How to encrypt a voice input using a symmetric key to be sent in a network?

Hi all, i have retrieve voice input through a micro phone and stored it as byte packet used "*conman sound class*" to be sent on a network. The problem is that, "HOW TO ENCRYPT AND DECRYPT THIS *BYTE* OF DATA USING A SYMMETRIC KEY ALGORITHM". It will be helpful if related code is posted.
with regards
Marshall

If you are calling the BDC in a program, create a job to run the program and specify the user you want each program to run under.

Similar Messages

  • General question: How to execute a batch input using different user name?

    Hi everyone,
    I would be very grateful if someone could tell me how to execute a batch input from source code using a differente username so the batch input is executed with different permissions.
    For example, I log on with:
    Username: A
    , but I'd like to execute a batch input using the rights and permissions of user B.
    Thanks in advance and best regards.
    Ben.

    If you are calling the BDC in a program, create a job to run the program and specify the user you want each program to run under.

  • How do you navigate dialogue boxes using the tab key in Photoshop CS6 on Mac OS X Mavericks?

    I know that seems really 101 and obvious, but I worked in Photoshop on a PC for many years, and using the tab key to navigate through every field/radial button/dropdown menu/etc. was never an issue. On the Mac OS X however, it only navigates through certain fields within a dialogue box. And before the guaranteed suggestion to change my Mac OS X Keyboard preferences to allow full keyboard access to "All Controls" instead of "Text Boxes and Lists Only", I have already tried this setting which did not resolve my issue.
    Does/has anyone out there worked between both platforms and had this issue as well? I'm a Mac guy through and through, but I must say, this is the one thing that I think PC has a slight edge on. It's incredibly frustrating to have my keyboard workflow interrupted because I can't simply tab over to a certain field that is in a dialogue box which I'm currently working in...
    Here are my details:
    Photoshop CS6 (13.0.6)
    Mac OS X Mavericks (10.9.1)
    Applies to all filetypes as the issue is regarding dialogue boxes and not files themselves.
    No error message.
    Normal use.
    It works on PC, but not on Mac.
    2.3 GHz Intel Core i7 Processor
    8 GB of memory
    719 GB of space available on my main HD
    This has never worked in any version of Photoshop I have used on any version of Mac OS X, but has worked consistently on every version of Photoshop that I have used on every version of Windows I've used (up to Windows 7)
    I hope this provides enough information to get the ball rolling on this. I fear that there is no answer that will resolve the issue, but before I throw in the towel, I figured it was worth trying this forum since my web searches have turned up absolutely nothing of help.
    Thanks in advance for your time and help.
    Best,
    Tim

    Thanks for your input.  Since Safe Mac's Adware Removal tool has done a very good job of cleaning out the junk and
    letting me run better, I'm happy for now.
    However, I appreciate your judgement and I am working on evaluating Safari vs FireFox vs Chrome.  I've had some trouble using FireFox with
    LastPass which works very well under Chrome.  But that is only one data point.  Most of my Ram troub;e os related to the number of windows
    and tabs I open.  I've tried comparing the three browsers for how back each reacts.
    I multiply windows and tabs because as I surf the web, I discover things I want and don't want to lose them.  However, I need a tool more useful
    and structured than bookmarks to be able to record things of interest to make them easy to return to and find later.

  • How can I stop iTunes from using my multimedia keys on my keyboard?

    I use the multimedia keys on my keyboard for WinAmp, which is my primary music player.  When iTunes is open it hijacks every one of them.  WinAmp has options to enable and disable the use of global hotkeys and multimedia keys.  iTunes does not seem to.  Is there really no way to get iTunes to stop taking control of my keys?  I am using Windows 7 Home Premium 64 bit, for the record.

    Yep.  Don't manually manage.

  • HT1338 how do i get voice over say the last key pressed.

    A friend is blind.    He can hear e-mail but it would begood if he could hear the keyboard keys pressed.    Will voice over say the last key pressed.

    Hi David_MadjBright,
    Sorry for the delay in getting back to you. If you haven’t already got this sorted I’ll be happy to help. Drop me an email with the details. You’ll get the ‘contact us’ link in my profile.
    Cheers
    David
    BTCare Community Mod
    If we have asked you to email us with your details, please make sure you are logged in to the forum, otherwise you will not be able to see our ‘Contact Us’ link within our profiles.
    We are sorry but we are unable to deal with service/account queries via the private message(PM) function so please don't PM your account info, we need to deal with this via our email account :-)

  • How do I sample a frequency or voice input using labview in real time?

    This is my first time using labview to sample real-time!  I'm trying to setup a microphone, so that when a voice is spoken to the mic I can sample the frequency, and
    further customize the data in labview. The final goal is to amplify the frequency and output it to a speaker. If possible via labview. My question is do I need some type of evaluation board , microcontroller, to sample the frequencies and save the data sample to labview. Also, how would I go by doing this in real-time, or when the person is speaking to the mic the voice/frequency can be modified in labview instantenaeously. If someone can give me a step-by-step way of performing this, please let me know.
    I currently use Labview 8.2 and 8.5

    There are many LabVIEW shipping examples that are built to acquire sound samples from a microphone attached to a sound card.  There is also an example on how to play a sound file directly to speakers, that you should definitely take a look at.  These examples VIs are found in the Sound folder which is under Hardware Input and Output in the NI Example Finder.  Depending on how advanced your frequency analysis will be, you might want to look into purchasing the Sound and Vibration Toolkit.  For your specific application, it doesn't sound like you will need the LabVIEW Real-Time Module, you should be able to obtain very accurate results without it.  Please view the article linked below for more information on this toolkit.  Thanks!
    Sound and Vibration Toolkit for LabVIEW
    Meghan M.

  • How to encrypt file on linux using Gnupg command in Java Embedding in BPEL.

    Hi All,
    I am trying to invoke a command script using the java embedding in BPEL Process.I am using the below code to execute the particular command to encrypt the file :-
    try {    
            Runtime rt = Runtime.getRuntime();    
    Process pr = rt.exec(new String[] {"/bin/bash", "-c", "/u01/GnuPG/bin/gpg", "-e", "-r", "Developer","/u01/oracle/ConfigFiles/Adapter_controlDir/abc.csv"});    
             int exitVal = pr.waitFor();            
            String result = "SUCCESS: Process exit with " + exitVal;         
            addAuditTrailEntry("result = "+result);      
            setVariableData("outputVariable","payload","/client:processResponse/client:result",result);    
    } catch(Exception e) {    
            e.printStackTrace();      
      String result = "FAILURE: Exception with " + e.toString();    
            addAuditTrailEntry("result = "+result);      
            setVariableData("outputVariable","payload","/client:processResponse/client:result",result);    
    The above statement does nothing. I am not sure what command i need to use to access to the command line.
    When i try this particular statement from linux machine command prompt :- /u01/GnuPG/bin/gpg -e  -r  Developer /u01/oracle/ConfigFiles/Adapter_controlDir/abc.csv
    It works absolutely fine and it creates the encrypted files also.
    Please suggest , which command i need to use from the java embedding.
    Please suggest!!
    Regards,
    Shah

    I think, you can try, writing these commands into a separate shell script and call that shell script from bpel via Java embedding. However, you might not get a return response.. but you can still give a shot.
    Hope it helps.

  • How to encrypt excel file data using triple DES algorithm in oracle

    Hi,
    I would like to know the process or script to encrypt/decrypt the excel file data using triple DES algorithm in oracle.

    I'm not quite sure your requirement.... do you mean when uploading files to be stored in the database ?

  • How does one create a form using flash and have it be sent to an email address (using adobe air for android if that matters) ?

    I am trying to make an app for my Cab Company and was going to add a reservation form, however idk if you can add html code or how to make one with as3, and I haven't been able to find a decent tutorial anywhere online.

    You will need to find a tutorial for sending email via AS3 (normally requires a PHP or other server-side processing file).  Search Google using terms like "AS3 send email tutorial" and develop things from there.

  • Hi Freinds......How to Encrypt/Decrypt Text file in j2me

    Hello friendz.,,
    I m having problem with textfile exncryption decryption in j2me..
    Can abybode tell me how to encrypt/decrypt Text file using J2ME API's.......
    PLZ help me .......
    Thanx in advance
    regards,
    Parag

    http://www.mobilefish.com/developer/bouncycastle/bouncycastle.html
    http://www-128.ibm.com/developerworks/library/j-midpds.html

  • Error while encrypting the xml file using asymmetric cipher...pls help

    i am encryption the xml file using asymmetric cyper....
    in one class , i am generating private key and public key using "RSA" algorithm..using 1024 byte initialization...
    it is generating properly...
    and after that in second class i am encrypting the xml file using "DESede" algorithm and i am using public key of above class..
    but i am getting exceptione :
    java.security.InvalidKeyException: Invalid key length: 162 bytes
    at com.sun.crypto.provider.DESedeCipher.engineGetKeySize(DashoA6275)
    at javax.crypto.Cipher.init(DashoA6275)
    at XmlEncryption.getEncryptedData(XmlEncryption.java:147)
    at XmlEncryption.encryptCompleteXmlFile(XmlEncryption.java:123)
    at demoXmlEncApp.simulateBookSellersEnd(demoXmlEncApp.java:72)
    at demoXmlEncApp.main(demoXmlEncApp.java:29)
    so, what is that ?
    i want to use RSA algo for key generatiion and DESede for cipher initialization .
    is there any site for where source code of xml file encryption using asymmetric cipher is available?
    pls, help me.....

    Sachin,
    What sabre150 is trying to explain to you, is that encrypting data (such as an XML file) is a 2-step process. In the first step, you generate a symmetric key (such as DES, 3DES, AES) and encrypt your file with this key (and the appropriate mode and padding).
    In order to ensure that your encrypted data cannot be decrypted by unauthorized individuals, you now need to protect the symmetric key. Encrypting your symmetric key with another symmetric key does not solve the problem, since you have a chain of symmetric keys that need to be encrypted into infinity.
    Cryptographers solve this problem by encrypting the symmetric key with an asymmetric key, such as as RSA. To perform this second step, you generate an RSA key-pair, encrypt the symmetric key you generated in step 1 with the Public key of the RSA key-pair, and give the recipient of the encrypted XML file, access to the Private key of the RSA key-pair as well as the encrypted symmetric key.
    The recipient, then uses the RSA Private key to decrypt the symmetric key first, and then uses the "plaintext" symmetric key to decrypt the XML file.
    What sabre150 was also attempting to explain to you, is the traditional way of transporting an encrypted "blob" that consists of data + symmetric key. With a modern key-management system, combining the two would be unnecessary.

  • How I get started using voice input with mac mail?

    Just got a new Imac.  have had Apple computers for a long time.  Want to start using voice input with mail.  How do I get started?

    Apple's voice input options are the following:
    Dictation
    This allows you to speak a phrase and have the system enter it as text in any text field, be it a name and address form or a text editor like Pages or Word. The settings for this service are in the Dictation system preferences, and by default you activate it by pressing the Fn key twice in a row and then speak the desired phrase after you hear the bing sounds.
    Speakable Items
    This option allows you to somewhat control the Mac's interface elements by speaking key phrases to the system. This option is enabled in the Accessibility system preferences, and is at the bottom of the listed services. In here you can turn on the service and calibrate it to properly hear your voice, set a "listening key" (similar to the Fn key for Dictation), and then enable various command libraries.

  • How to encrypt with a string as input,but not a key object

    As far as I know,when encrypt or decrypt ,a key must first be got,and the key is first generate by a tool or from SecurityRandom,that means I can not generate the same key with the same input.Does there is a method which can generate a same with the same input string?
    There is a need to transfer file between to site,and the customer wish to encrypt these files during transfering,and they want to store a string into each database at each site,when sending and receiving files,get the string from the database to encrypt or decrypt the file,they alse want to have a control of the string,they can change the string randomly if they wish as long as long keep each string is equal,how to realize this?

    I think what you are looking for is a password based encryption (PBE). An example of using the same is mentioned in JCE reference guide. Below is the relevant code/docs from the rference guide.
    Using Password-Based Encryption
    In this example, we prompt the user for a password from which we derive an encryption key.
    It would seem logical to collect and store the password in an object of type java.lang.String. However, here's the caveat: Objects of type String are immutable, i.e., there are no methods defined that allow you to change (overwrite) or zero out the contents of a String after usage. This feature makes String objects unsuitable for storing security sensitive information such as user passwords. You should always collect and store security sensitive information in a char array instead.
    For that reason, the javax.crypto.spec.PBEKeySpec class takes (and returns) a password as a char array.
    The following method is an example of how to collect a user password as a char array:
         * Reads user password from given input stream.
        public char[] readPasswd(InputStream in) throws IOException {
            char[] lineBuffer;
            char[] buf;
            int i;
            buf = lineBuffer = new char[128];
            int room = buf.length;
            int offset = 0;
            int c;
    loop:   while (true) {
                switch (c = in.read()) {
                  case -1:
                  case '\n':
                    break loop;
                  case '\r':
                    int c2 = in.read();
                    if ((c2 != '\n') && (c2 != -1)) {
                        if (!(in instanceof PushbackInputStream)) {
                            in = new PushbackInputStream(in);
                        ((PushbackInputStream)in).unread(c2);
                    } else
                        break loop;
                  default:
                    if (--room < 0) {
                        buf = new char[offset + 128];
                        room = buf.length - offset - 1;
                        System.arraycopy(lineBuffer, 0, buf, 0, offset);
                        Arrays.fill(lineBuffer, ' ');
                        lineBuffer = buf;
                    buf[offset++] = (char) c;
                    break;
            if (offset == 0) {
                return null;
            char[] ret = new char[offset];
            System.arraycopy(buf, 0, ret, 0, offset);
            Arrays.fill(buf, ' ');
            return ret;
        }In order to use Password-Based Encryption (PBE) as defined in PKCS #5, we have to specify a salt and an iteration count. The same salt and iteration count that are used for encryption must be used for decryption:
        PBEKeySpec pbeKeySpec;
        PBEParameterSpec pbeParamSpec;
        SecretKeyFactory keyFac;
        // Salt
        byte[] salt = {
            (byte)0xc7, (byte)0x73, (byte)0x21, (byte)0x8c,
            (byte)0x7e, (byte)0xc8, (byte)0xee, (byte)0x99
        // Iteration count
        int count = 20;
        // Create PBE parameter set
        pbeParamSpec = new PBEParameterSpec(salt, count);
        // Prompt user for encryption password.
        // Collect user password as char array (using the
        // "readPasswd" method from above), and convert
        // it into a SecretKey object, using a PBE key
        // factory.
        System.out.print("Enter encryption password:  ");
        System.out.flush();
        pbeKeySpec = new PBEKeySpec(readPasswd(System.in));
        keyFac = SecretKeyFactory.getInstance("PBEWithMD5AndDES");
        SecretKey pbeKey = keyFac.generateSecret(pbeKeySpec);
        // Create PBE Cipher
        Cipher pbeCipher = Cipher.getInstance("PBEWithMD5AndDES");
        // Initialize PBE Cipher with key and parameters
        pbeCipher.init(Cipher.ENCRYPT_MODE, pbeKey, pbeParamSpec);
        // Our cleartext
        byte[] cleartext = "This is another example".getBytes();
        // Encrypt the cleartext
        byte[] ciphertext = pbeCipher.doFinal(cleartext);Hope this helps
    Sai Pullabhotla

  • How to create sine wave and step input using cwgraph in VB 6.0

    hello..
    i'm doing my master's project now. i'm stuck on how to create a sine wave and a step input using the cwgraph using VB 6.0. please help. thanks.

    hello..thank for the reply.
    i'm having problem with my coding using cwgraph. can anyone help. everytime i do the full compile, there's error.but it can still can run, but can't convert to application form.for your info, i'm using RTscope and cwgraph to plot graph.the error is in the cwgraph coding.below are part of the coding with error. and can somebody tell me how to add cwgraph component in the VB? i try adding component, but it's not in the list of component,and i've browse for it already too.i'm doing the software at home, but i'can run it at my lab cause cwgraph component is not listed.please help.
    Dim countTime As Integer, count1 As Integer, countFreq As Integer, countVolt As Integer
    Private Sub cmdRun_Click()
    If cmdRun.CausesValidation = True Then
    cmdPause.CausesValidation = False
    tmrOsc2.Enabled = True
    tmrOsc3.Enabled = True
    Else
    cmdPause.CausesValidation = False
    tmrOsc2.Enabled = False
    tmrOsc3.Enabled = False
    For count1 = 0 To 100
    Data1(count1) = 0
    Data2(count1) = 0
    RT1.Value(1, count1) = 0
    RT1.Value(2, count1) = 0
    RT1.Refresh
    CWGraph2.Plots(1).PlotY count1 ' THIS CODING HAS AN ERROR ...
    CWGraph2.Plots(2).PlotY count1 ' THIS CODING HAS AN ERROR ...
    Next count1
    End If
    End Sub

  • In iOS 5 on the iphone 3gs, how does one disable voice control, not voice dailing.  I have never wanted or used voice control please help me disable it.

    In iOS 5 on the iphone 3gs, how does one disable voice control, not voice dailing.  I have never wanted or used voice control please help me disable it. 

    are you talking about voiceover where the phone is reading things out loud to you? you have to double tap things in voiceover in order to select them. you'll need to go to settings > general > accessibility > and turn off voiceover there

Maybe you are looking for

  • Using web link to call the report by passing the parameter but report blank

    Hi, I have using web link to prompt to generate the report(Quotation Format) by passing SR number in Service Request object. The result return is blank report, the URL link that i put in as below :- https://secure-ausomxega.crmondemand.com/OnDemand/u

  • Is this the best way to Triple Boot?

    Hi all, I have a had a pickle of a time setting up Leopard...with my triple boot setup. I am curious if I went about it "properly"or if there is a better way. Use instructions at your own peril if you wish. I am not responsible for errors or any prob

  • Importing photos from photo stream

    Under iphoto, it used to be that photos would be pulled down from photo stream and an album for the month would be auto generated, housing all of the photos for that month that were imported from photo stream. Under the new photos app, I see the curr

  • .csv file in an outlook email attachment

    Hello, How can we accomplish following using SOA/BPEL without using Oracle Beehive or any other third paty tools. 1. Emails contain a .csv file with 5 columns. 2. There is a table in Oracle EBS database with 5 columns. 3. We need to have real time in

  • Outlook connector calendar problem

    Dear All I having problem with outlook connector, my users are able to see each others calendar from /uwc but they are not able to browse each other calendar from outlook, I have read something in regards of aci setting in ldap directory but I have n