CN106412856A - Encryption method and terminal after reading voice message - Google Patents

Encryption method and terminal after reading voice message Download PDF

Info

Publication number
CN106412856A
CN106412856A CN201610861467.4A CN201610861467A CN106412856A CN 106412856 A CN106412856 A CN 106412856A CN 201610861467 A CN201610861467 A CN 201610861467A CN 106412856 A CN106412856 A CN 106412856A
Authority
CN
China
Prior art keywords
key
speech message
encrypted
unit
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610861467.4A
Other languages
Chinese (zh)
Other versions
CN106412856B (en
Inventor
何伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huzhou YingLie Intellectual Property Operation Co.,Ltd.
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610861467.4A priority Critical patent/CN106412856B/en
Publication of CN106412856A publication Critical patent/CN106412856A/en
Application granted granted Critical
Publication of CN106412856B publication Critical patent/CN106412856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an encryption method after reading a voice message. The method comprises the following steps: encrypting the voice message by use of a first secret key after firstly playing the voice message; and then decrypting by use of the first secret key before re-playing the encrypted voice message; if the decryption is accurate, playing the voice message; if the decryption is inaccurate, not playing the voice message. Through the adoption of the method disclosed by the invention, the aim of preventing the user voice message from being leaked in the premise of not deleting the read voice message is achieved, and meanwhile, the aim of better protecting the user permission is achieved for providing multiple verification.

Description

Method and terminal that a kind of speech message is encrypted after readding
Technical field
The invention belongs to end message secrecy technology field and in particular to a kind of speech message read after encryption method and end End.
Background technology
Network is more and more flourishing at present, and flow rate are more and more cheap, and voice communication chat is more convenient, uses Frequency is very high, and voice-enabled chat will also result in the leakage of individual privacy, in order to not obtained individual privacy easily by other people, takes herein The method protection privacy of voice encryption;After user receives speech message, when user clicks on voice messaging with finger, software Sample finger print as the key of encryption, when voice messaging is play using the encrypting fingerprint of firm sampling;Read other later Speech message also can facilitate user to remember with the encrypting fingerprint of sampling for the first time;When playing again only with sampling Finger print information coupling could obtain broadcasting voice;Burn-after-reading on existing mobile phone is will to delete for after pictorial information reading Remove, and voice messaging may comprise critically important privacy information, if user is not intended to delete at once, need reading voice to disappear Encrypt immediately after breath, both can protect and not allow other people check, facilitate user to use again.
Content of the invention:
In order to overcome the defect of above-mentioned background technology, method and end that a kind of present invention speech message of offer is encrypted after readding End, on the premise of not deleting and readding speech message, both can protect and not allow other people check, facilitate user's use again
The technical scheme being adopted in order to solve the above-mentioned technical problem present invention is:
The present invention provides a kind of method that speech message is encrypted after readding:First after played voice message, use first key Speech message is encrypted;Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct, Then played voice message, if decipher incorrect, not played voice message.
It is preferred that when speech message being encrypted with first key, it is first determined whether there is generation first is close Key, is if so, then directly encrypted using first key, if it is not, then generating a first key and being encrypted.
It is preferred that when being decrypted with first key, if deciphering is incorrect, cumulative error number of times is added 1, when accumulative mistake When number of times reaches pre-set limit by mistake, start the second key and verified, if being proved to be successful, played voice message simultaneously supplements first with money Key, if checking is unsuccessful, not played voice message quitting a program.
It is preferred that first key includes fingerprint key, the second key includes safety problem.
It is preferred that after speech message being encrypted with first key, with encryption picture display speech message, encrypting picture Including locking picture.
The terminal that the present invention encrypts after also providing a kind of speech message to read, including the broadcasting mould for played voice message Block, also includes:
Encrypting module, for being encrypted to speech message with first key after played voice message first;
First authentication module, for the solution before playing encrypted speech message again, to the first key of user input Whether confidential information is correctly verified, if so, then played voice message, if it is not, then not played voice message.
Memory module, for storing first key.
It is preferred that encrypting module includes:
First key search unit, for searching for whether memory module has the first key pre-setting, if so, then will First key is delivered to first key ciphering unit, if it is not, then sending enabling signal to first key signal generating unit;
First key signal generating unit, for generating first key, and first key is delivered to first key ciphering unit;
First key ciphering unit, for being encrypted to speech message using first key.
It is preferred that the first authentication module includes:
First decryption information acquiring unit, for obtaining the decryption information of the first key of user input;
First decryption verification unit, for whether correctly verifying to decryption information, if so, then played voice message, If it is not, then not played voice message, and rub-out signal is sent to counting unit;
Counting unit, for when receiving rub-out signal, cumulative number plus 1;
Judging unit, whether the cumulative number for judging counting unit reaches pre-set limit, if so, then to the second checking Module sends enabling signal;
Terminal also includes the second authentication module, and the second authentication module is used for the checking information of the second key to user input Whether correctly verified, if so, then played voice message, if it is not, then not played voice message quitting a program, the second key Storage is in a storage module.
It is preferred that first key includes fingerprint key, the second key includes safety problem, the first decryption information acquiring unit Including fingerprint device.
It is preferred that encrypting module also includes picture replacement unit, for first key ciphering unit to speech message plus After close, with encryption picture display speech message, encrypt picture and include locking picture.
The beneficial effects of the present invention is:Once after certain speech message was play by user, carrying out to it immediately adding Close, the secure fashion of direct deletion different from the past.The secrecy effect reaching, aligns after can not affecting user again again Carry out reading and play.If desired play out again, be decrypted successfully by key.Speech message is encrypted Process, being first had to judge whether there is a first key, being if so, then directly encrypted using it, if it is not, then needing Generate a first key to be encrypted again.In order to reach the more preferable purpose protecting user's access right, increased the second key Verification mode, first key authentication failed reach preset times limit in the case of, the scheme enabling the second key is carried out Checking, has reached the purpose ensureing user's access right, safer reasonable.The preferred fingerprint authentication of first key, the second key is tested The safety problem that card preferred, users pre-set in the terminal is carried out, such as, in the case that user's finger is injured, can pass through This kind of mode is verified further.And in putting into practice, first key and the second key all have a lot of replacement schemes, such as sound Checking, password authentification etc..After encryption speech message, original display packing is replaced by locking picture, point out this message of user Read and encrypt.The present invention do not delete read speech message on the premise of reach and protect user speech message not compromised Purpose, reach the more preferable purpose protecting user's access right for providing multiple-authentication simultaneously.
Brief description
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is that the embodiment of the present invention one adds the method flow diagram judging whether to have after first key scheme;
Fig. 3 is the method flow diagram that the embodiment of the present invention one adds after the second cipher key scheme;
Fig. 4 is the embodiment of the present invention two terminal structure schematic diagram;
Fig. 5 is the structural representation of the embodiment of the present invention two encrypting module;
Fig. 6 is the structural representation of the embodiment of the present invention 2 first authentication module;
Fig. 7 is the terminal structure schematic diagram that the embodiment of the present invention two adds after the second authentication module;
Fig. 8 is the structural representation of the embodiment of the present invention 2 second authentication module;
Fig. 9 is the structural representation of encrypting module after the embodiment of the present invention two picture replacement unit.
Specific embodiment
The present invention is described further with reference to the accompanying drawings and examples.
Embodiment one
A kind of method that speech message is encrypted after readding:First after played voice message, with first key to speech message It is encrypted;Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct, play described Speech message, if deciphering is incorrect, does not play described speech message, as shown in figure 1, its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, with first key, speech message is encrypted afterwards;
Whether step 3, correctly verify to the decryption information of the first key of user input, if so, then plays voice Message, if it is not, then not played voice message.
Once after certain speech message was play by user, being encrypted to it immediately, direct deletion different from the past Secure fashion.The secrecy effect reaching, carries out to it reading playing after can not affecting user again again.If desired again Secondary play out, be decrypted successfully by key.
As one kind improvement of the present embodiment, when speech message being encrypted with first key, it is first determined whether depositing In the first key of generation, if so, then directly it is encrypted using first key, if it is not, then generating a first key simultaneously It is encrypted.
As shown in Fig. 2 its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, judge whether the first key of generation, if so, then directly close using first Key is encrypted to speech message, if it is not, then generating a first key, and speech message is encrypted;
Whether step 3, correctly verify to the decryption information of the first key of user input, if so, then plays voice Message, if it is not, then not played voice message.
The process that speech message is encrypted, first has to judge whether there is a first key, if so, then straight Connect and be encrypted using it, if it is not, then need to produce a first key being encrypted again.
As one kind improvement of the present embodiment, when being decrypted with first key, if deciphering is correct, plays voice and disappear Breath, if deciphering incorrect, not played voice message, and cumulative error number of times is added 1;When cumulative error number of times reaches pre- limiting During value, start the second key and verified.Pre-set limit in the present embodiment is 3 times.As shown in figure 3, its concrete steps includes:
Step 1, judges speech message to be played whether unencryption, if so, then enters step 2, if it is not, then entering step 3;
Step 2, played voice message, judge whether the first key of generation, if so, then directly close using first Key is encrypted to speech message, if it is not, then generating a first key, and speech message is encrypted;
Step 3, obtains the decryption information of the first key of user input;
Whether step 4, correctly verify to the decryption information of the first key of user input, if so, then plays voice Message, if it is not, then not played voice message, and enter step 5;
Step 5, cumulative error number of times adds 1;
Step 6, judges whether described cumulative error number of times reaches 3 times, if so, then enters step 7, if it is not, then returning to step Rapid 3;
Step 7, obtains the checking information of the second key of user input;
Step 8, judges the second key authentication whether success, if so, then played voice message, and enters step 9, if it is not, Then do not play described speech message, and quit a program.
Step 9, resets described first key.For example obtain user fingerprints information again and be stored in institute as first key State memory module.
In order to reach the more preferable purpose protecting user's access right, increased the verification mode of the second key, close first In the case that key authentication failed reaches preset times restriction, the scheme enabling the second key is verified, has reached guarantee user The purpose of access right, safer reasonable.
A kind of preferred as the present embodiment, first key selects fingerprint key, and user receives a speech message, handss Refer to touch speech message region, judge whether system had generated fingerprint key, without if then sample Fingers Stricture of vagina information generates key, if key has existed, subsequently all can use this key;When user clicks on encrypted voice During message, by present sample finger print information and the fingerprint key contrast generating, if if fingerprint key contrast success, play Voice messaging.
Second key selects safety problem.Owner can be after opening speech message encryption function of the present invention, thing First a security permission problem is set, if in the case that fingerprint key contrast unsuccessfully, adds up to contrast unsuccessfully after three times, ejection one Individual dialog box, the correct problem answering owner's setting can also play voice it is ensured that the highest authority of owner, and what owner set asks Topic can reset fingerprint key after being verified.
The preferred fingerprint authentication of first key, the safety problem that the second key authentication preferred, users pre-set in the terminal is entered OK, for example, in the case that user's finger is injured, can be verified further by this kind of mode.And in putting into practice, first is close Key and the second key all have a lot of replacement schemes, such as voice authentication, password authentification etc..
As one kind improvement of the present embodiment, after speech message being encrypted with first key, shown with encryption picture Speech message, encryption picture includes locking picture.One lock picture prompting user is added after playback ends on speech message.Plus After close speech message, original display packing is replaced by locking picture, point out this message of user to read and encrypted.
Embodiment two
The terminal that a kind of speech message is encrypted after readding, as shown in figure 4, include:
Playing module, for played voice message:
Encrypting module, for being encrypted to speech message with first key after played voice message first;
First authentication module, for the solution before playing encrypted speech message again, to the first key of user input Whether confidential information is correctly verified, if so, then played voice message, if it is not, then not played voice message.
Memory module, for storing first key.
The working method of the present embodiment is encrypted to speech message with first key for after played voice message first; Need to be decrypted with first key before playing encrypted speech message again, if deciphering is correct, play described speech message, If deciphering is incorrect, do not play described speech message.That is, first having to judge speech message to be played whether unencryption, if It is, then played voice message with first key, speech message to be encrypted afterwards;If it is not, it is then close to the first of user input Whether the decryption information of key is correctly verified, if so, then played voice message, if it is not, then not played voice message.User's point Commence play out voice after hitting, if only wall scroll speech message, just encrypted with the key of above-mentioned generation when playing voice and starting, When continuously playing if there are a plurality of speech message, when one speech message of broadcasting, then backstage encrypts one with the key of above-mentioned generation Bar, midway stops playing and which bar speech message to be then encrypted into that when.
Once after certain speech message of the present embodiment was play by user, being encrypted to it immediately, different from the past The secure fashion directly deleted.The secrecy effect reaching, carries out to it reading playing after can not affecting user again again. If desired play out again, be decrypted successfully by key.
As one kind improvement of the present embodiment, as shown in figure 5, encrypting module includes:
First key search unit, for searching for whether memory module has the first key pre-setting, if so, then will First key is delivered to first key ciphering unit, if it is not, then sending enabling signal to first key signal generating unit;
First key signal generating unit, for generating first key, and first key is delivered to first key ciphering unit;
First key ciphering unit, for being encrypted to speech message using first key.
Specifically working method is:First determine whether speech message to be played whether unencryption, if speech message unencryption, Played voice message, is judged whether the first key of generation, if so, then directly using first key, speech message is entered Row encryption, if it is not, then generating a first key, and is encrypted to speech message;If speech message is encrypted, defeated to user Whether the decryption information of the first key entering correctly is verified, if so, then played voice message, if it is not, then not playing voice Message.
Provide a kind of process preferably speech message being encrypted, first have to judge whether to have existed one the One key, is if so, then directly encrypted using it, if it is not, then need to produce a first key being encrypted again.
As one kind improvement of the present embodiment,
As shown in fig. 6, the first authentication module includes:
First decryption information acquiring unit, for obtaining the decryption information of the first key of user input;
First decryption verification unit, for whether correctly verifying to decryption information, if so, then played voice message, If it is not, then not played voice message, and rub-out signal is sent to counting unit;
Counting unit, for when receiving rub-out signal, cumulative number plus 1;
Judging unit, whether the cumulative number for judging counting unit reaches pre-set limit, if so, then to the second checking Module sends enabling signal;
As shown in fig. 7, terminal also includes the second authentication module, the second authentication module is used for the second key to user input Checking information whether correctly verified, if so, then played voice message, if it is not, then not played voice message exit journey Sequence, the second key storage is in a storage module.As shown in figure 8, the second authentication module includes:
Second checking information acquiring unit, for obtaining the second checking information of user input;
Second authentication unit, whether the second checking information for judging user input is correct, if so, then plays voice and disappears Breath, if it is not, then not played voice message, and quit a program;
First key reset cell, for resetting first key.
Present solution provides second authentication module, to reaching the more preferable purpose ensureing user's access right.With When first key is decrypted, if deciphering is correct, played voice message, if deciphering incorrect, not played voice message, and Cumulative error number of times is added 1;When cumulative error number of times reaches pre-set limit 3 times, start the second key and verified.
First determine whether speech message to be played whether unencryption, if speech message unencryption, played voice message, judge With the presence or absence of the first key of generation, if so, then directly using first key, speech message is encrypted, if it is not, then giving birth to Become a first key, and speech message is encrypted;If speech message is encrypted, obtain the first key of user input Decryption information;
Then whether the decryption information of the first key of user input is correctly verified, if the solution secret letter of first key Breath is correct, then played voice message, if the decryption information of first key is incorrect, not played voice message, and will add up Errors number adds 1;
Point out the checking information of the second key of user input when whether cumulative error number of times reaches 3 times;Judge second Whether key authentication is successful, if the second key authentication success, played voice message, and resets described first key.For example again Secondary acquisition user fingerprints information is simultaneously stored in described memory module as first key.If the second key authentication is unsuccessful, no Play described speech message, and quit a program.
This programme, in order to reach the more preferable purpose protecting user's access right, increased the verification mode of the second key, In the case that first key authentication failed reaches preset times restriction, the scheme enabling the second key is verified, has reached guarantor The purpose of barrier user's access right, safer reasonable.
A kind of preferred as the present embodiment, first key includes fingerprint key, and the second key includes safety problem, and first Decryption information acquiring unit includes fingerprint device.The preferred fingerprint authentication of first key, the second key authentication preferred, users pre-set Safety problem in the terminal is carried out, such as, in the case that user's finger is injured, can be carried out further by this kind of mode Checking.And in putting into practice, first key and the second key all have a lot of replacement schemes, such as voice authentication, password authentification etc.. First key selects fingerprint more convenient and safety.
As one kind improvement of the present embodiment, as shown in figure 9, encrypting module also includes picture replacement unit, for the After one secret key encryption unit is to speech message encryption, with encryption picture display speech message, encrypts picture and include locking picture.Plus After close speech message, original display packing is replaced by locking picture, point out this message of user to read and encrypted.
It should be appreciated that for those of ordinary skills, can be improved according to the above description or be converted, And all these modifications and variations all should belong to the protection domain of claims of the present invention.

Claims (10)

1. after a kind of speech message is read encryption method it is characterised in that:First after played voice message, with first key pair Described speech message is encrypted;Need to be decrypted with described first key before playing encrypted described speech message again, If deciphering is correct, play described speech message, if deciphering is incorrect, do not play described speech message.
2. after a kind of speech message according to claim 1 is read encryption method it is characterised in that:With first key to institute When stating speech message and being encrypted, it is first determined whether there is the first key of generation, if so, then directly using described first Key is encrypted, if it is not, then generating a described first key and being encrypted.
3. after a kind of speech message according to claim 2 is read encryption method it is characterised in that:Use described first key When being decrypted, if deciphering is incorrect, cumulative error number of times is added 1, when described cumulative error number of times reaches pre-set limit, Start the second key to be verified, if being proved to be successful, played voice message simultaneously supplements described first key with money, if checking does not become Work(, then not played voice message quitting a program.
4. after a kind of speech message according to claim 3 is read encryption method it is characterised in that:Described first key bag Include fingerprint key, described second key includes safety problem.
5. after a kind of speech message according to any one of claim 1-4 is read encryption method it is characterised in that:With first After key is encrypted to described speech message, show described speech message with encryption picture, described encryption picture includes locking Picture.
6. the terminal of encryption after a kind of speech message is read, including the playing module for playing described speech message, its feature exists In also including:
Encrypting module, for being encrypted to described speech message with first key after played voice message first;
First authentication module, for the solution before playing encrypted described speech message again, to the first key of user input Whether confidential information is correctly verified, if so, then plays described speech message, if it is not, then not playing described speech message.
Memory module, for storing described first key.
7. after a kind of speech message according to claim 6 is read, the terminal of encryption is it is characterised in that described encrypting module bag Include:
First key search unit, for searching for whether memory module has the first key pre-setting, if so, then will be described First key is delivered to first key ciphering unit, if it is not, then sending enabling signal to first key signal generating unit;
Described first key signal generating unit, for generating described first key, and described first key is delivered to described first Secret key encryption unit;
Described first key ciphering unit, for being encrypted to described speech message using described first key.
8. after a kind of speech message according to claim 7 is read, the terminal of encryption is it is characterised in that described first verifies mould Block includes:
First decryption information acquiring unit, for obtaining the decryption information of the first key of user input;
Whether the first decryption verification unit, for correctly verifying to described decryption information, if so, then play described voice and disappear Breath, if it is not, then not playing described speech message, and rub-out signal is sent to counting unit;
Counting unit, for when receiving described rub-out signal, cumulative number plus 1;
Judging unit, whether the cumulative number for judging described counting unit reaches pre-set limit, if so, then to the second checking Module sends enabling signal;
Described terminal also includes described second authentication module, and described second authentication module is used for the second key to user input Whether checking information is correctly verified, if so, then plays described speech message, if it is not, then not playing described speech message simultaneously Quit a program, described second key storage is in described memory module.
9. after a kind of speech message according to claim 8 is read encryption terminal it is characterised in that:Described first key bag Include fingerprint key, described second key includes safety problem, described first decryption information acquiring unit includes fingerprint device.
10. after a kind of speech message according to any one of claim 6-9 is read encryption terminal it is characterised in that:Described Encrypting module also includes picture replacement unit, for encrypting to described speech message in described first key ciphering unit Afterwards, show described speech message with encryption picture, described encryption picture includes locking picture.
CN201610861467.4A 2016-09-28 2016-09-28 Method and terminal for encrypting read voice message Active CN106412856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610861467.4A CN106412856B (en) 2016-09-28 2016-09-28 Method and terminal for encrypting read voice message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610861467.4A CN106412856B (en) 2016-09-28 2016-09-28 Method and terminal for encrypting read voice message

Publications (2)

Publication Number Publication Date
CN106412856A true CN106412856A (en) 2017-02-15
CN106412856B CN106412856B (en) 2020-04-24

Family

ID=58015666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610861467.4A Active CN106412856B (en) 2016-09-28 2016-09-28 Method and terminal for encrypting read voice message

Country Status (1)

Country Link
CN (1) CN106412856B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225310A (en) * 2021-03-23 2021-08-06 上海闻泰电子科技有限公司 Voice encryption method, device, system, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130097254A1 (en) * 2002-11-18 2013-04-18 Facebook, Inc. Electronic message delivery based on presence notification
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130097254A1 (en) * 2002-11-18 2013-04-18 Facebook, Inc. Electronic message delivery based on presence notification
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225310A (en) * 2021-03-23 2021-08-06 上海闻泰电子科技有限公司 Voice encryption method, device, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN106412856B (en) 2020-04-24

Similar Documents

Publication Publication Date Title
CN108494738B (en) Verifiable post-quantum electronic voting system and implementation method thereof
CN112000975B (en) Key management system
CN103201998A (en) Data processing for securing local resources in a mobile device
CN107454035B (en) Identity authentication method and device
CN103200009A (en) System and method for fingerprint encryption and decryption
CN105405185A (en) Safety verifying method and apparatus thereof
CN101674575A (en) Method for protecting security of mobile communication terminal data and device thereof
CN113472793A (en) Personal data protection system based on hardware password equipment
CN112615824B (en) Anti-leakage one-time pad communication method and device
CN103560892A (en) Secret key generation method and secret key generation device
CN103186936A (en) Management method for network voting and network voting system
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN111222167A (en) Private data access method based on block chain and explicit authorization mechanism
CN110378135A (en) Intimacy protection system and method based on big data analysis and trust computing
CN109151823A (en) The method and system of eSIM card authentication
CN110493177A (en) Based on unsymmetrical key pond to and sequence number quantum communications service station AKA cryptographic key negotiation method and system
CN106412856A (en) Encryption method and terminal after reading voice message
JP2003204322A (en) Cryptographic communication system
WO2006026925A1 (en) A method for setting the authentication key
CN106027474B (en) A kind of identity card card-reading terminal in authentication ids system
CN106452845A (en) Online unlocking implementation method and apparatus
CN104618104B (en) Accessory, electronic equipment and the system for realizing accessory certification
CN106446713A (en) Encryption method and system for database content
CN111859423A (en) Information security encryption method and device
CN110535632A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station AKA cryptographic key negotiation method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201118

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Jiji Intellectual Property Operation Co., Ltd

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Patentee before: Phicomm (Shanghai) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201214

Address after: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee after: Bengbu Lichao Information Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Hangzhou Jiji Intellectual Property Operation Co., Ltd

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210308

Address after: 313000 room 1019, Xintiandi commercial office, Yishan street, Wuxing District, Huzhou, Zhejiang, China

Patentee after: Huzhou YingLie Intellectual Property Operation Co.,Ltd.

Address before: 8319 Yanshan Road, Bengbu City, Anhui Province

Patentee before: Bengbu Lichao Information Technology Co.,Ltd.