WO2017166420A1 - Voice encryption method and voice transmission terminal - Google Patents

Voice encryption method and voice transmission terminal Download PDF

Info

Publication number
WO2017166420A1
WO2017166420A1 PCT/CN2016/084080 CN2016084080W WO2017166420A1 WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1 CN 2016084080 W CN2016084080 W CN 2016084080W WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1
Authority
WO
WIPO (PCT)
Prior art keywords
string information
user
voice
start
dictation
Prior art date
Application number
PCT/CN2016/084080
Other languages
French (fr)
Chinese (zh)
Inventor
陈涌
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201610197555.9 priority Critical
Priority to CN201610197555.9A priority patent/CN105743912A/en
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017166420A1 publication Critical patent/WO2017166420A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00
    • H04L29/02Communication control; Communication processing
    • H04L29/06Communication control; Communication processing characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

Disclosed in the present application are a voice encryption method and voice transmission terminal, said method being used for said voice transmission terminal, and said method comprising: determining whether to start oral character-string information during a call; if so, then launching an encryption algorithm and encrypting a user's oral character-string information into another character-string information; inputting the encrypted character-string information to a mobile communication network, thereby improving voice-communication security.

Description

Voice encryption method and voice transmitting terminal

This application claims priority to Chinese Patent Application No. 201610197555.9, entitled "A Voice Encryption Method and Voice Transmission Terminal", filed on March 31, 2016, the entire contents of which are incorporated herein by reference. In the application.

Technical field

The present invention relates to the field of communications technologies, and in particular, to a voice encryption method and a voice transmitting terminal.

Background technique

While enjoying the convenience brought by voice communication, the public also bears the security problems that cannot be ignored in voice communication. Among them, it is most common to eavesdrop on bank card number and password. Therefore, it is necessary to encrypt the voice call content, specifically: The voice signal is encrypted before it enters the mobile communication network, and the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the voice decryption error.

But for computer experts, it is not difficult to easily crack the encrypted signal when only a noise or noise is eavesdropped, so voice communication security is still a very difficult problem.

Summary of the invention

In view of this, the present invention provides a voice encryption method and a voice transmission terminal to improve voice communication security.

A voice encryption method is applied to a voice transmitting terminal, and the method includes:

Determine whether the user wants to start dictation string information during the call;

If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;

The encrypted string information is input to the mobile communication network.

The determining whether the user wants to start the dictation string information during the call includes: determining, by using a voice recognition manner, whether the user starts the dictation string information during the call.

The determining whether the user starts to start the dictation string information during the call includes: determining whether a manual trigger signal is received.

The encryption algorithm includes: re-charging each character in the string information dictated by the user. arrangement.

The encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.

A voice transmitting terminal includes:

a determining unit, configured to determine whether the user wants to start dictation string information during the call;

An encryption unit, configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;

An output unit, configured to input the encrypted string information into a mobile communication network.

The determining unit is specifically configured to determine, by using a voice recognition manner, whether the user starts the dictation string information during the call.

The determining unit is specifically configured to determine whether a manual trigger signal is received; when receiving the manual trigger signal, determine that the user wants to start dictating the string information.

The encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictating the user The string information is encrypted into another string information.

The encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for replacing all or part of the characters in the string information dictated by the user with other characters. The string information dictated by the user is encrypted into another string information.

It can be seen from the above technical solution that the present invention only encrypts the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of the attacker, thereby improving the security of the voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.

DRAWINGS

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.

FIG. 1 is a flowchart of a voice encryption method according to an embodiment of the present invention;

2 is a schematic structural diagram of a voice sending terminal according to an embodiment of the present invention;

FIG. 3 is a schematic structural diagram of another voice sending terminal according to an embodiment of the present invention.

detailed description

The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.

Referring to FIG. 1 , an embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve voice communication security. The method includes:

Step 101: Determine whether the user wants to start the dictation string information during the call; when it is determined that the user wants to start the dictation string information, the process proceeds to step 102; otherwise, the character string information dictated by the user is directly input into the mobile communication network. And on this basis, perform step 101 again;

Step 102: Start an encryption algorithm, and encrypt the string information dictated by the user into another string information.

Step 103: Input the encrypted character string information into the mobile communication network; at this point, the current round of voice encryption process is completed, and then return to step 101 to start the next round of voice encryption process.

From the point of view of the meaning of the string, the string information may be sensitive information such as a bank card number and password, a personal mailbox user name and a password, and is not limited. From the point of view of the contents of the string, the string information may be a sequence of numbers containing a number of digital numbers and/or a number of letter numbers.

The voice transmitting terminal may use the manual trigger signal as a criterion for determining whether the user wants to start the dictation string information during the call. For example, the voice transmitting terminal user communicates the bank card number and password to the mobile communication network. Before the voice receiving terminal user, the user may first press a certain control on the voice sending terminal to prompt the voice transmitting terminal to start entering the string information. After receiving the prompt, the voice sending terminal automatically starts the encryption algorithm to dictate the string information of the user. Encrypted into another string of information.

Alternatively, the voice transmitting terminal may also determine whether the user wants to start the dictation string information by using a voice recognition manner. For example, when the voice transmitting terminal user says “bank card number is” and “password is” during the voice call, The voice transmitting terminal will automatically start the encryption algorithm to put the user port. The string information described is encrypted into another string information.

In the prior art, the speech signal is encrypted into noise or noise and its language intelligibility is reduced (so-called language intelligibility, which is one or several speakers, and can be listened to by one or several voices through the communication system. The number of linguistic units that people have identified as meaningful is zero, with obvious encryption features, which is easy to attract the attention of attackers. However, this embodiment keeps the language intelligibility of the voice signal before and after encryption (that is, the eavesdropper hears Normal voice), which makes the voice signal not show any encryption features after encryption, and is excellent in camouflage. It is difficult to be aware that the voice signal has been encrypted and is not easy to attract the attention of the attacker.

The voice receiving end can automatically decrypt the original voice signal, but compared with the prior art, the present embodiment does not encrypt the voice call content in full, thereby reducing the decryption burden of the voice receiving terminal. Moreover, since the encrypted signal is still normal voice, it is convenient for the voice receiving end user to record, so the voice receiving end can also not decrypt, but the voice receiving end user performs manual processing on the pre-recorded normal voice according to the agreed decryption algorithm. Decryption, which further reduces the decryption burden on the voice receiving end.

The encryption algorithm for encrypting the character string information of the user to another string information may be to rearrange the characters in the string information of the user's dictation. The specific implementation manner may be: performing string information sent by the user. Speech recognition, and separately storing each character information, and then rearranging the currently stored character information in a preset order to obtain the encrypted string information; or, performing voice recognition on the string information sent by the user, and The pre-stored character voice packet finds the character information corresponding to each character information, and then rearranges the currently found character information according to the preset order, thereby obtaining the encrypted character string information; of course, it is not limited. In these two specific implementations. In the following, the encryption effect of the encryption algorithm is exemplified: for the password of the bank card that the user of the voice transmission terminal inputs is "xyz13588660517", the voice transmitting terminal can encrypt it as "813x0y571z8665", and the voice content sent is the same user. The recombination of the characters actually spoken, or the recombination of the corresponding characters in the voice packet.

Alternatively, the encryption algorithm for encrypting the string information of the user's dictation into another string information may also replace all or part of the characters in the string information dictated by the user with other characters, and the specific implementation may be: The character string information is used for voice recognition, and character information corresponding to each character information is searched in a pre-stored character voice packet, and then all or part of the character information currently found is replaced with other content in the character voice packet. Character information, thereby obtaining encrypted string information; of course, the pre-stored character voice packet can be pre-recorded by the user, It can be obtained from other sources (such as downloaded from the Internet). In the following, an encryption effect of the encryption algorithm is exemplified: for the bank card password of the content of the "xyz13588660517" entered by the voice transmitting terminal user, the voice transmitting terminal can encrypt it as "2a5764b32c8943", and the voice content sent is A combination of characters that are actually pronounced by the same user, or a combination of characters in a non-user pre-recorded voice package. Alternatively, the two encryption algorithms can be combined as a new encryption algorithm.

As can be seen from the above description, in this embodiment, only the voice signal whose content is string information is encrypted, and the encrypted signal is still normal voice, which is not easy to attract attention of the attacker, thereby improving the security of voice communication. In addition, since the present embodiment does not perform full-process encryption on the voice call content, the decryption burden of the voice receiving terminal is reduced.

In addition, referring to FIG. 2, an embodiment of the present invention further discloses a voice sending terminal to improve voice communication security, including:

The determining unit 100 is configured to determine whether the user wants to start the dictation string information during the call;

The encryption unit 200 is configured to: when the determining unit 100 determines that the user wants to start the dictation string information, start the encryption algorithm, and encrypt the character string information dictated by the user into another character string information;

The output unit 300 is configured to input the encrypted string information into the mobile communication network.

The determining unit 100 is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.

Alternatively, the determining unit 100 is specifically configured to determine whether a manual trigger signal is received; when the manual trigger signal is received, it is determined that the user wants to start the dictation string information.

The encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, activate an encryption algorithm for rearranging each character in the character string information dictated by the user, and dictate the character of the user. The string information is encrypted into another string information.

Alternatively, the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictate the character of the user. The string information is encrypted into another string information.

In summary, the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.

3 shows a block diagram of a voice transmitting terminal according to still another embodiment of the present invention. As shown in FIG. 3, the terminal 7 may include: at least one processor 71, such as a CPU, at least one communication bus 72, and a memory 73; The communication bus 72 is used to implement connection communication between these components; the memory 73 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory. A set of program codes is stored in the memory 73, and the processor 71 is configured to call the program code stored in the memory 73 for performing the following operations:

Determine whether the user wants to start dictation string information during the call;

If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;

The encrypted string information is input to the mobile communication network.

The processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:

The voice recognition method is used to determine whether the user wants to start dictation string information during the call.

The processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:

Determine if a manual trigger signal is received.

The encryption algorithm includes: rearranging characters in the string information dictated by the user.

The encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.

In summary, the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication. In addition, compared with the prior art, the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.

The various embodiments in this specification are described in a progressive manner, and each embodiment focuses on Different from the other embodiments, the same similar parts between the various embodiments can be referred to each other. For the voice transmitting terminal disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the related parts can be referred to the method part.

The above description of the disclosed embodiments enables those skilled in the art to make or use the invention. Various modifications to these embodiments will be apparent to those skilled in the art, and the general principles defined herein may be implemented in other embodiments without departing from the spirit or scope of the embodiments of the invention. . Therefore, the embodiments of the present invention are not to be limited to the embodiments shown herein, but the scope of the invention is to be accorded

Claims (10)

  1. A voice encryption method is applied to a voice transmitting terminal, and the method includes:
    Determine whether the user wants to start dictation string information during the call;
    If yes, the encryption algorithm is started, and the string information dictated by the user is encrypted into another string information;
    The encrypted string information is input to the mobile communication network.
  2. The method according to claim 1, wherein the determining whether the user wants to start dictation string information during a call comprises:
    The voice recognition method is used to determine whether the user wants to start dictation string information during the call.
  3. The method according to claim 1, wherein the determining whether the user wants to start dictation string information during a call comprises:
    Determine if a manual trigger signal is received.
  4. The method according to claim 1, wherein the encryption algorithm comprises: rearranging characters in the character string information dictated by the user.
  5. The method according to claim 1, wherein the encryption algorithm comprises: replacing all or part of characters in the string information dictated by the user with other characters.
  6. A voice transmitting terminal, comprising:
    a determining unit, configured to determine whether the user wants to start dictation string information during the call;
    An encryption unit, configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
    An output unit, configured to input the encrypted string information into a mobile communication network.
  7. The voice transmitting terminal according to claim 6, wherein the determining unit is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
  8. The voice transmitting terminal according to claim 6, wherein the determining unit is specifically configured to determine whether a manual trigger signal is received; and when receiving the manual trigger signal, determine that the user wants to start dictation string information.
  9. The voice transmitting terminal according to claim 6, wherein the encrypting unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, start the character string information used for dictating the user An encryption algorithm that rearranges characters to dictate the characters of the user The string information is encrypted into another string information.
  10. The voice transmitting terminal according to claim 6, wherein the encrypting unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, start the character string information used to dictate the user An encryption algorithm that replaces all or part of the characters with other characters, and encrypts the string information dictated by the user into another string information.
PCT/CN2016/084080 2016-03-31 2016-05-31 Voice encryption method and voice transmission terminal WO2017166420A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610197555.9 2016-03-31
CN201610197555.9A CN105743912A (en) 2016-03-31 2016-03-31 Voice encryption method and voice sending terminal

Publications (1)

Publication Number Publication Date
WO2017166420A1 true WO2017166420A1 (en) 2017-10-05

Family

ID=56253159

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084080 WO2017166420A1 (en) 2016-03-31 2016-05-31 Voice encryption method and voice transmission terminal

Country Status (2)

Country Link
CN (1) CN105743912A (en)
WO (1) WO2017166420A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333042A (en) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 Method, security gateway and system for preventing data leakage
CN102761867A (en) * 2011-04-29 2012-10-31 德信智能手机技术(北京)有限公司 Method for increasing session safety and session equipment
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN103516915A (en) * 2012-06-27 2014-01-15 百度在线网络技术(北京)有限公司 Method, system and device for replacing sensitive words in call process of mobile terminal
CN103595844A (en) * 2013-11-15 2014-02-19 深圳市中兴移动通信有限公司 Processing method and device for dual-tone multi-frequency number
WO2015115798A1 (en) * 2014-01-29 2015-08-06 Samsung Electronics Co., Ltd. User terminal device and secured communication method thereof

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2863443B1 (en) * 2003-12-05 2006-03-03 Sagem Method of saving data of a mobile telephone
CN101014060B (en) * 2007-02-02 2010-05-19 东南大学 Voice encryption method for GSM handset with anti longterm prediction rule pulse excitation compression coding
CN101631304B (en) * 2009-07-23 2012-05-23 东南大学 Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
CN101909290A (en) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 Method, system and mobile terminal for encrypting voice call
CN105357007B (en) * 2014-08-21 2019-05-31 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal
CN104378198A (en) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 Voice encryption method based on block cipher system
CN104994500B (en) * 2015-05-22 2018-07-06 南京科烁志诺信息科技有限公司 A kind of speech security transmission method and device for mobile phone
CN105050082B (en) * 2015-09-11 2019-10-25 成都汇研科技有限公司 Voice communication method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761867A (en) * 2011-04-29 2012-10-31 德信智能手机技术(北京)有限公司 Method for increasing session safety and session equipment
CN102811439A (en) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 Method and system for voice processing
CN102333042A (en) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 Method, security gateway and system for preventing data leakage
CN103516915A (en) * 2012-06-27 2014-01-15 百度在线网络技术(北京)有限公司 Method, system and device for replacing sensitive words in call process of mobile terminal
CN103595844A (en) * 2013-11-15 2014-02-19 深圳市中兴移动通信有限公司 Processing method and device for dual-tone multi-frequency number
WO2015115798A1 (en) * 2014-01-29 2015-08-06 Samsung Electronics Co., Ltd. User terminal device and secured communication method thereof

Also Published As

Publication number Publication date
CN105743912A (en) 2016-07-06

Similar Documents

Publication Publication Date Title
US9444809B2 (en) Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones™
CA2748695C (en) System and method for unlocking a device
CN102117614B (en) Personalized text-to-speech synthesis and personalized speech feature extraction
US8812319B2 (en) Dynamic pass phrase security system (DPSS)
US9325675B2 (en) Secure delivery of files to authorized recipients
US6741705B1 (en) System and method for securing voice mail messages
JP2006505021A (en) Robust multi-factor authentication for secure application environments
EP1244266B1 (en) Method and apparatus to facilitate secure network communications with a voice responsive network interface device
US8935777B2 (en) Login using QR code
DE60119489T2 (en) Method of inspection of data integrity, corresponding device and mobile terminal
US7535586B2 (en) Information processing device, printing device, print data transmission method, printing method, print data transmitting program, and recording medium
US8824641B2 (en) Real time automatic caller speech profiling
JP5701916B2 (en) Method and system for writing a telephone conversation into text
JP6378703B2 (en) Adaptive processing by multiple media processing nodes
US20070101133A1 (en) Method for offloading encryption and decryption of a message received at a message server to remote end devices
US8205098B2 (en) Secure and usable protection of a roamable credentials store
EP1902442B1 (en) Selective security masking within recorded speech utilizing speech recognition techniques
US6907123B1 (en) Secure voice communication system
KR20010039387A (en) Method protecting data stored in lost mobile terminal and recording medium therefor
US9032219B2 (en) Securing speech recognition data
US20080022377A1 (en) Device Authentication
CN1871809B (en) System and method for generating reproducible session keys
US20060005033A1 (en) System and method for secure communications between at least one user device and a network entity
JP2001524771A (en) Method and system for securely transferring a data set in a data communication system
CN101441869A (en) Method and terminal for speech recognition of terminal user identification

Legal Events

Date Code Title Description
NENP Non-entry into the national phase in:

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896194

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896194

Country of ref document: EP

Kind code of ref document: A1