CN106888310A - Ciphering and deciphering device and method and communication terminal device - Google Patents

Ciphering and deciphering device and method and communication terminal device Download PDF

Info

Publication number
CN106888310A
CN106888310A CN201510947297.7A CN201510947297A CN106888310A CN 106888310 A CN106888310 A CN 106888310A CN 201510947297 A CN201510947297 A CN 201510947297A CN 106888310 A CN106888310 A CN 106888310A
Authority
CN
China
Prior art keywords
data
ciphering
key sequence
encipher
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510947297.7A
Other languages
Chinese (zh)
Inventor
李星
黄强
李永三
徐远
张义东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CN201510947297.7A priority Critical patent/CN106888310A/en
Publication of CN106888310A publication Critical patent/CN106888310A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

The present invention provides a kind of ciphering and deciphering device, is applied to communication terminal, including:Application processor, the application processor includes kernel module, wherein, the kernel module is applied to the communication data that the transmission communication terminal is received, wherein the communication data packet includes communicating data;And encryption/decryption module, the encryption/decryption module is connected with the kernel module, it is adaptable to which the communication data to being received from the kernel module is encrypted or decrypts.The present invention also provides a kind of encipher-decipher method and is applied to the ciphering and deciphering device.The present invention also provides a kind of communication terminal device, including:Any described ciphering and deciphering device;And switching device, it is adaptable to it is turned on and off the ciphering and deciphering device.The ciphering and deciphering device and the encipher-decipher method can effectively prevent from obtaining without permission the Content of Communication of communicating pair, so as to significantly improve the security of dialog context and short message content.

Description

Ciphering and deciphering device and method and communication terminal device
Technical field
The present invention relates to the communications field, more particularly to a kind of ciphering and deciphering device, a kind of encipher-decipher method and A kind of communication terminal device.
Background technology
The communication business such as including call, short message, image, each communication service is required for being encrypted guarantor Protect to prevent from being intercepted and captured in the links of communication or being eavesdropped without permission.It was verified that encryption is Protection information safety feasible and effective means, cipher system is to realize the technology base of Information Security Plinth.Specifically, encryption is to change original information data with certain special algorithm so that without awarding Even if the information that power person has been encrypted, but the method because not knowing decryption, still cannot understand information Content.
In the prior art, it is transmitted without encryption in the call of communication terminal and note data, Very big information security hidden danger can be so carried, is very easy to be intercepted and captured without permission or eavesdropped.
The content of the invention
The problem that the present invention is solved is, in the prior art, the call of communication terminal and note data without Encryption and be transmitted.
To solve the above problems, the embodiment of the present invention provides a kind of ciphering and deciphering device, is applied to communication terminal, Including:Application processor, the application processor includes kernel module, wherein, the kernel module is fitted For transmitting the communication data that the communication terminal is received, wherein the communication data packet includes communicating data; And encryption/decryption module, the encryption/decryption module is connected with the kernel module, it is adaptable to from described interior The communication data received at core module is encrypted or decrypts.
Illustrate, the communicating data is the voice data in communication process.
Alternatively, the ciphering and deciphering device also includes modulation /demodulation module, the decode-regulating module and institute State application processor connection.
Alternatively, the ciphering and deciphering device also includes digital signal processing module, the Digital Signal Processing Module is connected with the modulation /demodulation module.
Alternatively, the modulation /demodulation module and the application processor are set up specially using shared drive mode Thread is transmitted with transmission channel.
Alternatively, the data that the digital signal processing module and the modulation /demodulation module are exchanged use ring Type cache way is stored.
Alternatively, the encryption/decryption module passes through bus and the external connection of the application processor.
Alternatively, the bus include secure digital input and output (Secure Digital Input and Output, SDIO) interface bus, universal asynchronous receiving-transmitting (Universal Asynchronous Receiver/Transmitter, UART) interface bus, SPI (Serial Peripheral Interface, SPI) bus or I2C (Inter-Integrated Circuit) interface bus.
Alternatively, the encryption/decryption module is built in the application processor.
Alternatively, the communication data also includes note data.
Alternatively, the communicating data is instant data.
The embodiment of the present invention also provides a kind of encipher-decipher method, is applied to the ciphering and deciphering device, including: The communication data that the communication terminal is received is obtained, wherein, the communication data includes communicating data;With And the communication data is encrypted or decrypted.
Illustrate, the communicating data is the voice data in communication process.
Alternatively, the communicating data is AMR (Adaptive Multi-Rate, AMR) lattice Formula.
Alternatively, the communicating data is instant data.
Alternatively, the communication data also includes note data.
Alternatively, if the note data is long, the encipher-decipher method also includes the segmentation short message Data.
Alternatively, the encipher-decipher method also includes the transmission communication data by bus to being placed on State the encryption/decryption module of application processor.
Alternatively, the encipher-decipher method also includes the transmission communication data to being built at the application Manage the encryption/decryption module of device.
Alternatively, the communication data is encrypted or decrypt include dynamic more new key, wherein dynamically Updating the key includes:Obtain ordered series of numbers;Generation first key sequence and the second key sequence;Generation the Three key sequences are based on the ordered series of numbers and the first key sequence;And update the 3rd key sequence Based on second key sequence.
Alternatively, generating the first key sequence and second key sequence includes:Generation key sequence Row seed;And the key sequence seed is iterated using AES.
Alternatively, generate the key sequence seed and be based on the time at talkthrough moment, both call sides electricity The preset identity recognition number of words number or chip.
Alternatively, the 3rd key sequence is scramble ordered series of numbers group, and the scramble ordered series of numbers group is put including multiple The random ordered series of numbers.
Alternatively, generate the 3rd key sequence is included based on the first key sequence:Obtain described First key sequence per byte high position data as ordered series of numbers described in scramble initial value;Obtain with described the Low data of one key sequence per byte is used as scramble step-length;And ordered series of numbers described in scramble is based on described first Initial value and the scramble step-length.
Alternatively, ordered series of numbers described in scramble is based on the initial value and the scramble step-length is included to the ordered series of numbers At least carry out the place-exchange of first order.
Alternatively, ordered series of numbers described in scramble is based on the initial value and the scramble step-length is included by described initial It is worth corresponding item to start often by a scramble step-length, the position for carrying out the ordered series of numbers first order is handed over Change.
Alternatively, update the 3rd key sequence is included based on second key sequence:Obtain described Second key sequence per byte high position data as continuous updating duration;Obtain the second key sequence Low data of the row per byte is used as undated parameter;And corresponding putting of choosing in the scramble ordered series of numbers group The random array is based on the duration and the undated parameter of the continuous updating.
The embodiment of the present invention also provides a kind of communication terminal device, including:Any described ciphering and deciphering device; And switching device, it is adaptable to it is turned on and off the ciphering and deciphering device.
Compared with prior art, the technical scheme of the embodiment of the present invention has advantages below:
The proper communication of the communicating pair for not influenceing to authorize by the call encrypted and note data, and can be with Effectively prevent without permission obtain communicating pair Content of Communication, so as to significantly improve dialog context with And the security of short message content.
Brief description of the drawings
Fig. 1 is the structural representation of the ciphering and deciphering device of one embodiment of the invention;
Fig. 2 is the structural representation of the ciphering and deciphering device of another embodiment of the present invention;
Fig. 3 is the flow chart of the encipher-decipher method of one embodiment of the invention;
Fig. 4 is the flow chart of the communicating data encipher-decipher method of one embodiment of the invention;
Fig. 5 is the flow chart of the note data encryption method of one embodiment of the invention;
Fig. 6 is the flow chart of the note data decryption method of one embodiment of the invention;And
Fig. 7 is the flow chart of the key dynamic updating method of one embodiment of the invention.
Specific embodiment
From background technology, in the prior art, communication terminal call and note data without plus It is close treatment and be transmitted.Therefore, the embodiment of the present invention provides a kind of ciphering and deciphering device, a kind of encryption and decryption Method and a kind of communication terminal device, place is encrypted in communication terminal to communicating data and note data Reason, effectively to prevent from obtaining without permission the Content of Communication of communicating pair, so as to significantly improve logical The security of words content and short message content.
It is understandable to enable the above objects, features and advantages of the present invention to become apparent, below in conjunction with the accompanying drawings Specific embodiment of the invention is described in detail.It should be noted that providing the purpose of these accompanying drawings Contribute to understand embodiments of the invention, and should not be construed as and improperly limit of the invention.
Fig. 1 shows the structural representation of the ciphering and deciphering device 100 of one embodiment of the invention, described plus solution Close device 100, is applied to communication terminal, including application processor 101 (Application Processor, AP), the application processor 101 includes kernel (kernel) module 1011, wherein, the kernel mould Block 1011 is applied to the communication data that the transmission communication terminal is received;And encryption/decryption module 1012, institute State encryption/decryption module 1012 to be connected with the kernel module 1011, it is adaptable to from the kernel module 1011 The communication data that place receives is encrypted or decrypts.Wherein, the communication data includes communicating data.Tool Body illustrates that the communicating data is the voice data in communication process.Wherein, the encryption and decryption mould Block 1012 passes through bus and the external connection of the application processor 101.
The external connection encryption/decryption module 1012 is beneficial at the application to the application processor 101 Enciphering and deciphering algorithm or key are debugged and changed to reason device 101 from different third party's encryption/decryption modules, Encryption/decryption module is also facilitated to provide enciphering and deciphering algorithm or key for various data or file.
With reference to Fig. 1, in certain embodiments, the ciphering and deciphering device 100 also includes modulation /demodulation (modem) Module 103, the decode-regulating module 103 is connected with the application processor 101.In some embodiments In, the modulation /demodulation module 103 and the application processor 101 are using shared drive (share Memory) mode sets up dedicated transmission channel and transmits thread (Thread).
With continued reference to Fig. 1, in certain embodiments, the ciphering and deciphering device 100 also includes at data signal Reason (Digital Signal Processing, DSP) module 105, the digital signal processing module 105 with The modulation /demodulation module 103 is connected.In certain embodiments, the digital signal processing module 105 The data exchanged with the modulation /demodulation module 103 are using ring-like caching (ring buffer, not shown) side Formula is stored.
In certain embodiments, the bus includes SDIO interface bus, UART interface bus, SPI Interface bus or I2C interface bus.
In certain embodiments, the communication data also includes note data.
In certain embodiments, the communicating data can be instant data.Illustrate, it is described Instant data, in addition to necessary time needed for data transmission and processing, are not postponed by any extra, wherein, Necessary time needed for data transmission and processing is very short to be can be ignored.
In certain embodiments, the ciphering and deciphering device 100 includes 2G/3G/4G antennal interfaces, WIFI/ Bluetooth (BlueTooth, BT)/global positioning system (Global Positioning System, GPS)/frequency modulation (Frequency Modulation, FM) interface, liquid crystal display (Liquid Crystal Display, LCD) Interface, embedded RAM card (Embedded Multi-Chip Package, EMCP) interface, T card interfaces, TP interfaces, client identification module (Subscriber Identity Module, SIM) interface, utilizing camera interface Or inductor interface.
In certain embodiments, the communication terminal can be applied to Public Switched Telephony Network (Public Switched Telephone Network, PSTN) common analog telephone, dtelegraphone, coin electricity Phone, card phone machine, IC Card Telephone machine, or it is applied to integrated services digital network (Integrated Service Digital Network, ISDN) digital telephone set and be applied to the wireless of mobile communications network Mobile phone.
Fig. 2 shows the structural representation of the ciphering and deciphering device 200 of another embodiment of the present invention, described Ciphering and deciphering device 200, is applied to communication terminal, including application processor 201, the application processor 201 Including kernel module 2011, wherein, the kernel module 2011 is applied to the transmission communication terminal and receives Communication data;And encryption/decryption module 2012, the encryption/decryption module 2012 and the kernel module 2011 connections, it is adaptable to which the communication data to being received from the kernel module 2011 is encrypted or decrypts. Wherein, the communication data includes communicating data.Illustrate, the communicating data is to converse Voice data in journey.Wherein, the encryption/decryption module 2012 is built in the application processor 201.
The built-in encryption/decryption module 2012 is beneficial in the application processor 201 simplify described plus solution The structure of close device 200, reduces power consumption and cost.
With reference to Fig. 2, in certain embodiments, the ciphering and deciphering device 200 also includes modulation /demodulation module 203, the decode-regulating module 203 is connected with the application processor 201.In certain embodiments, The modulation /demodulation module 203 and the application processor 201 set up special biography using shared drive mode Defeated passage transmits thread.
With continued reference to Fig. 2, in certain embodiments, the ciphering and deciphering device 200 also includes at data signal Reason module 205, the digital signal processing module 205 is connected with the modulation /demodulation module 203.One In a little embodiments, the number that the digital signal processing module 205 and the modulation /demodulation module 203 are exchanged Stored according to using ring-like cache way.
In certain embodiments, the communication data also includes note data.
In certain embodiments, the communicating data can be instant data.Illustrate, it is described Instant data, in addition to necessary time needed for data transmission and processing, are not postponed by any extra, wherein, Necessary time needed for data transmission and processing is very short to be can be ignored.
In certain embodiments, the ciphering and deciphering device 200 includes 2G/3G/4G antennal interfaces, WIFI/ Bluetooth/global positioning system/frequency modulation interface, liquid crystal display interface, embedded internal memory card interface, T clampings Mouth, TP interfaces, client identification module interface, utilizing camera interface or inductor interface.
In certain embodiments, the communication terminal can be applied to Public Switched Telephony Network common Analog telephone, dtelegraphone, coin-box telephone set, card phone machine, IC Card Telephone machine, it is also possible to It is the digital telephone set for being applied to integrated services digital network and the wireless hand for being applied to mobile communications network Machine.
The embodiment of the present invention also provides a kind of encipher-decipher method, is applied to the ciphering and deciphering device 100 or institute State ciphering and deciphering device 200.Fig. 3 is the flow chart of the encipher-decipher method 300 of one embodiment of the invention.It is described Encipher-decipher method 300 includes:
310:The communication data that the communication terminal is received is obtained, wherein, the communication data includes call Data;And
320:The communication data is encrypted or decrypted.
Illustrate, the communicating data is the voice data in communication process.
In certain embodiments, the communicating data can be AMR forms.
In certain embodiments, the communicating data is instant data.Illustrate, it is described instant Data, in addition to necessary time needed for data transmission and processing, are not postponed by any extra, wherein, data Necessary time needed for transmission process is very short to be can be ignored.
In certain embodiments, the communication data also includes note data.
If the note data is long, in certain embodiments, the encipher-decipher method 300 also includes Split the note data, so as to avoid the reception compatibling problem of ultralong short message.
In certain embodiments, when the encipher-decipher method 300 is applied to the ciphering and deciphering device 100, The encipher-decipher method 300 also includes the transmission communication data by bus to being placed at the application Manage the encryption/decryption module 1012 of device 101.
In certain embodiments, when the encipher-decipher method 300 is applied to the ciphering and deciphering device 200, The encipher-decipher method 300 also includes the transmission communication data to being built in the application processor 201 The encryption/decryption module 2012.
Hereinafter, with reference to the ciphering and deciphering device 100 and the encipher-decipher method 300, call number is described in detail According to the encipher-decipher method with note data.
Fig. 4 is the flow chart of the communicating data encipher-decipher method 400 of one embodiment of the invention.With reference to Fig. 1 And Fig. 4, the communicating data encipher-decipher method 400 includes:Send logical through standard voice data handling process Talk about data 401 to the digital signal processing module 105;Send the communicating data 401 to decode-regulating Module 103;The communicating data 401 is stored in ring-like buffer (not shown), wherein, the ring Type buffer is located at the end of decode-regulating module 103;The decode-regulating module 103 and it is described should Dedicated transmissions pipeline is set up using shared drive mode between processor 101 (Fig. 4 is not shown);Send The communicating data 401 is to the application processor 101;Send the communicating data 401 to described plus solution Close module 1012;The communicating data 401 is encrypted or decrypted;Foldback passes through what is encrypted or decrypt The communicating data 401 is to the decode-regulating module 103;And foldback is described by what is encrypted or decrypt Communicating data 401 to the digital signal processing module 105 continues to walk the standard voice data processing stream Journey.
Ground is illustrated, sending the communicating data 401 to the encryption/decryption module 1012 includes described answering Encryption and decryption is sent with the kernel module 1011 in processor 101 ask 405 to the encryption/decryption module 1012.Wherein, the encryption and decryption request 405 includes the communicating data 401.
Ground is illustrated, foldback is by the communicating data 401 of encryption or decryption to the decode-regulating Module 103 includes that the foldback encryption and decryption of the encryption/decryption module 1012 replys 409 to the application processor 101 In the kernel module 1011.Wherein, the encryption and decryption is replied 409 and includes passing through what is encrypted or decrypt The communicating data 401.
Wherein, the standard voice data handling process is the speech data in road known in technical staff in field Handling process.
Above-mentioned communicating data encipher-decipher method 400 can also be applied to the ciphering and deciphering device 200.
Fig. 5 is the flow chart of the note data encryption method 500 of one embodiment of the invention.With reference to Fig. 1 and Fig. 5, the note data encryption method 500 includes:Send note data 501 to the kernel module 1011;CIPHERING REQUEST 505 is sent to the encryption/decryption module 1012, wherein the CIPHERING REQUEST 505 is wrapped Include the note data 501;Operation is encrypted to the note data 501;Foldback encryption replys 509 To the kernel module 1011, the encryption replys 509 includes the note data 501 of encryption;Hair Send the note data 501 of encryption to the modulation /demodulation module 103;And send the described short of encryption Letter data 501.
Said short message data ciphering method 500, it is also possible to be applied to the ciphering and deciphering device 200.
Fig. 6 is the flow chart of the note data decryption method 600 of one embodiment of the invention.With reference to Fig. 1 and Fig. 6, the note data decryption method 600 includes:Obtain the note data 601 of encryption;Send described The note data 601 of encryption is to the decode-regulating module 103;Send the note data 601 of the encryption To the kernel module 1011;Decoding request 605 is sent to the encryption/decryption module 1012, wherein described Decoding request 605 includes the note data 601 of the encryption;Note data 601 to the encryption is carried out Decryption oprerations;Foldback encryption replys 609 to the kernel module 1011, and the encryption replys 609 to be included Original note data;And send the original note data to application software.
Said short message data decryption method 600, it is also possible to be applied to the ciphering and deciphering device 200.
In certain embodiments, the communication data is encrypted or decrypt include dynamic more new key. Fig. 7 is the flow chart of the key dynamic updating method 700 of one embodiment of the invention.The key dynamic is more New method 700 includes:
710:Obtain ordered series of numbers;
730:Generation first key sequence and the second key sequence;
750:Generate the 3rd key sequence and be based on the ordered series of numbers and the first key sequence;And
770:Update the 3rd key sequence and be based on second key sequence.
Wherein, the frequency that the item number correspondence of the ordered series of numbers is processed by the digital signal processing module 203 Number.Wherein, the frequency is obtained in time-domain sampling by the digital signal processing module 203 pairs Communicating data carry out what is obtained after Fourier transformation.In certain embodiments, the ordered series of numbers is generated at random Item;Wherein, in certain embodiments, the item of the ordered series of numbers can be positive integer.
In certain embodiments, generating the first key sequence and second key sequence includes:It is raw Into key sequence seed;And the key sequence seed is iterated using AES.
Illustrate, the built-in described encryption/decryption module 2012 of the application processor 201 is described in Key sequence seed is iterated using AES to the sequence seed, according to the difference of iterations Produce the first key sequence and second key sequence.Wherein, iterations is more, generation The encryption strength of the first key sequence and second key sequence is higher.In certain embodiments, The AES includes SH256 AESs.
In certain embodiments, the key sequence seed is generated to be based on the time at talkthrough moment, lead to The preset identity recognition number of words both sides' telephone number or chip.
In certain embodiments, the 3rd key sequence is scramble ordered series of numbers group, the scramble ordered series of numbers group bag Include the ordered series of numbers of multiple scrambles.
In certain embodiments, generate the 3rd key sequence is included based on the first key sequence: Obtain initial value of high position data of the first key sequence per byte as ordered series of numbers described in scramble;Obtain Low data using the first key sequence per byte is used as scramble step-length;And ordered series of numbers base described in scramble In the initial value and the scramble step-length.
Wherein, the first key sequence and second key sequence are set up specially by common memory mode The modulation /demodulation module 203 is transferred into by the application processor 201 with pipeline.
Illustrate, the initial value is a sequence number for item in the ordered series of numbers, the scramble step-length It is draw back item or the number of income forward.
In certain embodiments, ordered series of numbers described in scramble is based on the initial value and the scramble step-length including right The ordered series of numbers at least carries out the place-exchange of first order.
It is illustrated that, a binary number is classified as 01101100, wherein, the high position data is 0010, The low data is 0100, i.e., described initial value is 2, and the scramble step-length is 4, thus exchanges described The Section 2 and Section 6 of ordered series of numbers obtain the ordered series of numbers 01001110 of scramble with ordered series of numbers described in scramble.
In certain embodiments, ordered series of numbers described in scramble be based on the initial value and the scramble step-length include by The corresponding item of the initial value starts often by a scramble step-length, and first order is carried out to the ordered series of numbers Place-exchange.
It is illustrated that, a binary number is classified as 01101100, wherein, the high position data is 0010, The low data is 0010, i.e., described initial value is 2, and the scramble step-length is 2, thus by the 2nd Start often to march forward 2 starting point and the place-exchange of advance terminal of once being advanced, and obtains scramble The ordered series of numbers 01100110.
Illustrate by way of further example, a binary number is classified as 01101100, wherein, the high position data It is 0010, the low data is 0001, i.e., described initial value is 2, the scramble step-length is 1, because And often being marched forward by the 2nd 1 carries out once the corresponding item of the initial value, i.e., the 2nd, and The place-exchange of the advance terminal, obtains the ordered series of numbers 01010110 of scramble.
In certain embodiments, the 3rd key sequence of generation is sent to the Digital Signal Processing mould Block 205.
In certain embodiments, update the 3rd key sequence is included based on second key sequence: Obtain duration of high position data of second key sequence per byte as continuous updating;Obtain described Low data of two key sequences per byte is used as undated parameter;And in the selection scramble ordered series of numbers group The ordered series of numbers of corresponding scramble is based on the duration and the undated parameter of the continuous updating.Wherein, institute Stating the duration of continuous updating is used for the frequency that control key updates, and the duration of continuous updating is long, renewal frequency Slowly;Conversely, the when length of continuous updating, renewal frequency is fast.Wherein, undated parameter includes the scramble The sequence number of the ordered series of numbers of scramble in ordered series of numbers group.
It is illustrated that, the low data is that binary number 1000, i.e. undated parameter are 8, so that The ordered series of numbers for choosing the 8th group of scramble in the scramble ordered series of numbers group updates current key.
In certain embodiments, scramble is based on by the frequency that the digital signal processing module 203 is processed 3rd key sequence is carrying out the encryption of communicating data.It is illustrated that, will be by the numeral The frequency of the treatment of signal processing module 203 carries out convolution with the 3rd key sequence.Then, by adding Close data enter the standard voice data handling process.
The embodiment of the present invention also provides a kind of communication terminal device.The communication terminal device includes:It is any Described ciphering and deciphering device;And switching device, it is adaptable to it is turned on and off the ciphering and deciphering device.Its In, the communication terminal device can be switched between encryption mode and general mode.Wherein, exist Under general mode, communicating data or note data are not encrypted.
Illustrate, when the switching device is opened, the ciphering and deciphering device is opened, so that described Phone enters encryption mode;When the switching device is closed, the ciphering and deciphering device is closed, so that institute State phone and enter general mode.
Although present disclosure is as above, the present invention is not limited to this.Any those skilled in the art, Without departing from the spirit and scope of the present invention, can make various changes or modifications, therefore guarantor of the invention Shield scope should be defined by claim limited range.

Claims (26)

1. a kind of ciphering and deciphering device, is applied to communication terminal, it is characterised in that including:
Application processor, the application processor includes kernel module, wherein, the kernel module is applicable In the communication data that the communication terminal is received is transmitted, wherein the communication data packet includes communicating data;With And
Encryption/decryption module, the encryption/decryption module is connected with the kernel module, it is adaptable to from described interior The communication data received at core module is encrypted or decrypts.
2. ciphering and deciphering device as claimed in claim 1, it is characterised in that also including modulation /demodulation module, institute Decode-regulating module is stated to be connected with the application processor.
3. ciphering and deciphering device as claimed in claim 2, it is characterised in that also including digital signal processing module, The digital signal processing module is connected with the modulation /demodulation module.
4. ciphering and deciphering device as claimed in claim 2, it is characterised in that the modulation /demodulation module and described Application processor sets up dedicated transmission channel transmission thread using shared drive mode.
5. ciphering and deciphering device as claimed in claim 3, it is characterised in that the digital signal processing module and The data that the modulation /demodulation module is exchanged are stored using ring-like cache way.
6. ciphering and deciphering device as claimed in claim 1, it is characterised in that the encryption/decryption module passes through bus With the external connection of the application processor.
7. ciphering and deciphering device as claimed in claim 6, it is characterised in that the bus includes that secure digital is defeated Enter output interface bus, universal asynchronous receiving-transmitting interface bus, SPI bus or I2C interfaces total Line.
8. ciphering and deciphering device as claimed in claim 1, it is characterised in that the encryption/decryption module is built in institute In stating application processor.
9. ciphering and deciphering device as claimed in claim 1, it is characterised in that the communication data also includes short message Data.
10. ciphering and deciphering device as claimed in claim 1, it is characterised in that the communicating data is instant data.
A kind of 11. encipher-decipher methods, are applied to the ciphering and deciphering device as described in any in claim 1 to 10, its It is characterised by, including:
The communication data that the communication terminal is received is obtained, wherein, the communication data includes communicating data; And
The communication data is encrypted or decrypted.
12. encipher-decipher methods as claimed in claim 11, it is characterised in that the communicating data is many self adaptations Rate format.
13. encipher-decipher methods as claimed in claim 11, it is characterised in that the communicating data is instant data.
14. encipher-decipher methods as claimed in claim 11, it is characterised in that the communication data also includes short message Data.
15. encipher-decipher methods as claimed in claim 14, it is characterised in that if also including the note data It is long, split the note data.
16. encipher-decipher methods as claimed in claim 11, it is characterised in that also including transmitting the communication data By bus to the encryption/decryption module for being placed on the application processor.
17. encipher-decipher methods as claimed in claim 11, it is characterised in that also including transmitting the communication data To the encryption/decryption module for being built in the application processor.
18. encipher-decipher methods as claimed in claim 11, it is characterised in that be encrypted to the communication data Or decryption includes dynamic more new key, wherein dynamic updates the key including:
Obtain ordered series of numbers;
Generation first key sequence and the second key sequence;
Generate the 3rd key sequence and be based on the ordered series of numbers and the first key sequence;And
Update the 3rd key sequence and be based on second key sequence.
19. encipher-decipher methods as claimed in claim 18, it is characterised in that the generation first key sequence and Second key sequence includes:
Generation key sequence seed;And
The key sequence seed is iterated using AES.
20. encipher-decipher methods as claimed in claim 19, it is characterised in that the generation key sequence kind subbase The preset identity recognition number of time, both call sides telephone number or chip in the talkthrough moment.
21. encipher-decipher methods as claimed in claim 18, it is characterised in that the 3rd key sequence is scramble Ordered series of numbers group, the scramble ordered series of numbers group includes the ordered series of numbers of multiple scrambles.
22. encipher-decipher methods as claimed in claim 21, it is characterised in that generation the 3rd key sequence base Include in the first key sequence:
Obtain initial value of high position data of the first key sequence per byte as ordered series of numbers described in scramble;
The low data using the first key sequence per byte is obtained as scramble step-length;And
Ordered series of numbers described in scramble is based on the initial value and the scramble step-length.
23. encipher-decipher methods as claimed in claim 22, it is characterised in that ordered series of numbers described in scramble is based on described first Initial value and the scramble step-length include at least carrying out the ordered series of numbers place-exchange of first order.
24. encipher-decipher methods as claimed in claim 22, it is characterised in that ordered series of numbers described in scramble is based on described first Initial value and the scramble step-length include often being walked by a scramble by the corresponding item of the initial value It is long, the place-exchange of first order is carried out to the ordered series of numbers.
25. encipher-decipher methods as claimed in claim 21, it is characterised in that update the 3rd key sequence base Include in second key sequence:
Obtain duration of high position data of second key sequence per byte as continuous updating;
Low data of second key sequence per byte is obtained as undated parameter;And
Choose corresponding scramble in the scramble ordered series of numbers group the array be based on the continuous updating when The long and undated parameter.
A kind of 26. communication terminal devices, including:
Ciphering and deciphering device as described in any in claim 1 to 10;And
Switching device, it is adaptable to be turned on and off the ciphering and deciphering device.
CN201510947297.7A 2015-12-16 2015-12-16 Ciphering and deciphering device and method and communication terminal device Pending CN106888310A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510947297.7A CN106888310A (en) 2015-12-16 2015-12-16 Ciphering and deciphering device and method and communication terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510947297.7A CN106888310A (en) 2015-12-16 2015-12-16 Ciphering and deciphering device and method and communication terminal device

Publications (1)

Publication Number Publication Date
CN106888310A true CN106888310A (en) 2017-06-23

Family

ID=59176820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510947297.7A Pending CN106888310A (en) 2015-12-16 2015-12-16 Ciphering and deciphering device and method and communication terminal device

Country Status (1)

Country Link
CN (1) CN106888310A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108092964A (en) * 2017-12-11 2018-05-29 广州三星通信技术研究有限公司 For the method and its electric terminal of the protection call voice of electric terminal
CN108111492A (en) * 2017-12-11 2018-06-01 广州三星通信技术研究有限公司 For the method and its electric terminal of the protection call voice of electric terminal
CN109040790A (en) * 2018-06-28 2018-12-18 苏州科达科技股份有限公司 Data encryption/decryption method, device and electronic equipment
CN110138807A (en) * 2019-06-12 2019-08-16 北京塞宾科技有限公司 A kind of high security conference system
CN112214795A (en) * 2020-10-13 2021-01-12 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN116758661A (en) * 2023-08-16 2023-09-15 鹿客科技(北京)股份有限公司 Intelligent unlocking method, intelligent unlocking device, electronic equipment and computer readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787180A (en) * 1997-03-24 1998-07-28 Transcrypt International, Inc. Method of connecting a scrambler or encryption device to a hand-held portable cellular telephone
CN101980513A (en) * 2010-08-05 2011-02-23 上海闻泰电子科技有限公司 Mobile phone with anti-wiretapping function and anti-wiretapping implementation method for same
CN102307346A (en) * 2011-08-29 2012-01-04 成都华之芯科技有限公司 Method for security of mobile phone communication and security mobile phone
CN104038614A (en) * 2013-03-04 2014-09-10 德信无线通讯科技(北京)有限公司 Special security key for secure mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787180A (en) * 1997-03-24 1998-07-28 Transcrypt International, Inc. Method of connecting a scrambler or encryption device to a hand-held portable cellular telephone
CN101980513A (en) * 2010-08-05 2011-02-23 上海闻泰电子科技有限公司 Mobile phone with anti-wiretapping function and anti-wiretapping implementation method for same
CN102307346A (en) * 2011-08-29 2012-01-04 成都华之芯科技有限公司 Method for security of mobile phone communication and security mobile phone
CN104038614A (en) * 2013-03-04 2014-09-10 德信无线通讯科技(北京)有限公司 Special security key for secure mobile phone

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108092964A (en) * 2017-12-11 2018-05-29 广州三星通信技术研究有限公司 For the method and its electric terminal of the protection call voice of electric terminal
CN108111492A (en) * 2017-12-11 2018-06-01 广州三星通信技术研究有限公司 For the method and its electric terminal of the protection call voice of electric terminal
CN108111492B (en) * 2017-12-11 2021-03-19 广州三星通信技术研究有限公司 Method for protecting conversation voice for electronic terminal and electronic terminal thereof
CN109040790A (en) * 2018-06-28 2018-12-18 苏州科达科技股份有限公司 Data encryption/decryption method, device and electronic equipment
CN110138807A (en) * 2019-06-12 2019-08-16 北京塞宾科技有限公司 A kind of high security conference system
CN112214795A (en) * 2020-10-13 2021-01-12 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN112214795B (en) * 2020-10-13 2022-08-16 天津津航计算技术研究所 Encryption module suitable for various data bandwidths
CN116758661A (en) * 2023-08-16 2023-09-15 鹿客科技(北京)股份有限公司 Intelligent unlocking method, intelligent unlocking device, electronic equipment and computer readable medium
CN116758661B (en) * 2023-08-16 2023-10-27 鹿客科技(北京)股份有限公司 Intelligent unlocking method, intelligent unlocking device, electronic equipment and computer readable medium

Similar Documents

Publication Publication Date Title
CN106888310A (en) Ciphering and deciphering device and method and communication terminal device
US20070239994A1 (en) Bio-metric encryption key generator
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN103986503A (en) Safety Bluetooth headset and voice communication method thereof
CN114944925B (en) Signaling secure transmission method and device, server and SE chip
CN102377560A (en) Data encryption method and device for mobile communication terminal
CN104955033A (en) Voice encryption communication method
WO2022188033A1 (en) Data uploading method, data downloading method and related device
CN101707767A (en) Data transmission method and devices
CN105681310A (en) Bluetooth based voice source real-time voice encryption method
CN105407109A (en) Data secure transmission method between Bluetooth devices
CN105407467A (en) Short message encryption methods, devices and system
CN107276884A (en) A kind of autonomous encrypting and deciphering system of social software based on intelligent terminal
CN108156604B (en) Group calling encryption transmission method and device of cluster system, cluster terminal and system
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN103458401B (en) A kind of voice encryption communication system and communication means
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN101631304B (en) Anti-adaptive multi-rate coding third-generation mobile communication end-to-end voice encryption method
CN101420689B (en) Mobile terminal and method for implementing encoding and decoding process of audio code stream
CN105262759B (en) A kind of method and system of coded communication
CN105992203A (en) Speech communication encryption key negotiation method and system based on same
CN101873372A (en) Mobile phone system structure with encrypted communication function
CN104581714A (en) Method for encrypting speech on basis of TD-SCDMA (time division-synchronization code division multiple access) circuit domains
CN106961330A (en) Quantum key service station
CN203537408U (en) End-to-end voice communication privacy device with assignable secret key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170623

RJ01 Rejection of invention patent application after publication