[0081] See figure 2 , The second embodiment of the recording encryption and decryption method of the present invention is proposed. The method includes the following steps:
[0082] S21. Before recording, collect voice information of two recording participants respectively, and generate a first key according to the two collected voice information.
[0083] This step S21 is a preparation process before recording. Before recording officially starts, the first key is first set. Specifically: prompt one recording participant to speak, collect the voice information of one recording participant, and then prompt the other recording participant to speak, and collect the voice information of the other recording participant; then use a general algorithm to collect the two The sound information is combined into a first key, and the first key is used to encrypt subsequent recordings.
[0084] For example, by collecting the frequency information of the two sounds, find the binary data strings corresponding to the two frequencies, and then calculate the sum of the two binary strings bitwise, and add 1 to the result to get the first One key. For example, the sound frequency is 400Hz and 350Hz, 400 corresponds to the binary system is 110010000, 350 corresponds to the binary system is 101011110, then the result is 110010000+101011110, and then add 1 to this result to get the first key as 1011101111. Here, only a simple key generation algorithm is used as an example, and the present invention is not limited to this key generation algorithm.
[0085] Recording participants can be recording operators and recording objects. The recording operator is the person who operates the recording equipment to record; the recording object is the person who makes the sound during the recording.
[0086] Preferably, the two recording participants are preferably two recording objects, and are two opposite parties. For example, when a reporter records an interview, the voice information of the reporter and interviewer is collected to generate the first key; when a lawyer records forensics, the voice information of the lawyer and witnesses is collected to generate the first key.
[0087] S22. When recording the sound, encrypt the recorded sound data by using the first key to generate an encrypted recording file.
[0088] This step S22 is the formal recording process. During the recording process, the voice data is continuously collected, and the recorded voice data is encrypted with the first key. After the recording is finished, an encrypted recording file is generated and the encrypted recording file is stored in the designated position.
[0089] S23. When the encrypted recording file is opened, two pieces of sound information are collected separately, and a second key is generated according to the two pieces of collected sound information.
[0090] Specifically, when the encrypted recording file is opened, the user is prompted for verification. Collect one piece of sound information first, then collect another piece of sound information, and then use the same algorithm as that used to generate the first key to combine the two collected sound information into a second key.
[0091] Then it is judged whether the second key and the first key match, when they match, go to step S24, and when they do not match, go to step S25.
[0092] S24. Successfully decrypt the encrypted recording file.
[0093] When the second key matches the first key, the second key (or the first key) is used to decrypt the encrypted recording file, the encrypted recording file is played normally, and the user can listen to the recording content normally.
[0094] S25. Failed to decrypt the encrypted recording file.
[0095] When the second key does not match the first key, the decryption fails, the encrypted recording file is refused to be played or the encrypted recording file cannot be played normally, and the user cannot listen to the recording content normally.
[0096] For example, before recording, the voices of recording participants A and B are respectively recorded to generate a first key, and the first key is used to encrypt the recording data during recording to generate an encrypted recording file. When the encrypted recording file is opened, it must be verified by sounding. When the two voices are matched with the voices of recording participants A and B, the verification can be passed, and the content of the encrypted recording file can be listened to normally, otherwise the recording content cannot be listened to , Which means that the recording participants A and B must speak in order to pass the verification and listen to the recording content.
[0097] Therefore, in the recording encryption and decryption method of this embodiment, the sound information of two individuals is used to encrypt the recorded content during recording. When listening to the recording, the encrypted sound information of the two individuals is also required to decrypt it, which greatly guarantees the content of the recording. Security, which improves the security of recording data. This embodiment is especially suitable for special occasions that require a higher security level.
[0098] In addition, when there are three or more participants in the recording, the sound information of three or more people can also be collected to generate the first key for encryption. When decrypting, it is also necessary to collect the sound information of the aforementioned three or more people to generate the second key. Successfully decrypted.
[0099] The above embodiments describe in detail the case where the biometric information is sound information. When the biometric information is fingerprint information, iris information, or face information, the implementation process is the same as the above embodiment, and will not be repeated here.
[0100] The present invention further provides a recording encryption and decryption device applied to the aforementioned mobile terminal. Now based on the above-mentioned mobile terminal hardware structure and communication system, an embodiment of the recording encryption and decryption device of the present invention is proposed. Such as image 3 , The device includes a first key generation module, an encryption module, a second key generation module, and a decryption module, wherein:
[0101] The first key generation module: used to collect biometric information of at least one recording participant before recording, and generate the first key according to the collected biometric information.
[0102] The biometric information can be voice information, fingerprint information, iris information, or face information.
[0103] The recording participant can be the recording operator or/and the recording object. The recording operator is the person who operates the recording equipment to record; the recording object is the person who makes the sound during the recording.
[0104] The first key generation module can only collect the biometric information of one recording participant to generate the first key. Take the collection of sound information as an example: the first key generation module prompts a recording participant to speak, and collects the recording participant’s voice Then use a general algorithm to generate the sound information as a first key, and the first key is used to encrypt subsequent recordings. For example, when a reporter is recording an interview, the reporter's voice information is collected to generate the first key; when a lawyer is recording evidence, the lawyer's voice information is collected to generate the first key.
[0105] The first key generation module can also collect the biometric information of two recording participants to generate the first key. Take the collection of sound information as an example: the first key generation module prompts a recording participant to speak, and collects the recording participant’s Sound information, and then prompt another recording participant to speak, and collect the sound information of another recording participant; then use a general algorithm to combine the two collected sound information into a first key, which is used for Encrypt subsequent recordings. Preferably, the two recording participants are preferably two recording objects, and are two opposite parties. For example, when a reporter records an interview, the voice information of the reporter and interviewer is collected to generate the first key; when a lawyer records forensics, the voice information of the lawyer and witnesses is collected to generate the first key.
[0106] In addition, when there are three or more participants in the recording, the biometric information of three or more can also be collected to generate the first key for encryption.
[0107] Encryption module: when recording sound, use the first key to encrypt the recorded sound data to generate an encrypted recording file.
[0108] Specifically, during the sound recording process, the recording device continuously collects sound data, and the encryption module encrypts the recorded sound data using the first key. After the recording ends, it generates an encrypted recording file and stores the encrypted recording file in a designated location.
[0109] The second key generation module: when the encrypted recording file is opened, the biometric information is collected, and the second key is generated according to the collected biometric information.
[0110] Specifically, when the encrypted recording file is opened, the user is prompted to verify, collect biometric information, and generate the biometric information as the second key using the same algorithm as the first key. The amount of biometric information collected when the second key generation module generates the second key is the same as the amount of biometric information collected when the first key generation module generates the first key, and the method of generating the key is also the same. I will not repeat them here.
[0111] Decryption module: used to judge whether the second key matches the first key, when the two match, use the second key (or the first key) to decrypt the encrypted recording file, when the two do not match , It will not respond. After the decryption module successfully decrypts the encrypted recording file, the user can listen to the recording content normally, otherwise the recording content cannot be listened to normally.
[0112] Therefore, the recording encryption and decryption device of this embodiment uses the biometric information of at least one recording participant to encrypt the recording content during recording. When listening to the recording, the biometric information of the recording participant at the time of encryption is also required to decrypt, which ensures that The security of recording content improves the security of recording data.