Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document encrypting method and document decrypting method on basis of voice print

An encryption method and encryption key technology, which is applied in the direction of instruments, electrical digital data processing, digital data protection, etc., can solve the problems of limited memory key ability and low key security, and achieve high security and convenient use Effect

Active Publication Date: 2012-11-28
HANGZHOU DIANZI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is the safest and most convenient in theory, but people have limited ability to memorize the key. In actual use, it is often "one code pass". security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document encrypting method and document decrypting method on basis of voice print
  • Document encrypting method and document decrypting method on basis of voice print
  • Document encrypting method and document decrypting method on basis of voice print

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with accompanying drawing.

[0024] Speech features MFCC parameters vary with the speaker's pitch, syllable, syllable context, glottal airflow model, and each individual's unique pronunciation. After being trained by the GMM Gaussian mixture model, the parameter values ​​of the speech feature GMM model are stable within a certain numerical range, which is determined by the speaker's voiceprint (the speaker's unique glottal airflow characteristics, pronunciation, etc.) and semantic content. Given the semantic content, the model parameter values ​​are further stabilized around the speaker's voiceprint. Stable key information can be extracted from this model parameter value, that is, the encryption and decryption key determined by the voiceprint characteristics of the voice. The above is the basic principle of the present invention. The process of document encryption in the present invention is as follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a document encrypting method on the basis of a voice print, which comprises the following steps that: (1) a user remembers a key; (2) the user says a sentence by voice randomly, and a key is extracted from characteristic parameters of the voice print of the voice as an encrypted key; (3) a symmetric encryption algorithm is selected, the key extracted in the step (2) is used to encrypt a document, an intermediate document is generated, a random text string in the step (2) and the intermediate document are packed together to generate a novel document; and (4) the key remembered by the user is used to encrypt the document in the step (3) to form an encrypted document. A voice print document decrypting method comprises the following steps that: (1) the selected symmetric encryption algorithm and the key remembered by the user are used to generate a temporary document; (2) a text string correlative with the encrypted key of the document is separated out from the temporary document and the user says the text string by voice and extracts a key from the characteristic parameters of the voice print of the voice; and (3) the temporary document is decrypted by the key extracted in the step (2) and the selected symmetric encryption algorithm to complete decrypting the document. The document encrypting method and the voice print document decrypting method provided by the invention are convenient to use and have high safety.

Description

technical field [0001] The invention belongs to the technical field of computer information security document protection, and in particular relates to a voiceprint-based file-by-file-encryption encryption and decryption method. Background technique [0002] At present, a large amount of private and important information in people's work and life is generally stored in personal computers or file servers in the form of electronic documents. As we all know, electronic documents themselves are vulnerable to network attacks, and their existence is stolen, destroyed, and distributed without authorization. Waiting for danger. Therefore, it is particularly important to encrypt and protect documents. [0003] Document encryption generally adopts symmetric encryption methods (such as AES, 3DES, etc.), and under the condition that the number of key bits is long enough, document encryption itself can be considered safe in daily use. It is difficult for a stealer to directly crack the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/24G06F21/60
Inventor 吴震东
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products