Voice encryption method and device and voice decryption method and device

A voice encryption and voice technology, applied in the field of information security, can solve the problems of reduced information security and easily deciphered information, and achieve the effect of improving security and increasing the difficulty of deciphering

Active Publication Date: 2015-02-18
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the existing voice encryption and decryption technology makes the encrypted information easier to decipher, resulting in reduced information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice encryption method and device and voice decryption method and device
  • Voice encryption method and device and voice decryption method and device
  • Voice encryption method and device and voice decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] see Figure 1a , is a flow chart of a speech encryption method provided in Embodiment 1 of the present invention. The method of the embodiment of the present invention can be executed by a voice encryption device implemented in hardware and / or software. The implementation device is typically configured in a terminal capable of providing voice encryption services, such as a smart phone, a tablet computer, etc. various mobile terminals.

[0034] The method includes: operation 11-operation 13.

[0035] In operation 11, characters in the speech for encryption are identified to obtain an encrypted character sequence.

[0036] This operation specifically uses speech recognition technology to recognize and obtain an encrypted character sequence from the speech used for encryption.

[0037] Wherein, the voice used for encryption refers to the voice for encrypting the information to be encrypted, which can be the voice input by the user through the microphone in the terminal c...

Embodiment 2

[0053] see figure 2 , is a flow chart of a voice encryption method provided in Embodiment 2 of the present invention. On the basis of the foregoing embodiments, this embodiment provides a preferred solution for the operation of extracting the characteristic parameters of the speech used for encryption, and specifically provides a preferred solution for extracting the speech rate value of the speech used for encryption.

[0054] The preferred method includes: operation 21-operation 22.

[0055] In operation 21, the time interval between two adjacent characters in the encrypted character sequence is acquired.

[0056] In this embodiment, by acquiring the time interval between two adjacent characters in the encrypted character sequence, the obtained time interval is used as the speech rate value of the speech used for encryption. In other words, based on the pause between two adjacent characters in the encrypted character sequence, characterize the speech rate value of the spe...

Embodiment 3

[0068] see image 3 , is a schematic structural diagram of a speech encryption device provided in Embodiment 3 of the present invention. The device includes: a voice recognition module 31 , a feature extraction module 32 and an encryption module 33 .

[0069] Wherein, recognition module 31 is used for identifying the character in the speech that is used for encrypting, obtains encrypted character sequence; Feature extraction module 32 is used for extracting the characteristic parameter of described speech that is used for encrypting; Encryption module 33 is used for using described speech recognition The encrypted character sequence obtained by module identification is used to encrypt the information to be encrypted, and save the encrypted character sequence and the characteristic parameters, so that when the information is obtained by decryption, the decrypted character sequence and the voice used for decryption The characteristic parameters are matched.

[0070] In the tec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a voice encryption method and device and a voice decryption method and device. The voice encryption method includes recognizing characters of voice for encryption to obtain an encrypted character sequence, extracting the characteristic parameters for the voice for encryption, encrypting the information to be encrypted by the recognized encryption characters and storing the encrypted character sequence and the characteristic parameters so as to be matched with a decryption character sequence and the characteristic parameters of the voice for decryption when the received information is decrypted. Accordingly, decipher difficulty is added, and safety of the encrypted information is improved.

Description

technical field [0001] The embodiment of the present invention relates to the field of information security technologies, and in particular to a voice encryption method and device, and a voice decryption method and device. Background technique [0002] Speech encryption technology is a commonly used information encryption technology. It mainly recognizes characters from the input voice through speech recognition to obtain an encrypted character sequence, and then encrypts the encrypted information with the encrypted character sequence through an encryption algorithm to ensure the above-mentioned Information Security. Correspondingly, when decrypting encrypted information, voice recognition is performed on the voice used for decryption through voice recognition, characters are recognized from the voice used for decryption, and a sequence of decrypted characters is obtained. Afterwards, match the decrypted character sequence with the encrypted character sequence, and if the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L15/02G10L25/48H04L9/06
Inventor 刘孟李军王道龙李华明袁艺刘晓伟燕宇飞张钰易敏文吕文玉
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products