WO2017166420A1 - Procédé de chiffrement vocal et terminal de transmission vocale - Google Patents

Procédé de chiffrement vocal et terminal de transmission vocale Download PDF

Info

Publication number
WO2017166420A1
WO2017166420A1 PCT/CN2016/084080 CN2016084080W WO2017166420A1 WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1 CN 2016084080 W CN2016084080 W CN 2016084080W WO 2017166420 A1 WO2017166420 A1 WO 2017166420A1
Authority
WO
WIPO (PCT)
Prior art keywords
string information
user
voice
dictation
call
Prior art date
Application number
PCT/CN2016/084080
Other languages
English (en)
Chinese (zh)
Inventor
陈涌
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017166420A1 publication Critical patent/WO2017166420A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a voice encryption method and a voice transmitting terminal.
  • the voice signal is encrypted before it enters the mobile communication network, and the voice receiving terminal can decrypt the original voice signal after receiving the encrypted signal, and the eavesdropper can only hear the noise or noise caused by the voice decryption error.
  • the present invention provides a voice encryption method and a voice transmission terminal to improve voice communication security.
  • a voice encryption method is applied to a voice transmitting terminal, and the method includes:
  • the encrypted string information is input to the mobile communication network.
  • the determining whether the user wants to start the dictation string information during the call includes: determining, by using a voice recognition manner, whether the user starts the dictation string information during the call.
  • the determining whether the user starts to start the dictation string information during the call includes: determining whether a manual trigger signal is received.
  • the encryption algorithm includes: re-charging each character in the string information dictated by the user. arrangement.
  • the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
  • a voice transmitting terminal includes:
  • a determining unit configured to determine whether the user wants to start dictation string information during the call
  • An encryption unit configured to: when the determining unit determines that the user wants to start the dictation string information, start an encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
  • An output unit configured to input the encrypted string information into a mobile communication network.
  • the determining unit is specifically configured to determine, by using a voice recognition manner, whether the user starts the dictation string information during the call.
  • the determining unit is specifically configured to determine whether a manual trigger signal is received; when receiving the manual trigger signal, determine that the user wants to start dictating the string information.
  • the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictating the user
  • the string information is encrypted into another string information.
  • the encryption unit is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for replacing all or part of the characters in the string information dictated by the user with other characters.
  • the string information dictated by the user is encrypted into another string information.
  • the present invention only encrypts the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of the attacker, thereby improving the security of the voice communication.
  • the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
  • FIG. 1 is a flowchart of a voice encryption method according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a voice sending terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another voice sending terminal according to an embodiment of the present invention.
  • an embodiment of the present invention discloses a voice encryption method, which is applied to a voice sending terminal to improve voice communication security.
  • the method includes:
  • Step 101 Determine whether the user wants to start the dictation string information during the call; when it is determined that the user wants to start the dictation string information, the process proceeds to step 102; otherwise, the character string information dictated by the user is directly input into the mobile communication network. And on this basis, perform step 101 again;
  • Step 102 Start an encryption algorithm, and encrypt the string information dictated by the user into another string information.
  • Step 103 Input the encrypted character string information into the mobile communication network; at this point, the current round of voice encryption process is completed, and then return to step 101 to start the next round of voice encryption process.
  • the string information may be sensitive information such as a bank card number and password, a personal mailbox user name and a password, and is not limited. From the point of view of the contents of the string, the string information may be a sequence of numbers containing a number of digital numbers and/or a number of letter numbers.
  • the voice transmitting terminal may use the manual trigger signal as a criterion for determining whether the user wants to start the dictation string information during the call. For example, the voice transmitting terminal user communicates the bank card number and password to the mobile communication network. Before the voice receiving terminal user, the user may first press a certain control on the voice sending terminal to prompt the voice transmitting terminal to start entering the string information. After receiving the prompt, the voice sending terminal automatically starts the encryption algorithm to dictate the string information of the user. Encrypted into another string of information.
  • the voice transmitting terminal may also determine whether the user wants to start the dictation string information by using a voice recognition manner. For example, when the voice transmitting terminal user says “bank card number is” and “password is” during the voice call, The voice transmitting terminal will automatically start the encryption algorithm to put the user port. The string information described is encrypted into another string information.
  • the speech signal is encrypted into noise or noise and its language intelligibility is reduced (so-called language intelligibility, which is one or several speakers, and can be listened to by one or several voices through the communication system.
  • language intelligibility which is one or several speakers, and can be listened to by one or several voices through the communication system.
  • the number of linguistic units that people have identified as meaningful is zero, with obvious encryption features, which is easy to attract the attention of attackers.
  • this embodiment keeps the language intelligibility of the voice signal before and after encryption (that is, the eavesdropper hears Normal voice), which makes the voice signal not show any encryption features after encryption, and is excellent in camouflage. It is difficult to be aware that the voice signal has been encrypted and is not easy to attract the attention of the attacker.
  • the voice receiving end can automatically decrypt the original voice signal, but compared with the prior art, the present embodiment does not encrypt the voice call content in full, thereby reducing the decryption burden of the voice receiving terminal. Moreover, since the encrypted signal is still normal voice, it is convenient for the voice receiving end user to record, so the voice receiving end can also not decrypt, but the voice receiving end user performs manual processing on the pre-recorded normal voice according to the agreed decryption algorithm. Decryption, which further reduces the decryption burden on the voice receiving end.
  • the encryption algorithm for encrypting the character string information of the user to another string information may be to rearrange the characters in the string information of the user's dictation.
  • the specific implementation manner may be: performing string information sent by the user. Speech recognition, and separately storing each character information, and then rearranging the currently stored character information in a preset order to obtain the encrypted string information; or, performing voice recognition on the string information sent by the user, and
  • the pre-stored character voice packet finds the character information corresponding to each character information, and then rearranges the currently found character information according to the preset order, thereby obtaining the encrypted character string information; of course, it is not limited. In these two specific implementations.
  • the encryption effect of the encryption algorithm is exemplified: for the password of the bank card that the user of the voice transmission terminal inputs is "xyz13588660517", the voice transmitting terminal can encrypt it as "813x0y571z8665", and the voice content sent is the same user.
  • the encryption algorithm for encrypting the string information of the user's dictation into another string information may also replace all or part of the characters in the string information dictated by the user with other characters, and the specific implementation may be:
  • the character string information is used for voice recognition, and character information corresponding to each character information is searched in a pre-stored character voice packet, and then all or part of the character information currently found is replaced with other content in the character voice packet.
  • an encryption effect of the encryption algorithm is exemplified: for the bank card password of the content of the "xyz13588660517" entered by the voice transmitting terminal user, the voice transmitting terminal can encrypt it as "2a5764b32c8943", and the voice content sent is A combination of characters that are actually pronounced by the same user, or a combination of characters in a non-user pre-recorded voice package.
  • the two encryption algorithms can be combined as a new encryption algorithm.
  • an embodiment of the present invention further discloses a voice sending terminal to improve voice communication security, including:
  • the determining unit 100 is configured to determine whether the user wants to start the dictation string information during the call;
  • the encryption unit 200 is configured to: when the determining unit 100 determines that the user wants to start the dictation string information, start the encryption algorithm, and encrypt the character string information dictated by the user into another character string information;
  • the output unit 300 is configured to input the encrypted string information into the mobile communication network.
  • the determining unit 100 is specifically configured to determine, by using a voice recognition manner, whether the user wants to start dictation string information during a call.
  • the determining unit 100 is specifically configured to determine whether a manual trigger signal is received; when the manual trigger signal is received, it is determined that the user wants to start the dictation string information.
  • the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, activate an encryption algorithm for rearranging each character in the character string information dictated by the user, and dictate the character of the user.
  • the string information is encrypted into another string information.
  • the encryption unit 200 is specifically configured to: when the determining unit determines that the user wants to start the dictation string information, initiate an encryption algorithm for rearranging each character in the string information dictated by the user, and dictate the character of the user.
  • the string information is encrypted into another string information.
  • the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
  • the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.
  • the terminal 7 may include: at least one processor 71, such as a CPU, at least one communication bus 72, and a memory 73;
  • the communication bus 72 is used to implement connection communication between these components;
  • the memory 73 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • a set of program codes is stored in the memory 73, and the processor 71 is configured to call the program code stored in the memory 73 for performing the following operations:
  • the encrypted string information is input to the mobile communication network.
  • the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
  • the voice recognition method is used to determine whether the user wants to start dictation string information during the call.
  • the processor 71 performs the following operations when performing the determination of whether the user wants to start the dictation string information during the call:
  • the encryption algorithm includes: rearranging characters in the string information dictated by the user.
  • the encryption algorithm includes: replacing all or part of characters in the string information dictated by the user with other characters.
  • the present invention encrypts only the voice signal whose content is string information, and the encrypted signal is still normal voice, which is not easy to attract the attention of an attacker, thereby improving the security of voice communication.
  • the present invention does not encrypt the voice call content in full, and thus reduces the decryption burden of the voice receiving terminal.

Abstract

La présente invention concerne un procédé de chiffrement vocal et un terminal de transmission vocale. Ledit procédé est utilisé pour ledit terminal de transmission vocale, et ledit procédé consiste à : déterminer s'il faut démarrer des informations de chaîne de caractères orales pendant un appel ; si tel est le cas, lancer un algorithme de chiffrement et chiffrer les informations de chaîne de caractères orales d'un utilisateur de sorte à obtenir d'autres informations de chaîne de caractères ; entrer les informations de chaîne de caractères chiffrées dans un réseau de communication mobile, de sorte à améliorer la sécurité de communications vocales.
PCT/CN2016/084080 2016-03-31 2016-05-31 Procédé de chiffrement vocal et terminal de transmission vocale WO2017166420A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610197555.9 2016-03-31
CN201610197555.9A CN105743912B (zh) 2016-03-31 2016-03-31 一种语音加密方法和语音发送终端

Publications (1)

Publication Number Publication Date
WO2017166420A1 true WO2017166420A1 (fr) 2017-10-05

Family

ID=56253159

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084080 WO2017166420A1 (fr) 2016-03-31 2016-05-31 Procédé de chiffrement vocal et terminal de transmission vocale

Country Status (2)

Country Link
CN (1) CN105743912B (fr)
WO (1) WO2017166420A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333042A (zh) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 一种防止数据泄密的方法、安全网关及系统
CN102761867A (zh) * 2011-04-29 2012-10-31 德信智能手机技术(北京)有限公司 提高通话安全性的方法和通话设备
CN102811439A (zh) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 语音处理方法及系统
CN103516915A (zh) * 2012-06-27 2014-01-15 百度在线网络技术(北京)有限公司 在移动终端通话过程中敏感词汇的替换方法、系统及装置
CN103595844A (zh) * 2013-11-15 2014-02-19 深圳市中兴移动通信有限公司 双音多频号码的处理方法和装置
WO2015115798A1 (fr) * 2014-01-29 2015-08-06 Samsung Electronics Co., Ltd. Dispositif terminal d'utilisateur, et procédé de communications sécurisées correspondant

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2863443B1 (fr) * 2003-12-05 2006-03-03 Sagem Procede de sauvegarde des donnees d'un telephone mobile
CN101014060B (zh) * 2007-02-02 2010-05-19 东南大学 抗长时预测规则脉冲激励压缩编码全球通手机语音加密方法
CN101631304B (zh) * 2009-07-23 2012-05-23 东南大学 抗自适应多速率编码第三代移动通信端到端语音加密方法
CN101909290A (zh) * 2010-08-25 2010-12-08 中兴通讯股份有限公司 一种实现语音通话加密的方法及系统及移动终端
CN105357007B (zh) * 2014-08-21 2019-05-31 深圳市中兴微电子技术有限公司 加密通信方法及通信终端
CN104378198A (zh) * 2014-10-16 2015-02-25 南京中科龙脉物联网技术有限公司 一种基于分组密码体制的语音加密方法
CN104994500B (zh) * 2015-05-22 2018-07-06 南京科烁志诺信息科技有限公司 一种用于移动电话的语音保密传输方法及装置
CN105050082B (zh) * 2015-09-11 2019-10-25 成都汇研科技有限公司 语音通信方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761867A (zh) * 2011-04-29 2012-10-31 德信智能手机技术(北京)有限公司 提高通话安全性的方法和通话设备
CN102811439A (zh) * 2011-06-02 2012-12-05 中兴通讯股份有限公司 语音处理方法及系统
CN102333042A (zh) * 2011-10-31 2012-01-25 深信服网络科技(深圳)有限公司 一种防止数据泄密的方法、安全网关及系统
CN103516915A (zh) * 2012-06-27 2014-01-15 百度在线网络技术(北京)有限公司 在移动终端通话过程中敏感词汇的替换方法、系统及装置
CN103595844A (zh) * 2013-11-15 2014-02-19 深圳市中兴移动通信有限公司 双音多频号码的处理方法和装置
WO2015115798A1 (fr) * 2014-01-29 2015-08-06 Samsung Electronics Co., Ltd. Dispositif terminal d'utilisateur, et procédé de communications sécurisées correspondant

Also Published As

Publication number Publication date
CN105743912A (zh) 2016-07-06
CN105743912B (zh) 2020-04-07

Similar Documents

Publication Publication Date Title
JP6307665B2 (ja) 再生不能通信セッションのためのシステムおよび方法
WO2020155767A1 (fr) Procédé et appareil d'ouverture de session sans mot de passe basée sur un terminal mobile, dispositif et support de stockage
US20160197894A1 (en) Method of generating a deniable encrypted communications via password entry
US20140143550A1 (en) Securing speech recognition data
CN109450777B (zh) 会话信息提取方法、装置、设备和介质
CN111614683B (zh) 一种数据处理方法、装置、系统及一种网卡
US20160197895A1 (en) Method of deniable encrypted communications
CN107533598B (zh) 应用程序的登录密码的输入方法、装置和终端
CN104767746A (zh) 推送消息接收方法、消息推送方法、客户端及服务器
JP2009237774A (ja) 認証サーバ、サービス提供サーバ、認証方法、通信端末、およびログイン方法
US11245530B2 (en) System and method for secure communication
CN108965785B (zh) 一种视频会议录像方法、录像装置、控制中心和终端
CN110380856B (zh) 终端设备及其语音信息处理方法、装置以及存储介质
JP5691586B2 (ja) 秘話通信システム、装置及びプログラム
WO2016150363A1 (fr) Procédé et appareil de gestion de chiffrement à gradient
JP2002269047A (ja) 音声ユーザ認証システム
US11941154B2 (en) Securing personally identifiable and private information in conversational AI-based communication
WO2017166420A1 (fr) Procédé de chiffrement vocal et terminal de transmission vocale
Fazeen et al. Context-aware multimedia encryption in mobile platforms
CN112767944A (zh) 声纹识别方法及装置
CN114338156A (zh) 数据处理方法、装置及存储介质
KR101721582B1 (ko) 음성 데이터를 이용한 비대면 사용자 인증 시스템, 방법 및 컴퓨터 프로그램
CN114172670A (zh) 授权方法、装置和系统
WO2018137415A1 (fr) Procédé de suppression de données, terminal et serveur
CN111065094B (zh) 通讯录传输方法、装置、存储介质及电子设备

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16896194

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16896194

Country of ref document: EP

Kind code of ref document: A1