CN114500167B - Information processing method and device, electronic equipment and storage medium - Google Patents
Information processing method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114500167B CN114500167B CN202111604814.2A CN202111604814A CN114500167B CN 114500167 B CN114500167 B CN 114500167B CN 202111604814 A CN202111604814 A CN 202111604814A CN 114500167 B CN114500167 B CN 114500167B
- Authority
- CN
- China
- Prior art keywords
- terminal
- identification code
- voice
- user alias
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 38
- 238000003672 processing method Methods 0.000 title claims abstract description 21
- 238000012795 verification Methods 0.000 claims abstract description 20
- 238000000034 method Methods 0.000 claims description 21
- 238000004806 packaging method and process Methods 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 claims description 2
- 230000006854 communication Effects 0.000 abstract description 36
- 238000004891 communication Methods 0.000 abstract description 35
- 238000010586 diagram Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000005538 encapsulation Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the application discloses an information processing method, an information processing device, electronic equipment and a storage medium, wherein when a first terminal and a second terminal belonging to different networks in a broadband and narrowband converged communication system are communicated, the first terminal acquires an identification code and a user alias of the first terminal when voice data are required to be sent; encapsulating the voice data, the identification code and the user alias into at least one voice packet; and sending the at least one voice packet, so that after the second terminal receives the at least one voice packet, voice data, an identification code and a user alias are analyzed from the at least one voice packet, and after the identification code passes verification, the voice data is output and the user alias is displayed. Based on the application, two terminals in different networks can obtain and display the user aliases of the other party, and the convenience of user communication in the broadband and narrowband converged communication system is improved.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to an information processing method, an information processing apparatus, an electronic device, and a storage medium.
Background
In a broadband-narrowband converged communication system (also referred to as a broadband-narrowband trunked communication system), broadband call communication can be performed by mixed grouping, but in the communication process, a broadband terminal can only obtain a user alias of the broadband terminal and cannot obtain a user alias of the narrowband terminal, and similarly, a narrowband terminal can only obtain a user alias of the narrowband terminal and cannot obtain a user alias of the broadband terminal, which brings inconvenience to user communication.
Disclosure of Invention
The application aims to provide an information processing method and device, electronic equipment and storage medium, and the information processing method and device comprise the following technical scheme:
an information processing method for a first terminal, the method comprising:
when voice data is required to be sent, acquiring an identification code and a user alias of the first terminal;
encapsulating the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
the at least one voice packet is sent, so that after the second terminal receives the at least one voice packet, the voice data can be analyzed from the at least one voice packet, the identification code and the user alias are output after the identification code passes verification, and the user alias is displayed;
The first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
In the above method, preferably, the identification code and at least part of the content of the user alias are both encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code in the voice packet has the same length as the bit allocated to at least part of the content of the user alias.
The above method, preferably, further comprises: encrypting the voice data to obtain encrypted voice data;
said encapsulating said voice data and said identification code and user alias into at least one voice packet comprises:
encapsulating the encrypted voice data, the encryption parameters, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code, the encryption parameter, and at least a portion of the encrypted voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias.
In the above method, preferably, the identification code, the encryption parameter and at least part of the content of the user alias are all encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code, the bit allocated to the encryption parameter, and the bit allocated to at least part of the content of the user alias have the same length.
Preferably, the method, wherein the encapsulating the voice data, the identification code and the user alias into at least one voice packet includes:
when the number of the voice data is larger than a first threshold value, packaging the voice data, the identification code and the user alias into a plurality of voice packets;
when the length of the user alias is greater than a second threshold value, each voice packet is packaged with the identification code, part of the content of the user alias and part of the data of the voice data;
and when the length of the user alias is smaller than or equal to the second threshold value, each voice packet is encapsulated with the identification code and part of the voice data, and at least part of the voice packets are encapsulated with the user alias.
An information processing method for a second terminal, the method comprising:
receiving at least one voice packet sent by a first terminal; wherein each voice packet encapsulates an identification code of the first terminal and at least part of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
analyzing each voice packet to obtain the voice data, and identifying codes and user aliases of the first terminal;
and outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
An information processing apparatus for a first terminal, the apparatus comprising:
the acquisition module is used for acquiring the identification code and the user alias of the first terminal when the voice data are required to be transmitted;
the packaging module is used for packaging the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
The sending module is used for sending the voice packet so that the second terminal can analyze the voice data from the at least one voice packet after receiving the at least one voice packet, the identification code and the user alias output the voice data after passing the verification based on the identification code, and the user alias is displayed;
the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
An information processing apparatus for a first terminal, the apparatus comprising:
the receiving module is used for receiving at least one voice packet sent by the first terminal; wherein each voice packet encapsulates an identification code of the first terminal and at least part of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
the analysis module is used for respectively analyzing each voice packet to obtain the voice data, and the identification code and the user alias of the first terminal;
And the output module is used for outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
An electronic device, comprising:
a memory for storing a program;
a processor for calling and executing the program in the memory, and implementing the respective steps of the information processing method according to any one of the above by executing the program.
A readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the information processing method according to any of the preceding claims.
According to the information processing method, the information processing device, the electronic equipment and the storage medium, under the condition that a first terminal and a second terminal belonging to different networks in a broadband-narrowband converged communication system communicate, the first terminal acquires an identification code and a user alias of the first terminal when voice data are required to be sent; encapsulating the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates an identification code and at least a portion of the voice data; at least part of voice package is encapsulated with at least part of content of user alias; and transmitting the at least one voice packet, so that after the second terminal receives the at least one voice packet, voice data, an identification code and a user alias can be analyzed from the at least one voice packet, and after the identification code passes verification, the voice data is output to display the user alias. Based on the application, two terminals in different networks can obtain and display the user aliases of the other party, and the convenience of user communication in the broadband and narrowband converged communication system is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a broadband convergence communication system according to an embodiment of the present application;
FIG. 2 is a flowchart of an implementation of an information processing method according to an embodiment of the present application;
FIG. 3 is a flowchart of another implementation of the information processing method according to the embodiment of the present application;
FIG. 4 is a schematic diagram of an information processing apparatus according to an embodiment of the present application;
FIG. 5 is a schematic diagram of another configuration of an information processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in other sequences than those illustrated herein.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without any inventive effort, are intended to be within the scope of the application.
As shown in fig. 1, an architecture diagram of a broadband/narrowband converged communication system according to an embodiment of the present application includes: broadband systems (i.e., broadband networks), narrowband systems (i.e., narrowband networks), terminals attributed to broadband systems (abbreviated broadband terminals), and terminals attributed to narrowband systems (abbreviated narrowband terminals).
As an example, the broadband system may be any one of an LTE trunked network, a 3G network, a 4G network, a 5G network, etc., and the narrowband system may be any one of a police digital trunked (Police Digital Trunking, PDT) system, a digital mobile radio (Digital Mobile Radio, DMR) system. The broadband system and the narrowband system communicate through an interconnection gateway.
By way of example, the broadband terminal may be a PoC (Push-to-Talk over Cellular) terminal (i.e., a handset integrated with a handset-to-talk POC service, such as PNC360/370/380, etc.), or a dual mode terminal; the narrowband terminal may be an intercom (e.g., PDT intercom, DMR intercom, etc.) or a dual mode terminal. The broadband terminal can only access the broadband system, the narrowband terminal can only access the narrowband system, and the dual-mode terminal can access the broadband system and the narrowband system.
The command and dispatch system is used for carrying out voice communication with the broadband terminal and the narrowband terminal so that a dispatcher can dispatch the users of the broadband terminal and the narrowband terminal through the command and dispatch system.
Based on the wide-narrow band convergence communication system, voice communication can be performed between the wide-band terminal and the narrow-band terminal.
As shown in fig. 2, a flowchart for implementing an information processing method according to an embodiment of the present application may include:
step S201: when the first terminal needs to send voice data, the identification code and the user alias of the first terminal are acquired.
The first terminal may be a broadband terminal or a narrowband terminal. The voice data to be transmitted by the first terminal may be voice data of a user of the first terminal collected by the first terminal.
The identification code of the first terminal may be a number for uniquely identifying the first terminal. As an example, when the first terminal is a broadband terminal, the identification code of the first terminal may be a phone number, and when the first terminal is a narrowband terminal, the identification code of the first terminal may be a device ID carried by the first terminal device when shipped.
The user alias is used by the user of the other terminal in communication with the first terminal to quickly identify who the user of the first terminal is. For example, the user alias may be: XX office of XX district XX of XX city.
The user alias of the first terminal may be configured by the user of the first terminal in advance and stored in the first terminal, for example, when the first terminal is a broadband terminal (such as a mobile phone), an interaction function with the user is generally provided, and at this time, the user alias may be configured by the user.
The user alias of the first terminal may be previously embedded into the first terminal by a technician through a server, for example, when the first terminal is a narrowband terminal (such as an interphone), the first terminal generally does not have a user configuration function, and at this time, the technician may embed the alias of the user of the first terminal into the first terminal at the server side.
Step S202: the first terminal encapsulates the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates an identification code and at least a portion of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias.
In the embodiment of the present application, when the first terminal and other terminals perform voice communication, voice data needs to be encapsulated into a voice packet, for example, an RTP (Real-time-time Transport Protocol) voice packet, and in the embodiment of the present application, besides the encapsulated voice data, the voice packet encapsulates an identification code and a user alias of the first terminal.
Since the amount of voice data that one voice packet can carry is limited, only one voice packet is required when the amount of voice data to be transmitted is small, and when the amount of voice data to be transmitted is large, the voice data needs to be transmitted through a plurality of (two or more) voice packets.
Each voice packet is encapsulated with the identification code of the first terminal and part of voice data, and different voice data are encapsulated in different voice packets. While the user aliases may be encapsulated in each voice packet or only in a portion of the voice packets.
Optionally, in the voice packet encapsulated with the user alias, each voice packet may encapsulate the complete user alias, or may encapsulate only a part of the user alias, for example, in the case that the user alias is relatively short, each voice packet may encapsulate the complete user alias, and in the case that the user alias is relatively long, the user alias may be divided into a plurality of parts, where each part is encapsulated in a different voice packet.
Alternatively, the identification code encapsulated into the voice packet may be an encrypted identification code or a signed identification code. When the user alias is divided into parts and encapsulated in different voice packets, the encrypted identification code or signed identification code may be divided into parts and encapsulated in different voice packets.
Step S203: the first terminal sends the at least one voice packet, so that after the second terminal receives the at least one voice packet, voice data, an identification code and a user alias can be parsed (also called decoded) from the at least one voice packet, and after the identification code passes verification, the voice data is output to display the user alias.
The second terminal and the first terminal belong to different networks, for example, if the first terminal belongs to a broadband network, the second terminal belongs to a narrowband network; alternatively, if the first terminal is affiliated to a narrowband network, the second terminal is affiliated to a broadband network.
After the second terminal receives the at least one voice packet, voice data, an identification code and a user alias are analyzed from the at least one voice packet, then the identification code is checked, and after the verification is passed, the voice data is output and the user alias is displayed.
Based on the application, the user aliases are packaged into the voice packet, so that two terminals in different networks can obtain and display the user aliases of the other party, and the convenience of user communication in the broadband and narrowband converged communication system is improved.
A voice packet typically comprises three parts: standard frame header, frame extension header and payload data portion. In the application, the identification code and the user alias of the first terminal are both encapsulated in the frame extension header of the voice packet, and the voice data is encapsulated in the payload data part. Wherein, in the case that at least part of the content of the user alias is encapsulated in the voice packet, the bit allocated to the identification code and the bit allocated to at least part of the content of the user alias have the same length.
Assuming that the length of bits allocated for the identification code in the voice packet is N, then,
if the length of the bit occupied by the user alias is less than or equal to N, the complete user alias may be encapsulated in the voice packet.
If the bit length occupied by the user alias is greater than N, the complete user alias may be split into multiple parts of content, each part of content being packaged into a different voice package. Alternatively, each portion of the content of the user alias may have a length N or less (e.g., after at least one portion of the content having a length N is truncated from the user alias by a length N, the length of the last remaining portion of the content may be less than N or may be equal to N).
In the embodiment of the present application, in order to facilitate decoding by the second terminal, the proportion of bits allocated to the identification code and the user alias in the voice packet is 1:1.
in some scenarios, in order to ensure the security of voice data, the voice data needs to be encrypted, and based on this, the information processing method provided by the embodiment of the present application may further include: and encrypting the voice data to be transmitted to obtain encrypted voice data.
Accordingly, one implementation of the foregoing encapsulating the voice data, the identification code and the user alias into at least one voice packet may be:
Encapsulating the encrypted voice data, the encryption parameters, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates an identification code, encryption parameters, and at least a portion of the encrypted voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias. The encryption parameter refers to a parameter involved in encrypting voice data.
That is, in the case of encrypting voice data, an encryption parameter for encrypting voice data needs to be encapsulated in each voice packet, so that after the second terminal receives the voice packet, the encrypted voice data can be decrypted according to the encryption parameter carried in the voice packet.
Wherein, at least part of the content of the identification code, the encryption parameter and the user alias are packaged in the frame extension head of the voice packet;
in order to facilitate the decoding of the second terminal, the bits allocated to the identification code, the bits allocated to the encryption parameter, and the bits allocated to at least part of the content of the user alias in the voice packet have the same length. That is, the proportion of bits allocated to the identification code, encryption parameter, and user alias in the voice packet is 1:1:1. in the case where only the identification code and the encryption parameter are present in the voice packet, the proportion of bits allocated to the identification code and the encryption parameter in the voice packet is 1:1.
Similarly, assuming that the length of the bits allocated for the identification code in the voice packet is N, then,
if the length of the bit occupied by the user alias is less than or equal to N, the complete user alias may be encapsulated in the voice packet.
If the bit length occupied by the user alias is greater than N, the complete user alias may be split into multiple parts of content, each part of content being packaged into a different voice package.
In an alternative embodiment, in the case that at least part of the content of the user alias is encapsulated in the voice packet, the frame extension header of the voice packet may further include the length of the user alias, that is, the length of the complete user alias, so that the second terminal may obtain the complete user alias.
In an alternative embodiment, one implementation of the foregoing encapsulating the voice data, the identification code and the user alias into at least one voice packet may be:
when the number of voice data is greater than the first threshold, the voice data is encapsulated into a plurality of voice packets along with the identification code and the user alias. Wherein the first threshold may be a length of bits allocated for voice data in the voice packet.
When the length of the user alias is greater than the second threshold, each voice packet encapsulates the identification code, a portion of the content of the user alias, and a portion of the voice data. That is, if the length of the user alias is relatively long, the user alias is transmitted through consecutive voice packets, and each voice packet encapsulates a portion of the content of the user alias. The second threshold may be a length of bits in the voice packet allocated for the user alias.
When the length of the user alias is less than or equal to the second threshold, each voice packet encapsulates the identification code and part of the voice data, and each voice packet in the part of the voice packets encapsulates the user alias (i.e., the complete user alias). That is, if the length of the user alias is relatively short, the user alias may be encapsulated by a partial voice packet, and the entire user alias is encapsulated in the voice packet. As an example, the user aliases may be encapsulated by alternate voice packets, such as voice packet user aliases numbered singular, or voice packet user aliases numbered even.
Optionally, when the length of the user alias is less than or equal to the second threshold, each voice packet may be encapsulated with the identification code, the complete user alias, and part of the voice data.
The process of information processing by the first terminal is described above, and the process of information processing by the second terminal is described below, as shown in fig. 3, which is another implementation flowchart of the information processing method provided by the embodiment of the present application, may include:
step S301: the second terminal receives at least one voice packet sent by the first terminal; wherein each voice packet is encapsulated with an identification code of the first terminal and at least part of data of voice data; at least part of the voice packet is also encapsulated with at least part of the content of the user alias of the first terminal; the first terminal is attributed to the broadband network, and the second terminal is attributed to the narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
The process of encapsulating voice data into voice packets by the first terminal is referred to the previous embodiments and will not be described in detail here.
Step S302: and the second terminal analyzes each voice packet to obtain the voice data, and the identification code and the user alias of the first terminal.
That is, the second terminal decodes each voice packet to obtain the voice data, the identification code of the first terminal and the user alias. Under the condition that a plurality of voice packets are received, voice data obtained by decoding from each voice packet can be spliced to obtain complete voice data, and under the condition that at least two voice packets carry part of the content of the user alias, part of the content of the user alias obtained by decoding from at least two voice packets can be spliced to obtain complete user alias.
Step S303: and the second terminal outputs voice data and displays the user alias after the verification based on the identification code is passed.
The second terminal checks the identification code obtained by analysis to judge whether the identification code is a valid identification code, for example, if the identification code is an encrypted identification code, a preset decryption algorithm can be utilized to decrypt the identification code to judge whether the decryption is successful, if the decryption is successful, the identification code is valid, otherwise, the identification code is invalid. For another example, the identification code is a signed identification code, the signature of the identification code can be calculated, the calculated signature and the analyzed signature are compared, if the calculated signature and the analyzed signature are the same, the identification code is effective, otherwise, the identification code is ineffective.
According to the information processing method provided by the embodiment of the application, when the first terminal sends voice data, the user alias is packaged into the voice packet, so that the second terminal can analyze the user alias from the voice packet and display the user alias, two terminals in different networks can obtain the user alias of the other party and display the user alias, and the convenience of user communication in the broadband-narrowband converged communication system is improved.
Optionally, at least part of the voice data encapsulated in each voice packet is at least part of the encrypted voice data; correspondingly, each voice packet is also encapsulated with encryption parameters. Based on the above, the second terminal analyzes each voice packet to obtain the above encrypted voice data, the encryption parameter, the identification code of the first terminal and the user alias. At this time, the second terminal may decrypt the encrypted voice data based on the encryption parameter, and then output the decrypted voice data after verification based on the identification code, displaying the user alias.
Corresponding to the method embodiment, the embodiment of the application also provides an information processing device, and a schematic structural diagram of the information processing device provided by the embodiment of the application is shown in fig. 4, which may include:
An acquisition module 401, an encapsulation module 402 and a transmission module 403; wherein,
the obtaining module 401 is configured to obtain an identification code and a user alias of the first terminal when voice data needs to be sent;
the encapsulation module 402 is configured to encapsulate the voice data and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
the sending module 403 is configured to send the one voice packet, so that after the second terminal receives the at least one voice packet, the voice data may be parsed from the at least one voice packet, the identification code and the user alias, after the identification code passes verification, the voice data is output, and the user alias is displayed;
the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
According to the information processing device provided by the embodiment of the application, the user aliases are packaged into the voice packet, so that two terminals in different networks can obtain and display the user aliases of the other party, and the convenience of user communication in the broadband and narrowband converged communication system is improved.
In an alternative embodiment, the identification code and at least part of the content of the user alias are both encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code in the voice packet has the same length as the bit allocated to at least part of the content of the user alias.
In an alternative embodiment, the method further comprises:
the encryption module is used for encrypting the voice data to obtain encrypted voice data;
the encapsulation module 402 is configured to:
encapsulating the encrypted voice data, the encryption parameters, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code, the encryption parameter, and at least a portion of the encrypted voice data; each of the at least partial voice packets also encapsulates at least a portion of the content of the user alias.
In an alternative embodiment, the identification code, the encryption parameter and at least part of the content of the user alias are encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code, the bit allocated to the encryption parameter, and the bit allocated to at least part of the content of the user alias have the same length.
In an alternative embodiment, the encapsulation module 402 is configured to:
when the number of the voice data is larger than a first threshold value, packaging the voice data, the identification code and the user alias into a plurality of voice packets;
when the length of the user alias is greater than a second threshold value, each voice packet is packaged with the identification code, part of the content of the user alias and part of the data of the voice data;
and when the length of the user alias is smaller than or equal to the second threshold value, each voice packet is encapsulated with the identification code and part of the voice data, and at least part of the voice packets are encapsulated with the user alias.
Corresponding to the method embodiment, the embodiment of the present application further provides an information processing apparatus, and another schematic structural diagram of the information processing apparatus provided in the embodiment of the present application is shown in fig. 5, which may include:
a receiving module 501, a parsing module 502 and an outputting module 503; wherein,
the receiving module 501 is configured to receive at least one voice packet sent by a first terminal; wherein each voice packet encapsulates an identification code of the first terminal and at least part of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
The parsing module 502 is configured to parse each voice packet to obtain the voice data, and the identification code and the user alias of the first terminal;
the output module 503 is configured to output the voice data and display the user alias after the verification based on the identification code passes.
After the voice packet is received, the information processing device provided by the embodiment of the application can analyze the user alias of the transmitting end from the voice packet and display the user alias, so that two terminals in different networks can obtain the user alias of the other party and display the user alias, and the convenience of user communication in the broadband and narrowband converged communication system is improved.
Corresponding to the method embodiment, the application further provides an electronic device, and a schematic structural diagram of the electronic device is shown in fig. 6, which may include: at least one processor 1, at least one communication interface 2, at least one memory 3 and at least one communication bus 4.
In the embodiment of the present application, the number of the processor 1, the communication interface 2, the memory 3 and the communication bus 4 is at least one, and the processor 1, the communication interface 2 and the memory 3 complete communication with each other through the communication bus 4.
The processor 1 may be a central processing unit CPU, or a specific integrated circuit ASIC (Application Specific Integrated Circuit), or one or more integrated circuits configured to implement embodiments of the present application, etc.
The memory 3 may comprise a high-speed RAM memory, and may also comprise a non-volatile memory (non-volatile memory) or the like, such as at least one disk memory.
Wherein the memory 3 stores a program, the processor 1 may call the program stored in the memory 3, the program being for:
when voice data is required to be sent, acquiring an identification code and a user alias of the first terminal;
encapsulating the voice data and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
the at least one voice packet is sent, so that after the second terminal receives the at least one voice packet, the voice data can be analyzed from the at least one voice packet, the identification code and the user alias are output after the identification code passes verification, and the user alias is displayed;
the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
Or,
the program is for:
receiving at least one voice packet sent by a first terminal; wherein each voice packet encapsulates an identification code of the first terminal and at least part of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
analyzing each voice packet to obtain the voice data, and identifying codes and user aliases of the first terminal;
and outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
Alternatively, the refinement function and the extension function of the program may be described with reference to the above.
The embodiment of the present application also provides a storage medium storing a program adapted to be executed by a processor, the program being configured to:
when voice data is required to be sent, acquiring an identification code and a user alias of the first terminal;
encapsulating the voice data and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
The at least one voice packet is sent, so that after the second terminal receives the at least one voice packet, the voice data is analyzed from the at least one voice packet, the identification code and the user alias are output after the identification code passes verification, and the user alias is displayed;
the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
Or,
the program is for:
receiving at least one voice packet sent by a first terminal; wherein each voice packet encapsulates an identification code of the first terminal and at least part of the voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
analyzing each voice packet to obtain the voice data, and identifying codes and user aliases of the first terminal;
And outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
Alternatively, the refinement function and the extension function of the program may be described with reference to the above.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
It should be understood that in the embodiments of the present application, the claims, the various embodiments, and the features may be combined with each other, so as to solve the foregoing technical problems.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. An information processing method for a first terminal, the method comprising:
when voice data is required to be sent, acquiring an identification code of the first terminal and a user alias, wherein the identification code of the first terminal comprises a number for uniquely identifying the first terminal, and the user alias is used for enabling a user of the second terminal to identify the user of the first terminal;
encapsulating the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
The at least one voice packet is sent, so that after the second terminal receives the at least one voice packet, the voice data can be analyzed from the at least one voice packet, the identification code and the user alias are output after the identification code passes verification, and the user alias is displayed;
the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
2. The method of claim 1, wherein the identification code and at least a portion of the content of the user alias are both encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code in the voice packet has the same length as the bit allocated to at least part of the content of the user alias.
3. The method as recited in claim 1, further comprising: encrypting the voice data to obtain encrypted voice data;
said encapsulating said voice data and said identification code and user alias into at least one voice packet comprises:
Encapsulating the encrypted voice data, the encryption parameters, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code, the encryption parameter, and at least a portion of the encrypted voice data; at least part of the voice packet also encapsulates at least part of the content of the user alias.
4. A method according to claim 3, wherein the identification code, the encryption parameter and at least part of the content of the user alias are encapsulated in a frame extension header of the voice packet;
in the case where at least part of the content of the user alias is encapsulated in a voice packet, the bit allocated to the identification code, the bit allocated to the encryption parameter, and the bit allocated to at least part of the content of the user alias have the same length.
5. The method of any of claims 1-4, wherein said encapsulating the voice data and the identification code and user alias into at least one voice packet comprises:
when the number of the voice data is larger than a first threshold value, packaging the voice data, the identification code and the user alias into a plurality of voice packets;
When the length of the user alias is greater than a second threshold value, each voice packet is packaged with the identification code, part of the content of the user alias and part of the data of the voice data;
and when the length of the user alias is smaller than or equal to the second threshold value, each voice packet is encapsulated with the identification code and part of the voice data, and at least part of the voice packets are encapsulated with the user alias.
6. An information processing method for a second terminal, the method comprising:
receiving at least one voice packet sent by a first terminal; each voice packet is packaged with an identification code of the first terminal and at least part of data of voice data, and the identification code of the first terminal comprises a number uniquely identifying the first terminal; at least part of the voice packet also encapsulates at least part of content of a user alias of the first terminal, the user alias being used to enable a user of the second terminal to identify the user of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
Analyzing each voice packet to obtain the voice data, and identifying codes and user aliases of the first terminal;
and outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
7. An information processing apparatus for a first terminal, the apparatus comprising:
the system comprises an acquisition module, a first terminal and a second terminal, wherein the acquisition module is used for acquiring an identification code and a user alias of the first terminal when voice data are required to be transmitted, the identification code of the first terminal comprises a number for uniquely identifying the first terminal, and the user alias is used for enabling a user of the second terminal to identify the user of the first terminal;
the packaging module is used for packaging the voice data, the identification code and the user alias into at least one voice packet; wherein each voice packet encapsulates the identification code and at least a portion of the voice data; at least part of voice package is also packaged with at least part of content of the user alias;
the sending module is used for sending the voice packet so that the second terminal can analyze the voice data from the at least one voice packet after receiving the at least one voice packet, the identification code and the user alias output the voice data and display the user alias after the identification code passes verification;
The first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; alternatively, the first terminal is assigned to a narrowband network and the second terminal is assigned to a broadband network.
8. An information processing apparatus for a second terminal, the apparatus comprising:
the receiving module is used for receiving at least one voice packet sent by the first terminal; each voice packet is packaged with an identification code of the first terminal and at least part of data of voice data, and the identification code of the first terminal comprises a number uniquely identifying the first terminal; at least part of the voice packet also encapsulates at least part of content of a user alias of the first terminal, the user alias being used to enable a user of the second terminal to identify the user of the first terminal; the first terminal belongs to a broadband network, and the second terminal belongs to a narrowband network; or the first terminal is attributed to a narrowband network, and the second terminal is attributed to a broadband network;
the analysis module is used for respectively analyzing each voice packet to obtain the voice data, and the identification code and the user alias of the first terminal;
and the output module is used for outputting the voice data and displaying the user alias after the verification based on the identification code is passed.
9. An electronic device, comprising:
a memory for storing a program;
a processor for calling and executing the program in the memory, the respective steps of the information processing method according to any one of claims 1 to 6 being realized by executing the program.
10. A readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the information processing method according to any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111604814.2A CN114500167B (en) | 2021-12-24 | 2021-12-24 | Information processing method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111604814.2A CN114500167B (en) | 2021-12-24 | 2021-12-24 | Information processing method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114500167A CN114500167A (en) | 2022-05-13 |
CN114500167B true CN114500167B (en) | 2023-11-24 |
Family
ID=81496595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111604814.2A Active CN114500167B (en) | 2021-12-24 | 2021-12-24 | Information processing method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114500167B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6731625B1 (en) * | 1997-02-10 | 2004-05-04 | Mci Communications Corporation | System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony |
CN105141611A (en) * | 2015-08-31 | 2015-12-09 | 努比亚技术有限公司 | Remote call control device and method |
CN106534602A (en) * | 2016-11-23 | 2017-03-22 | 努比亚技术有限公司 | Terminal and information processing method |
CN107566671A (en) * | 2017-10-12 | 2018-01-09 | 携程旅游信息技术(上海)有限公司 | Network voice communication method and its system, storage medium, electronic equipment |
CN107911361A (en) * | 2017-11-14 | 2018-04-13 | 网易(杭州)网络有限公司 | Support voice management method, apparatus, terminal device and the storage medium of more sessions |
CN108199950A (en) * | 2017-12-29 | 2018-06-22 | 海能达通信股份有限公司 | Speech communication and system, wide and narrow strip convergent terminal |
CN109672610A (en) * | 2018-12-26 | 2019-04-23 | 深圳市自然门科技有限公司 | A kind of multigroup group speech real time communication method and system |
CN109729552A (en) * | 2017-10-27 | 2019-05-07 | 成都鼎桥通信技术有限公司 | Voice transmission method and device |
CN110290538A (en) * | 2019-07-19 | 2019-09-27 | 中国铁道科学研究院集团有限公司通信信号研究所 | Integrated Bearing System of Railway Station Based on LTE+DMR Broadband and Narrowband Convergence Technology |
CN112104589A (en) * | 2019-06-18 | 2020-12-18 | 成都鼎桥通信技术有限公司 | End-to-end encryption method with width integration |
CN112118573A (en) * | 2019-06-21 | 2020-12-22 | 普天信息技术有限公司 | Voice encryption communication method and device between different systems of wide-band and narrow-band clusters |
CN112770269A (en) * | 2019-11-05 | 2021-05-07 | 海能达通信股份有限公司 | Voice communication method and system under wide-band and narrow-band intercommunication environment |
CN113438609A (en) * | 2021-08-27 | 2021-09-24 | 深圳市晨讯物联科技有限公司 | Method, system, device and storage medium for scheduling communication with integration of width and width |
CN113630732A (en) * | 2020-05-07 | 2021-11-09 | 海能达通信股份有限公司 | Converged communication method, terminal, system and storage medium |
-
2021
- 2021-12-24 CN CN202111604814.2A patent/CN114500167B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6731625B1 (en) * | 1997-02-10 | 2004-05-04 | Mci Communications Corporation | System, method and article of manufacture for a call back architecture in a hybrid network with support for internet telephony |
CN105141611A (en) * | 2015-08-31 | 2015-12-09 | 努比亚技术有限公司 | Remote call control device and method |
CN106534602A (en) * | 2016-11-23 | 2017-03-22 | 努比亚技术有限公司 | Terminal and information processing method |
CN107566671A (en) * | 2017-10-12 | 2018-01-09 | 携程旅游信息技术(上海)有限公司 | Network voice communication method and its system, storage medium, electronic equipment |
CN109729552A (en) * | 2017-10-27 | 2019-05-07 | 成都鼎桥通信技术有限公司 | Voice transmission method and device |
CN107911361A (en) * | 2017-11-14 | 2018-04-13 | 网易(杭州)网络有限公司 | Support voice management method, apparatus, terminal device and the storage medium of more sessions |
CN108199950A (en) * | 2017-12-29 | 2018-06-22 | 海能达通信股份有限公司 | Speech communication and system, wide and narrow strip convergent terminal |
CN109672610A (en) * | 2018-12-26 | 2019-04-23 | 深圳市自然门科技有限公司 | A kind of multigroup group speech real time communication method and system |
CN112104589A (en) * | 2019-06-18 | 2020-12-18 | 成都鼎桥通信技术有限公司 | End-to-end encryption method with width integration |
CN112118573A (en) * | 2019-06-21 | 2020-12-22 | 普天信息技术有限公司 | Voice encryption communication method and device between different systems of wide-band and narrow-band clusters |
CN110290538A (en) * | 2019-07-19 | 2019-09-27 | 中国铁道科学研究院集团有限公司通信信号研究所 | Integrated Bearing System of Railway Station Based on LTE+DMR Broadband and Narrowband Convergence Technology |
CN112770269A (en) * | 2019-11-05 | 2021-05-07 | 海能达通信股份有限公司 | Voice communication method and system under wide-band and narrow-band intercommunication environment |
CN113630732A (en) * | 2020-05-07 | 2021-11-09 | 海能达通信股份有限公司 | Converged communication method, terminal, system and storage medium |
CN113438609A (en) * | 2021-08-27 | 2021-09-24 | 深圳市晨讯物联科技有限公司 | Method, system, device and storage medium for scheduling communication with integration of width and width |
Non-Patent Citations (3)
Title |
---|
"Narrowband_ISDN_and_broadband_ISDN_service_and_network_interworking";Bernhard Petri;《IEEE》;全文 * |
"窄带无线自组网在应急语音通信中的实战性应用研究";李溯;《通信电源技术》;全文 * |
集群通信任务关键语音业务的技术方案分析;徐元圣;刘超;苗雨;张文健;管鲍;胡军;;警察技术(第03期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114500167A (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101562813B (en) | Method for implementing real-time data service, real-time data service system and mobile terminal | |
CN108377495B (en) | A data transmission method, related equipment and system | |
CN104144086B (en) | Communication means and system and information transmission and receiving device | |
CN104703176B (en) | Configuration method of wireless network, intelligent terminal and wireless network equipment | |
CN104333455A (en) | Secrete communication system and method for smart phone | |
CN105119900B (en) | Information security transmission method, networking access method and corresponding terminal | |
CN103327030A (en) | Method for information transmission by utilizing Wi-Fi (Wireless-Fidelity) message length | |
EP3089504A1 (en) | Method and device for sending and receiving radio parameter | |
CN107294913A (en) | Safety communicating method, service end and client based on HTTP | |
CN113438633B (en) | Communication data processing method, terminal and computer readable storage medium | |
US20080120728A1 (en) | Method and apparatus for performing integrity protection in a wireless communications system | |
CN105992203A (en) | Speech communication encryption key negotiation method and system based on same | |
CN110650476B (en) | Management frame encryption and decryption | |
CN108966217B (en) | Secret communication method, mobile terminal and secret gateway | |
CN105764050B (en) | The method and apparatus that terminal sends data to net external equipment out of WLAN | |
CN114500167B (en) | Information processing method and device, electronic equipment and storage medium | |
EP2887613A1 (en) | Method and apparatus for performing secure voice call | |
KR20080046128A (en) | Method and device for integrity protection of wireless communication system | |
CN112714009B (en) | Network distribution method, network equipment to be distributed and network equipment | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN108848127A (en) | Data transmission method, device, computer equipment and computer readable storage medium | |
WO2016119624A1 (en) | Data transmission method and apparatus thereof | |
EP1926275A1 (en) | Method for data communication between user end devices | |
CN106060801B (en) | Data communication method, device and system based on Wi-Fi device | |
CN115988453A (en) | Data receiving and transmitting system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |