Recording encryption and decryption method and device

A technology for encrypting and decrypting and recording files, applied in the field of recording encryption and decryption methods and devices, can solve the problems of privacy leakage, low security, loss, etc., and achieve the effect of ensuring security and improving security.

Active Publication Date: 2015-11-25
NUBIA TECHNOLOGY CO LTD
5 Cites 9 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, for some special recording scenarios, such as reporter interview recording, lawyer evidence collection recording, etc., the generated recording files may involve privacy or secret informat...
View more

Method used

[0038] The A/V input unit 120 is used to receive audio or video signals. The A/V input unit 120 may include a camera 121 that processes image data of a still picture or video obtained by an image capture device in a video capture mode or an image capture mode, and a microphone 1220 . The processed image frames can be displayed on the display module 151 . The image frames processed by the camera 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 1210 may be provided according to the configuration of the mobile terminal...
View more

Abstract

The invention discloses a recording encryption and decryption method and device. The method comprises the following steps: collecting biological feature information of at least one recording participant, and generating a first key according to the biological feature information; when recording sounds, encrypting the recorded sound data by using the first key, and generating an encrypted recording file; and when opening the encrypted recording file, collecting biological feature information, generating a second key according to the collected biological feature information, and when the second key is matched with the first key, decrypting the encrypted recording file. Therefore, the security of recording data is improved.

Application Domain

Key distribution for secure communication

Technology Topic

Computer hardwareEncryption

Image

  • Recording encryption and decryption method and device
  • Recording encryption and decryption method and device
  • Recording encryption and decryption method and device

Examples

  • Experimental program(2)

Example

[0064] See figure 1 , The first embodiment of the recording encryption and decryption method of the present invention is proposed. The method includes the following steps:
[0065] S11. Before recording, collect voice information of a recording participant, and generate a first key according to the collected voice information.
[0066] This step S11 is a preparation process before recording. Before recording officially starts, the first key is first set. Specifically, it is: prompting a recording participant to speak, collecting the voice information of the recording participant, and then generating the voice information as a first key using a general algorithm, and the first key is used to encrypt subsequent recordings.
[0067] For example, the frequency is converted into a corresponding binary data string through the frequency information of the collected sound, and then the binary string is repeated twice, and 1 is added to obtain the first key. For example, the sound frequency is 400 Hz, and the binary corresponding to 400 is 110010000, then the first key is 110010000110010000+1, that is, 110010000110010001. Here, only a simple key generation algorithm is used as an example, and the present invention is not limited to this key generation algorithm.
[0068] The recording participant can be the recording operator or/and the recording object. The recording operator is the person who operates the recording equipment to record; the recording object is the person who makes the sound during the recording.
[0069] For example, when a reporter is recording an interview, the reporter's voice information is collected to generate the first key; when a lawyer is recording evidence, the lawyer's voice information is collected to generate the first key.
[0070] S12. When recording the sound, encrypt the recorded sound data by using the first key to generate an encrypted recording file.
[0071] This step S12 is the formal recording process. During the recording process, the voice data is continuously collected, and the recorded voice data is encrypted with the first key. After the recording is completed, an encrypted recording file is generated and the encrypted recording file is stored in the designated position.
[0072] S13. When the encrypted recording file is opened, a piece of sound information is collected, and a second key is generated according to the collected sound information.
[0073] Specifically, when the encrypted recording file is opened, the user is prompted for verification. First, the user is prompted to speak, and the user's voice information is collected, and then the voice information is generated as the second key using the same algorithm as the first key.
[0074] Then it is judged whether the second key and the first key match, when they match, go to step S14, and when they do not match, go to step S15.
[0075] S14. Successfully decrypt the encrypted recording file.
[0076] When the second key matches the first key, the second key (or the first key) is used to decrypt the encrypted recording file, the encrypted recording file is played normally, and the user can listen to the recording content normally.
[0077] S15. Failed to decrypt the encrypted recording file.
[0078] When the second key does not match the first key, the decryption fails, the encrypted recording file is refused to be played or the encrypted recording file cannot be played normally, and the user cannot listen to the recording content normally.
[0079] For example, before recording, recording participant A records his own voice to generate a first key, and uses the first key to encrypt recording data to generate an encrypted recording file during recording. When the encrypted recording file is opened, it must be verified by sounding. When the sound matches the voice of recording participant A, the verification can be passed, and the content of the encrypted recording file can be listened to normally, otherwise the recording content cannot be listened to. In other words, the recording participant A must speak in order to pass the verification and listen to the recording content.
[0080] Therefore, in the recording encryption and decryption method of this embodiment, the voice information of a person is used to encrypt the recording content during recording. When listening to the recording, the voice information of that person at the time of encryption also needs to be decrypted, which ensures the security of the recorded content and improves Improve the security of recorded data.

Example

[0081] See figure 2 , The second embodiment of the recording encryption and decryption method of the present invention is proposed. The method includes the following steps:
[0082] S21. Before recording, collect voice information of two recording participants respectively, and generate a first key according to the two collected voice information.
[0083] This step S21 is a preparation process before recording. Before recording officially starts, the first key is first set. Specifically: prompt one recording participant to speak, collect the voice information of one recording participant, and then prompt the other recording participant to speak, and collect the voice information of the other recording participant; then use a general algorithm to collect the two The sound information is combined into a first key, and the first key is used to encrypt subsequent recordings.
[0084] For example, by collecting the frequency information of the two sounds, find the binary data strings corresponding to the two frequencies, and then calculate the sum of the two binary strings bitwise, and add 1 to the result to get the first One key. For example, the sound frequency is 400Hz and 350Hz, 400 corresponds to the binary system is 110010000, 350 corresponds to the binary system is 101011110, then the result is 110010000+101011110, and then add 1 to this result to get the first key as 1011101111. Here, only a simple key generation algorithm is used as an example, and the present invention is not limited to this key generation algorithm.
[0085] Recording participants can be recording operators and recording objects. The recording operator is the person who operates the recording equipment to record; the recording object is the person who makes the sound during the recording.
[0086] Preferably, the two recording participants are preferably two recording objects, and are two opposite parties. For example, when a reporter records an interview, the voice information of the reporter and interviewer is collected to generate the first key; when a lawyer records forensics, the voice information of the lawyer and witnesses is collected to generate the first key.
[0087] S22. When recording the sound, encrypt the recorded sound data by using the first key to generate an encrypted recording file.
[0088] This step S22 is the formal recording process. During the recording process, the voice data is continuously collected, and the recorded voice data is encrypted with the first key. After the recording is finished, an encrypted recording file is generated and the encrypted recording file is stored in the designated position.
[0089] S23. When the encrypted recording file is opened, two pieces of sound information are collected separately, and a second key is generated according to the two pieces of collected sound information.
[0090] Specifically, when the encrypted recording file is opened, the user is prompted for verification. Collect one piece of sound information first, then collect another piece of sound information, and then use the same algorithm as that used to generate the first key to combine the two collected sound information into a second key.
[0091] Then it is judged whether the second key and the first key match, when they match, go to step S24, and when they do not match, go to step S25.
[0092] S24. Successfully decrypt the encrypted recording file.
[0093] When the second key matches the first key, the second key (or the first key) is used to decrypt the encrypted recording file, the encrypted recording file is played normally, and the user can listen to the recording content normally.
[0094] S25. Failed to decrypt the encrypted recording file.
[0095] When the second key does not match the first key, the decryption fails, the encrypted recording file is refused to be played or the encrypted recording file cannot be played normally, and the user cannot listen to the recording content normally.
[0096] For example, before recording, the voices of recording participants A and B are respectively recorded to generate a first key, and the first key is used to encrypt the recording data during recording to generate an encrypted recording file. When the encrypted recording file is opened, it must be verified by sounding. When the two voices are matched with the voices of recording participants A and B, the verification can be passed, and the content of the encrypted recording file can be listened to normally, otherwise the recording content cannot be listened to , Which means that the recording participants A and B must speak in order to pass the verification and listen to the recording content.
[0097] Therefore, in the recording encryption and decryption method of this embodiment, the sound information of two individuals is used to encrypt the recorded content during recording. When listening to the recording, the encrypted sound information of the two individuals is also required to decrypt it, which greatly guarantees the content of the recording. Security, which improves the security of recording data. This embodiment is especially suitable for special occasions that require a higher security level.
[0098] In addition, when there are three or more participants in the recording, the sound information of three or more people can also be collected to generate the first key for encryption. When decrypting, it is also necessary to collect the sound information of the aforementioned three or more people to generate the second key. Successfully decrypted.
[0099] The above embodiments describe in detail the case where the biometric information is sound information. When the biometric information is fingerprint information, iris information, or face information, the implementation process is the same as the above embodiment, and will not be repeated here.
[0100] The present invention further provides a recording encryption and decryption device applied to the aforementioned mobile terminal. Now based on the above-mentioned mobile terminal hardware structure and communication system, an embodiment of the recording encryption and decryption device of the present invention is proposed. Such as image 3 , The device includes a first key generation module, an encryption module, a second key generation module, and a decryption module, wherein:
[0101] The first key generation module: used to collect biometric information of at least one recording participant before recording, and generate the first key according to the collected biometric information.
[0102] The biometric information can be voice information, fingerprint information, iris information, or face information.
[0103] The recording participant can be the recording operator or/and the recording object. The recording operator is the person who operates the recording equipment to record; the recording object is the person who makes the sound during the recording.
[0104] The first key generation module can only collect the biometric information of one recording participant to generate the first key. Take the collection of sound information as an example: the first key generation module prompts a recording participant to speak, and collects the recording participant’s voice Then use a general algorithm to generate the sound information as a first key, and the first key is used to encrypt subsequent recordings. For example, when a reporter is recording an interview, the reporter's voice information is collected to generate the first key; when a lawyer is recording evidence, the lawyer's voice information is collected to generate the first key.
[0105] The first key generation module can also collect the biometric information of two recording participants to generate the first key. Take the collection of sound information as an example: the first key generation module prompts a recording participant to speak, and collects the recording participant’s Sound information, and then prompt another recording participant to speak, and collect the sound information of another recording participant; then use a general algorithm to combine the two collected sound information into a first key, which is used for Encrypt subsequent recordings. Preferably, the two recording participants are preferably two recording objects, and are two opposite parties. For example, when a reporter records an interview, the voice information of the reporter and interviewer is collected to generate the first key; when a lawyer records forensics, the voice information of the lawyer and witnesses is collected to generate the first key.
[0106] In addition, when there are three or more participants in the recording, the biometric information of three or more can also be collected to generate the first key for encryption.
[0107] Encryption module: when recording sound, use the first key to encrypt the recorded sound data to generate an encrypted recording file.
[0108] Specifically, during the sound recording process, the recording device continuously collects sound data, and the encryption module encrypts the recorded sound data using the first key. After the recording ends, it generates an encrypted recording file and stores the encrypted recording file in a designated location.
[0109] The second key generation module: when the encrypted recording file is opened, the biometric information is collected, and the second key is generated according to the collected biometric information.
[0110] Specifically, when the encrypted recording file is opened, the user is prompted to verify, collect biometric information, and generate the biometric information as the second key using the same algorithm as the first key. The amount of biometric information collected when the second key generation module generates the second key is the same as the amount of biometric information collected when the first key generation module generates the first key, and the method of generating the key is also the same. I will not repeat them here.
[0111] Decryption module: used to judge whether the second key matches the first key, when the two match, use the second key (or the first key) to decrypt the encrypted recording file, when the two do not match , It will not respond. After the decryption module successfully decrypts the encrypted recording file, the user can listen to the recording content normally, otherwise the recording content cannot be listened to normally.
[0112] Therefore, the recording encryption and decryption device of this embodiment uses the biometric information of at least one recording participant to encrypt the recording content during recording. When listening to the recording, the biometric information of the recording participant at the time of encryption is also required to decrypt, which ensures that The security of recording content improves the security of recording data.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Self-limiting electronic gear shifter

ActiveCN101922547Aensure safetyIncreased front space and operator comfort
Owner:HANGCHA GRP

Parking braking control device and method

InactiveCN103496360Aprevent movementensure safety
Owner:GREAT WALL MOTOR CO LTD

Mobile phone shielding device for driver

InactiveCN101364814Aensure safetyFacilitate normal communication
Owner:动力新跃(北京)汽车科技有限公司

Classification and recommendation of technical efficacy words

  • ensure safety
  • improve security

High accuracy non-contact tri-dimensional facial type measuring device

InactiveCN101105389Aensure safetylow cost
Owner:中国人民解放军第二炮兵装备研究院第四研究所

Intelligent charger with output voltage changing function

Owner:SHENZHEN SIECOM COMM TECH DEV CO LTD

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products