CN105391677A - Information transmission method and mobile terminal - Google Patents

Information transmission method and mobile terminal Download PDF

Info

Publication number
CN105391677A
CN105391677A CN201410453959.0A CN201410453959A CN105391677A CN 105391677 A CN105391677 A CN 105391677A CN 201410453959 A CN201410453959 A CN 201410453959A CN 105391677 A CN105391677 A CN 105391677A
Authority
CN
China
Prior art keywords
enciphered message
information
sent
message
encryption identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410453959.0A
Other languages
Chinese (zh)
Inventor
杨帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410453959.0A priority Critical patent/CN105391677A/en
Publication of CN105391677A publication Critical patent/CN105391677A/en
Pending legal-status Critical Current

Links

Abstract

The invention proposes an information transmission method and a mobile terminal. During information transmission, the mobile terminal provided by the invention is used for transmitting and receiving a short message, thereby causing no leakage of the short message even if the short message is sent to other common mobile terminals. Because a transmitting end and a receiving end stores and transmits information in an encrypted manner, information decryption display for a user based on an encryption identification can be determined to be carried out only if the user needs to check the detail of the information, thereby guaranteeing the safety of information transmission. Moreover, even if the information data of the user in the mobile terminal is copied to other electronic equipment, such as a computer, the user does not need to worry about the leakage of the contents of data because other equipment does not have a decryption function corresponding to the mobile terminal.

Description

A kind of information transmitting methods and mobile terminal
Technical field
The present invention relates to information transmission technique field, particularly relate to a kind of information transmitting methods and mobile terminal.
Background technology
More and more carry out many smart phone users at present and information is sent to the demand having privacy, but existing take smart mobile phone as the mobile terminal of representative, all cannot meet user for information transmission privacy or the demand of fail safe, especially the occasion of sending bulk message is needed at work, when user is when selecting batch targeted customer, accidentally information is sent to non-targeted user, then can cause the leakage of important information; If the occasion of sending bulk message in life, then can cause the leakage of private information.
Therefore, how to improve user carries out information transmit-receive fail safe based on mobile terminal, become those skilled in the art's problem demanding prompt solution.
Summary of the invention
The technical problem to be solved in the present invention is, provides a kind of information transmitting methods and mobile terminal, improves user carries out information transmit-receive and storage fail safe based on mobile terminal.
The technical solution used in the present invention is, described information transmitting methods, is sending the flow process of side execution, comprising:
Be encrypted to sent the information content and obtain enciphered message, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
The described enciphered message sent is preserved as the information sent;
Check information operating based on user, the described information sent is decrypted and presents.
Further, the setting position of described enciphered message, comprising: the head of described enciphered message, middle part or afterbody; The described information content to be sent, comprising: the information content of writing with note or multimedia message form.
Further, the algorithm of described encryption and decryption does not change the length of described information to be sent.
Further, the algorithm of described encryption and decryption, comprising: DES (DataEncryptionStandard, data encryption standard) enciphering and deciphering algorithm or XOR enciphering and deciphering algorithm.
Further, when the length of the described information content to be sent exceedes the maximum length once sending information, describedly be sent to receiving terminal by inserting the enciphered message after encryption identification, determine to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal, comprising:
Be divided into many message segments be sent to receiving terminal successively by inserting the enciphered message after encryption identification, after receiving the message segment containing encryption identification for receiving terminal, determine to be decrypted all message segments belonging to this enciphered message received to present based on encryption identification.
The present invention also provides a kind of information transmitting methods, is receiving the flow process of side execution, comprising:
The enciphered message that receiving end/sending end is sent also is preserved;
Check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents.
Further, the flow process that described reception side performs, also comprises:
Check information operating based on user, when the setting position of described enciphered message does not find encryption identification, directly present described enciphered message, or prompting user profile cannot be opened.
Further, when receiving many message segments belonging to an enciphered message, describedly checking information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message being decrypted and presenting, comprising:
Check information operating based on user, when finding encryption identification in the message segment received, just can be decrypted and present receiving all message segments belonging to this enciphered message.
In order to the fail safe of the transmission information of outstanding mobile terminal, the present invention also provides a kind of mobile terminal, comprises first processor;
Described first processor, enciphered message is obtained for being encrypted to sent the information content, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
The described enciphered message sent is preserved as the information sent;
Check information operating based on user, the described information sent is decrypted and presents.
In order to the fail safe of the reception information of outstanding mobile terminal, the present invention also provides a kind of mobile terminal, comprises the second processor;
Described second processor, the enciphered message sent for receiving end/sending end is also preserved; Check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents.
Adopt technique scheme, the present invention at least has following advantages:
Information transmitting methods of the present invention and mobile terminal, when the information of carrying out is transmitted, use the mobile terminal designed by the present invention send and receive note, even if be sent to other common mobile terminal by mistake, also there will not be the problem that note is revealed.Because transmitting terminal of the present invention and receiving terminal are all preserve in an encrypted form and transmission of information, only when user needs to check message details, just determining to present for user carries out decrypts information based on encryption identification, therefore, ensure that the fail safe of information when transmitting.And, even if occur that the information data in mobile terminal is copied out the situation of other electronic equipments such as computer by user, because other equipment do not possess the decipher function corresponding to above-mentioned mobile terminal, therefore also need not the leakage of concern of data content.
Accompanying drawing explanation
Fig. 1 is that the information transmitting methods of first embodiment of the invention is at the flow chart sending side execution;
Fig. 2 is that the information transmitting methods of first embodiment of the invention is at the flow chart receiving side execution;
Fig. 3 is second embodiment of the invention mobile terminal composition structural representation;
Fig. 4 is third embodiment of the invention mobile terminal composition structural representation;
Fig. 5 is the schematic flow sheet that the transmitting terminal of fourth embodiment of the invention performs;
Fig. 6 is the schematic flow sheet that the receiving terminal of fourth embodiment of the invention performs.
Embodiment
For further setting forth the present invention for the technological means reaching predetermined object and take and effect, below in conjunction with accompanying drawing and preferred embodiment, the present invention is described in detail as after.
First embodiment of the invention, a kind of information transmitting methods, as shown in Figure 1, is sending the flow process of side execution, is comprising following concrete steps:
Step S101, after user completes to sent information content editor, be encrypted to sent the information content and obtain enciphered message, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
Concrete, the setting position of enciphered message, comprising: the head of enciphered message, middle part or afterbody.The information content to be sent can be: the information content of writing with note or multimedia message form.Encryption identification can be: the character that the user such as "/r ", "/n ", " close " is of little use.
In the present embodiment, the algorithm of encryption and decryption does not change the length of described information to be sent.Such as: the algorithm of these encryption and decryption can be: DES (DataEncryptionStandard, data encryption standard) enciphering and deciphering algorithm or XOR enciphering and deciphering algorithm.Why the algorithm of encryption and decryption is defined as the algorithm not changing described message length to be sent by the present embodiment, because if algorithms for encryption and decryption can change the length of information to be sent, then when every bar information once sends length restriction, can cause that an information is divided into many to send, cause unnecessary economic loss to user.
Because the length that may there is the described information content to be sent in practical application inherently exceedes the situation of the maximum length once sending information, for this situation, described in the present embodiment step S101 is sent to receiving terminal by inserting the enciphered message after encryption identification, determine to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal, comprising:
Be divided into many message segments be sent to receiving terminal successively by inserting the enciphered message after encryption identification, after receiving the message segment containing encryption identification for receiving terminal, determine to be decrypted all message segments belonging to this enciphered message received to present based on encryption identification.
Step S102, preserves the described enciphered message sent as the information sent.
Step S103, checks information operating based on user, is decrypted presents the described information sent.Concrete, user checks that information operating refers to the operation checked the details of information.Because the information content sent stores with the form of enciphered message, the information read by third party's Information application is also encryption, immediately database is derived also can not to reveal short message content from mobile terminal.
The information transmitting methods of the present embodiment, as shown in Figure 2, is receiving the flow process of side execution, comprising:
Step S201, the enciphered message that receiving end/sending end is sent also is preserved;
Step S202, checks information operating based on user, when the setting position of described enciphered message finds encryption identification, is decrypted presents described enciphered message.
Concrete, corresponding to transmitting terminal, an enciphered message is divided into the situation of many message segments transmissions, when receiving terminal receives many message segments belonging to an enciphered message, step S202 comprises:
Check information operating based on user, when finding encryption identification in the message segment received, just can be decrypted and present receiving all message segments belonging to this enciphered message.
Preferably, the flow process that described reception side performs, also comprises:
Step S203, checks information operating based on user, when the setting position of described enciphered message does not find encryption identification, directly presents described enciphered message, or prompting user profile cannot be opened.
Second embodiment of the invention, in order to outstanding mobile terminal transmission and protect stored fail safe, the present embodiment also provides a kind of mobile terminal, as shown in Figure 3, comprises a processor 10;
Processor 10, enciphered message is obtained for being encrypted to sent the information content, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
The described enciphered message sent is preserved as the information sent;
Check information operating based on user, the described information sent is decrypted and presents.
Corresponding with the concrete steps involved by the flow process sending side in the first embodiment on the function detail that in the present embodiment, processor 10 completes.
Third embodiment of the invention, in order to outstanding mobile terminal reception and protect stored fail safe, the present embodiment also provides a kind of mobile terminal, as shown in Figure 4, comprises a processor 20;
Processor 20, the enciphered message sent for receiving end/sending end is also preserved; Check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents.
Corresponding with the concrete steps involved by the flow process receiving side in the first embodiment on the function detail that in the present embodiment, processor 20 completes.
It should be noted that, because second and third embodiment of the present invention describes the function of mobile terminal product respectively with the angle of transmitting terminal and receiving terminal, in fact a kind of mobile terminal is also comprised, it comprises the function that in second and third embodiment, processor completes simultaneously, and this mobile terminal is in use without the need to limiting it as transmitting terminal or receiving terminal, but user carries out the transmitting-receiving of information as required.
Fourth embodiment of the invention, the present embodiment 5 ~ 6 introduces an application example transmitted for short message by reference to the accompanying drawings on the basis of above-described embodiment.
The mobile terminal of this application example is also divided into transmitting terminal and receiving terminal two roles to be described.
One, as shown in Figure 5, the flow process of transmitting terminal execution is as follows:
Steps A 1, normal log-on message application, enters write information interface, writes the information content, and fill in addressee.
Steps A 2, clicks and adds the penal menu, selects to add encrypted indicia, if now the content of editing interface is multimedia message, when so adding panel pull-up, the option of encrypted indicia can be hidden, also encrypted indicia cannot be inserted, because the encryption of this application example is only for short message.Such as: select " close " word as adding secret mark.
Steps A 3, inserts " close " word at the short message content afterbody editted.
Steps A 4, clicks after sending button, before preservation database, judges encrypted indicia, and is encrypted short message content based on encrypted indicia, by the information after encryption stored in database.Now stored in the ciphertext that the short message content in database has been after encryption, such as: adopt XOR cryptographic algorithm, then encrypting example is:
Former character string is: space dragon coolpad enciphered message
Value after encryption: Chi bamboo water pipe Q]] ^BSV coupling sad
Value after deciphering: space dragon coolpad enciphered message.
Steps A 5, when the Information application interface display data such as details of list, the last character intercepting short message content judges, if " close ", so then carries out XOR deciphering to short message content, is presented on the interface of user with normal text.If there is no " close " word, then can not be decrypted operation when showing text, namely can only show ciphertext.
Two, as shown in Figure 6, the flow process of receiving terminal execution is as follows:
Step B1, receiving terminal receives a short message.
Step B2, by this short message content stored in database.
Step B3, when the Information application interface display data such as details of list, the last character intercepting short message content judges, if " close ", so then carries out XOR deciphering to short message content, is presented on the interface of user with normal text.
Step B4, if do not have " close " word, then can not be decrypted operation when showing text.
Above-mentioned flow process is the transmitting terminal of Encrypted short message breath function and the flow process of receiving terminal respectively, if the program is applied in the occasion of bulk SMS, have this application example transmitting terminal function mobile terminal select contact person time be have selected 10 people, 6 people are had to use the mobile terminal with this application example receiving terminal function, there are other common mobile terminal that 4 people use, after so enciphered message sends, because what send is exactly ciphertext, on the mobile terminal using this application example, so have the flow process of deciphering, normally can check short message content, what see in other common mobile terminal is then the information of encrypting, mess code completely.
In addition, due to short message content be encryption after deposit in a database, so the short message that third party's Information application or other means read also be encryption, immediately database is derived also can not to reveal short message content from mobile terminal.
The scheme of this application example by adding the flow process of encryption and decryption in normal short message transmitting-receiving flow process; thus achieve and can read safely between the mobile terminal of this application example; and between the mobile terminal and other common mobile terminal of this application example, send Encrypted short message when ceasing; play the effect that encrypted content information is maintained secrecy; and the short message content in local data base serves secret effect with the form storage of ciphertext; the content of protection note that can be safer, the client for big customer, group's custom-made mobile phone has good application prospect.
The described information transmitting methods of the embodiment of the present invention and mobile terminal, when the information of carrying out is transmitted, use the mobile terminal designed by the present invention send and receive note, even if be sent to other common mobile terminal by mistake, also there will not be the problem that note is revealed.The form being all encryption due to transmitting terminal of the present invention and receiving terminal is preserved and transmission of information, only when user needs to check message details, just determining to present for user carries out decrypts information based on encryption identification, therefore, ensure that the fail safe of information when transmitting.And, even if occur that the information data in mobile terminal is copied out the situation of other electronic equipments such as computer by user, because other equipment do not possess the decipher function corresponding to above-mentioned mobile terminal, therefore also need not the leakage of concern of data content.
By the explanation of embodiment, should to the present invention for the technological means reaching predetermined object and take and effect be able to more deeply and concrete understanding, but appended diagram be only to provide with reference to and the use of explanation, be not used for being limited the present invention.

Claims (10)

1. an information transmitting methods, is characterized in that, is sending the flow process of side execution, comprising:
Be encrypted to sent the information content and obtain enciphered message, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
The described enciphered message sent is preserved as the information sent;
Check information operating based on user, the described information sent is decrypted and presents.
2. information transmitting methods according to claim 1, is characterized in that, the setting position of described enciphered message, comprising: the head of described enciphered message, middle part or afterbody;
The described information content to be sent, comprising: the information content of writing with note or multimedia message form.
3. information transmitting methods according to claim 1, is characterized in that, the algorithm of described encryption and decryption does not change the length of described information to be sent.
4. information transmitting methods according to claim 3, is characterized in that, the algorithm of described encryption and decryption, comprising: DES Cipher enciphering and deciphering algorithm or XOR enciphering and deciphering algorithm.
5. the information transmitting methods according to any one of Claims 1 to 4, it is characterized in that, when the length of the described information content to be sent exceedes the maximum length once sending information, describedly be sent to receiving terminal by inserting the enciphered message after encryption identification, determine to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal, comprising:
Be divided into many message segments be sent to receiving terminal successively by inserting the enciphered message after encryption identification, after receiving the message segment containing encryption identification for receiving terminal, determine to be decrypted all message segments belonging to this enciphered message received to present based on encryption identification.
6. an information transmitting methods, is characterized in that, is receiving the flow process of side execution, comprising:
The enciphered message that receiving end/sending end is sent also is preserved;
Check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents.
7. information transmitting methods according to claim 6, is characterized in that, the flow process that described reception side performs, and also comprises:
Check information operating based on user, when the setting position of described enciphered message does not find encryption identification, directly present described enciphered message, or prompting user profile cannot be opened.
8. the information transmitting methods according to claim 6 or 7, it is characterized in that, when receiving many message segments belonging to an enciphered message, describedly check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents, comprising:
Check information operating based on user, when finding encryption identification in the message segment received, be decrypted present receiving all message segments belonging to this enciphered message.
9. a mobile terminal, is characterized in that, comprising: first processor;
Described first processor, enciphered message is obtained for being encrypted to sent the information content, encryption identification is inserted at the setting position of enciphered message, being sent to receiving terminal by inserting the enciphered message after encryption identification, determining to be decrypted described enciphered message to present based on encryption identification after receiving for receiving terminal;
The described enciphered message sent is preserved as the information sent;
Check information operating based on user, the described information sent is decrypted and presents.
10. a mobile terminal, is characterized in that, comprising: the second processor;
Described second processor, the enciphered message sent for receiving end/sending end is also preserved; Check information operating based on user, when the setting position of described enciphered message finds encryption identification, described enciphered message is decrypted and presents.
CN201410453959.0A 2014-09-09 2014-09-09 Information transmission method and mobile terminal Pending CN105391677A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410453959.0A CN105391677A (en) 2014-09-09 2014-09-09 Information transmission method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410453959.0A CN105391677A (en) 2014-09-09 2014-09-09 Information transmission method and mobile terminal

Publications (1)

Publication Number Publication Date
CN105391677A true CN105391677A (en) 2016-03-09

Family

ID=55423518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410453959.0A Pending CN105391677A (en) 2014-09-09 2014-09-09 Information transmission method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105391677A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332011A (en) * 2016-08-31 2017-01-11 北京奇虎科技有限公司 Short message encrypted communication method and terminal
CN106658487A (en) * 2016-09-26 2017-05-10 惠州Tcl移动通信有限公司 Short message secret communication method and system based on chaos algorithm
CN107070920A (en) * 2017-04-18 2017-08-18 北京元心科技有限公司 Information transmission method and device based on communication application
CN108156315A (en) * 2017-12-13 2018-06-12 青岛海信移动通信技术股份有限公司 A kind of short message guard method and device
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713756A (en) * 2004-06-23 2005-12-28 华为技术有限公司 Security guarantee for memory data information of mobile terminal
CN101076168A (en) * 2007-06-20 2007-11-21 华为技术有限公司 Method for managing intelligent interminal system and intelligent terminal
CN101094068A (en) * 2007-07-17 2007-12-26 深圳凯虹移动通信有限公司 Transmision method for encrypting information of mobile terminal
CN101483867A (en) * 2008-01-10 2009-07-15 中国移动通信集团公司 User identity verification method, related device and system in WAP service
CN103188129A (en) * 2011-12-29 2013-07-03 盈世信息科技(北京)有限公司 E-mail encryption method, mail server and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1713756A (en) * 2004-06-23 2005-12-28 华为技术有限公司 Security guarantee for memory data information of mobile terminal
CN101076168A (en) * 2007-06-20 2007-11-21 华为技术有限公司 Method for managing intelligent interminal system and intelligent terminal
CN101094068A (en) * 2007-07-17 2007-12-26 深圳凯虹移动通信有限公司 Transmision method for encrypting information of mobile terminal
CN101483867A (en) * 2008-01-10 2009-07-15 中国移动通信集团公司 User identity verification method, related device and system in WAP service
CN103188129A (en) * 2011-12-29 2013-07-03 盈世信息科技(北京)有限公司 E-mail encryption method, mail server and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐钒文: "《基于P2P的隐蔽匿名通信技术研究》", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106332011A (en) * 2016-08-31 2017-01-11 北京奇虎科技有限公司 Short message encrypted communication method and terminal
CN106332011B (en) * 2016-08-31 2019-12-06 北京安云世纪科技有限公司 Short message encryption communication method and terminal
CN106658487A (en) * 2016-09-26 2017-05-10 惠州Tcl移动通信有限公司 Short message secret communication method and system based on chaos algorithm
CN107070920A (en) * 2017-04-18 2017-08-18 北京元心科技有限公司 Information transmission method and device based on communication application
CN108156315A (en) * 2017-12-13 2018-06-12 青岛海信移动通信技术股份有限公司 A kind of short message guard method and device
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information

Similar Documents

Publication Publication Date Title
CN107086915B (en) Data transmission method, data sending end and data receiving end
CN104243149B (en) Encrypt and Decrypt method, device and server
CN105812332A (en) Data protection method
CN105391677A (en) Information transmission method and mobile terminal
CN104270517A (en) Information encryption method and mobile terminal
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN105101183A (en) Method and system for protecting private contents at mobile terminal
CN104573548A (en) Information encryption and decryption methods and devices and terminal
CN108667784B (en) System and method for protecting internet identity card verification information
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN102075615A (en) Method for sending and receiving short messages and subscriber identity module (SIM)
CN102572750A (en) Method and terminal for protecting short messages
CN113572743A (en) Data encryption and decryption method and device, computer equipment and storage medium
CN106685897B (en) Safe input method, device and system
CN106507349A (en) A kind of built-in terminal encryption system of software and hardware combining and encryption method
CN105959279A (en) Computer information transmission system and method based on encryption processing
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN105281897A (en) File encryption method and device and file decryption method and device
CN105577361A (en) Information processing method and device thereof
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
CN110166403A (en) A kind of safety method of key and ciphertext separated transmission
CN105119923B (en) A kind of information decoding method and terminal
CN101754209A (en) Method for protecting contents of mobile phone
CN102064935B (en) Decryption display method and system and related equipment
KR101267875B1 (en) Apparatus for message encryption and decryption using virtual keyboard and recording medium storing program for executing method of the same in computer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160309