Supercharge Your Innovation With Domain-Expert AI Agents!

Recording encryption and decryption method and device

A technology for encrypting and decrypting and recording files, applied in the field of recording encryption and decryption methods and devices, can solve the problems of privacy leakage, low security, loss, etc., and achieve the effect of ensuring security and improving security.

Active Publication Date: 2015-11-25
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for some special recording scenarios, such as reporter interview recording, lawyer evidence collection recording, etc., the generated recording files may involve privacy or secret information. If the recording content is heard by others, it will cause privacy leakage and cause unpredictable Loss
Therefore, the recording data recorded by the existing recording equipment is less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recording encryption and decryption method and device
  • Recording encryption and decryption method and device
  • Recording encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0064] see figure 1 , propose the first embodiment of the recording encryption and decryption method of the present invention, the method includes the following steps:

[0065] S11. Before recording, collect voice information of a recording participant, and generate a first key according to the collected voice information.

[0066] This step S11 is the preparatory process before the recording, and before the recording officially starts, the first key is firstly set. Specifically, prompting a recording participant to make a sound, collecting the voice information of the recording participant, and then using a common algorithm to generate the voice information into a first key, and the first key is used to encrypt subsequent recordings.

[0067] For example, through the frequency information of the collected sound, the frequency is converted into a corresponding binary data string, and then the binary string is repeated twice, and 1 is added to obtain the first key. For exampl...

no. 2 example

[0081] see figure 2 , propose the second embodiment of the recording encryption and decryption method of the present invention, the method includes the following steps:

[0082] S21. Before recording, respectively collect voice information of two recording participants, and generate a first key according to the collected two voice information.

[0083] This step S21 is the preparatory process before the recording, and before the recording officially starts, the first key is firstly set. Specifically: Prompt one recording participant to speak, collect the voice information of one recording participant, then prompt another recording participant to speak, collect the other recording participant's voice information; then use a general algorithm to combine the collected two The sound information is combined into a first key, which is used to encrypt subsequent recordings.

[0084] For example, through the frequency information of the two sounds collected, the binary data strings...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a recording encryption and decryption method and device. The method comprises the following steps: collecting biological feature information of at least one recording participant, and generating a first key according to the biological feature information; when recording sounds, encrypting the recorded sound data by using the first key, and generating an encrypted recording file; and when opening the encrypted recording file, collecting biological feature information, generating a second key according to the collected biological feature information, and when the second key is matched with the first key, decrypting the encrypted recording file. Therefore, the security of recording data is improved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a recording encryption and decryption method and device. Background technique [0002] In the Internet age, it is becoming more and more convenient for people to obtain information, but at the same time, private information is more likely to be leaked, and how to protect privacy has attracted more and more attention. Therefore, higher requirements are put forward for data encryption in various scenarios. In the recording scene, most recording devices now record the recording data into a regular file. When others obtain the file, they can listen to the recording content normally. However, for some special recording scenarios, such as reporter interview recording, lawyer evidence collection recording, etc., the generated recording files may involve privacy or secret information. If the recording content is heard by others, it will cause privacy leakage and cause unpredictable...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 汪飞
Owner NUBIA TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More