CN114025045B - Call data management method and system based on block chain - Google Patents

Call data management method and system based on block chain Download PDF

Info

Publication number
CN114025045B
CN114025045B CN202111145822.5A CN202111145822A CN114025045B CN 114025045 B CN114025045 B CN 114025045B CN 202111145822 A CN202111145822 A CN 202111145822A CN 114025045 B CN114025045 B CN 114025045B
Authority
CN
China
Prior art keywords
call
data
terminal
call data
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111145822.5A
Other languages
Chinese (zh)
Other versions
CN114025045A (en
Inventor
蒋旺奇
刘奎阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pengchuang Digital Technology Shenzhen Group Co Ltd
Original Assignee
Pengchuang Digital Technology Shenzhen Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Pengchuang Digital Technology Shenzhen Group Co ltd filed Critical Pengchuang Digital Technology Shenzhen Group Co ltd
Priority to CN202111145822.5A priority Critical patent/CN114025045B/en
Publication of CN114025045A publication Critical patent/CN114025045A/en
Application granted granted Critical
Publication of CN114025045B publication Critical patent/CN114025045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/20Automatic or semi-automatic exchanges with means for interrupting existing connections; with means for breaking-in on conversations
    • H04M3/205Eavesdropping prevention - indication of insecurity of line or network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a call data management method and a call data management system based on a block chain, which are characterized in that after successful call invitation confirmation of a first terminal and a second terminal, voice call data and call signal strength between the first terminal and the second terminal are collected, and the collection of the voice call data and interactive communication of the terminals are finished under the condition that the call signal strength is abnormal, so that the voice call content in the call process can be prevented from being intercepted; in addition, the voice call data are converted into the call data in the text form, and then the call data are encrypted and packaged and then are respectively stored in the corresponding block chains, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the occurrence probability of data loss and tampering can be reduced, and centralized and dynamic storage management is performed on the call data.

Description

Call data management method and system based on block chain
Technical Field
The invention relates to the technical field of call data management, in particular to a call data management method and system based on a block chain.
Background
The smart phone can make a voice call in the modes of making a call or sending a WeChat voice and the like, so that the real-time performance and the convenience of communication among different users can be greatly improved. In some special occasions, such as an enterprise customer service call, the call voices of both parties of the call are usually recorded and stored, so as to facilitate the later verification of the call content. At present, communication voice is directly stored in the form of audio data, because the data volume of the audio data is usually large, the direct storage not only occupies a large storage space, but also has the condition that the audio data is lost or tampered, the integrity and the safety of the communication voice storage cannot be ensured, and therefore the efficient and reliable management of the communication voice cannot be realized.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a conversation data management method and a conversation data management system based on a block chain, wherein after successful conversation invitation confirmation of a first terminal and a second terminal, the conversation data and the conversation signal strength between the first terminal and the second terminal are collected, and the collection of the voice conversation data and the interactive communication of the terminals are ended under the condition that the conversation signal strength is abnormal, so that the interception of the voice conversation content in the conversation process by the outside can be avoided; in addition, the collected voice call data is identified and converted into the call data in the text form, the call data is encrypted and packaged and then is respectively stored in the corresponding block chains, and meanwhile, the storage state of the call data with longer storage time in the block chains is changed, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the probability of data loss and falsification can be reduced, and centralized and dynamic storage management is performed on the call data.
The invention provides a call data management method based on a block chain, which is characterized by comprising the following steps:
step S1, after the conversation invitation confirmation is carried out on the first terminal and the second terminal, the interactive conversation contact between the first terminal and the second terminal is established; acquiring voice call data of a first terminal and a second terminal in an interactive call process, and simultaneously detecting the intensity of call signals respectively received by the first terminal and/or the second terminal in the interactive call process;
step S2, analyzing the intensity of the call signal, and ending the collection of the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold value; performing voice recognition on the acquired voice call data, so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
step S3, respectively encrypting and packaging the first call data and the second call data, and then respectively storing the encrypted and packaged first call data and second call data into block chains corresponding to the first terminal and the second terminal; changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain;
further, in step S1, after the call invitation confirmation is performed on the first terminal and the second terminal, an interactive call contact between the first terminal and the second terminal is established; the method for acquiring voice call data of the first terminal and the second terminal in the interactive call process, and simultaneously detecting the call signal strength respectively received by the first terminal and/or the second terminal in the interactive call process specifically comprises the following steps:
step S101, a first terminal is indicated to send a call invitation request to a second terminal at a first moment, wherein the call invitation request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating a second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
step S102, when an interactive conversation relation between a first terminal and a second terminal is established, voice conversation data of the first terminal and the second terminal in the interactive conversation process are collected; simultaneously, continuously detecting the intensity of a call signal received by the first terminal and/or the second terminal respectively in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal;
further, in the step S2, analyzing the intensity of the call signal, and when the intensity of the call signal is lower than a preset signal intensity threshold, ending the collection of the voice call data; and performing voice recognition on the acquired voice call data, so that dividing the voice call data into first call data from a first terminal and second call data from a second terminal specifically comprises:
step S201, according to the intensity of the call signal obtained by continuous detection, determining the corresponding average call signal intensity during the continuous detection period; comparing the average call signal intensity with a preset signal intensity threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call relation between the first terminal and the second terminal;
step S202, according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, first voice call data belonging to the first user and second voice call data belonging to the second user are obtained by separating and extracting the collected voice call data; performing background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
step S203, performing semantic recognition processing on the first voice call data and the second voice call data subjected to the background noise reduction processing respectively, so as to convert the first voice call data and the second voice call data into first call data in a text form and second call data in a text form respectively;
further, in step S3, after the first call data and the second call data are encrypted and packaged respectively, the encrypted and packaged first call data and the encrypted and packaged second call data are stored in block chains corresponding to the first terminal and the second terminal, respectively; then, according to the duration of the call data in the block chain, changing the storage state of the call data in the block chain specifically includes:
step S301, dividing the first call data and the second call data into a plurality of first call sub-data and a plurality of second call sub-data respectively; encrypting and compressing and packaging each first call subdata and each second call subdata respectively to obtain corresponding first call subdata packets and second call subdata packets;
step S302, according to the segmentation sequence of each first call subdata in the first call data, sequentially stacking and storing all the first call subdata packets into a block chain of the first terminal; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
step S303, acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; if the continuous storage time length exceeds a preset time length threshold value, deleting all first call sub-packets or all second call sub-packets stored in the block chain, otherwise, keeping the storage states of all first call sub-packets or all second call sub-packets in the block chain unchanged;
further, in the step S301, the first call data and the second call data are respectively divided into a plurality of first call sub-data and a plurality of second call sub-data; the encrypting and compressing and packing each first call sub-data and each second call sub-data to obtain corresponding first call sub-data packets and second call sub-data packets specifically includes:
step S3011, scanning and recognizing text form data corresponding to the first call data and the second call data, recognizing the text form data to obtain corresponding characters, matching the recognized characters with a trained data word bank to obtain a plurality of words from the data word bank, forming a corresponding word map according to word senses of the words, wherein the word map relates to the logical relevance of the word senses among different words, and dividing the first call data and the second call data into a plurality of first call sub-data and a plurality of second call sub-data according to the least number of words principle by using the following formula (1),
Figure BDA0003285382520000041
in the above formula (1), P i The communication sub data set is obtained by dividing the ith communication data, wherein i is 1 and 2; n represents the number of the call sub data obtained by dividing the call data; (c) 1 ,c 2 ...c n ) Representing n pieces obtained by dividing call dataCall subdata; min represents the minimum value operation, namely, the corresponding call data division mode when the number of vocabularies is minimum is obtained according to the vocabulary recognition result of each call data;
step S3012, encrypt each first call sub-data and each second call sub-data using the following formula (2),
c n m =(x 1 ,x 2 ,x 3 ,x 4 ) (2)
in the above formula (2), c n m The cipher text corresponding to the mth character in the first call sub data or the second call sub data is represented, and each character c n m Composed of four bits of cipher text (x) 1 ,x 2 ,x 3 ,x 4 ) Composition, each ciphertext is in a pure digital form;
step S3013, using the following formula (3), compressing and packaging the encrypted first call sub-data or second call sub-data to obtain a corresponding first call sub-data packet and second call sub-data packet,
Y(c n * )=L(c 1 1 c 1 2 …c 1 m ) (3)
in the above formula (3),: y (c) n * ) The nth first call sub-data representing the encrypted first call data or the nth second call sub-data representing the second call data are compressed and packaged to obtain a sub-data packet; l (c) 1 1 c 1 2 …c 1 m ) And representing data compression operation, wherein the digital string corresponding to the encrypted call sub-data is used as input, and the digital string is traversed by using a sliding window algorithm, wherein the length of a sliding window is 3.
The invention also provides a call data management system based on the block chain, which is characterized by comprising an interactive call construction module, a voice call data acquisition module, a call signal strength detection module, a voice call data identification module, a call data encryption, packaging and storage module and a block chain data storage and change module; wherein the content of the first and second substances,
the interactive call construction module is used for constructing an interactive call contact between the first terminal and the second terminal after the call invitation confirmation of the first terminal and the second terminal is carried out;
the communication signal strength detection module is used for detecting the communication signal strength received by the first terminal and/or the second terminal in the interactive communication process;
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in the interactive call process; analyzing the intensity of the call signal, and finishing acquiring the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold value;
the voice call data recognition module is used for carrying out voice recognition on the collected voice call data so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
the call data encryption, packaging and storage module is used for respectively encrypting and packaging the first call data and the second call data and then respectively storing the first call data and the second call data into block chains corresponding to the first terminal and the second terminal;
the block chain data storage changing module is used for changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain;
further, after the interactive session construction module is used for confirming the session invitation of the first terminal and the second terminal, constructing the interactive session contact between the first terminal and the second terminal specifically includes:
instructing the first terminal to send a call offer request to the second terminal at a first moment, wherein the call offer request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating a second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
when an interactive call relation between a first terminal and a second terminal is established, voice call data of the first terminal and the second terminal in the interactive call process are collected;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
continuously detecting the intensity of a call signal received by the first terminal and/or the second terminal respectively in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal;
further, the voice call data acquisition module is used for analyzing the call signal strength, and when the call signal strength is lower than a preset signal strength threshold, the voice call data acquisition module finishes acquiring the voice call data specifically including:
determining the average call signal intensity corresponding to the continuous detection period according to the call signal intensity obtained by continuous detection; comparing the average call signal intensity with a preset signal intensity threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call relation between the first terminal and the second terminal;
and (c) a second step of,
the voice call data recognition module is configured to perform voice recognition on the collected voice call data, so that dividing the voice call data into first call data from a first terminal and second call data from a second terminal specifically includes:
according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, separating and extracting first voice call data belonging to the first user and second voice call data belonging to the second user from the collected voice call data; performing background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
performing semantic recognition processing on the first voice call data and the second voice call data subjected to the background noise reduction processing respectively, so that the first voice call data and the second voice call data are converted into first call data in a text form and second call data in a text form respectively;
further, the session data encryption, packaging and storage module is configured to encrypt and package the first session data and the second session data respectively, and store the encrypted and packaged first session data and the encrypted and packaged second session data in block chains corresponding to the first terminal and the second terminal, respectively, and specifically includes:
the first call data and the second call data are respectively divided into a plurality of first call subdata and a plurality of second call subdata; encrypting and compressing and packaging each first call subdata and each second call subdata respectively to obtain corresponding first call subdata packets and second call subdata packets;
stacking and storing all the first call sub-data packets into a block chain of the first terminal in sequence according to the segmentation sequence of each first call sub-data in the first call data; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
and the number of the first and second groups,
the block chain data storage changing module is configured to change the storage state of the call data in the block chain according to the duration of the call data in the block chain, specifically including:
acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; and if the continuous storage time exceeds a preset time threshold, deleting all the first call sub-packets or all the second call sub-packets stored in the block chain, otherwise, keeping the storage states of all the first call sub-packets or all the second call sub-packets in the block chain unchanged.
Compared with the prior art, the call data management method and system based on the block chain collect the voice call data and the call signal strength between the first terminal and the second terminal after the call invitation confirmation of the first terminal and the second terminal is successful, and end the collection of the voice call data and the interactive communication of the terminals under the condition that the call signal strength is abnormal, so that the voice call content can be prevented from being eavesdropped outside in the call process; in addition, the collected voice call data is identified and converted into the call data in the text form, the call data is encrypted and packaged and then is respectively stored in the corresponding block chains, and meanwhile, the storage state of the call data with longer storage time in the block chains is changed, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the probability of data loss and falsification can be reduced, and centralized and dynamic storage management is performed on the call data.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a call data management method based on a block chain according to the present invention.
Fig. 2 is a schematic structural diagram of a call data management system based on a block chain according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
Fig. 1 is a schematic flow chart of a call data management method based on a block chain according to an embodiment of the present invention. The call data management method based on the block chain comprises the following steps:
step S1, after the conversation invitation confirmation is carried out on the first terminal and the second terminal, the interactive conversation contact between the first terminal and the second terminal is established; acquiring voice call data of a first terminal and a second terminal in an interactive call process, and simultaneously detecting the intensity of call signals respectively received by the first terminal and/or the second terminal in the interactive call process;
step S2, analyzing the intensity of the call signal, and ending the collection of the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold; performing voice recognition on the acquired voice call data so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
step S3, respectively encrypting and packaging the first call data and the second call data, and respectively storing the encrypted and packaged first call data and second call data in block chains corresponding to the first terminal and the second terminal; and changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain.
The beneficial effects of the above technical scheme are: according to the call data management method based on the block chain, after successful call invitation confirmation of the first terminal and the second terminal is carried out, voice call data and call signal strength between the first terminal and the second terminal are collected, and interactive communication between the collected voice call data and the terminal is finished under the condition that the call signal strength is abnormal, so that the voice call content in the call process can be prevented from being intercepted; in addition, the collected voice call data is identified and converted into the call data in the text form, the call data is encrypted and packaged and then is respectively stored in the corresponding block chains, and meanwhile, the storage state of the call data with longer storage time in the block chains is changed, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the probability of data loss and falsification can be reduced, and centralized and dynamic storage management is performed on the call data.
Preferably, in step S1, after the call offer confirmation is performed on the first terminal and the second terminal, an interactive call contact between the first terminal and the second terminal is constructed; the method for acquiring the voice call data of the first terminal and the second terminal in the interactive call process and detecting the call signal strength respectively received by the first terminal and/or the second terminal in the interactive call process specifically comprises the following steps:
step S101, indicating a first terminal to send a call invitation request to a second terminal at a first moment, wherein the call invitation request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating the second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
step S102, when an interactive conversation relation between a first terminal and a second terminal is established, voice conversation data of the first terminal and the second terminal in the interactive conversation process are collected; and simultaneously, continuously detecting the intensity of the call signal received by the first terminal and/or the second terminal in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal.
The beneficial effects of the above technical scheme are: in the actual call operation, the first terminal and the second terminal may be, but are not limited to, mobile terminals such as smart phones; the call between the first terminal and the second terminal may be implemented based on a mobile network provided by an operator or a network such as a WLAN. When a first terminal needs to perform a voice call connection with a second terminal, the first terminal first sends a call offer request to the second terminal at a first time, where the call offer request may be, but is not limited to, a request instruction, and when the second terminal receives the call offer request at a second time, the second terminal analyzes the call offer request, so as to extract identity information of the first terminal from the call offer request, where the identity information may be, but is not limited to, an IP address or a phone number of the first terminal, and both the IP address and the phone number have uniqueness. The second terminal itself has a preset identity information white list, the preset identity information white list may include identity information corresponding to different terminals, the terminals corresponding to the identity information have a right of call connection with the second terminal, and the terminals outside the preset identity information white list do not have a right of call connection with the second terminal, and the identity information included in the preset identity information white list may be dynamically changed, and the second terminal may add new identity information or delete original identity information in the white list according to a call situation between itself and other terminals. The second terminal compares the extracted identity information with a preset identity information white list, if the identity information is contained in the preset identity information white list, the first terminal has the right of call connection with the second terminal, at the moment, the second terminal feeds back a corresponding response message to the first terminal to confirm that the call invitation is successful, and the first terminal and the second terminal form an interactive call connection based on a handshake protocol; if the identity information is not included in the preset identity information white list, it indicates that the first terminal does not have the authority of call connection with the second terminal, and at this time, the second terminal feeds back a corresponding rejection message to the first terminal to confirm that the call invitation fails.
After the interactive communication relation is successfully established between the first terminal and the second terminal, the voice communication data in the interactive communication process can be collected by utilizing the microphone elements arranged in the first terminal and the second terminal, so that the real-time voice communication data of the users of the first terminal and the second terminal in the interactive communication process can be collected and recorded. Meanwhile, the first terminal and the second terminal are connected in an interactive communication mode based on a wireless network, the communication signal strength received by the first terminal and the second terminal in the interactive communication process can be continuously detected by using wireless network signal strength sensors (such as antennas) of the first terminal and the second terminal in the interactive communication process, and Kalman filtering processing is performed on the communication signal strength, so that interference signal components contained in the detected communication signal strength can be effectively reduced.
Preferably, in the step S2, the intensity of the call signal is analyzed, and when the intensity of the call signal is lower than a preset signal intensity threshold, the collection of the voice call data is ended; and performing voice recognition on the acquired voice call data, so that dividing the voice call data into first call data from the first terminal and second call data from the second terminal specifically comprises:
step S201, according to the intensity of the call signal obtained by continuous detection, determining the corresponding average call signal intensity during the continuous detection period; comparing the average call signal strength with a preset signal strength threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call connection between the first terminal and the second terminal;
step S202, according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, first voice call data belonging to the first user and second voice call data belonging to the second user are obtained by separating and extracting the collected voice call data; carrying out background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
step S203, performing semantic recognition processing on the first voice call data and the second voice call data subjected to the background noise reduction processing, so as to convert the first voice call data and the second voice call data into first call data in a text form and second call data in a text form, respectively.
The beneficial effects of the above technical scheme are: when the first terminal and the second terminal are in interactive call connection based on a wireless network, if the wireless network is interfered by the outside (for example, eavesdropping equipment is accessed into the wireless network to monitor the first terminal and/or the second terminal), correspondingly, the intensity of the call signal received by the first terminal or the second terminal respectively is attenuated, at this moment, according to the intensity of the call signal obtained by continuous detection, the corresponding average intensity of the call signal during continuous detection is determined, and the average intensity of the call signal is compared with a preset signal intensity threshold, if the average intensity of the call signal is lower than the preset signal intensity threshold, it is indicated that the first terminal or the second terminal is interfered by the outside signal currently, and the risk that the call is eavesdropped exists, at this moment, the collection of the voice call data is finished, and the interactive call connection between the first terminal and the second terminal is interrupted, therefore, the collected voice call data can be effectively prevented from being stolen, and the communication signal between the first terminal and the second terminal is prevented from being invaded by a third party, so that the safety of the voice call data is improved.
Because the voiceprint features of the first user and the second user corresponding to the first terminal and the second terminal are different, the collected voice call data generally contains voices of the first user and the second user in a mixed mode, and the first voice call data belonging to the first user and the second voice call data belonging to the second user can be separated and extracted according to the difference of the voiceprint features of the first user and the second user, so that the situation that the subsequent accurate semantic recognition cannot be carried out due to the fact that the voices of the first user and the voices of the second user are overlapped with each other is avoided, the process of separating and extracting belongs to a voice recognition processing process commonly used in the prior art, and further description is not carried out. Finally, the separated first voice call data and second voice call data are respectively subjected to semantic recognition processing, so that the first voice call data and the second voice call data can be quickly and accurately converted into first call data in a text form and second call data in a text form, conversion from audio form data to text form data is achieved, and data volume of the data is greatly reduced.
Preferably, in step S3, the first call data and the second call data are encrypted and packaged respectively, and then are stored in block chains corresponding to the first terminal and the second terminal respectively; then, according to the duration of the call data in the block chain, changing the storage state of the call data in the block chain specifically includes:
step S301, the first call data and the second call data are respectively divided into a plurality of first call subdata and a plurality of second call subdata; encrypting and compressing and packaging each first call subdata and each second call subdata respectively to obtain corresponding first call subdata packets and second call subdata packets;
step S302, according to the segmentation sequence of each first call subdata in the first call data, sequentially stacking and storing all the first call subdata packets into a block chain of the first terminal; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
step S303, acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; if the continuous storage time exceeds a preset time threshold, deleting all the first call sub-packets or all the second call sub-packets stored in the block chain, otherwise, keeping the storage states of all the first call sub-packets or all the second call sub-packets in the block chain unchanged.
The beneficial effects of the above technical scheme are: the interactive communication duration between the first terminal and the second terminal is long or the communication content of the first user/the second user is more, which results in a larger data volume of the first communication data and the second communication data obtained by semantic recognition, and if the first communication data and the second communication data are directly stored integrally, not only a larger storage space needs to be provided, but also data loss is easily caused. The first call data and the second call data are respectively divided into a plurality of first call sub-data and a plurality of second call sub-data; and respectively carrying out encryption processing and compression packaging processing on each first call subdata and each second call subdata so as to obtain corresponding first call subdata packets and second call subdata packets, so that the call data can be stored in a confidential mode and the convenience of splitting and storing the call data is improved. The dividing of the first call data and the second call data into the first call sub-data and the second call sub-data may be performed by equally dividing the first call data and the second call data into the first call sub-data and the second call sub-data, which will not be described in further detail herein.
In addition, according to the segmentation sequence of each piece of call sub-data in the call data, the call sub-data packet obtained by segmenting the call sub-data packet earliest is placed and stacked at the lowest layer of the block chain storage block, and the call sub-data packet obtained by segmenting the call sub-data packet latest is placed and stacked at the topmost layer of the block chain storage block, so that different call sub-data packets can be extracted from the block chain quickly and orderly in the follow-up process. The call sub-data packet stored in the block chain generally has a certain storage life cycle, and when the call sub-data packet is stored in the block chain for a longer time, the longer the time the call sub-data packet occupies the storage space of the block chain, the more the call sub-data packet is not beneficial to realizing the efficient operation of the storage space of the block chain. Comparing the continuous storage time of the call sub-data packet in the corresponding block chain with a preset time threshold; if the duration exceeds the preset duration threshold, the corresponding call sub-packet is not called for a long time, the call sub-packet does not need to be stored in the block chain continuously, and the corresponding call sub-packet is deleted at the moment, so that the storage space of the block chain can be prevented from being occupied for a long time, and the operation efficiency of the storage space of the block chain can be improved.
Preferably, in the step S301, the first call data and the second call data are respectively divided into a plurality of first call sub-data and a plurality of second call sub-data; the encrypting and compressing and packing each first call sub-data and each second call sub-data to obtain corresponding first call sub-data packets and second call sub-data packets specifically includes:
step S3011, scanning and recognizing the text form data corresponding to the first communication data and the second communication data, recognizing the text form data to obtain corresponding words, matching the recognized words with a trained data word bank to obtain a plurality of words from the data word bank, forming a corresponding word map according to word senses of the words, wherein the word map is related to the logical relevance of the word senses among different words, and dividing the first communication data and the second communication data into a plurality of first communication sub-data and a plurality of second communication sub-data according to the least number of words and phrases principle by using the following formula (1),
Figure BDA0003285382520000151
in the above formula (1), P i The communication sub data set is obtained by dividing the ith communication data, wherein i is 1 and 2; n represents the number of the call sub data obtained by dividing the call data; (c) 1 ,c 2 ...c n ) Representing n call subdata obtained by dividing the call data; min represents the minimum value operation, namely, the corresponding call data division mode when the number of vocabularies is minimum is obtained according to the vocabulary recognition result of each call data; for example, the call data is "i go to beijing university visit", and traversal is started from the beginning to obtain "i/go/beijing/university/visit", "i/go/beijing university/visit", the first group is divided into 5 groups of words, and the second group is divided into 4 groups of words, so that division is performed with the second group of results; the data word stock is selected from a set of high-quality Chinese word stock which is proposed by natural language processing and social humanistic calculation laboratory arrangement of Hua university, word lists come from social labels, search hot words, input method word stocks and the like of mainstream websites, and the data word stock is a commonly used Chinese word stock in the prior art and is not introduced in detail;
step S3012, encrypt each first call sub-data and each second call sub-data using the following formula (2),
c n m =(x 1 ,x 2 ,x 3 ,x 4 ) (2)
in the above formula (2), c n m The cipher text corresponding to the mth character in the first call sub data or the second call sub data is represented, and each character c n m Composed of four bits of cipher text (x) 1 ,x 2 ,x 3 ,x 4 ) Composition, each ciphertext is in a pure digital form; for example, in UTF-8 encoding, each chinese character generally corresponds to 3 bytes, i.e., corresponds to a 24-bit binary number, the 24-bit binary number is divided into 4 groups, i.e., each group corresponds to a 6-bit binary number, two 0 s are added in front of each 6-bit binary number to form a new 8-bit binary number, and the decimal system corresponding to the 8-bit binary number is a cipher text; for example, a binary number of a Chinese character is (010100100100111101001110), which is obtained after splitting and zero padding (000)10100) (00100100) (00111101) (00001110), i.e. corresponding to (x) 1 ,x 2 ,x 3 ,x 4 ) (20,36,61,14), shown textually as 20366114, the second and so on appended to the back;
step S3013, using the following formula (3), compressing and packaging the encrypted first call sub-data or second call sub-data to obtain a corresponding first call sub-data packet and second call sub-data packet,
Y(c n * )=L(c 1 1 c 1 2 …c 1 m ) (3)
in the above formula (3),: y (c) n * ) The nth first call sub-data representing the encrypted first call data or the nth second call sub-data representing the second call data are compressed and packaged to obtain a sub-data packet; l (c) 1 1 c 1 2 …c 1 m ) Representing data compression operation, taking the digital string corresponding to the encrypted call subdata as input, and traversing the digital string by using a sliding window algorithm, wherein the length of a sliding window is 3; the sliding window algorithm is a common compression algorithm in the art and will not be described in detail here, wherein the length of the sliding window is 3, that is, when adjacent 3 numbers occur consecutively, the array occurring for the first time is the parent array, and the following ones are denoted by labels.
The beneficial effects of the above technical scheme are: the conversation data is divided into a plurality of conversation subdata by using the formula (1), and the text data of the conversation is divided according to words, so that the semantic analysis of the conversation can be realized, and the visualization of the conversation data can be realized; the divided call sub-data is encrypted by using the formula (2), so that the call data is prevented from being stolen and utilized by people; the encrypted data is compressed by the formula (3), so that the space required by data storage can be greatly reduced, and the occurrence probability of data loss and tampering can be reduced, thereby carrying out centralized and dynamic storage management on the call data.
Fig. 2 is a schematic structural diagram of a call data management system based on a block chain according to an embodiment of the present invention. The call data management system based on the block chain comprises an interactive call construction module, a voice call data acquisition module, a call signal strength detection module, a voice call data identification module, a call data encryption packaging and storage module and a block chain data storage change module; wherein, the first and the second end of the pipe are connected with each other,
the interactive call construction module is used for constructing an interactive call contact between the first terminal and the second terminal after the call invitation confirmation of the first terminal and the second terminal;
the communication signal strength detection module is used for detecting the communication signal strength received by the first terminal and/or the second terminal in the interactive communication process;
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in the interactive call process; analyzing the intensity of the call signal, and finishing collecting the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold value;
the voice call data recognition module is used for carrying out voice recognition on the acquired voice call data so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
the call data encryption, packaging and storage module is used for respectively encrypting and packaging the first call data and the second call data and then respectively storing the first call data and the second call data into block chains corresponding to the first terminal and the second terminal;
the block chain data storage changing module is used for changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain.
The beneficial effects of the above technical scheme are: the call data management system based on the block chain acquires voice call data and call signal strength between a first terminal and a second terminal after successful call invitation confirmation of the first terminal and the second terminal, and finishes acquiring the voice call data and interactive communication of the terminals under the condition that the call signal strength is abnormal, so that the voice call content in the call process can be prevented from being intercepted; in addition, the collected voice call data is identified and converted into the call data in the text form, the call data is encrypted and packaged and then is respectively stored in the corresponding block chains, and meanwhile, the storage state of the call data with longer storage time in the block chains is changed, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the probability of data loss and falsification can be reduced, and centralized and dynamic storage management is performed on the call data.
Preferably, after the interactive session construction module is configured to confirm the session invitation of the first terminal and the second terminal, the constructing of the interactive session contact between the first terminal and the second terminal specifically includes:
instructing the first terminal to send a call invitation request to the second terminal at a first moment, wherein the call invitation request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating the second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
when an interactive call relation between a first terminal and a second terminal is established, voice call data of the first terminal and the second terminal in the interactive call process are collected;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
and continuously detecting the intensity of the call signal received by the first terminal and/or the second terminal respectively in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal.
The beneficial effects of the above technical scheme are: in the actual call operation, the first terminal and the second terminal may be, but are not limited to, mobile terminals such as smart phones; the call between the first terminal and the second terminal may be implemented based on a mobile network provided by an operator or a network such as a WLAN. When a first terminal needs to perform voice call connection with a second terminal, the first terminal firstly sends a call invitation request to the second terminal at a first moment, where the call invitation request may be, but is not limited to, a request instruction, and when the second terminal receives the call invitation request at a second moment, the call invitation request is parsed, so as to extract identity information of the first terminal from the call invitation request, where the identity information may be, but is not limited to, an IP address or a telephone number of the first terminal, and both the IP address and the telephone number have uniqueness. The second terminal itself has a preset identity information white list, the preset identity information white list may include identity information corresponding to different terminals, the terminals corresponding to the identity information have a right of call connection with the second terminal, and the terminals outside the preset identity information white list do not have a right of call connection with the second terminal, and the identity information included in the preset identity information white list may be dynamically changed, and the second terminal may add new identity information or delete original identity information in the white list according to a call situation between itself and other terminals. The second terminal compares the extracted identity information with a preset identity information white list, if the identity information is contained in the preset identity information white list, the first terminal has the right of call connection with the second terminal, at the moment, the second terminal feeds back a corresponding response message to the first terminal to confirm that the call invitation is successful, and the first terminal and the second terminal form an interactive call connection based on a handshake protocol; if the identity information is not included in the preset identity information white list, it indicates that the first terminal does not have the authority of call connection with the second terminal, and at this time, the second terminal feeds back a corresponding rejection message to the first terminal to confirm that the call invitation fails.
After the interactive communication relation is successfully established between the first terminal and the second terminal, the voice communication data in the interactive communication process can be collected by utilizing the microphone elements arranged in the first terminal and the second terminal, so that the real-time voice communication data of the users of the first terminal and the second terminal in the interactive communication process can be collected and recorded. Meanwhile, the first terminal and the second terminal are connected in an interactive call based on a wireless network, the respective call signal strengths received by the first terminal and the second terminal in the interactive call process can be continuously detected by using wireless network signal strength sensors (such as antennas) of the first terminal and the second terminal in the interactive call process, and Kalman filtering processing is performed on the call signal strengths, so that interference signal components contained in the detected call signal strengths can be effectively reduced.
Preferably, the voice call data acquisition module is configured to analyze the call signal strength, and when the call signal strength is lower than a preset signal strength threshold, ending acquiring the voice call data specifically includes:
determining the average call signal intensity corresponding to the continuous detection period according to the call signal intensity obtained by continuous detection; comparing the average call signal strength with a preset signal strength threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call connection between the first terminal and the second terminal;
and the number of the first and second groups,
the voice call data recognition module is used for performing voice recognition on the collected voice call data, so that the step of dividing the voice call data into first call data from a first terminal and second call data from a second terminal specifically comprises the following steps:
according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, separating and extracting first voice call data belonging to the first user and second voice call data belonging to the second user from the collected voice call data; carrying out background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
and performing semantic recognition processing on the first voice call data and the second voice call data subjected to the background noise reduction processing respectively, so that the first voice call data and the second voice call data are converted into first call data in a text form and second call data in a text form respectively.
The beneficial effects of the above technical scheme are: when the first terminal and the second terminal are in interactive call connection based on the wireless network, if the wireless network is interfered by the outside (for example, the wiretapping device is accessed into the wireless network to monitor the first terminal and/or the second terminal), the intensity of the call signal received by the first terminal or the second terminal respectively is attenuated, at this time, according to the intensity of the call signal obtained by continuous detection, the corresponding average call signal intensity during the continuous detection is determined, and the average call signal intensity is compared with the preset signal intensity threshold, if the average call signal intensity is lower than the preset signal intensity threshold, it is indicated that the first terminal or the second terminal is interfered by the outside signal currently, and there is a risk that the call is wiretapped, at this time, the collection of the voice call data is finished, and the interactive call connection between the first terminal and the second terminal is interrupted, therefore, the collected voice call data can be effectively prevented from being stolen, and the communication signal between the first terminal and the second terminal is prevented from being invaded by a third party, so that the safety of the voice call data is improved.
Because the voiceprint features of the first user and the second user corresponding to the first terminal and the second terminal are different, the collected voice call data generally contains voices of the first user and the second user in a mixed mode, and the first voice call data belonging to the first user and the second voice call data belonging to the second user can be separated and extracted according to the difference of the voiceprint features of the first user and the second user, so that the situation that the subsequent accurate semantic recognition cannot be carried out due to the fact that the voices of the first user and the voices of the second user are overlapped with each other is avoided, the process of separating and extracting belongs to a voice recognition processing process commonly used in the prior art, and further description is not carried out. Finally, the separated first voice call data and second voice call data are respectively subjected to semantic recognition processing, so that the first voice call data and the second voice call data can be quickly and accurately converted into first call data in a text form and second call data in a text form, conversion from audio form data to text form data is achieved, and data volume of the data is greatly reduced.
Preferably, the encrypting, packaging and storing module of call data is configured to respectively encrypt and package the first call data and the second call data, and then respectively store the first call data and the second call data in block chains corresponding to the first terminal and the second terminal, and specifically includes:
the first call data and the second call data are respectively divided into a plurality of first call subdata and a plurality of second call subdata; respectively encrypting and compressing and packaging each first call subdata and each second call subdata to obtain corresponding first call subdata packets and second call subdata packets;
stacking and storing all the first call sub-data packets into a block chain of the first terminal in sequence according to the segmentation sequence of each first call sub-data in the first call data; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
and (c) a second step of,
the block chain data storage changing module is configured to change the storage state of the call data in the block chain according to the duration of the call data in the block chain, and specifically includes:
acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; if the continuous storage time exceeds a preset time threshold, deleting all the first call sub-packets or all the second call sub-packets stored in the block chain, otherwise, keeping the storage states of all the first call sub-packets or all the second call sub-packets in the block chain unchanged.
The beneficial effects of the above technical scheme are: the interactive communication duration between the first terminal and the second terminal is long or the communication content of the first user/the second user is more, which results in a larger data volume of the first communication data and the second communication data obtained by semantic recognition, and if the first communication data and the second communication data are directly stored integrally, not only a larger storage space needs to be provided, but also data loss is easily caused. The first call data and the second call data are respectively divided into a plurality of first call subdata and a plurality of second call subdata; and respectively carrying out encryption processing and compression packaging processing on each first call subdata and each second call subdata so as to obtain corresponding first call subdata packets and second call subdata packets, so that the call data can be stored in a confidential mode and the convenience of splitting and storing the call data is improved. The dividing of the first call data and the second call data into the first call sub-data and the second call sub-data may be performed by equally dividing the first call data and the second call data into the first call sub-data and the second call sub-data, which will not be described in further detail herein.
In addition, according to the segmentation sequence of each piece of call subdata in the call data, the call subdata packet obtained by segmentation at the earliest is placed and stacked at the lowest layer of the block chain storage block, and the call subdata packet obtained by segmentation at the latest is placed and stacked at the topmost layer of the block chain storage block, so that different call subdata packets can be conveniently and rapidly and orderly extracted from the block chain in the follow-up process. The call sub-packets stored in the block chain usually have a certain storage life cycle, and as the duration of the call sub-packets stored in the block chain is longer, the time that the call sub-packets occupy the storage space of the block chain is longer, which is not favorable for realizing the efficient operation of the storage space of the block chain. Comparing the continuous storage time of the call sub-data packet in the corresponding block chain with a preset time threshold; if the duration exceeds the preset duration threshold, the corresponding call sub-packet is not called for a long time, the call sub-packet does not need to be stored in the block chain continuously, and the corresponding call sub-packet is deleted at the moment, so that the storage space of the block chain can be prevented from being occupied for a long time, and the operation efficiency of the storage space of the block chain can be improved.
As can be seen from the content of the above embodiment, the method and system for managing call data based on a blockchain acquire the voice call data and the call signal strength between the first terminal and the second terminal after the call invitation confirmation of the first terminal and the second terminal is successful, and end the acquisition of the voice call data and the interactive communication of the terminals when the call signal strength is abnormal, so that the voice call content can be prevented from being eavesdropped outside during the call; in addition, the collected voice call data is identified and converted into the call data in the text form, the call data is encrypted and packaged and then is respectively stored in the corresponding block chains, and meanwhile, the storage state of the call data with longer storage time in the block chains is changed, so that the voice call data in the original audio form can be converted into the call data in the text form which is easier to store, the space required by data storage is greatly reduced, the probability of data loss and falsification can be reduced, and centralized and dynamic storage management is performed on the call data.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (5)

1. The call data management method based on the block chain is characterized by comprising the following steps:
step S1, after the conversation invitation confirmation is carried out on the first terminal and the second terminal, the interactive conversation contact between the first terminal and the second terminal is established; acquiring voice call data of a first terminal and a second terminal in an interactive call process, and simultaneously detecting the intensity of call signals respectively received by the first terminal and/or the second terminal in the interactive call process;
step S2, analyzing the intensity of the call signal, and ending the collection of the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold value; performing voice recognition on the acquired voice call data, so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
step S3, respectively encrypting and packaging the first call data and the second call data, and then respectively storing the encrypted and packaged first call data and second call data into block chains corresponding to the first terminal and the second terminal; changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain;
in step S2, analyzing the intensity of the call signal, and ending collecting the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold; and performing voice recognition on the acquired voice call data, so that dividing the voice call data into first call data from a first terminal and second call data from a second terminal specifically comprises:
step S201, according to the intensity of the call signal obtained by continuous detection, determining the corresponding average call signal intensity during the continuous detection period; comparing the average call signal intensity with a preset signal intensity threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call relation between the first terminal and the second terminal;
step S202, according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, separating and extracting first voice call data belonging to the first user and second voice call data belonging to the second user from collected voice call data; performing background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
step S203, respectively performing semantic recognition processing on the first voice call data and the second voice call data subjected to the background noise reduction processing, so as to respectively convert the first voice call data and the second voice call data into first call data in a text form and second call data in a text form;
in step S3, after the first call data and the second call data are encrypted and packaged, respectively, the encrypted and packaged first call data and the encrypted and packaged second call data are stored in block chains corresponding to the first terminal and the second terminal, respectively; then, according to the duration of the call data in the block chain, changing the storage state of the call data in the block chain specifically includes:
step S301, dividing the first call data and the second call data into a plurality of first call sub-data and a plurality of second call sub-data respectively; encrypting and compressing and packaging each first call subdata and each second call subdata respectively to obtain corresponding first call subdata packets and second call subdata packets;
step S302, according to the segmentation sequence of each first call subdata in the first call data, sequentially stacking and storing all the first call subdata packets into a block chain of the first terminal; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
step S303, acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; and if the continuous storage time length exceeds a preset time length threshold value, deleting all the first call sub-packets or all the second call sub-packets stored in the block chain, otherwise, keeping the storage states of all the first call sub-packets or all the second call sub-packets in the block chain unchanged.
2. The block chain-based call data management method of claim 1, wherein:
in step S1, after the call invitation confirmation is performed on the first terminal and the second terminal, an interactive call contact between the first terminal and the second terminal is established; the method for acquiring voice call data of the first terminal and the second terminal in the interactive call process, and simultaneously detecting the call signal strength respectively received by the first terminal and/or the second terminal in the interactive call process specifically comprises the following steps:
step S101, instructing a first terminal to send a call invitation request to a second terminal at a first moment, wherein the call invitation request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating a second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
step S102, when an interactive communication relation between a first terminal and a second terminal is established, voice communication data of the first terminal and the second terminal in an interactive communication process are collected; and simultaneously, continuously detecting the intensity of the call signal received by the first terminal and/or the second terminal in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal.
3. The method for managing call data based on a blockchain according to claim 1, wherein: in the step S301, the first call data and the second call data are respectively divided into a plurality of first call sub-data and a plurality of second call sub-data; the encrypting and compressing and packing each first call sub-data and each second call sub-data to obtain corresponding first call sub-data packets and second call sub-data packets specifically includes:
step S3011, scanning and recognizing text form data corresponding to the first call data and the second call data, recognizing the text form data to obtain corresponding characters, matching the recognized characters with a trained data word bank to obtain a plurality of words from the data word bank, forming a corresponding word map according to word senses of the words, wherein the word map relates to the logical relevance of the word senses among different words, and dividing the first call data and the second call data into a plurality of first call sub-data and a plurality of second call sub-data according to the least number of words principle by using the following formula (1),
Figure FDA0003579478250000041
in the above formula (1), P i The communication sub data set is obtained by dividing the ith communication data, wherein i is 1 and 2; n represents the number of the call sub data obtained by dividing the call data; (c) 1 ,c 2 ...c n ) Representing n call subdata obtained by dividing the call data; min represents the minimum value operation, and the corresponding call data division mode when the number of vocabularies is minimum is obtained according to the vocabulary recognition result of each call data;
step S3012, encrypting each of the first call sub-data and each of the second call sub-data using the following formula (2),
c n m =(x 1 ,x 2 ,x 3 ,x 4 ) (2)
in the above formula (2), c n m The cipher text corresponding to the mth character in the first call sub data or the second call sub data is represented, and each character c n m Composed of four bits of cipher text (x) 1 ,x 2 ,x 3 ,x 4 ) Composition, each ciphertext is in a pure digital form;
step S3013, using the following formula (3), compressing and packaging the encrypted first call sub-data or second call sub-data to obtain a corresponding first call sub-data packet and second call sub-data packet,
Y(c n * )=L(c 1 1 c 1 2 …c 1 m ) (3)
in the above formula (3),: y (c) n * ) The nth first call sub-data representing the encrypted first call data or the nth second call sub-data representing the second call data are compressed and packaged to obtain a sub-data packet; l (c) 1 1 c 1 2 …c 1 m ) And representing data compression operation, wherein the digital string corresponding to the encrypted call sub-data is used as input, and the digital string is traversed by using a sliding window algorithm, wherein the length of a sliding window is 3.
4. The communication data management system based on the block chain is characterized by comprising an interactive communication construction module, a voice communication data acquisition module, a communication signal strength detection module, a voice communication data identification module, a communication data encryption packaging and storage module and a block chain data storage change module; wherein the content of the first and second substances,
the interactive call construction module is used for constructing an interactive call contact between the first terminal and the second terminal after the call invitation confirmation of the first terminal and the second terminal is carried out;
the communication signal strength detection module is used for detecting the communication signal strength respectively received by the first terminal and/or the second terminal in the interactive communication process;
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in the interactive call process; analyzing the intensity of the call signal, and finishing the collection of the voice call data when the intensity of the call signal is lower than a preset signal intensity threshold value;
the voice call data recognition module is used for carrying out voice recognition on the collected voice call data so as to divide the voice call data into first call data from a first terminal and second call data from a second terminal;
the call data encryption, packaging and storage module is used for respectively encrypting and packaging the first call data and the second call data and then respectively storing the first call data and the second call data into block chains corresponding to the first terminal and the second terminal;
the block chain data storage changing module is used for changing the storage state of the call data in the block chain according to the continuous storage duration of the call data in the block chain;
the voice call data acquisition module is configured to analyze the call signal strength, and when the call signal strength is lower than a preset signal strength threshold, end acquisition of the voice call data specifically includes:
determining the average call signal intensity corresponding to the continuous detection period according to the call signal intensity obtained by continuous detection; comparing the average call signal intensity with a preset signal intensity threshold; if the average call signal intensity is lower than a preset signal intensity threshold value, ending the collection of the voice call data and interrupting the interactive call connection between the first terminal and the second terminal; otherwise, continuing to collect the voice call data and keeping the interactive call relation between the first terminal and the second terminal;
and the number of the first and second groups,
the voice call data recognition module is configured to perform voice recognition on the collected voice call data, so that dividing the voice call data into first call data from a first terminal and second call data from a second terminal specifically includes:
according to respective voiceprint characteristics of a first user of a first terminal and a second user of a second terminal, separating and extracting first voice call data belonging to the first user and second voice call data belonging to the second user from the collected voice call data; performing background noise reduction processing on the first voice call data and the second voice call data so as to remove background noise components contained in the first voice call data and the second voice call data;
performing semantic recognition processing on the first voice call data and the second voice call data subjected to background noise reduction processing respectively, so that the first voice call data and the second voice call data are converted into first call data in a text form and second call data in a text form respectively; the session data encryption, packaging and storage module is configured to encrypt and package the first session data and the second session data respectively, and store the encrypted and packaged first session data and the encrypted and packaged second session data in block chains corresponding to the first terminal and the second terminal, where the storage module specifically includes:
the first call data and the second call data are respectively divided into a plurality of first call subdata and a plurality of second call subdata; encrypting and compressing and packaging each first call subdata and each second call subdata respectively to obtain corresponding first call subdata packets and second call subdata packets;
stacking and storing all the first call sub-data packets into a block chain of the first terminal in sequence according to the segmentation sequence of each first call sub-data in the first call data; according to the segmentation sequence of each second communication sub-data in the second communication data, sequentially stacking and storing all second communication sub-data packets in a block chain of the second terminal;
and the number of the first and second groups,
the block chain data storage changing module is configured to change the storage state of the call data in the block chain according to the duration of the call data in the block chain, specifically including:
acquiring the continuous storage duration of all the first call sub-packets or all the second call sub-packets in the corresponding block chains; comparing the continuous storage time with a preset time threshold; and if the continuous storage time exceeds a preset time threshold, deleting all the first call sub-packets or all the second call sub-packets stored in the block chain, otherwise, keeping the storage states of all the first call sub-packets or all the second call sub-packets in the block chain unchanged.
5. The blockchain-based call data management system of claim 4, wherein: the interactive call construction module is configured to, after confirming a call offer between the first terminal and the second terminal, construct an interactive call contact between the first terminal and the second terminal, and specifically includes:
instructing the first terminal to send a call offer request to the second terminal at a first moment, wherein the call offer request comprises identity information of the first terminal, and the identity information comprises an IP address or a telephone number of the first terminal; indicating a second terminal to extract the identity information from the call invitation request, and comparing the identity information with a preset identity information white list; if the identity information is contained in a preset identity information white list, confirming that the call invitation is successful, and constructing an interactive call contact between the first terminal and the second terminal; if the identity information is not contained in a preset identity information white list, confirming that the call invitation is unsuccessful;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
when an interactive call relation between a first terminal and a second terminal is established, voice call data of the first terminal and the second terminal in the interactive call process are collected;
and the number of the first and second groups,
the voice call data acquisition module is used for acquiring voice call data of the first terminal and the second terminal in an interactive call process, and specifically comprises the following steps:
and continuously detecting the intensity of the call signal received by the first terminal and/or the second terminal respectively in the interactive call process, and performing Kalman filtering processing on the intensity of the call signal.
CN202111145822.5A 2021-09-28 2021-09-28 Call data management method and system based on block chain Active CN114025045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111145822.5A CN114025045B (en) 2021-09-28 2021-09-28 Call data management method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111145822.5A CN114025045B (en) 2021-09-28 2021-09-28 Call data management method and system based on block chain

Publications (2)

Publication Number Publication Date
CN114025045A CN114025045A (en) 2022-02-08
CN114025045B true CN114025045B (en) 2022-09-30

Family

ID=80055012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111145822.5A Active CN114025045B (en) 2021-09-28 2021-09-28 Call data management method and system based on block chain

Country Status (1)

Country Link
CN (1) CN114025045B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3076420B1 (en) * 2017-12-29 2020-02-07 Commissariat A L'energie Atomique Et Aux Energies Alternatives METHOD OF EXCHANGING KEYS BY INTELLIGENT CONTRACT DEPLOYED ON A BLOCK CHAIN
CN108805571B (en) * 2018-06-11 2021-02-26 北京京东尚科信息技术有限公司 Data protection method, platform, block chain node, system and storage medium
TWI711293B (en) * 2019-03-26 2020-11-21 宏碁股份有限公司 Method of identity authentication for voice over internet protocol call and related device
CN112131545B (en) * 2020-11-20 2021-10-29 支付宝(杭州)信息技术有限公司 Method, device and equipment for processing voice authorization and voice related service
CN113035188A (en) * 2021-02-25 2021-06-25 平安普惠企业管理有限公司 Call text generation method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114025045A (en) 2022-02-08

Similar Documents

Publication Publication Date Title
US10410636B2 (en) Methods and system for reducing false positive voice print matching
CN109600752B (en) Deep clustering fraud detection method and device
CN106550155B (en) Swindle sample is carried out to suspicious number and screens the method and system sorted out and intercepted
CN109451182B (en) Detection method and device for fraud telephone
CN101308654B (en) Speech analysis and recognition method, system and apparatus
US6327347B1 (en) Calling party identification authentication and routing in response thereto
CN106686191A (en) Processing method for adaptively identifying harassing call and processing system thereof
CN103731832A (en) System and method for preventing phone and short message frauds
CN106970911A (en) A kind of strick precaution telecommunication fraud system and method based on big data and machine learning
CN104580260B (en) A kind of safety method suitable for Intelligent terminal for Internet of things
CN106789855A (en) The method and device of user login validation
CN112818316B (en) Voiceprint-based identity recognition and application method, device and equipment
CN101247281A (en) Protocol packet detecting method, system and equipment
CN111741472A (en) GoIP fraud telephone identification method, system, medium and equipment
CN113794805A (en) Detection method and detection system for GOIP fraud telephone
CN111401906A (en) Transfer risk detection method and system
CN109858917A (en) A kind of anti-fake system and its method based on artificial intelligence
CN114338617A (en) Audio and video auditing method and illegal number identification method based on video call
CN114025045B (en) Call data management method and system based on block chain
KR101033870B1 (en) Method and device for processing spam call
CN109587357B (en) Crank call identification method
CN109104429B (en) Detection method for phishing information
CN114817489A (en) Educational material storage and query management system and method based on big data
CN114641003A (en) Fraud prevention system and method
CN115334509B (en) Communication wind control system applying big data service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220810

Address after: 15AB(13AB)-2, Cooperation Financial Building, Dongmen Community, Dongmen Street, Luohu District, Shenzhen, Guangdong, 518000

Applicant after: Pengchuang Digital Technology (Shenzhen) Group Co., Ltd.

Address before: 102400 No. 1, zone 1, Guba Road, Chengguan Street, Fangshan District, Beijing - s679

Applicant before: Deming Shangpin Technology Group Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant