用自身所在终端私钥加密后的语音数据发送给服务器。
可选地,还包括:公钥获取模块,设置为从所述服务器获取所述接收方的公钥。
可选地,还包括;号码查询模块,设置为向服务器查询所述接收方的号码是否在企业移动办公通讯录中。
本发明实施例还提供一种终端,包括密钥生成模块、语音解密模块,其中,
密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音解密模块,设置为利用本身私钥对接收到的加密语音数据进行解密。
本发明实施例再提供一种终端,包括:
密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音加密模块,设置为利用本身私钥或进行语音传输的另一方终端的公钥对语音数据进行加密;
语音传输模块,设置为将加密的语音数据发送给服务器或进行语音传输的另一方终端;
语音解密模块,设置为利用本身私钥对接收到的加密语音数据进行解密。
可选地,所述终端还包括公钥获取模块,设置为从所述服务器获取所述进行语音传输的另一方终端的公钥。
可选地,所述终端还包括号码查询模块,设置为向服务器查询所述进行语音传输的另一方终端的号码是否在企业移动办公通讯录中。
本发明实施例再提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一语音加密方法。
本发明实施例通过对语音数据进行加密,且加密和解密采用不相同密钥的方式,使得语音数据从终端发出到接收的整个过程具有高安全性,解决了企业移动办公中的语音安全问题。而且本发明实施例通话双方的密钥获取通过企业办公服务器,不需要运营商网络做任何改动,不涉及信令和信道开销;另外,语音的加密解密不需要配合运营商的加密信令,因此终端不需要定制化开发。
本发明实施例的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
此处所说明的附图用来提供对本发明实施例的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是本发明实施例1的一种语音加密系统的结构示意图;
图2是本发明实施例2的一种终端的结构示意图;
图3是本发明实施例3的一种语音加密方法的流程图;
图4是本发明实施例3的发送方语音通讯的流程图;
图5是本发明实施例3的接收方语音通讯的流程图;
图6是本发明实施例3的服务器业务处理的流程图;
图7是本发明实施例5的一种语音加密方法的流程图。
本发明的较佳实施方式
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。
发明人在实现本发明时发现,现有的加密技术涉及到网络侧的信令流程设计和终端的定制开发,对于非CDMA2000的用户无法使用此技术,同时非定制的加密手机也无法使用。另外,随着移动互联网络的发展,语音通话方式不再局限在运营商一种方式,为此有必要将语音加密方式扩大化,以适应所有运营商用户和所有智能终端,即便是在手机欠费限制上网时,亦可以 通过wifi等其他网络来使用语音加密通话,而在这种情况下,现有的加密技术也不能应用。
实施例1
本发明实施例的一种语音加密系统如图1所示,语音加密系统包括服务器11和多个终端。企业要实现移动办公,都会部署后台的服务器,用以管理企业员工信息、邮箱、业务等诸多信息;
服务器还设置为:收集并管理终端的公钥,响应主叫终端(如图中所示的主叫方)的获取公钥请求,主动下发公钥给被叫终端(如图中所示的被叫方)。
终端上安装企业移动办公软件,该软件设置为生成非对称密钥、与服务器交互、语音通话等功能。
本实施例以两个终端:发送方12和接收方13为例。所述服务器11分别与所述发送方12和接收方13连接;所述服务器11存储有发送方12和接收方13的公钥,发送方12和接收方13分别存储有本身的私钥。
在发送方12和接收方13之间进行语音数据传输,所述语音数据利用接收方13的公钥进行加密,接收方13接收到加密的语音数据后,利用本身私钥进行解密。或者,语音数据利用发送方私钥进行加密后发送给服务器,服务器利用发送方公钥对接收到的语音数据进行解密;服务器利用接收方公钥对解密后的语音数据进行加密,并将加密的语音数据发送给接收方。
具体地,
发送方包括:第一公钥获取模块,设置为从所述服务器获取所述接收方的公钥;第一语音加密模块,设置为利用获取的公钥对语音数据进行加密;第一数据传输模块,设置为将加密的语音数据发送给所述接收方;
或者,
发送方包括第二语音加密模块,设置为利用本身私钥对语音数据进行加密;第二数据传输模块,设置为将加密的语音数据发送给服务器;相应地,服务器包括:第一语音解密模块,设置为利用发送方公钥对所述发送方发送的语音数据进行解密;第三语音加密模块,设置为利用接收方公钥对所述语音数据进行加密;第三数据传输模块,设置为将加密的语音数据发送给接收 方。
发送方12和接收方13都包括密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器11。本实施例中主叫和被叫都作为语音的发送方和接收方,利用对方的公钥加密语音、利用己方的私钥解密语音,完成加密通话过程。
结合图2所示的终端组成结构示意图,这里以发送方12发起与被叫方13的通话为例,
当终端为发送方12时,至少包括密钥生成模块21、语音加密模块22、语音传输模块23和号码查询模块26,其中,
密钥生成模块21,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音加密模块22,设置为利用获取的公钥对语音数据进行加密;
语音传输模块23,设置为将加密的语音数据发送给所述接收方13。
发送方还包括:公钥获取模块25,设置为从所述服务器11获取所述接收方13的公钥。
发送方还包括:号码查询模块26,设置为向服务器11查询所述接收方13的号码是否在企业移动办公通讯录中。
相应地,当终端为接收方13,至少包括密钥生成模块21、语音解密模块24,其中,
密钥生成模块21,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音解密模块24,设置为利用本身私钥对接收到的加密语音数据进行解密。
实施例2
本发明实施例的一种终端的结构如图2所示,本实施例中的终端既可以作为发送方,也可以作为接收方,所述终端包括密钥生成模块21、语音加密模块22、语音传输模块23、语音解密模块24、公钥获取模块25和号码查询模块26;其中,
密钥生成模块21分别与语音加密模块22和语音解密模块24连接,语音 加密模块22分别与公钥获取模块25和语音传输模块23连接,号码查询模块26与公钥获取模块25连接。
密钥生成模块21,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
语音加密模块22,设置为利用本身私钥或进行语音传输的另一方终端的公钥对语音数据进行加密;
语音传输模块23,设置为将加密的语音数据发送给服务器或进行语音传输的另一方终端;
语音解密模块24,设置为利用本身私钥对接收到的加密语音数据进行解密;
公钥获取模块25,设置为从所述服务器获取所述进行语音传输的另一方终端的公钥;
号码查询模块26,设置为向服务器查询所述进行语音传输的另一方终端的号码是否在企业移动办公通讯录中。
本实施例中,语音传输模块23、公钥获取模块25和号码查询模块26集成在移动办公应用软件中,该移动办公应用软件提供必要的办公应用功能,还支持与服务器连接功能,在网络畅通的前提下上传、下载公钥,并支持语音通讯功能。密钥生成模块21是依附于移动办公应用运行的一个程序模块,密钥生成模块21可自动生成一对非对称密码对即公钥和私钥,用公钥加密的数据只能用对应的私钥解密,用私钥加密的数据也只用相应的公钥能解密,其中公钥可以公开。语音加密模块22是依附移动办公应用运行的程序模块,该模块可获取终端的话筒语音数据,利用接收方的公钥对语音数据加密,加密完成后再发送出去。语音解密模块24是依附移动办公应用运行的程序模块,该模块可接受被加密的语音数据,利用语音发送方的公钥对语音数据解密,并将解密语音播放。
实施例3
当采用实施例1的语音加密系统和实施例2的终端时,本发明实施例的一种语音加密方法如图3所示,所述方法包括以下步骤:
步骤s301,发送方和接收方分别生成非对称加密的公钥和私钥,并将生 成的公钥上传到服务器。
本实施例中,由手机上的移动办公软件生成一对唯一的非对称的加密密钥,用公钥加密的数据只有对应的私钥才能解密、用私钥加密的数据也只有对应的公钥才能解密。公钥上发到服务器,由服务器统一保管,私钥由终端保管,且定时更新。
步骤s302,判断是否需要对发送的语音数据进行加密,如果是,则进入步骤s303,否则发起非加密通讯并结束本流程。
本步骤中的判断是否需要对发送的语音数据进行加密的过程具体包括:向服务器查询接收方的号码是否在企业移动办公通讯录中,如果是,则需要对发送的语音数据进行加密;如果接收方的号码不在企业移动办公通讯录中,则不需要加密。本实施例中,移动办公软件会接收服务器下发的企业移动办公通讯录,与此通讯录中的所有号码的通话都可以设定为必须为加密通话。
步骤s303,发送方从服务器获取接收方公钥。
本实施例中,移动办公软件在终端后台检测机主是否准备使用通话功能,如果是在与企业通讯录中的电话,则从企业服务器获取拨被叫的公开密钥,并进入步骤s304。如果是拨打的非企业通讯录中的电话,则直接拔打不用加密并结束本流程。
步骤s304,发送方利用接收方公钥对发送的语音数据进行加密,并将加密的语音数据发送给接收方。
步骤s305,接收方接收到加密的语音数据后,利用本身私钥进行解密。本实施例中,被叫方也会同时接收到服务器下发的主叫方公钥。
通话建立后,主被叫双方用对方公钥加密语音数据,用己方私钥解密语音数据,完成加密通话流程。
本实施例的发送方语音通讯的流程如图4所示,主叫终端在拨号或发送语音信息前要确保移动办公客户端应用已经运行。结合图2,具体步骤如下:
步骤s401,启动移动办公应用软件并在后台监测机主是否正要拨打电话或发送语音信息,在终端上可以通过监测拨打消息或是话筒数据等来判断用户是否要使用语音通讯。
步骤s402,生成非对称密钥对。密钥生成模块21在启动后会定时生成 密钥对,并将公钥上传至移动办公服务器管理。
步骤s403~步骤s404,为监听到机主的语音通讯行为后,先判断被叫方是否在企业移动办公通讯录中,如果是,则表示为通讯内容涉及企业成员,需要加密处理,进入步骤s406;如果不是,则表示不需要加密处理,进入步骤s405。
本步骤中的判断由办公软件客户端向服务器查询来完成。当查询到被叫方号码,表示此号码需要加密处理。
步骤s405,发起非加密通讯。结束本流程。
步骤s406,获取被叫方的公钥,当服务器告知主叫方被叫号码需要加密的同时,会下发被叫的公钥给主叫方。主叫方获得公钥后,进入步骤s407。如果获取被叫公钥失败,则通讯方式为默认的非加密方式,并结束本流程。
步骤s407,获取终端话筒语音数据。
步骤s408,利用被叫公钥加密后再发送语音。
本实施例的接收方语音通讯的流程如图5所示,所述流程包括以下步骤:
步骤s501~步骤s502,由于被叫号码同样属于同一企业移动办公数据中心管理,在终端上启动移动办公应用软件后,会生成非对称密码对,并将公开密钥上发至数据中心服务器。
步骤s503~步骤s504,判断移动办公应用客户端监测终端是否收到来电信息或其他语音接收消息,一旦监测到,判断是否接收到服务器下发的主叫号码公钥,如果接收到则表示此通话可以采用加密方式,进入步骤s506;否则进入步骤s505。
步骤s505,按非加密方式接听。结束本流程。
步骤s506,从服务器获取主叫号码的加密公钥。此行为是服务器主动发起,被叫终端被动接收的。由于移动办公软件客户端一直在后台与服务器保持连接,公钥获取和接收来电可并行处理。
步骤s507,接收到加密的语音数据,使用本机的私钥解密接收到的语音。
步骤s508~步骤s509,当被叫方要发送语音信息时,则用服务器下发的主叫方公钥加密语音数据。同样,主叫方接收到被叫方语音后,则用自身的私钥解密。
本实施例的服务器业务处理的流程如图6所示,所述流程包括以下步骤:
步骤s601~步骤s602,企业移动办公数据中心会接收并保存本中心所监控的所有终端的上报信息,其中包括终端上报的加密公钥,服务器会管理所有终端上发的公钥。服务器实时监听终端是否有获取指定号码公钥的请求。一旦请求有效,则进入步骤s603。
步骤s603,判断该指定号码是否在企业移动办公通讯录中,是表示为通讯内容涉及企业成员,需要加密处理,进入步骤s604;
步骤s604~步骤s605,将请求中指定的被叫号码公钥下发至主叫方,将主叫方公钥下发至被叫方。
需要说明的是,两个下发过程有任一不成功,则提示主叫不能实现加密通话。当下发都成功后,主被叫则可实现加密通话。整个通话的过程,只需要服务器做公钥的调度者,加密和解密都在终端上完成,空口传播的语音数据全程加密。
实施例4
本实施例对一种语音加密系统进行说明,该系统与实施例1类似,其不同之处在于发送方和服务器的组成结构有以下变化:
所述发送方包括语音加密模块和数据传输模块;语音加密模块用于利用本身私钥对语音数据进行加密;数据传输模块用于将加密的语音数据发送给服务器;
所述服务器包括语音解密模块、语音加密模块和数据传输模块;语音解密模块用于利用发送方公钥对所述发送方发送的语音数据进行解密;语音加密模块用于利用接收方公钥对所述语音数据进行加密;数据传输模块用于将加密的语音数据发送给接收方。
实施例5
当采用实施例4的语音加密系统时,本发明实施例的一种语音加密方法如图7所示,所述方法包括以下步骤:
步骤s701,发送方和接收方生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器。
步骤s702,判断是否需要对发送的语音数据进行加密,如果是,则转步 骤s703,否则发起非加密通讯。
步骤s703,发送方利用本身私钥对发送的语音数据进行加密,并将加密的语音数据发送给服务器。
步骤s704,服务器利用发送方公钥对所述语音数据进行解密。
步骤s705,服务器利用接收方公钥对所述语音数据进行加密,并将加密的语音数据发送给接收方。
步骤s706,所述接收方接收到加密的语音数据后,利用本身私钥进行解密。
本实施例将服务器作为语音中转站,服务器接收到发送方用私钥加密的语音数据后在服务器上解密,再将数据用接收方的公钥加密,以此来减少通话双方在加密流程上获取对方公钥的开销。
另外,本发明实施例还可以采用对称加密方式,接收方在通话前通过服务器获得了发送方的加密密码,然后双方用此密码进行语音的加解密。
本发明实施例通过对语音数据进行加密,且加密和解密采用不相同秘钥的方式,使得语音数据从终端发出到接收的整个过程具有高安全性,解决了企业移动办公中的语音安全问题。而且本发明实施例通话双方的密钥获取通过企业办公服务器,不需要运营商网络做任何改动,不涉及信令和信道开销;另外,语音的加密解密不需要配合运营商的加密信令,因此终端不需要定制化开发,现有的智能终端亦能完成本发明的功能。所以,本发明实施例很好的利用企业移动办公的网络条件满足了企业办公对于信息安全的高要求。
尽管为示例目的,已经公开了本发明的优选实施例,本领域的技术人员将意识到各种改进、增加和取代也是可能的,因此,本发明的范围应当不限于上述实施例。
在本申请所提供的几个实施例中,应该理解到,所揭露的技术内容,可通过其它的方式实现。其中,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,可以为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,单元或模块的间接耦合或通信连接, 可以是电性或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。
工业实用性
本发明实施例提出的语音加密方法,所述方法包括:利用接收方公钥对发送的语音数据进行加密;所述接收方接收到加密的语音数据后,利用本身私钥进行解密。本发明实施例还公开了一种语音加密系统及终端。本发明实施例通过对语音数据进行加密,且加密和解密采用不相同秘钥的方式,使得语音数据从终端发出到接收的整个过程具有高安全性,解决了企业移动办公中的语音安全问题。而且本发明实施例通话双方的密钥获取通过企业办公服 务器,不需要运营商网络做任何改动,不涉及信令和信道开销;另外,语音的加密解密不需要配合运营商的加密信令,因此终端不需要定制化开发,现有的智能终端亦能完成本发明实施例的功能。

Claims (19)

  1. 一种语音加密方法,包括:
    发送方利用接收方公钥对发送的语音数据进行加密,以使接收方利用本身私钥对接收到的语音数据进行解密。
  2. 如权利要求1所述的语音加密方法,其中,所述利用接收方公钥对发送的语音数据进行加密包括:
    所述发送方从服务器获取所述接收方公钥;
    所述发送方利用所述接收方公钥对发送的所述语音数据进行加密,并将加密的语音数据发送给所述接收方。
  3. 如权利要求1所述的语音加密方法,其中,所述利用接收方公钥对发送的语音数据进行加密包括:
    所述发送方利用本身私钥对发送的语音数据进行加密,并将加密的语音数据发送给服务器;
    服务器利用发送方公钥对所述语音数据进行解密;
    所述服务器利用接收方公钥对所述语音数据进行加密,并将加密的语音数据发送给所述接收方。
  4. 如权利要求1或2所述的语音加密方法,所述利用接收方公钥对发送的语音数据进行加密之前,还包括:
    所述发送方判断是否需要对所述发送的语音数据进行加密,如果是,则利用接收方公钥对发送的语音数据进行加密。
  5. 如权利要求4所述的语音加密方法,其中,所述判断是否需要对发送的语音数据进行加密包括:
    所述发送方向服务器查询所述接收方的号码是否在企业移动办公通讯录中,如果是,则需要对发送的语音数据进行加密;否则不需要加密。
  6. 如权利要求1至5任一项所述的语音加密方法,所述发送方利用接收 方公钥对发送的语音数据进行加密之前还包括:所述发送方和所述接收方分别生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器。
  7. 一种语音加密系统,包括服务器和多个终端,所述服务器分别与所述多个终端连接;所述服务器存储有每个终端的公钥,每个终端存储有本身的私钥;
    所述终端中的发送方与接收方之间进行语音数据传输,
    所述语音数据利用接收方公钥进行加密,接收方接收到加密的语音数据后,利用本身私钥进行解密;或者,
    所述语音数据利用发送方私钥进行加密后发送给服务器,服务器利用发送方公钥对接收到的语音数据进行解密;服务器利用接收方公钥对解密后的语音数据进行加密,并将加密的语音数据发送给接收方。
  8. 如权利要求7所述的语音加密系统,所述发送方包括:
    第一公钥获取模块,设置为从所述服务器获取所述接收方的公钥;
    第一语音加密模块,设置为利用获取的公钥对语音数据进行加密;
    第一数据传输模块,设置为将加密的语音数据发送给所述接收方。
  9. 如权利要求7所述的语音加密系统,所述发送方包括:
    第二语音加密模块,设置为利用本身私钥对语音数据进行加密;
    第二数据传输模块,设置为将加密的语音数据发送给服务器;
    所述服务器包括:
    第一语音解密模块,设置为利用发送方公钥对所述发送方发送的语音数据进行解密;
    第三语音加密模块,设置为利用接收方公钥对所述语音数据进行加密;
    第三数据传输模块,设置为将加密的语音数据发送给接收方。
  10. 如权利要求8或9所述的语音加密系统,所述发送方还包括号码查询模块,设置为向服务器查询所述接收方的号码是否在企业移动办公通讯录 中。
  11. 如权利要求7、8或9所述的语音加密系统,所述终端包括密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器。
  12. 一种终端,包括密钥生成模块、语音加密模块、语音传输模块和号码查询模块,其中,
    密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
    语音加密模块,设置为利用获取的公钥对语音数据进行加密,或者利用所在终端自身私钥对语音数据进行加密;
    语音传输模块,设置为将利用获得的公钥加密的语音数据发送给所述接收方,或者将利用自身所在终端私钥加密后的语音数据发送给服务器。
  13. 根据权利要求12所述的终端,还包括:公钥获取模块,设置为从所述服务器获取所述接收方的公钥。
  14. 根据权利要求12或13所述的终端,还包括;号码查询模块,设置为向服务器查询所述接收方的号码是否在企业移动办公通讯录中。
  15. 一种终端,包括密钥生成模块、语音解密模块,其中,
    密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
    语音解密模块,设置为利用本身私钥对接收到的加密语音数据进行解密。
  16. 一种终端,包括:
    密钥生成模块,设置为生成非对称加密的公钥和私钥,并将生成的公钥上传到服务器;
    语音加密模块,设置为利用本身私钥或进行语音传输的另一方终端的公钥对语音数据进行加密;
    语音传输模块,设置为将加密的语音数据发送给服务器或进行语音传输的另一方终端;
    语音解密模块,设置为利用本身私钥对接收到的加密语音数据进行解密。
  17. 如权利要求16所述的终端,所述终端还包括公钥获取模块,设置为从所述服务器获取所述进行语音传输的另一方终端的公钥。
  18. 如权利要求15或16所述的终端,所述终端还包括号码查询模块,设置为向服务器查询所述进行语音传输的另一方终端的号码是否在企业移动办公通讯录中。
  19. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权1~权6任一项的语音加密方法。
PCT/CN2016/093968 2015-10-15 2016-08-08 一种语音加密方法、系统和装置 WO2017063438A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510665140.5A CN106604268A (zh) 2015-10-15 2015-10-15 一种语音加密方法、系统和终端
CN201510665140.5 2015-10-15

Publications (1)

Publication Number Publication Date
WO2017063438A1 true WO2017063438A1 (zh) 2017-04-20

Family

ID=58517735

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/093968 WO2017063438A1 (zh) 2015-10-15 2016-08-08 一种语音加密方法、系统和装置

Country Status (2)

Country Link
CN (1) CN106604268A (zh)
WO (1) WO2017063438A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286896A (zh) * 2018-09-29 2019-01-29 合肥鸿坤通信工程有限公司 一种基于设备管控的安全通信系统
CN114727237A (zh) * 2022-05-11 2022-07-08 易联科技(深圳)有限公司 基于物联网公网对讲机设备的语音数据加密以及解密方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108270916A (zh) * 2017-12-01 2018-07-10 南京嘉谷初成通信科技有限公司 一种智能手机的加密方法
CN108347438A (zh) * 2018-02-02 2018-07-31 成都动视时代科技有限公司 多媒体数据安全传输方法
CN109257347A (zh) * 2018-09-10 2019-01-22 中国建设银行股份有限公司 适于银企间数据交互的通信方法和相关装置、存储介质
CN111224968B (zh) * 2019-12-31 2022-01-04 北京安盛联合科技有限公司 一种随机选择中转服务器的安全通信方法
CN111832075A (zh) * 2020-07-24 2020-10-27 上海明略人工智能(集团)有限公司 一种音频数据处理方法、装置及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101052029A (zh) * 2006-04-04 2007-10-10 阿尔卡特朗讯公司 用于传输包括可扩展标记语言信息的消息的方法
EP2787461A1 (en) * 2011-09-14 2014-10-08 Peking University Secure digital content sharing method, device, and system
CN104125071A (zh) * 2014-08-01 2014-10-29 深圳市中兴移动通信有限公司 通信方法、系统和通信终端
CN104243146A (zh) * 2014-09-05 2014-12-24 宇龙计算机通信科技(深圳)有限公司 一种加密通信方法、装置及终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101052029A (zh) * 2006-04-04 2007-10-10 阿尔卡特朗讯公司 用于传输包括可扩展标记语言信息的消息的方法
EP2787461A1 (en) * 2011-09-14 2014-10-08 Peking University Secure digital content sharing method, device, and system
CN104125071A (zh) * 2014-08-01 2014-10-29 深圳市中兴移动通信有限公司 通信方法、系统和通信终端
CN104243146A (zh) * 2014-09-05 2014-12-24 宇龙计算机通信科技(深圳)有限公司 一种加密通信方法、装置及终端

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109286896A (zh) * 2018-09-29 2019-01-29 合肥鸿坤通信工程有限公司 一种基于设备管控的安全通信系统
CN114727237A (zh) * 2022-05-11 2022-07-08 易联科技(深圳)有限公司 基于物联网公网对讲机设备的语音数据加密以及解密方法
CN114727237B (zh) * 2022-05-11 2022-08-19 易联科技(深圳)有限公司 基于物联网公网对讲机设备的语音数据加密以及解密方法

Also Published As

Publication number Publication date
CN106604268A (zh) 2017-04-26

Similar Documents

Publication Publication Date Title
WO2017063438A1 (zh) 一种语音加密方法、系统和装置
JP6612358B2 (ja) ネットワークアクセスデバイスをワイヤレスネットワークアクセスポイントにアクセスさせるための方法、ネットワークアクセスデバイス、アプリケーションサーバ、および不揮発性コンピュータ可読記憶媒体
US8275990B2 (en) Method for receiving/sending multimedia messages
EP2425646B1 (en) Network access nodes
CN111787533B (zh) 加密方法、切片管理方法、终端及接入和移动性管理实体
CN103401949A (zh) 一种用于手机的个人数据安全分享的系统和方法
CN101917711A (zh) 一种移动通信系统及其语音通话加密的方法
CN105792185A (zh) 一种通过一部智能手机使用多个手机号码的系统及方法
CN108156604B (zh) 集群系统的组呼加密传输方法及装置、集群终端和系统
CN103002439B (zh) 保密通话的通信方法及用户终端
EP2140672B1 (en) Secure voicemail system and method
WO2010130223A1 (zh) 一种隐藏用户号码的方法和装置
WO2016177222A1 (zh) 一种漏话提醒方法及装置
CN105025471A (zh) 被叫终端、主叫终端、语音通信方法及系统
CN108270917B (zh) 一种加密智能手机
WO2016107583A1 (zh) 呼叫方法及系统、固定电话机
CN113132090B (zh) 一种共享量子密钥的系统和基于所述系统的保密通信方法
US8971534B2 (en) Mobile communication terminal and method
CN108184209B (zh) 消息应答的方法及装置
CN108156112B (zh) 数据加密方法、电子设备及网络侧设备
US9949097B1 (en) Sharing SIM functionality between devices
KR20060112597A (ko) 이동통신 단말기의 메모리를 리셋하는 서비스 방법, 그서비스 제공을 위한 시스템 및 이동통신 단말기
CN106998320B (zh) 集群组呼的组根密钥的传递方法及装置
KR101527053B1 (ko) 사생활 보호 통신 모드가 가능한 통신 시스템
JP2004096583A (ja) 通信方法及び通信端末

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16854820

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16854820

Country of ref document: EP

Kind code of ref document: A1