CN107995673A - A kind of voice data processing apparatus, method and terminal - Google Patents
A kind of voice data processing apparatus, method and terminal Download PDFInfo
- Publication number
- CN107995673A CN107995673A CN201610952521.6A CN201610952521A CN107995673A CN 107995673 A CN107995673 A CN 107995673A CN 201610952521 A CN201610952521 A CN 201610952521A CN 107995673 A CN107995673 A CN 107995673A
- Authority
- CN
- China
- Prior art keywords
- voice data
- encryption
- module
- decryption
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 39
- 230000006854 communication Effects 0.000 claims description 17
- 238000003672 processing method Methods 0.000 abstract description 10
- 230000005540 biological transmission Effects 0.000 abstract 2
- 230000015271 coagulation Effects 0.000 abstract 1
- 238000005345 coagulation Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 230000007958 sleep Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000012792 core layer Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. Transmission Power Control [TPC] or power classes
- H04W52/02—Power saving arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a kind of voice data processing apparatus, including:Baseband processing module, enciphering/deciphering interface module and enciphering/deciphering module, enciphering/deciphering module carry is in baseband processing module;Wherein, baseband processing module, for receiving the pending voice data from upper level processing module;Call enciphering/deciphering interface module;Pending voice data is sent to enciphering/deciphering module by enciphering/deciphering interface module;It is additionally operable to receive the voice data after the processing from enciphering/deciphering module;Voice data after downward coagulation module transmission processing;Enciphering/deciphering module, for receiving the pending voice data from baseband processing module;Pending voice data is handled using the key prestored, the voice data after being handled;Voice data after being handled by from enciphering/deciphering interface module to baseband processing module transmission.The embodiment of the present invention also discloses a kind of voice data processing method and terminal.
Description
Technical Field
The present invention relates to the field of data processing, and in particular, to a voice data processing apparatus, method, and terminal.
Background
No matter how the smart phone is developed, voice communication is the most important application of the smart phone, more and more attention and applications are paid to safety communication, and communication contents are encrypted in the communication process of the smart phone, so that the communication safety is guaranteed. Currently, the solutions for voice encryption are largely divided into two types: software encryption and hardware encryption. Wherein, the software encryption, such as Code Division Multiple Access (CDMA) encryption, is completely implemented by a software algorithm, and the algorithm runs on the core of a Central Processing Unit (CPU) that is commonly used by mobile phones; the hardware encryption is implemented by implementing an encryption algorithm and operation through a special chip, such as a Secure Digital memory (SD) card.
In the prior art, the hardware encryption is more common due to higher security. However, the hardware encryption scheme has a serious drawback, for example, because the encryption card, i.e. the SD card for implementing the encryption algorithm, is mounted on the Application Processor (AP) as the encryption/decryption hardware, all encrypted voice data streams are sent to the AP and the SD card by the baseband Processor (Modem), and after the encryption/decryption is completed, the data is sent back to the Modem. In this case, the AP always participates in the encryption/decryption operation, so that the AP never sleeps during the communication process, the power consumption of the whole device is very high, and the battery endurance is obviously reduced.
Disclosure of Invention
In view of this, embodiments of the present invention are to provide a voice data processing apparatus, method and terminal, so as to reduce power consumption and improve battery endurance in the process of encrypting/decrypting voice data.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a speech data processing apparatus, including: the encryption/decryption module is mounted on the baseband processing module; the baseband processing module is configured to receive to-be-processed voice data from a previous-stage processing module, where the to-be-processed voice data is voice data that needs to be encrypted or decrypted; calling the encryption/decryption interface module; sending the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module; the encryption/decryption module is also used for receiving the processed voice data from the encryption/decryption module; sending the processed voice data to a next-stage processing module; the encryption/decryption module is used for receiving the voice data to be processed from the baseband processing module; processing the voice data to be processed by adopting a prestored secret key to obtain the processed voice data; and sending the processed voice data to the baseband processing module through the encryption/decryption interface module.
In a second aspect, an embodiment of the present invention provides a method for processing voice data, including: receiving voice data to be processed from a previous-stage processing module, wherein the voice data to be processed is voice data needing encryption or decryption; calling an encryption/decryption interface module; sending the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module; receiving the processed voice data from the encryption/decryption module; and sending the processed voice data to a next-stage processing module.
In a third aspect, an embodiment of the present invention provides a terminal, including: the encryption/decryption device comprises a baseband processor, an encryption/decryption interface and a memory card with the encryption/decryption function, wherein the memory card is mounted on the baseband processor; the baseband processor is configured to receive to-be-processed voice data from a previous-stage processing module, where the to-be-processed voice data is voice data that needs to be encrypted or decrypted; sending the voice data to be processed to the memory card through the encryption/decryption interface; the memory card is also used for receiving processed voice data from the memory card; sending the processed voice data to a next-stage processing module; the memory card is used for receiving the voice data to be processed from the baseband processor; processing the voice data to be processed by adopting a prestored secret key to obtain the processed voice data; and sending the processed voice data to the baseband processor through the memory card.
The embodiment of the invention provides a voice data processing device, a method and a terminal, wherein the device comprises: the encryption/decryption module is mounted on the baseband processing module, so that in the process of encrypting/decrypting voice data, the baseband processing module can receive the voice data to be processed from the previous-stage processing module and send the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module; then, the encryption/decryption module processes the voice data to be processed by adopting a pre-stored secret key to obtain processed voice data, and sends the processed voice data to the baseband processing module; and finally, the baseband processing module sends the processed voice data to a next-stage processing module so as to carry out next-step processing. Therefore, the baseband processing module can directly carry out data communication with the encryption/decryption module without a third-party processing module, such as participation of an application processing module, so that power consumption can be reduced, battery endurance can be improved, and good user experience is provided.
Drawings
Fig. 1 is a schematic diagram illustrating a process of encrypting and decrypting voice data in a terminal in the prior art;
fig. 2 is a schematic structural diagram of a voice data processing apparatus according to a first embodiment of the present invention;
FIG. 3 is a schematic diagram of another structure of a voice data processing apparatus according to a first embodiment of the present invention;
fig. 4 is a schematic diagram of a driving system of an encryption/decryption driving module according to a first embodiment of the present invention;
FIG. 5 is a flowchart illustrating a voice data processing method according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a speech data processing apparatus according to a second embodiment of the present invention;
FIG. 7 is a flowchart illustrating a voice data processing method according to a second embodiment of the present invention;
fig. 8 is a flowchart illustrating a key obtaining method according to a second embodiment of the present invention;
FIG. 9 is a flowchart illustrating a method for clearing a key according to a second embodiment of the present invention;
fig. 10 is a schematic structural diagram of a terminal in a third embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
In the prior art, a terminal such as a smart phone, a tablet computer, a smart watch, etc. at least has an AP, a Modem, a radio frequency antenna, an audio device, and a codec, where the AP, the radio frequency antenna, and the codec are respectively connected to the Modem, the audio device is connected to the codec, the AP is provided with an encryption/decryption interface, and is also mounted with an SD card for encrypting or decrypting voice data.
Then, in order to implement hardware encryption or decryption of voice data, fig. 1 is a schematic flow chart of encryption and decryption processes of voice data in a terminal in the prior art, and referring to fig. 1, for a downlink voice signal (a solid line in the figure), the terminal receives the downlink voice signal from a communication network through a radio frequency antenna 11, the downlink voice signal is transmitted to a Modem12 by the radio frequency antenna 11 to be demodulated, so as to obtain encrypted voice data, then, the encrypted voice data is transmitted to an AP13, the AP13 transmits the encrypted voice data to an SD card 14 to be decrypted, the decrypted voice data is transmitted back to the AP13 by the SD card 14, then, the AP13 transmits the decrypted voice data to a Modem12, and the Modem12 transmits the decrypted voice data to a codec 15 to be decoded, and then, the decrypted voice data is played by an audio device 16, such as a speaker, a receiver, an earphone, and the like; for the uplink voice signal (dashed line in the figure), the terminal obtains voice data through the audio device 16, such as a microphone, an earphone microphone, and the like, the voice data is transferred to the codec 16 by the audio device 16 for encoding, and then transferred to the Modem12, and then the encoded voice data is transferred to the AP13 by the Modem12, and A P13 sends the voice data to the SD card 14 for encryption to obtain encrypted voice data, and the encrypted voice data is sent back to the AP13 by the SD card 14, and then the AP13 sends the encrypted voice data to the Modem12, and the M odem12 modulates the encrypted voice data to obtain the uplink voice signal, and finally, the Modem12 sends the uplink voice signal to the rf antenna 11, and the uplink voice signal is sent to the communication network through the rf antenna 11.
Therefore, the AP participates in the encryption and decryption process of the voice data, so that the AP always works and cannot sleep, the power consumption of the terminal is greatly increased, and the cruising ability of the terminal battery is obviously reduced.
Example one
In order to solve the above technical problem, an embodiment of the present invention provides a voice data processing apparatus, fig. 2 is a schematic structural diagram of the voice data processing apparatus in the first embodiment of the present invention, and referring to fig. 2, the voice data processing apparatus 20 includes: a baseband processing module 201, an encryption/decryption interface module 202 and an encryption/decryption module 203;
here, the encryption/decryption module 203 is mounted to the baseband processing module 201 so that the baseband processing module 201 can directly access the encryption/decryption module 203 and perform data communication with the encryption/decryption module 203.
Then, the baseband processing module may write or clear data into the encryption/decryption module through the encryption/decryption interface module, for example, the baseband processing module may write a key into the encryption/decryption module, or may clear a key stored in the encryption/decryption module; the baseband processing module may also receive data from the encryption/decryption module, for example, the baseband processing module may receive voice data after encryption/decryption processing. Of course, the baseband processing module may also perform other data communication with the encryption/decryption module, and the embodiment of the present invention is not limited in particular here.
It should be noted that the baseband processing module, the encryption/decryption interface module, and the encryption/decryption module may be physically combined or separately arranged, and here, the embodiment of the present invention is not specifically limited.
In practical application, the baseband processing module and the encryption/decryption interface module can be combined into a baseband processor; the encryption/decryption module may be a built-in memory card integrated with a secure encryption chip, such as an SD card with an encryption function, a MicroSD (TF) card, or a Flash memory (Flash memory), or may be an external encryptor, which is plug-and-play, and of course, the encryption/decryption module may also be other components with an encryption/decryption processing function, and herein, embodiments of the present invention are not limited specifically.
Further, in order to enable the encryption/decryption module to be mounted on the baseband processing module, referring to fig. 3, the voice data processing apparatus 20 further includes: the encryption/decryption driver module 301.
Here, the encryption/decryption driver module is configured to suspend the encryption/decryption module to the baseband processing module, so as to establish a data communication channel between the baseband processing module and the encryption/decryption module.
In practical applications, when the encryption/decryption module is an SD Card integrated with a secure cryptographic chip, the encryption/decryption driver module may be an SD Card driver, as shown in fig. 4, the driver follows a standard MMC system architecture, and includes three parts, namely a Host (Host) driver 401, a Core (Core) driver 402, and an SD Card (Card) driver 403;
the host driver 401 is a controller driver for different host terminals; the core driver 402 is a core layer of the whole MMC, completes the realization of different protocols and specifications, and provides an interface function for the host driver 401 and the device driver; the SD card driver 403 is a device driver for different clients, and is mainly referred to herein as an SD card driver.
The following describes a voice data processing method according to an embodiment of the present invention with reference to the voice data processing apparatus in the above embodiment.
Then, fig. 5 is a schematic flow chart of a voice data processing method according to a first embodiment of the present invention, and referring to fig. 5, the voice data processing method includes:
s501: the baseband processing module receives the voice data to be processed from the upper-level processing module;
here, the voice data to be processed is voice data that needs to be encrypted or decrypted.
In the specific implementation process, the voice data processing apparatus needs to process the voice data, and firstly, the baseband processing module needs to acquire the voice data to be processed from the previous stage processing module.
In practical applications, the previous-stage processing module may be a modulation and demodulation module, or an encoding/decoding module, or may also be another processing module, where the embodiment of the present invention is not specifically limited herein. For example, when the previous processing module is a modem module, the voice data to be processed may be voice data obtained by demodulating a downlink voice signal from a communication network by the modem module; when the previous processing module is an encoding/decoding module, the to-be-processed speech data may also be speech data obtained by encoding speech or recording from an audio module by the encoding/decoding module.
S502: the baseband processing module calls an encryption/decryption interface module;
here, before sending data to the encryption/decryption module, the baseband processing module needs to call the encryption/decryption interface module, and then can perform data communication with the encryption/decryption module.
Specifically, after the baseband processing module obtains the to-be-processed voice data, the encryption/decryption interface module may be called to start to prepare for sending the to-be-processed voice data to the encryption/decryption module.
S503: the baseband processing module sends the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module;
here, after the encryption/decryption interface module is called, the baseband processing module may send the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module, so that the encryption/decryption module may perform corresponding processing.
S504: the encryption/decryption module processes the voice data to be processed by adopting a prestored secret key to obtain the processed voice data;
here, after the encryption/decryption module obtains the voice data to be processed, the encryption/decryption module performs corresponding processing on the voice data to be processed by using the key pre-stored in the encryption/decryption module, so that the processed voice data can be obtained.
Specifically, when the received voice data to be processed from the baseband processing module is the voice data to be encrypted, the pre-stored key is adopted to encrypt the voice data to be processed; or, when the received to-be-processed voice data from the baseband processing module is the voice data to be decrypted, the pre-stored key is adopted to decrypt the to-be-processed voice data.
It should be noted that the key pre-stored in the encryption/decryption module may be fixed, that is, all encryption/decryption processes use the same key, and at this time, the risk of being decrypted easily occurs; the pre-stored key in the encryption/decryption module may also be changed, that is, different keys are used for encryption/decryption in different situations, and in this case, the security is higher. In practical applications, if it is desired that the key pre-stored in the encryption/decryption module is changed, a manner of periodically changing may be adopted, such as periodically writing a new key into the encryption/decryption module every 3s, a manner of randomly changing may be adopted, such as writing a new key into the encryption/decryption module every random time, a manner of processing write-once may be adopted, such as writing a new key before each processing for use in the current processing, or writing a new key after each processing for use in the next processing. Meanwhile, the number of the keys pre-stored in the encryption/decryption module may be one, or may be multiple, such as two, three, and the like. The present invention is not limited to the embodiments described above, but may be embodied in various forms.
S505: the encryption/decryption module sends the processed voice data to the baseband processing module through the encryption/decryption interface module;
here, after the encryption/decryption module completes processing of the voice data to be processed, the encryption/decryption module sends the processed voice data to the baseband processing module through the encryption/decryption interface module.
S506: and the baseband processing module sends the processed voice data to the next-stage processing module.
Here, after receiving the processed voice data from the encryption/decryption module, the baseband processing module sends the processed voice data to the next processing module, so that the next processing module performs further processing.
In practical applications, the next-stage processing module may be a modulation and demodulation module, or an encoding/decoding module, or may also be another processing module, where the embodiment of the present invention is not specifically limited herein. Exemplarily, when the processed voice data is encrypted voice data, the next-stage processing module may be a modulation and demodulation module, and may be capable of modulating the decrypted voice data to obtain an uplink voice signal and sending the uplink voice signal to a communication network; when the processed voice data is the decrypted voice data, the previous-stage processing module may be an encoding/decoding module, and can decode the decrypted voice data and send the decoded voice data to the audio module for playing.
At this point, the processing of the voice data is completed. As can be seen from the above, in the technical solution provided in the embodiment of the present invention, the baseband processing module receives the to-be-processed voice data from the previous stage processing module, calls the encryption/decryption interface module, and sends the to-be-processed voice data to the encryption/decryption module through the encryption/decryption interface module; then, the encryption/decryption module processes the voice data to be processed by adopting a pre-stored secret key to obtain processed voice data, and sends the processed voice data to the baseband processing module through the encryption/decryption interface module; and finally, the baseband processing module sends the processed voice data to a next-stage processing module so as to carry out next-step processing. Therefore, when the voice data processing device is applied to the terminal, the baseband processing module can directly carry out data communication with the encryption/decryption module without a third-party processing module, such as participation of the application processing module, so that power consumption can be reduced, battery endurance can be improved, and good user experience is provided.
Example two
Based on the foregoing embodiments, in practical applications, in order to manage the key required in the encryption/decryption process, referring to fig. 6, the one or more voice data processing apparatuses 20 further include: a key management module 601.
Here, the key management module is configured to obtain a key and send the key to the baseband processing module. Then, after receiving the key, the baseband processing module can write the key into the encryption/decryption module through the encryption/decryption interface module, and further, the encryption/decryption module stores the key, so that after obtaining the voice data to be processed, the encryption/decryption module can perform encryption processing or decryption processing on the voice data to be processed by using the key.
Therefore, before the encryption/decryption module performs encryption processing or decryption processing on the voice data to be processed by using the key, the baseband processing module is further required to write the key required for encryption/decryption into the encryption/decryption module in advance.
Then, fig. 7 is a flowchart illustrating a voice data processing method according to a second embodiment of the present invention, and referring to fig. 7, before executing S504, the voice data processing method further includes:
s701: the key management module acquires a key and sends the key to the baseband processing module;
here, the key acquired by the key management module is the key stored in advance in the encryption/decryption module in step S504.
S702: the baseband processing module writes the key into the encryption/decryption module through the encryption/decryption interface module;
specifically, after receiving the key sent by the key management module, the baseband processing module calls the encryption/decryption interface module, and writes the key into the encryption/decryption module through the encryption/decryption interface module.
S703: the encryption/decryption module stores the key.
Specifically, after obtaining the key written by the baseband processing module, the encryption/decryption module stores the key in the encryption/decryption module for use in performing encryption/decryption processing on the voice data.
The following describes in detail the way of the key management module to obtain the key according to the difference of the key ways used by the encryption/decryption module.
Firstly, because the encryption/decryption module can process the voice data to be processed by adopting a mode of processing one key at a time, namely, the keys used by the encryption/decryption module for each processing are different, at this time, the key management module needs to process one time to obtain a new key.
In a specific implementation process, the key management module may obtain a key before each processing of the encryption/decryption module, and then let the baseband processor write in the encryption/decryption module, so that the encryption/decryption module can store a new key before each processing for use in the processing; alternatively, the key management module may obtain the key after each processing of the encryption/decryption module and then let the baseband processor write the key into the encryption/decryption module, so that the encryption/decryption module can store a new key after each processing for use in the next processing.
Secondly, because the encryption/decryption module can also process the voice data to be processed in a mode of processing one key for multiple times in a preset time period, namely, in the preset time period, the key used for each processing of the encryption/decryption module is the same, and at this time, the key management module needs to obtain a new key every other preset time period.
In practical applications, the key management module may obtain the key before the beginning of each predetermined time period, and then let the baseband processor write the key into the encryption/decryption module, so that the encryption/decryption module can store the key again before the beginning of each predetermined time period for use in the next predetermined time period. Here, the preset time period may be a fixed time period, such as 2 seconds, 5 seconds, etc., or may be a non-fixed time period, such as a random time. Specifically, when the preset time period is a fixed time period, such as 2 seconds, at this time, the key management module needs to obtain a new key every 2 seconds; or, when the preset time period is a non-fixed time period, such as a random time, the key management module may obtain a new key at random time intervals.
Exemplarily, a second embodiment of the present invention further provides a method for acquiring a key by a key management module, fig. 8 is a schematic flow chart of the method for acquiring a key in the second embodiment of the present invention, and referring to fig. 8, the method for acquiring a key includes:
s801: the baseband processing module receives a call encryption/decryption instruction;
here, the call encryption/decryption instruction is used to instruct encryption/decryption of the voice data to be processed from the upper-level processing module.
In practical applications, the call encryption/decryption instruction may be generated by a user operation, for example, the user selects to perform an encrypted call on an application interface, and then the application processing module generates a call encryption/decryption instruction and sends the call encryption/decryption instruction to the baseband processing module.
S802: the baseband processing module executes the conversation encryption/decryption instruction to generate a key request;
here, the baseband processing module, upon receiving the call encryption/decryption instruction, executes the call encryption/decryption instruction, thereby generating the key request. Specifically, the key request is used to instruct the key management module to obtain the key.
S803: the baseband processing module sends a key request to the key management module;
here, after generating the key request, the baseband processing module sends the key request to the key management module to request the key management module to obtain the key.
S804: the key management module responds to the key request, generates a key negotiation request and sends the key negotiation request to the network side;
here, the key agreement request is used to instruct the network side to issue the key.
Specifically, after receiving a key request from the baseband processing module, the key management module generates a key agreement request, sends the key agreement request to the network side, and requests the network side to issue a key.
S805: the key management module receives a key from the network side.
In practical application, after receiving a key agreement request from the key management module, the network side sends an agreement result to the key management module, and when the agreement result is successful, the network side also sends a key to the key management module. Further, the key management module receives the network side sent key.
The key management module finishes the process of obtaining the key, and after obtaining the key (performing S801-S805), the key management module may send the key to the baseband processing module (performing S701), so that the baseband processing module can write the key into the encryption/decryption module (performing S702), and finally, the encryption/decryption module stores the key (performing S703).
Further, after the encryption/decryption module performs encryption processing or decryption processing on the voice data to be processed by using the key, the baseband processing module may also clear the key stored in the encryption/decryption module in advance.
Then, fig. 9 is a flowchart illustrating a method for clearing a key according to a second embodiment of the present invention, and referring to fig. 9, the method for clearing a key may include:
s901: the baseband processing module generates a key clearing instruction after receiving the call end indication message;
specifically, the call end indication message may be generated by a user operation, for example, the user selects to end the call on the application interface, and then the application processing module generates a call end indication message and sends the call end indication message to the baseband processing module. Therefore, after receiving the call end instruction message, the baseband processing module generates a key clearing instruction for instructing itself to clear the key pre-stored in the encryption/decryption module.
S902: the baseband processing module executes the key clearing instruction and clears the key in the encryption/decryption module through the encryption/decryption interface.
Here, the baseband processing module executes the key clearing instruction after generating the key clearing instruction, and then clears the pre-stored key in the encryption/decryption module through the encryption/decryption interface module.
At this point, the baseband processing module completes the process of clearing the key.
EXAMPLE III
Based on the same inventive concept, a third embodiment of the present invention further provides a terminal, fig. 10 is a schematic structural diagram of the terminal in the third embodiment of the present invention, and referring to fig. 10, the terminal 100 includes: a baseband processor 1001, an encryption/decryption interface 1002, and a memory card 1003 having an encryption/decryption function, the memory card being mounted on the baseband processor.
Specifically, the baseband processor is configured to receive to-be-processed voice data from a previous-stage processing module, where the to-be-processed voice data is voice data that needs to be encrypted or decrypted; sending the voice data to be processed to a memory card through an encryption/decryption interface; the voice processing device is also used for receiving processed voice data from the memory card; sending the processed voice data to a next-level processing module; the memory card is used for receiving the voice data to be processed from the baseband processor; processing the voice data to be processed by adopting a prestored secret key to obtain processed voice data; and sending the processed voice data to the baseband processor through the memory card.
Furthermore, the memory card is also used for encrypting the voice data to be processed by adopting a secret key when the received voice data to be processed from the baseband processor is the voice data to be encrypted; or, when the received voice data to be processed from the baseband processor is the voice data to be decrypted, the key is adopted to decrypt the voice data to be processed.
Further, the terminal further includes: the application manager with the key management function is used for acquiring the key and sending the key to the baseband processor; a baseband processor further configured to receive a key from an application manager; writing the key into the memory card through the encryption/decryption interface; the memory card is also used for storing the key.
Further, the application manager is further configured to send a key agreement request to the network side, where the key agreement request is used to instruct the network side to issue a key; a key is received from the network side.
Further, the baseband processor is further configured to receive a call encryption/decryption instruction, where the call encryption/decryption instruction is used to instruct to encrypt/decrypt to-be-processed voice data from the upper-level processing module; executing the conversation encryption/decryption instruction, generating a key request and sending the key request to the application manager; an application manager further configured to receive a key request from the baseband processor; and responding to the key request, generating a key negotiation request and sending the key negotiation request to the network side.
Further, the baseband processor is further configured to generate a key clearing instruction after receiving the call end indication message; and executing a key clearing instruction to clear the key in the memory card through the encryption/decryption interface.
Here, it should be noted that: the above description of the terminal embodiment is similar to the above description of the voice data processing method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description thereof is omitted. For technical details that are not disclosed in the terminal embodiment of the present invention, please refer to the description of the voice data processing method embodiment of the present invention for understanding, and therefore, for brevity, will not be described again.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (10)
1. A speech data processing apparatus, characterized in that the apparatus comprises: the encryption/decryption module is mounted on the baseband processing module; wherein,
the baseband processing module is used for receiving to-be-processed voice data from a previous-stage processing module, wherein the to-be-processed voice data is voice data needing to be encrypted or decrypted; calling the encryption/decryption interface module; sending the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module; the encryption/decryption module is also used for receiving the processed voice data from the encryption/decryption module; sending the processed voice data to a next-stage processing module;
the encryption/decryption module is used for receiving the voice data to be processed from the baseband processing module; processing the voice data to be processed by adopting a prestored secret key to obtain the processed voice data; and sending the processed voice data to the baseband processing module through the encryption/decryption interface module.
2. The apparatus of claim 1, further comprising: and the encryption/decryption driving module is used for mounting the encryption/decryption module on the baseband processing module so as to establish a data communication channel between the baseband processing module and the encryption/decryption module.
3. The apparatus according to claim 1, wherein the encryption/decryption module is further configured to encrypt the to-be-processed voice data with the key when the to-be-processed voice data received from the baseband processing module is voice data that needs to be encrypted; or, when the received to-be-processed voice data from the baseband processing module is voice data to be decrypted, decrypting the to-be-processed voice data by using the key.
4. The apparatus of claim 1, further comprising: the key management module is used for acquiring the key and sending the key to the baseband processing module;
the baseband processing module is further configured to receive the key from the key management module; writing the key into the encryption/decryption module through the encryption/decryption interface module;
the encryption/decryption module is also used for storing the secret key.
5. The apparatus of claim 4, wherein the key management module is further configured to send a key agreement request to a network side, where the key agreement request is used to instruct the network side to issue the key; receiving the key from the network side.
6. The apparatus of claim 5, wherein the baseband processing module is further configured to receive a call encryption/decryption instruction, where the call encryption/decryption instruction is used to instruct to encrypt/decrypt the voice data to be processed from the upper processing module; executing the conversation encryption/decryption instruction, generating a key request and sending the key request to the key management module;
the key management module is further configured to receive a key request from the baseband processing module; and responding to the key request, generating the key negotiation request and sending the key negotiation request to the network side.
7. The apparatus of claim 1, wherein the baseband processing module is further configured to generate a key clear instruction after receiving a call end indication message; and executing the key clearing instruction, and clearing the key in the encryption/decryption module through the encryption/decryption interface module.
8. A method of processing speech data, the method comprising:
receiving voice data to be processed from a previous-stage processing module, wherein the voice data to be processed is voice data needing encryption or decryption;
calling an encryption/decryption interface module;
sending the voice data to be processed to the encryption/decryption module through the encryption/decryption interface module;
receiving the processed voice data from the encryption/decryption module;
and sending the processed voice data to a next-stage processing module.
9. The method according to claim 8, wherein before said sending said voice data to be processed to said encryption/decryption module via said encryption/decryption interface module, said method further comprises:
acquiring a secret key, wherein the secret key is issued by a network side;
and writing the key into the encryption/decryption module through the encryption/decryption interface module.
10. A terminal, characterized in that the terminal comprises: the encryption/decryption device comprises a baseband processor, an encryption/decryption interface and a memory card with the encryption/decryption function, wherein the memory card is mounted on the baseband processor; wherein,
the baseband processor is used for receiving the voice data to be processed from the upper-level processing module, wherein the voice data to be processed is the voice data needing to be encrypted or decrypted; sending the voice data to be processed to the memory card through the encryption/decryption interface; the memory card is also used for receiving processed voice data from the memory card; sending the processed voice data to a next-stage processing module;
the memory card is used for receiving the voice data to be processed from the baseband processor; processing the voice data to be processed by adopting a prestored secret key to obtain the processed voice data; and sending the processed voice data to the baseband processor through the memory card.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610952521.6A CN107995673A (en) | 2016-10-27 | 2016-10-27 | A kind of voice data processing apparatus, method and terminal |
PCT/CN2017/085190 WO2018076671A1 (en) | 2016-10-27 | 2017-05-19 | Voice data processing device, method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610952521.6A CN107995673A (en) | 2016-10-27 | 2016-10-27 | A kind of voice data processing apparatus, method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107995673A true CN107995673A (en) | 2018-05-04 |
Family
ID=62024292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610952521.6A Pending CN107995673A (en) | 2016-10-27 | 2016-10-27 | A kind of voice data processing apparatus, method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107995673A (en) |
WO (1) | WO2018076671A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210357515A1 (en) * | 2020-05-18 | 2021-11-18 | Gsi Technology Inc. | Secure similarity search for sensitive data |
CN114040385A (en) * | 2021-11-17 | 2022-02-11 | 中国电信集团系统集成有限责任公司 | VoLTE-based encrypted call system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345965A (en) * | 2008-08-29 | 2009-01-14 | 中国电信股份有限公司 | Encryption call method based on speech code stream and mobile terminal |
CN101420689A (en) * | 2008-11-17 | 2009-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for implementing encoding and decoding process of audio code stream |
US20090276629A1 (en) * | 2008-04-30 | 2009-11-05 | Mediatek Inc. | Method for deriving traffic encryption key |
CN101873372A (en) * | 2009-04-27 | 2010-10-27 | 骆建军 | Mobile phone system structure with encrypted communication function |
CN102833417A (en) * | 2012-08-30 | 2012-12-19 | 锐迪科科技有限公司 | Communication terminal omitting subscriber identification module |
WO2015036777A1 (en) * | 2013-09-13 | 2015-03-19 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
CN104955033A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Voice encryption communication method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050136992A1 (en) * | 2003-12-23 | 2005-06-23 | Mueller Peter D. | Providing access to auxiliary hardware in multiprocessor devices |
CN105578459B (en) * | 2015-12-30 | 2019-04-16 | 努比亚技术有限公司 | Data encryption device and method under cellular network |
-
2016
- 2016-10-27 CN CN201610952521.6A patent/CN107995673A/en active Pending
-
2017
- 2017-05-19 WO PCT/CN2017/085190 patent/WO2018076671A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090276629A1 (en) * | 2008-04-30 | 2009-11-05 | Mediatek Inc. | Method for deriving traffic encryption key |
CN101345965A (en) * | 2008-08-29 | 2009-01-14 | 中国电信股份有限公司 | Encryption call method based on speech code stream and mobile terminal |
CN101420689A (en) * | 2008-11-17 | 2009-04-29 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for implementing encoding and decoding process of audio code stream |
CN101873372A (en) * | 2009-04-27 | 2010-10-27 | 骆建军 | Mobile phone system structure with encrypted communication function |
CN102833417A (en) * | 2012-08-30 | 2012-12-19 | 锐迪科科技有限公司 | Communication terminal omitting subscriber identification module |
WO2015036777A1 (en) * | 2013-09-13 | 2015-03-19 | Vodafone Ip Licensing Limited | Communicating with a machine to machine device |
CN104955033A (en) * | 2015-05-28 | 2015-09-30 | 盛耀无线通讯科技(北京)有限公司 | Voice encryption communication method |
Also Published As
Publication number | Publication date |
---|---|
WO2018076671A1 (en) | 2018-05-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108965302B (en) | Media data transmission system, method, device and storage medium | |
US9237008B2 (en) | Encryption device, encryption method, and encryption program | |
KR100947213B1 (en) | Secure conditional access and digital rights management in a multimedia processor | |
US9800925B2 (en) | Method, terminal, and system for communication pairing of a digital television terminal and a mobile terminal | |
CN107682141A (en) | Data ciphering method and system for data transfer | |
CN105764058B (en) | Method, device and system for accessing a network | |
EP3185466B1 (en) | Encrypted communications method and communications terminal, and computer storage medium | |
CN113987584B (en) | Hidden query method and system | |
WO2018049892A1 (en) | Data transmission method and apparatus, and terminal | |
US11006464B2 (en) | Method, apparatus, storage medium, and terminal for establishing a Wi-Fi connection | |
CN115001733B (en) | A data determination method, device, storage medium and terminal | |
CN113612746B (en) | Sensitive information storage method and system based on Android system | |
CN114430345A (en) | A data transmission method, device, storage medium and electronic device | |
CN102857889A (en) | Method and device for encrypting short messages | |
CN114386049A (en) | Encryption method, decryption method, device and device | |
CN112291268B (en) | Information transmission method, device, equipment and storage medium | |
CN110249645B (en) | Secure near field communication | |
CN114826569A (en) | Information processing method, server, client and storage medium | |
CN115378592B (en) | Password service calling method and system | |
CN113315844A (en) | File encryption transmission method, device, equipment and computer readable storage medium | |
CN107995673A (en) | A kind of voice data processing apparatus, method and terminal | |
WO2021012646A1 (en) | Nfc device, and information processing method based on same | |
CN104092680A (en) | Coding and decoding method, device and system for audio signal | |
CN112565656A (en) | Video call method, device, system, electronic equipment and storage medium | |
KR20140080131A (en) | Memory card with encryption functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180504 |
|
WD01 | Invention patent application deemed withdrawn after publication |