WO2017166420A1 - Procédé de chiffrement vocal et terminal de transmission vocale - Google Patents
Procédé de chiffrement vocal et terminal de transmission vocale Download PDFInfo
- Publication number
- WO2017166420A1 WO2017166420A1 PCT/CN2016/084080 CN2016084080W WO2017166420A1 WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1 CN 2016084080 W CN2016084080 W CN 2016084080W WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- string information
- user
- voice
- dictation
- call
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a voice encryption method and a voice transmitting terminal.
- the voice signal is encrypted before it enters the mobile communication network, and the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the voice decryption error.
- the present invention provides a voice encryption method and a voice transmission terminal to improve voice communication security.
- a voice encryption method is applied to a voice transmitting terminal, and the method includes:
- the encrypted string information is input to the mobile communication network.
- the determining whether the user wants to start the dictation string information during the call includes: determining, by using a voice recognition manner, whether the user starts the dictation string information during the call.
- the determining whether the user starts to start the dictation string information during the call includes: determining whether a manual trigger signal is received.
- the encryption algorithm includes: re-charging each character in the string information dictated by the user. arrangement.
- the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
- a voice transmitting terminal includes:
- a determining unit configured to determine whether the user wants to start dictation string information during the call
- An encryption unit configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
- An output unit configured to input the encrypted string information into a mobile communication network.
- the determining unit is specifically configured to determine, by using a voice recognition manner, whether the user starts the dictation string information during the call.
- the determining unit is specifically configured to determine whether a manual trigger signal is received; when receiving the manual trigger signal, determine that the user wants to start dictating the string information.
- the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictating the user
- the string information is encrypted into another string information.
- the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for replacing all or part of the characters in the string information dictated by the user with other characters.
- the string information dictated by the user is encrypted into another string information.
- the present invention only encrypts the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of the attacker, thereby improving the security of the voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
- FIG. 1 is a flowchart of a voice encryption method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a voice sending terminal according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of another voice sending terminal according to an embodiment of the present invention.
- an embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve voice communication security.
- the method includes:
- Step 101 Determine whether the user wants to start the dictation string information during the call; when it is determined that the user wants to start the dictation string information, the process proceeds to step 102; otherwise, the character string information dictated by the user is directly input into the mobile communication network. And on this basis, perform step 101 again;
- Step 102 Start an encryption algorithm, and encrypt the string information dictated by the user into another string information.
- Step 103 Input the encrypted character string information into the mobile communication network; at this point, the current round of voice encryption process is completed, and then return to step 101 to start the next round of voice encryption process.
- the string information may be sensitive information such as a bank card number and password, a personal mailbox user name and a password, and is not limited. From the point of view of the contents of the string, the string information may be a sequence of numbers containing a number of digital numbers and/or a number of letter numbers.
- the voice transmitting terminal may use the manual trigger signal as a criterion for determining whether the user wants to start the dictation string information during the call. For example, the voice transmitting terminal user communicates the bank card number and password to the mobile communication network. Before the voice receiving terminal user, the user may first press a certain control on the voice sending terminal to prompt the voice transmitting terminal to start entering the string information. After receiving the prompt, the voice sending terminal automatically starts the encryption algorithm to dictate the string information of the user. Encrypted into another string of information.
- the voice transmitting terminal may also determine whether the user wants to start the dictation string information by using a voice recognition manner. For example, when the voice transmitting terminal user says “bank card number is” and “password is” during the voice call, The voice transmitting terminal will automatically start the encryption algorithm to put the user port. The string information described is encrypted into another string information.
- the speech signal is encrypted into noise or noise and its language intelligibility is reduced (so-called language intelligibility, which is one or several speakers, and can be listened to by one or several voices through the communication system.
- language intelligibility which is one or several speakers, and can be listened to by one or several voices through the communication system.
- the number of linguistic units that people have identified as meaningful is zero, with obvious encryption features, which is easy to attract the attention of attackers.
- this embodiment keeps the language intelligibility of the voice signal before and after encryption (that is, the eavesdropper hears Normal voice), which makes the voice signal not show any encryption features after encryption, and is excellent in camouflage. It is difficult to be aware that the voice signal has been encrypted and is not easy to attract the attention of the attacker.
- the voice receiving end can automatically decrypt the original voice signal, but compared with the prior art, the present embodiment does not encrypt the voice call content in full, thereby reducing the decryption burden of the voice receiving terminal. Moreover, since the encrypted signal is still normal voice, it is convenient for the voice receiving end user to record, so the voice receiving end can also not decrypt, but the voice receiving end user performs manual processing on the pre-recorded normal voice according to the agreed decryption algorithm. Decryption, which further reduces the decryption burden on the voice receiving end.
- the encryption algorithm for encrypting the character string information of the user to another string information may be to rearrange the characters in the string information of the user's dictation.
- the specific implementation manner may be: performing string information sent by the user. Speech recognition, and separately storing each character information, and then rearranging the currently stored character information in a preset order to obtain the encrypted string information; or, performing voice recognition on the string information sent by the user, and
- the pre-stored character voice packet finds the character information corresponding to each character information, and then rearranges the currently found character information according to the preset order, thereby obtaining the encrypted character string information; of course, it is not limited. In these two specific implementations.
- the encryption effect of the encryption algorithm is exemplified: for the password of the bank card that the user of the voice transmission terminal inputs is "xyz13588660517", the voice transmitting terminal can encrypt it as "813x0y571z8665", and the voice content sent is the same user.
- the encryption algorithm for encrypting the string information of the user's dictation into another string information may also replace all or part of the characters in the string information dictated by the user with other characters, and the specific implementation may be:
- the character string information is used for voice recognition, and character information corresponding to each character information is searched in a pre-stored character voice packet, and then all or part of the character information currently found is replaced with other content in the character voice packet.
- an encryption effect of the encryption algorithm is exemplified: for the bank card password of the content of the "xyz13588660517" entered by the voice transmitting terminal user, the voice transmitting terminal can encrypt it as "2a5764b32c8943", and the voice content sent is A combination of characters that are actually pronounced by the same user, or a combination of characters in a non-user pre-recorded voice package.
- the two encryption algorithms can be combined as a new encryption algorithm.
- an embodiment of the present invention further discloses a voice sending terminal to improve voice communication security, including:
- the determining unit 100 is configured to determine whether the user wants to start the dictation string information during the call;
- the encryption unit 200 is configured to: when the determining unit 100 determines that the user wants to start the dictation string information, start the encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
- the output unit 300 is configured to input the encrypted string information into the mobile communication network.
- the determining unit 100 is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
- the determining unit 100 is specifically configured to determine whether a manual trigger signal is received; when the manual trigger signal is received, it is determined that the user wants to start the dictation string information.
- the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, activate an encryption algorithm for rearranging each character in the character string information dictated by the user, and dictate the character of the user.
- the string information is encrypted into another string information.
- the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictate the character of the user.
- the string information is encrypted into another string information.
- the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
- the terminal 7 may include: at least one processor 71, such as a CPU, at least one communication bus 72, and a memory 73;
- the communication bus 72 is used to implement connection communication between these components;
- the memory 73 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
- a set of program codes is stored in the memory 73, and the processor 71 is configured to call the program code stored in the memory 73 for performing the following operations:
- the encrypted string information is input to the mobile communication network.
- the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
- the voice recognition method is used to determine whether the user wants to start dictation string information during the call.
- the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
- the encryption algorithm includes: rearranging characters in the string information dictated by the user.
- the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
- the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
- the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
Abstract
La présente invention concerne un procédé de chiffrement vocal et un terminal de transmission vocale. Ledit procédé est utilisé pour ledit terminal de transmission vocale, et ledit procédé consiste à : déterminer s'il faut démarrer des informations de chaîne de caractères orales pendant un appel ; si tel est le cas, lancer un algorithme de chiffrement et chiffrer les informations de chaîne de caractères orales d'un utilisateur de sorte à obtenir d'autres informations de chaîne de caractères ; entrer les informations de chaîne de caractères chiffrées dans un réseau de communication mobile, de sorte à améliorer la sécurité de communications vocales.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610197555.9 | 2016-03-31 | ||
CN201610197555.9A CN105743912B (zh) | 2016-03-31 | 2016-03-31 | 一种语音加密方法和语音发送终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017166420A1 true WO2017166420A1 (fr) | 2017-10-05 |
Family
ID=56253159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/084080 WO2017166420A1 (fr) | 2016-03-31 | 2016-05-31 | Procédé de chiffrement vocal et terminal de transmission vocale |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105743912B (fr) |
WO (1) | WO2017166420A1 (fr) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333042A (zh) * | 2011-10-31 | 2012-01-25 | 深信服网络科技(深圳)有限公司 | 一种防止数据泄密的方法、安全网关及系统 |
CN102761867A (zh) * | 2011-04-29 | 2012-10-31 | 德信智能手机技术(北京)有限公司 | 提高通话安全性的方法和通话设备 |
CN102811439A (zh) * | 2011-06-02 | 2012-12-05 | 中兴通讯股份有限公司 | 语音处理方法及系统 |
CN103516915A (zh) * | 2012-06-27 | 2014-01-15 | 百度在线网络技术(北京)有限公司 | 在移动终端通话过程中敏感词汇的替换方法、系统及装置 |
CN103595844A (zh) * | 2013-11-15 | 2014-02-19 | 深圳市中兴移动通信有限公司 | 双音多频号码的处理方法和装置 |
WO2015115798A1 (fr) * | 2014-01-29 | 2015-08-06 | Samsung Electronics Co., Ltd. | Dispositif terminal d'utilisateur, et procédé de communications sécurisées correspondant |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2863443B1 (fr) * | 2003-12-05 | 2006-03-03 | Sagem | Procede de sauvegarde des donnees d'un telephone mobile |
CN101014060B (zh) * | 2007-02-02 | 2010-05-19 | 东南大学 | 抗长时预测规则脉冲激励压缩编码全球通手机语音加密方法 |
CN101631304B (zh) * | 2009-07-23 | 2012-05-23 | 东南大学 | 抗自适应多速率编码第三代移动通信端到端语音加密方法 |
CN101909290A (zh) * | 2010-08-25 | 2010-12-08 | 中兴通讯股份有限公司 | 一种实现语音通话加密的方法及系统及移动终端 |
CN105357007B (zh) * | 2014-08-21 | 2019-05-31 | 深圳市中兴微电子技术有限公司 | 加密通信方法及通信终端 |
CN104378198A (zh) * | 2014-10-16 | 2015-02-25 | 南京中科龙脉物联网技术有限公司 | 一种基于分组密码体制的语音加密方法 |
CN104994500B (zh) * | 2015-05-22 | 2018-07-06 | 南京科烁志诺信息科技有限公司 | 一种用于移动电话的语音保密传输方法及装置 |
CN105050082B (zh) * | 2015-09-11 | 2019-10-25 | 成都汇研科技有限公司 | 语音通信方法及装置 |
-
2016
- 2016-03-31 CN CN201610197555.9A patent/CN105743912B/zh active Active
- 2016-05-31 WO PCT/CN2016/084080 patent/WO2017166420A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102761867A (zh) * | 2011-04-29 | 2012-10-31 | 德信智能手机技术(北京)有限公司 | 提高通话安全性的方法和通话设备 |
CN102811439A (zh) * | 2011-06-02 | 2012-12-05 | 中兴通讯股份有限公司 | 语音处理方法及系统 |
CN102333042A (zh) * | 2011-10-31 | 2012-01-25 | 深信服网络科技(深圳)有限公司 | 一种防止数据泄密的方法、安全网关及系统 |
CN103516915A (zh) * | 2012-06-27 | 2014-01-15 | 百度在线网络技术(北京)有限公司 | 在移动终端通话过程中敏感词汇的替换方法、系统及装置 |
CN103595844A (zh) * | 2013-11-15 | 2014-02-19 | 深圳市中兴移动通信有限公司 | 双音多频号码的处理方法和装置 |
WO2015115798A1 (fr) * | 2014-01-29 | 2015-08-06 | Samsung Electronics Co., Ltd. | Dispositif terminal d'utilisateur, et procédé de communications sécurisées correspondant |
Also Published As
Publication number | Publication date |
---|---|
CN105743912A (zh) | 2016-07-06 |
CN105743912B (zh) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6307665B2 (ja) | 再生不能通信セッションのためのシステムおよび方法 | |
WO2020155767A1 (fr) | Procédé et appareil d'ouverture de session sans mot de passe basée sur un terminal mobile, dispositif et support de stockage | |
US20160197894A1 (en) | Method of generating a deniable encrypted communications via password entry | |
US20140143550A1 (en) | Securing speech recognition data | |
CN109450777B (zh) | 会话信息提取方法、装置、设备和介质 | |
CN111614683B (zh) | 一种数据处理方法、装置、系统及一种网卡 | |
US20160197895A1 (en) | Method of deniable encrypted communications | |
CN107533598B (zh) | 应用程序的登录密码的输入方法、装置和终端 | |
CN104767746A (zh) | 推送消息接收方法、消息推送方法、客户端及服务器 | |
JP2009237774A (ja) | 認証サーバ、サービス提供サーバ、認証方法、通信端末、およびログイン方法 | |
US11245530B2 (en) | System and method for secure communication | |
CN108965785B (zh) | 一种视频会议录像方法、录像装置、控制中心和终端 | |
CN110380856B (zh) | 终端设备及其语音信息处理方法、装置以及存储介质 | |
JP5691586B2 (ja) | 秘話通信システム、装置及びプログラム | |
WO2016150363A1 (fr) | Procédé et appareil de gestion de chiffrement à gradient | |
JP2002269047A (ja) | 音声ユーザ認証システム | |
US11941154B2 (en) | Securing personally identifiable and private information in conversational AI-based communication | |
WO2017166420A1 (fr) | Procédé de chiffrement vocal et terminal de transmission vocale | |
Fazeen et al. | Context-aware multimedia encryption in mobile platforms | |
CN112767944A (zh) | 声纹识别方法及装置 | |
CN114338156A (zh) | 数据处理方法、装置及存储介质 | |
KR101721582B1 (ko) | 음성 데이터를 이용한 비대면 사용자 인증 시스템, 방법 및 컴퓨터 프로그램 | |
CN114172670A (zh) | 授权方法、装置和系统 | |
WO2018137415A1 (fr) | Procédé de suppression de données, terminal et serveur | |
CN111065094B (zh) | 通讯录传输方法、装置、存储介质及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16896194 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16896194 Country of ref document: EP Kind code of ref document: A1 |