Nothing Special   »   [go: up one dir, main page]

CN109410955A - A kind of time slot scrambling of voice data, system, device and storage medium - Google Patents

A kind of time slot scrambling of voice data, system, device and storage medium Download PDF

Info

Publication number
CN109410955A
CN109410955A CN201811495704.5A CN201811495704A CN109410955A CN 109410955 A CN109410955 A CN 109410955A CN 201811495704 A CN201811495704 A CN 201811495704A CN 109410955 A CN109410955 A CN 109410955A
Authority
CN
China
Prior art keywords
voice data
target
voiceprint
data
secrecy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811495704.5A
Other languages
Chinese (zh)
Inventor
黎智勇
潘雷明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Speakin Network Technology Co Ltd
Original Assignee
Guangzhou Speakin Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Speakin Network Technology Co Ltd filed Critical Guangzhou Speakin Network Technology Co Ltd
Priority to CN201811495704.5A priority Critical patent/CN109410955A/en
Publication of CN109410955A publication Critical patent/CN109410955A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Acoustics & Sound (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of time slot scramblings of voice data, it is different from the mode for directly directly transferring to monitoring device to store original, untreated voice data, the application is after collecting primary voice data, before transferring to monitoring device to store, can also secrecy processing be carried out to primary voice data, so that monitoring device storage is the secure voice data for being clearly distinguishable from primary voice data.Even if database is dragged library or is stolen, stealer can only also access the voice data by secrecy processing, since there are significant differences with primary voice data for it, it cannot achieve purpose of the counterfeit real user by Application on Voiceprint Recognition, store the voice data of user in safer mode.The application further simultaneously discloses the secrecy system, device and computer readable storage medium of a kind of voice data, has above-mentioned beneficial effect.

Description

A kind of time slot scrambling of voice data, system, device and storage medium
Technical field
This application involves language data process technical field, in particular to a kind of time slot scrambling of voice data, system, dress It sets and computer readable storage medium.
Background technique
With the fast development of sound groove recognition technology in e, use sound that is unique, belonging to individual subscriber as being by application The mode at family is gradually used in various fields, such as mobile payment, remote validation, remote authorization etc..
It in public and inherently safe is ensured, safeguards that collective and individual interest are inviolable, setting prison is widely used now The mode of equipment is controlled to record image and voice data (being referred to as voice data, voice data etc.), in order to see in real time It examines or the later period calls to account.
It is directly by collected raw tone number since existing monitoring device is when recording the voice data of target scene According to being stored, once the database that the monitoring device manufacturer saves these voice data is dragged library or is stolen, raw tone Data will counterfeit true user be by way of playback come by some verifyings or identification, and then to individual subscriber property It threatens or heavy losses.
Therefore, how to overcome existing monitoring device saving voice data is existing technological deficiency, provides and a kind of more pacifies Full voice data processing method is this field so that cannot counterfeit real user database is dragged library or is stolen Technical staff's urgent problem to be solved.
Summary of the invention
The main purpose of the application is to provide a kind of time slot scrambling of voice data, be different from directly by it is original, without The mode that the voice data of processing directly transfers to monitoring device to be stored, the application collect primary voice data it Afterwards, before transferring to monitoring device to be stored, can also secrecy processing be carried out to primary voice data, so that monitoring device storage It is the secure voice data for being clearly distinguishable from primary voice data.Even if database is dragged library or is stolen, stealer also can only The voice data by secrecy processing is accessed, since there are significant differences with primary voice data for it, cannot achieve counterfeit true Real user stores the voice data of user in safer mode by the purpose of Application on Voiceprint Recognition.
The another object of the application is the provision of the secrecy system, device and computer-readable storage of a kind of voice data Medium.
To achieve the above object, this application provides a kind of time slot scramblings of voice data, comprising:
Acquire the voice data under target scene;
Secrecy processing is carried out to the target speech data in the voice data, obtains secure voice data;
The secure voice data are sent to the monitoring device under the target scene, so that the monitoring device stores Be carry out secrecy processing after target speech data.
Optionally, secrecy processing is carried out to the target speech data in the voice data, obtains secure voice data, wrapped It includes:
Extract the voiceprint for including in the voice data;
Determine the target voiceprint in the voiceprint according to preset secrecy processing vocal print library, and obtain with it is described The corresponding target speech data of target voiceprint;Wherein, in need protected is stored in advance in secrecy processing vocal print library The voiceprint of close processing;
Secrecy processing is carried out to the target speech data, obtains the secure voice data.
Optionally, the voiceprint for including in the voice data is extracted, comprising:
Divide the voice data, obtains multiple audio fragments;
Voiceprint wherein included is extracted from each audio fragment respectively.
Optionally, it after the voiceprint for including in extracting the voice data, is obtaining believing with the target vocal print Before ceasing corresponding target speech data, further includes:
The voice data is split by the type for extracting obtained voiceprint, obtains believing with vocal print described in every kind Cease corresponding sound bite;
It is corresponding, obtain target speech data corresponding with the target voiceprint, comprising:
Target voice segment corresponding with the target voiceprint is obtained, and using the target voice segment as described in Target speech data.
Optionally, the mode of secrecy processing is carried out, comprising:
It adjusts the sound characteristic of the target speech data predetermined time, be more than default feature by the target speech data The sound characteristic of threshold value reduced, be added in the target speech data in random noise at least one of;Wherein, described Sound characteristic includes at least one in tone color, tone and loudness of a sound.
To achieve the above object, present invention also provides a kind of secrecy systems of voice data, comprising:
Primary voice data acquisition unit, for acquiring the voice data under target scene;
Voice data secrecy processing unit, for carrying out secrecy processing to the target speech data in the voice data, Obtain secure voice data;
Secure voice data transmission unit, the monitoring for being sent to the secure voice data under the target scene Equipment, so that monitoring device storage is the target speech data carried out after secrecy processing.
Optionally, the voice data secrecy processing unit includes:
Voiceprint extracts subelement, for extracting the voiceprint for including in the voice data;
Target voiceprint and target speech data determine subelement, for being determined according to preset secrecy processing vocal print library Target voiceprint in the voiceprint, and obtain target speech data corresponding with the target voiceprint;Wherein, The voiceprint in need for carrying out secrecy processing is stored in advance in secrecy processing vocal print library;
Secrecy processing subelement obtains the secure voice number for carrying out secrecy processing to the target speech data According to.
Optionally, the voiceprint extraction subelement includes:
Voice data divides module and obtains multiple audio fragments for dividing the voice data;
Voiceprint distinguishes extraction module, for extracting vocal print letter wherein included from each audio fragment respectively Breath.
Optionally, the secrecy system of the voice data further include:
By type split cells, after the voiceprint for including in extracting the voice data, obtaining and institute Before stating the corresponding target speech data of target voiceprint, by the voice data by the type for extracting obtained voiceprint It is split, obtains sound bite corresponding with voiceprint described in every kind;
Corresponding, the target voiceprint and target speech data determine that subelement includes:
Target voice segment determining module, for obtaining target voice segment corresponding with the target voiceprint, and Using the target voice segment as the target speech data.
To achieve the above object, present invention also provides a kind of privacy devices of voice data, comprising:
Memory, for storing computer program;
Processor realizes the secrecy side of the voice data as described in above content when for executing the computer program Method.
To achieve the above object, described computer-readable to deposit present invention also provides a kind of computer readable storage medium It is stored with computer program on storage media, the language as described in above content is realized when the computer program is executed by processor The time slot scrambling of sound data.
Obviously, the time slot scrambling of voice data provided herein is different from original, untreated language directly The mode that sound data directly transfer to monitoring device to be stored, the application after collecting primary voice data, transfer to supervise Before control equipment is stored, can also secrecy processing be carried out to primary voice data, so that monitoring device storage is obvious area Not in the secure voice data of primary voice data.Even if database is dragged library or is stolen, stealer can only also access through It is logical to cannot achieve counterfeit real user since there are significant differences with primary voice data for it for the voice data for crossing secrecy processing The purpose for crossing Application on Voiceprint Recognition stores the voice data of user in safer mode.
The application additionally provides the secrecy system, device and computer readable storage medium of a kind of voice data simultaneously, tool There is above-mentioned beneficial effect, details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the time slot scrambling of voice data provided by the embodiments of the present application;
Fig. 2 is the method that a kind of pair of target speech data carries out secrecy processing in time slot scrambling provided by the embodiments of the present application Flow chart;
Fig. 3 is the side that another kind carries out secrecy processing to target speech data in time slot scrambling provided by the embodiments of the present application The flow chart of method;
Fig. 4 is a kind of structural block diagram of the secrecy system of voice data provided by the embodiments of the present application;
Fig. 5 is the company between a kind of privacy device and sound pick-up and monitoring device of voice data provided by the embodiments of the present application Connect relation schematic diagram.
Specific embodiment
The core of the application is to provide time slot scrambling, system, device and the computer-readable storage medium of a kind of voice data Matter is different from the mode for directly directly transferring to monitoring device to store original, untreated voice data, the application After collecting original voice data, before transferring to monitoring device to be stored, can also to original voice data into Row secrecy processing, so that monitoring device storage is the secure voice data for being clearly distinguishable from primary voice data.Even if data Library is dragged library or is stolen, and stealer can only also access the voice data by secrecy processing, due to itself and original voice There are significant differences for data, cannot achieve counterfeit real user by the purpose of identification, make the voice data of user more to pacify Full mode stores.
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art All other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Embodiment one
Referring to Figure 1, Fig. 1 is a kind of flow chart of the time slot scrambling of voice data provided by the embodiments of the present application, packet Include following steps:
S101: the voice data under acquisition target scene;
This step is intended to obtain voice data original, without any processing, i.e., user is under target scene with a voice The language that sound is said.To be different from the secure voice data that subsequent progress secrecy processing obtains, the application will illustrate to solve subsequent Part is released, it is unified that " primary voice data " is used to indicate the voice data that this step collects.
S102: secrecy processing is carried out to the target speech data in voice data, obtains secure voice data;
On the basis of S101, this step is intended to carry out secrecy processing to the target speech data in primary voice data, To obtain differing markedly from the secure voice data of primary voice data.
Wherein, due under many scenes monitoring device be mainly used for recording the sound of user, and usually may include more A respective sound of user, therefore target speech data both can simply refer to the voice of all users under scene, can also refer to The voice of some special user under scene.When monitoring device is also used to record such as equipment sound, the target speech data is also What is issued when can be in special state with certain equipment has the sound of identification meaning, herein and is not specifically limited, can root According to the demand flexible choice under practical application scene.
When target speech data is the part of speech data in full dose primary voice data, it is also necessary to which screening step is come The target speech data for needing to be encrypted accurately is filtered out from full dose primary voice data.By taking specific voice as an example, The voiceprint of specific voice usually can be used as screening foundation, i.e., extract and wrapped from full dose primary voice data first In the vocal print type contained, then vocal print type in judging to extract whether include specific voice vocal print, if comprising will be corresponding special The voice data of vocal print is determined as target speech data, and secrecy processing is carried out to it.
Further, in order to increase screening efficiency, can with side acquire just carry out voiceprint extraction and with specific sound Comparison between line.In order to further increase efficiency, collected primary voice data can also be pressed to default partitioning scheme point Multiple audio fragments are cut into, in order to extract the vocal print for including letter respectively from multiple audio fragments simultaneously in a parallel fashion Breath, in order to obtain all audio fragments comprising specific vocal print.Wherein, partitioning scheme can be for by the progress of certain file size Divide (such as 20KB), can also be split by certain segment clip durations (such as 10 seconds) or other same or similar Partitioning scheme is subject to and is more in line with actually located application scenarios or meets existing particular/special requirement, do not do specific limit herein It is fixed.
Specifically, the mode for carrying out secrecy processing may include:
The sound characteristic for adjusting target speech data predetermined time (may include at least one in tone color, tone and loudness of a sound ), the sound characteristic that target speech data is more than default characteristic threshold value reduced, be added in target speech data it is random At least one of in noise.It certainly, further include that the voice data in some period is subjected to entirety other than several above-mentioned Condition, and the introducing of noise be also possible to made noise can preset interference noise etc., do not do specific limit herein Fixed, the purpose for carrying out secrecy processing is to change the voiceprint that can be extracted from secure voice data, so that secrecy Voice data cannot be extracted voiceprint identical with primary voice data by application on voiceprint recognition equipment by way of playback, To achieve the purpose that also cannot counterfeit real user after data are stolen passes through Application on Voiceprint Recognition.
S103: being sent to the monitoring device under target scene for secure voice data so that monitoring device storage be into Target speech data after row secrecy processing.
On the basis of S102, the secure voice data that this step is intended to obtain after the completion of secrecy processing are sent to target Monitoring device under scene, so that monitoring device storage is the target speech data carried out after secrecy processing.
It should be noted that when the target speech data for being performed secrecy processing is only a part of full dose voice data When, illustrate that the voice data of remaining part does not need to carry out secrecy processing, but not encrypted voice data also will together can It is sent to the monitoring device, to guarantee the integrality of voice data storage.But due to just for property to target voice number According to having carried out secrecy processing, it is thus possible to the secure voice data for also needing to obtain and remaining do not carry out the original of secrecy processing Beginning voice data does scene merging so that the voice content being stored in monitoring device be it is consistent with actual scene, only When reading again out, wherein the voice of someone is different from its true voice, similar to be in news interview The case where protection has done voice change process to its sound by the privacy of interviewer.
It grabs the voice data with specific vocal print and is replaced using the secure voice data after progress secrecy processing, This portion of techniques belongs to well-known to those skilled in the art, conventional content, and present invention point is also not and how to grab It takes and replaces, therefore details are not described herein again.
Based on the above-mentioned technical proposal, the time slot scrambling of voice data provided by the embodiments of the present application, being different from directly will be former The mode that voice data begin, untreated directly transfers to monitoring device to be stored, the application are collecting original language After sound data, before transferring to monitoring device to be stored, can also secrecy processing be carried out to primary voice data, so that monitoring is set Standby storage is the secure voice data for being clearly distinguishable from primary voice data.Even if database is dragged library or is stolen, steal Person can only also access the voice data by secrecy processing, since there are significant difference, Wu Fashi with primary voice data for it Existing purpose of the counterfeit real user by Application on Voiceprint Recognition, stores the voice data of user in safer mode.
Embodiment two
Fig. 2 is referred to, Fig. 2 is that a kind of pair of target speech data maintains secrecy in time slot scrambling provided by the embodiments of the present application The flow chart of the method for processing, the present embodiment give a kind of concrete implementation mode for the S102 in embodiment one, utilize The mesh for needing to carry out secrecy processing in full dose primary voice data is screened to obtain in the secrecy processing vocal print library pre-established Voiceprint is marked, in order to targetedly carry out secrecy processing to target speech data corresponding with target voiceprint.I.e. originally The voice data for being used for some or certain high user of several security classifications under target scene is carried out secrecy processing by example, Specifically includes the following steps:
S201: the voiceprint for including in voice data is extracted;
This step, which is intended to extract from full dose primary voice data, obtains all voiceprints wherein included, it is assumed that one Segment length has recorded altogether the dialog procedure of 10 people up in 50 minutes full dose primary voice datas, that is to say, that passes through this step Rapid extraction will access 10 kinds of different voiceprints.
S202: determining the target voiceprint in voiceprint according to preset secrecy processing vocal print library, and obtains and mesh Mark the corresponding target speech data of voiceprint;
On the basis of S201, this step is intended to determine the target in voiceprint according to preset secrecy processing vocal print library Voiceprint continues above example, it is assumed that the number of corresponding 10 users of 10 kinds of voiceprints extracted above is 01,02 ..., 09,10, and 02 user in numbering and 09 user have been previously-completed the registration of its voiceprint, and are added The secrecy processing vocal print library, therefore the processing Jing Guo this step are added, is exactly 02 use by be identified as target voiceprint The corresponding voiceprint in family and the corresponding voiceprint of 09 user.
After determining target voiceprint, just only need to obtain target speech data corresponding with target voiceprint The secrecy processing carried out for subsequent step.
S203: secrecy processing is carried out to target speech data, obtains secure voice data.
Embodiment three
Fig. 3 is referred to, Fig. 3 is that another kind protects target speech data in time slot scrambling provided by the embodiments of the present application The flow chart of the method for close processing, in order on the basis of example 2, it is further provided one kind can quickly obtain target language The method of sound data, the present embodiment provide a kind of concrete implementation mode by S302 and S304, include the following steps:
S301: the voiceprint for including in voice data is extracted;
S302: voice data is split by the type for extracting obtained voiceprint, is obtained and every kind of voiceprint Corresponding sound bite;
On the basis of S301, full dose primary voice data is torn open according to the type for extracting obtained voiceprint Point, to obtain sound bite corresponding with every kind of voiceprint.Continue above example, that is to say, that can be each by this 10 users From voice data peel away, formed only include respective voice data sound bite.
S303: the target voiceprint in voiceprint is determined according to preset secrecy processing vocal print library;
S304: target voice segment corresponding with target voiceprint is obtained, and using target voice segment as target language Sound data;
On the basis of S302 and S303, once it is determined that target voiceprint, can also directly obtain and target vocal print The corresponding sound bite of information, so that it may quickly obtain needing to carry out the complete voice of secrecy processing.
S305: secrecy processing is carried out to target speech data, obtains secure voice data.
It should be noted that implementation provided in this embodiment, it is more suitable for can be disposably to full dose voice data Under the scene being uniformly processed, i.e., under scene not high to the requirement of real-time of processing, system can be made full use of in this scenario The advantage of one processing, speed up processing increase efficiency.
It is higher for requirement of real-time, need to extract in acquisition, side is screened, the scene of Bian Jinhang secrecy processing, this Shen Please also directed to another embodiment of offer of property:
The primary voice data collected in real time is divided into multiple audio pieces with default partitioning scheme in chronological order Section;
Successively extract the voiceprint for including in the audio fragment that each is partitioned into;
Successively judge in each audio fragment whether to include the spy for needing to carry out secrecy processing according to secrecy processing vocal print library Determine vocal print;
Voice data corresponding with specific vocal print in audio fragment comprising specific vocal print is subjected to secrecy processing, remaining sound The corresponding voice data of line is without any processing, obtains audio fragment after secrecy processing, and by audio fragment after the secrecy processing Monitoring device is sent to be saved;
The audio fragment for not including specific vocal print is directly sent to monitoring device to save.
Through the above technical solutions, being satisfied scene to the high request of real-time, and since monitoring device is by acquisition The audio fragment that sequence successively obtains, it is only necessary to which the later period is successively integrated in storage, quite convenient for operation.
Because situation is complicated, it can not enumerate and be illustrated, those skilled in the art should be able to recognize according to the application The basic skills principle combination actual conditions of offer may exist many examples, in the case where not paying enough creative works, It should within the scope of protection of this application.
Example IV
Fig. 4 is referred to below, and Fig. 4 is a kind of structural frames of the secrecy system of voice data provided by the embodiments of the present application Figure, the system may include:
Primary voice data acquisition unit 100, for acquiring the voice data under target scene;
Voice data secrecy processing unit 200 is obtained for carrying out secrecy processing to the target speech data in voice data To secure voice data;
Secure voice data transmission unit 300, the monitoring device for being sent to secure voice data under target scene, So that monitoring device storage is the target speech data carried out after secrecy processing.
Wherein, which may include:
Voiceprint extracts subelement, for extracting the voiceprint for including in voice data;
Target voiceprint and target speech data determine subelement, for being determined according to preset secrecy processing vocal print library Target voiceprint in voiceprint, and obtain target speech data corresponding with target voiceprint;Wherein, secrecy processing The voiceprint in need for carrying out secrecy processing is stored in advance in vocal print library;
Secrecy processing subelement obtains secure voice data for carrying out secrecy processing to target speech data.
Wherein, voiceprint extraction subelement may include:
Voice data divides module and obtains multiple audio fragments for dividing voice data;
Voiceprint distinguishes extraction module, for extracting voiceprint wherein included from each audio fragment respectively.
Further, which can also include:
By type split cells, after the voiceprint for including in extracting voice data, obtaining and target sound Before the corresponding target speech data of line information, voice data is split by the type for extracting obtained voiceprint, is obtained To sound bite corresponding with every kind of voiceprint;
Corresponding, the target voiceprint and target speech data determine that subelement may include:
Target voice segment determining module, for obtaining target voice segment corresponding with target voiceprint, and by mesh Sound bite is marked as target speech data.
The corresponding time slot scrambling with voice data of the secrecy system of the voice data, the present embodiment as with embodiment of the method Corresponding system embodiment exists, and has beneficial effect identical with embodiment of the method, no longer repeats one by one herein.
Based on the above embodiment, present invention also provides a kind of privacy devices of voice data, which can To include memory and processor, wherein have computer program in the memory, which calls the meter in the memory When calculation machine program, step provided by above-described embodiment may be implemented.Certainly, the secrecy processing device can also include it is various must Network interface, power supply and other components for wanting etc..
Specifically, the function component that the privacy device of the voice data can integrate in original monitoring device, It is also contemplated that being integrated by monitoring device producer so that the problem of security process reverse reduction that may be present, by the guarantor The accessory that close device can be individually attached in monitoring device as one, the accessory can voluntarily carry out secrecy processing side by user The configuration of formula, so that safety is higher.It is a kind of include but is not limited to connection type can be found in Fig. 5.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program Step provided by above-described embodiment may be implemented when being performed terminal or processor execution.The storage medium may include: U Disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), the various media that can store program code such as magnetic or disk.
Specific examples are used herein to illustrate the principle and implementation manner of the present application, and between each embodiment For progressive relationship, each embodiment focuses on the differences from other embodiments, identical between each embodiment Similar portion may refer to each other.For the device disclosed in the embodiment, reference can be made to corresponding method part illustration.The above reality The explanation for applying example is merely used to help understand the present processes and its core concept.For the ordinary skill people of the art Member for, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these improve and Modification is also fallen into the protection scope of the claim of this application.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also other elements including being not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or equipment for including element.

Claims (10)

1. a kind of time slot scrambling of voice data characterized by comprising
Acquire the voice data under target scene;
Secrecy processing is carried out to the target speech data in the voice data, obtains secure voice data;
The secure voice data are sent to the monitoring device under the target scene, so that monitoring device storage is Target speech data after carrying out secrecy processing.
2. time slot scrambling according to claim 1, which is characterized in that the target speech data in the voice data into Row secrecy processing obtains secure voice data, comprising:
Extract the voiceprint for including in the voice data;
The target voiceprint in the voiceprint is determined according to preset secrecy processing vocal print library, and is obtained and the target The corresponding target speech data of voiceprint;Wherein, in need carry out at secrecy is stored in advance in secrecy processing vocal print library The voiceprint of reason;
Secrecy processing is carried out to the target speech data, obtains the secure voice data.
3. time slot scrambling according to claim 2, which is characterized in that extract the vocal print letter for including in the voice data Breath, comprising:
Divide the voice data, obtains multiple audio fragments;
Voiceprint wherein included is extracted from each audio fragment respectively.
4. time slot scrambling according to claim 2, which is characterized in that the vocal print letter for including in extracting the voice data After breath, before obtaining target speech data corresponding with the target voiceprint, further includes:
The voice data is split by the type for extracting obtained voiceprint, is obtained and voiceprint pair described in every kind The sound bite answered;
It is corresponding, obtain target speech data corresponding with the target voiceprint, comprising:
Target voice segment corresponding with the target voiceprint is obtained, and using the target voice segment as the target Voice data.
5. time slot scrambling according to any one of claims 1 to 4, which is characterized in that carry out the mode of secrecy processing, wrap It includes:
It adjusts the sound characteristic of the target speech data predetermined time, be more than default characteristic threshold value by the target speech data Sound characteristic reduced, in the target speech data be added random noise at least one of;Wherein, the sound Feature includes at least one in tone color, tone and loudness of a sound.
6. a kind of secrecy system of voice data characterized by comprising
Primary voice data acquisition unit, for acquiring the voice data under target scene;
Voice data secrecy processing unit is obtained for carrying out secrecy processing to the target speech data in the voice data Secure voice data;
Secure voice data transmission unit, the monitoring for the secure voice data to be sent under the target scene are set It is standby, so that monitoring device storage is the target speech data carried out after secrecy processing.
7. secrecy system according to claim 6, which is characterized in that the voice data secrecy processing unit includes:
Voiceprint extracts subelement, for extracting the voiceprint for including in the voice data;
Target voiceprint and target speech data determine subelement, for according to the determination of preset secrecy processing vocal print library Target voiceprint in voiceprint, and obtain target speech data corresponding with the target voiceprint;Wherein, described The voiceprint in need for carrying out secrecy processing is stored in advance in secrecy processing vocal print library;
Secrecy processing subelement obtains the secure voice data for carrying out secrecy processing to the target speech data.
8. secrecy system according to claim 6, which is characterized in that further include:
By type split cells, after the voiceprint for including in extracting the voice data, obtaining and the mesh Before marking the corresponding target speech data of voiceprint, the voice data is carried out by the type for extracting obtained voiceprint It splits, obtains sound bite corresponding with voiceprint described in every kind;
Corresponding, the target voiceprint and target speech data determine that subelement includes:
Target voice segment determining module, for obtaining target voice segment corresponding with the target voiceprint, and by institute Target voice segment is stated as the target speech data.
9. a kind of privacy device of voice data characterized by comprising
Memory, for storing computer program;
Processor realizes the guarantor such as voice data described in any one of claim 1 to 5 when for executing the computer program Decryption method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the secrecy such as voice data described in any one of claim 1 to 5 when the computer program is executed by processor Method.
CN201811495704.5A 2018-12-07 2018-12-07 A kind of time slot scrambling of voice data, system, device and storage medium Pending CN109410955A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811495704.5A CN109410955A (en) 2018-12-07 2018-12-07 A kind of time slot scrambling of voice data, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811495704.5A CN109410955A (en) 2018-12-07 2018-12-07 A kind of time slot scrambling of voice data, system, device and storage medium

Publications (1)

Publication Number Publication Date
CN109410955A true CN109410955A (en) 2019-03-01

Family

ID=65457819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811495704.5A Pending CN109410955A (en) 2018-12-07 2018-12-07 A kind of time slot scrambling of voice data, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN109410955A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110428844A (en) * 2019-07-31 2019-11-08 歌尔科技有限公司 Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment
CN111935153A (en) * 2020-08-11 2020-11-13 北京天融信网络安全技术有限公司 CAN bus-based target message extraction method and device and storage medium
CN115378980A (en) * 2022-10-20 2022-11-22 广州万协通信息技术有限公司 Directional storage method and device for driving monitoring data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105096937A (en) * 2015-05-26 2015-11-25 努比亚技术有限公司 Voice data processing method and terminal
CN105279447A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Method and device for data encryption, and method and device for data decryption
US20170092276A1 (en) * 2014-07-31 2017-03-30 Tencent Technology (Shenzhen) Company Limited Voiceprint Verification Method And Device
CN107978320A (en) * 2017-11-28 2018-05-01 上海与德科技有限公司 One kind call method of adjustment, device, equipment and medium
CN108806701A (en) * 2018-06-11 2018-11-13 广州势必可赢网络科技有限公司 Voice data method for scrambling and device, voice data de-scrambling method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105279447A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Method and device for data encryption, and method and device for data decryption
US20170092276A1 (en) * 2014-07-31 2017-03-30 Tencent Technology (Shenzhen) Company Limited Voiceprint Verification Method And Device
CN105096937A (en) * 2015-05-26 2015-11-25 努比亚技术有限公司 Voice data processing method and terminal
CN107978320A (en) * 2017-11-28 2018-05-01 上海与德科技有限公司 One kind call method of adjustment, device, equipment and medium
CN108806701A (en) * 2018-06-11 2018-11-13 广州势必可赢网络科技有限公司 Voice data method for scrambling and device, voice data de-scrambling method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110428844A (en) * 2019-07-31 2019-11-08 歌尔科技有限公司 Speech verification method, electronic equipment, audio frequency apparatus and the medium of electronic equipment
CN111935153A (en) * 2020-08-11 2020-11-13 北京天融信网络安全技术有限公司 CAN bus-based target message extraction method and device and storage medium
CN111935153B (en) * 2020-08-11 2022-04-26 北京天融信网络安全技术有限公司 CAN bus-based target message extraction method and device and storage medium
CN115378980A (en) * 2022-10-20 2022-11-22 广州万协通信息技术有限公司 Directional storage method and device for driving monitoring data

Similar Documents

Publication Publication Date Title
CN111385283B (en) Double-recording video synthesis method and double-recording system of self-service equipment
US10135818B2 (en) User biological feature authentication method and system
CN107239954B (en) Method and device for increasing block generation speed
CN109410955A (en) A kind of time slot scrambling of voice data, system, device and storage medium
US7346472B1 (en) Method and device for monitoring and analyzing signals
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
CN102142254A (en) Voiceprint identification and voice identification-based recording and faking resistant identity confirmation method
JP2004310117A (en) Method for embedding and detecting watermark by quantization of characteristic value of signal
CN103310139A (en) Input validation method and input validation device
CN106302534A (en) A kind of detection and the method and system of process disabled user
CN105872749A (en) Video processing method and device
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
WO2015196642A1 (en) Data encryption method, decryption method and device
CN113256288B (en) Bank card unhooking method and device
CN114786038A (en) Low-custom live broadcast behavior monitoring method based on deep learning
CN104346547A (en) Intelligent identity identification system
CN106528696B (en) A method of extracting android system QQ account
CN113299016A (en) Service timing method and system of self-service terminal, self-service equipment and storage medium
CN117235406B (en) Information content security management and control method and device based on block chain
CN107393054A (en) Drive recorder and its method for data protection and identification
CN101872512A (en) Display method and equipment of overlaid transaction data
CN112241541A (en) Community security application method based on block chain and portrait recognition technology
CN116415236A (en) Distributed storage data safety state identification and protection method
CN113365100A (en) Video processing method and device
CN116049797A (en) Intelligent storage system based on data classification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301