CN114867012A - Encryption earphone and voice communication method thereof - Google Patents

Encryption earphone and voice communication method thereof Download PDF

Info

Publication number
CN114867012A
CN114867012A CN202210619582.6A CN202210619582A CN114867012A CN 114867012 A CN114867012 A CN 114867012A CN 202210619582 A CN202210619582 A CN 202210619582A CN 114867012 A CN114867012 A CN 114867012A
Authority
CN
China
Prior art keywords
key
voice
module
headset
key factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210619582.6A
Other languages
Chinese (zh)
Inventor
丁凯
郭发源
黄磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qixing Microelectronics Co ltd
Original Assignee
Beijing Qixing Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qixing Microelectronics Co ltd filed Critical Beijing Qixing Microelectronics Co ltd
Priority to CN202210619582.6A priority Critical patent/CN114867012A/en
Publication of CN114867012A publication Critical patent/CN114867012A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R1/00Details of transducers, loudspeakers or microphones
    • H04R1/10Earpieces; Attachments therefor ; Earphones; Monophonic headphones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04RLOUDSPEAKERS, MICROPHONES, GRAMOPHONE PICK-UPS OR LIKE ACOUSTIC ELECTROMECHANICAL TRANSDUCERS; DEAF-AID SETS; PUBLIC ADDRESS SYSTEMS
    • H04R5/00Stereophonic arrangements
    • H04R5/033Headphones for stereophonic communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an encryption earphone, which comprises a sound transceiving module, a voice receiving module and a voice processing module, wherein the sound transceiving module is used for receiving and outputting voice; the key generation module is used for generating a key according to a key generation strategy; the voice encryption module is used for encrypting the audio signal; the voice decryption module is used for decrypting the encrypted audio signal; the communication transceiving module is used for transmitting and receiving voice data; the key generation module comprises a key factor generation submodule and a key factor generation submodule, wherein the key factor generation submodule is used for generating a binary code according to a password input by a user, and the binary code is used as a key factor I; the key factor II generation submodule is used for generating a key factor II according to a plurality of groups of mass random keys; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key. The invention realizes digital coding, encryption and modulation of the sound source by combining the narrowband speech coding technology and the universal password technology, and is applied to the encryption earphone.

Description

Encryption earphone and voice communication method thereof
Technical Field
The invention relates to the technical field of earphones, in particular to an encryption earphone and a voice communication method thereof.
Background
Mobile communication has become an inseparable part of people's work and life, and people have higher and higher requirements for confidentiality of voice communication. Most voice streams of the existing communication network communication terminals are not encrypted. The mobile core network does not have the capability of encrypting communication audio data, so that voice encryption is a way to realize secure communication in the process of voice data transmission.
At present, most of encryption methods adopted for encrypting the voice data transmission process are realized by encrypting a mobile phone or installing encryption software on the mobile phone, and the method has a plurality of problems, such as: 1. the method is only suitable for a certain region, an operator or a communication mode, and multi-state intercommunication cannot be realized; 2. a specific service provider must be relied and trusted on safety, and safety autonomy cannot be achieved; 3. because the encryption is carried out through the mobile phone, the encryption is easily broken by mobile phone virus software or malicious attack programs, and important information is leaked.
Therefore, it is important to develop a device independent of communication equipment for encrypting voice communication data, and a mobile phone headset is a common external component of a mobile phone, and as the development of smart phones is increasing, mobile phone headsets become a common object that people often wear around. Therefore, it is an urgent need in the industry to develop an earphone that is independent of communication equipment and can encrypt voice communication data.
Disclosure of Invention
Aiming at the problems in the related art, the invention provides an encryption earphone and a voice communication method thereof.
The technical scheme of the invention is realized as follows:
according to an aspect of the present invention, there is provided an encryption headset.
The encryption earphone comprises:
the voice transceiving module is used for receiving voice and outputting the voice;
the key generation module is used for generating a key according to a key generation strategy;
the voice encryption module is used for encrypting the audio signal from the sound transceiving module by using the key;
a voice decryption module for decrypting the encrypted audio signal from the mobile communication device using the key;
the communication transceiver module is used for transmitting and receiving encrypted and unencrypted voice data;
the key generation module comprises a key factor generation submodule, a key factor two generation submodule and a key generation submodule, wherein the key factor generation submodule is used for generating 128-bit binary codes according to passwords input by a user, and the binary codes are used as key factors I; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key.
In addition, the encryption headset further comprises: and the password input module is used for inputting passwords by a user, wherein the passwords comprise digital passwords, color combination passwords and pattern combination passwords.
In addition, the voice cryptographic module symmetrically encrypts the audio signal from the voice transceiver module using the SM4 block encryption algorithm when encrypting the audio signal from the voice transceiver module using the key.
Further, the voice decryption module decrypts the encrypted audio signal from the mobile communication device using the SM4 packet encryption algorithm when decrypting the encrypted audio signal from the mobile communication device using the key.
Optionally, the encryption headset is a wireless bluetooth headset, and the wireless bluetooth headset includes a TWS wireless bluetooth headset, a strap wireless bluetooth headset, or a head-mounted wireless bluetooth headset.
Optionally, the encryption earphone comprises an encryption earphone body and a charging bin for placing the encryption earphone body, and the password input module is located on the encryption earphone body or on the charging bin.
According to another aspect of the present invention, there is provided a voice communication method performed through a cryptographic headset. The sending party and the receiving party carry out voice communication with the mobile communication device through the encryption earphone.
The voice communication method performed by the encryption earphone comprises the following steps:
a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
and encrypting the received voice by using the key, transmitting the encrypted voice data to the mobile communication device, and prompting the mobile communication device to transmit the encrypted voice data to a receiving party.
Wherein, when encrypting the received voice by using the key, the received voice is symmetrically encrypted by using the SM4 block encryption algorithm.
According to still another aspect of the present invention, there is provided a voice communication method performed through a cryptographic headset. The sender and the receiver carry out voice communication through the encryption earphone and the mobile communication device.
The voice communication method performed by the encryption earphone comprises the following steps:
a receiving party receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
and decrypting the encrypted voice data transmitted by the sender through the mobile communication device by using the key, and outputting voice under the condition of obtaining the decrypted voice data.
Wherein, when decrypting the encrypted voice data transmitted by the transmitting side through the mobile communication device using the key, the encrypted voice data is decrypted using the SM4 packet encryption algorithm.
Has the advantages that: the invention creates a voice encryption coding mode by combining a narrow-band voice coding technology and a universal password technology, realizes digital coding, encryption and modulation of a sound source, is applied to an encryption earphone, and provides a voice confidential product which has a completely closed safety chain, is safe, independent and controllable and can be widely applied to various areas, operators and communication modes for users. The eavesdropping risk can be resisted to the greatest extent, and the eavesdropping risk comprises line eavesdropping such as operator eavesdropping, network eavesdropping, No. 7 signaling eavesdropping and pseudo base station eavesdropping, and local eavesdropping such as mobile spyware and backdoor.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a block diagram of a modular structure of a cryptographic headset according to an embodiment of the invention;
fig. 2 is a schematic structural diagram of a charging bin with color combination password input for an encryption headset according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a charging bin with a digital password input of an encryption headset according to an embodiment of the invention;
fig. 4 is a first flowchart illustrating a voice communication method performed by a cryptographic headset according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a voice communication method performed by the encryption headset according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
According to an embodiment of the invention, an encryption headset and a voice communication method thereof are provided.
As shown in FIG. 1, an encryption earphone according to an embodiment of the present invention comprises
A sound transceiver module 101 for receiving and outputting a voice;
a key generation module 103, configured to generate a key according to a key generation policy;
a voice encryption module 105 for symmetrically encrypting the audio signal from the sound transceiving module based on the SM4 packet encryption algorithm using the key;
a speech decryption module 107 for decrypting the encrypted audio signal from the mobile communication device based on the SM4 packet encryption algorithm using the key;
a communication transceiver module 109 for transmitting and receiving encrypted and unencrypted voice data;
the key generation module 103 includes a key factor one generation submodule (not shown in the figure), a key factor two generation submodule (not shown in the figure), and a key generation submodule (not shown in the figure), where the key factor one generation submodule is used to generate a 128-bit binary code according to a password input by a user, and uses the binary code as a key factor one; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key. In addition, the encryption headset further comprises: and a password input module (not shown) for inputting a password by a user.
When the password is used specifically, the password comprises a digital password, a color combination password and a pattern combination password. The color combination password may be as shown in fig. 2, where the key 1 is red and the key 2 is black, and the password code may be any combination of red and black, such as: red, black and black (110), or red, black, red, black (1001), red, black, red, black (101100), random combinations of up to 128 bits can be achieved. And the numeric code may be a combination of 0-9 digits, as shown in fig. 3.
In addition, for convenience of use, the encryption headset of the present invention can adopt a wireless bluetooth headset, such as: a TWS wireless Bluetooth headset, a strap wireless Bluetooth headset, or a head-mounted wireless Bluetooth headset. When the wireless Bluetooth headset is not provided with the charging bin, the password input module can be arranged on the body of the wireless Bluetooth headset, such as the side surface of the wireless Bluetooth headset; and under the condition that the wireless Bluetooth headset is configured with the charging bin (as shown in fig. 2-3), the password input module can be configured on the charging bin and can be configured with the display screen for displaying.
When the wireless Bluetooth headset is a TWS wireless Bluetooth headset, key binaural synchronization can be realized by adopting a sniffer mode or a mode of forwarding from the master ear to the slave ear. Of course, in practical application, other matching functions can be configured, such as: the method comprises the steps of configuring a switching key to realize state switching, wherein the state switching comprises function switching of encrypted conversation, encrypted voice, encrypted conference and the like, specifically, prompting to enter an encrypted conversation mode if an encrypted conversation key is pressed in a non-encrypted conversation state, prompting to be in an encrypted conversation state by an indicator light, interrupting the encrypted conversation to return to a common conversation mode if the encrypted conversation key is pressed, and simultaneously turning off the indicator light of the encrypted conversation state. The mode of encryption switching can also be set on the earphone, and mode switching of encryption communication and ordinary communication, mode switching of encryption recording, encryption voice message, encryption conference and the like can be realized in any form of knocking, pressing, touching and voice assistance.
As shown in fig. 4, a voice communication method performed by an encryption headset according to an embodiment of the present invention includes:
step S401, a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
step S403, generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
step S405, encrypts the received voice based on the SM4 packet encryption algorithm using the key, and transmits the encrypted voice data to the mobile communication device, causing the mobile communication device to transmit the encrypted voice data to the receiving party.
As shown in fig. 5, a voice communication method performed by an encryption headset according to an embodiment of the present invention includes:
step S501, a receiver receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
step S503, generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
step S504 is to decrypt the encrypted voice data transmitted by the transmitting side through the mobile communication apparatus based on the SM4 block encryption algorithm using the key, and to output the voice in the case of obtaining the decrypted voice data.
In summary, by means of the technical scheme of the invention, a voice encryption coding mode is created through the combination of the narrow-band voice coding technology and the universal password technology, the digital coding, encryption and modulation of the sound source are realized, and the voice encryption coding mode is applied to the encryption earphone, thereby providing a voice secrecy product which has a completely closed safety chain, is safe, independent and controllable and can be widely applied to various areas, operators and communication modes for users. The eavesdropping risk can be resisted to the greatest extent, and the eavesdropping risk comprises line eavesdropping such as operator eavesdropping, network eavesdropping, No. 7 signaling eavesdropping and pseudo base station eavesdropping, and local eavesdropping such as mobile spyware and backdoor.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A cryptographic headset, comprising:
the voice transceiving module is used for receiving voice and outputting the voice;
the key generation module is used for generating a key according to a key generation strategy;
the voice encryption module is used for encrypting the audio signal from the sound transceiving module by using the key;
a voice decryption module for decrypting the encrypted audio signal from the mobile communication device using the key;
the communication transceiver module is used for transmitting and receiving encrypted and unencrypted voice data;
the key generation module comprises a key factor generation submodule, a key factor two generation submodule and a key generation submodule, wherein the key factor generation submodule is used for generating 128-bit binary codes according to passwords input by a user, and the binary codes are used as key factors I; the key factor II generation submodule is used for generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys and taking the key combinations as key factors II; and the key generation submodule is used for carrying out XOR operation on the key factor I and the key factor II to obtain a key.
2. The cryptographic headset of claim 1, further comprising: and the password input module is used for inputting passwords by a user, wherein the passwords comprise digital passwords, color combination passwords and pattern combination passwords.
3. The encrypting headset of claim 1, wherein the voice cryptographic module symmetrically encrypts the audio signal from the sound transceiver module using an SM4 block encryption algorithm when encrypting the audio signal from the sound transceiver module using the key.
4. The encrypting headset of claim 1, wherein the voice decryption module decrypts the encrypted audio signal from the mobile communication device using an SM4 packet encryption algorithm when decrypting the encrypted audio signal from the mobile communication device using the key.
5. The cryptographic headset of claim 2, wherein the cryptographic headset is a wireless bluetooth headset comprising a TWS wireless bluetooth headset, a strap wireless bluetooth headset, or a head-mounted wireless bluetooth headset.
6. The encrypting earphone according to claim 5, wherein the encrypting earphone comprises an encrypting earphone body and a charging chamber for placing the encrypting earphone body, and the password input module is positioned on the encrypting earphone body or the charging chamber.
7. A voice communication method performed by a cryptographic headset, wherein a sender and a receiver perform voice communication with a mobile communication apparatus through the cryptographic headset of any one of claims 1 to 6, and the voice communication method comprises:
a sender receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; carrying out XOR operation on the first key factor and the second key factor to obtain a key;
and encrypting the received voice by using the key, transmitting the encrypted voice data to the mobile communication device, and prompting the mobile communication device to transmit the encrypted voice data to a receiving party.
8. The voice communication method through the encryption headset of claim 7, wherein the received voice is symmetrically encrypted using an SM4 block encryption algorithm when being encrypted using the key.
9. A voice communication method performed by a cryptographic headset, wherein a sender and a receiver perform voice communication with a mobile communication apparatus through the cryptographic headset of any one of claims 1 to 6, and the voice communication method comprises:
a receiving party receives a password input by a user and generates a 128-bit binary code as a key factor one according to the password;
generating a group of randomly arranged key combinations based on a clock according to a plurality of groups of prestored massive random keys, and taking the key combinations as a key factor II; performing XOR operation on the first key factor and the second key factor to obtain a key;
and decrypting the encrypted voice data transmitted by the sender through the mobile communication device by using the key, and outputting voice under the condition of obtaining the decrypted voice data.
10. The voice communication method through the encryption headset according to claim 9, wherein the encrypted voice data is decrypted using an SM4 packet encryption algorithm when decrypting the encrypted voice data transmitted by the transmitting side through the mobile communication device using the key.
CN202210619582.6A 2022-05-30 2022-05-30 Encryption earphone and voice communication method thereof Pending CN114867012A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210619582.6A CN114867012A (en) 2022-05-30 2022-05-30 Encryption earphone and voice communication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210619582.6A CN114867012A (en) 2022-05-30 2022-05-30 Encryption earphone and voice communication method thereof

Publications (1)

Publication Number Publication Date
CN114867012A true CN114867012A (en) 2022-08-05

Family

ID=82640649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210619582.6A Pending CN114867012A (en) 2022-05-30 2022-05-30 Encryption earphone and voice communication method thereof

Country Status (1)

Country Link
CN (1) CN114867012A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348579A (en) * 2022-10-18 2022-11-15 长江量子(武汉)科技有限公司 Voice encryption method applied to wireless earphone and encryption type wireless earphone

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203537408U (en) * 2013-05-06 2014-04-09 兰玉栋 End-to-end voice communication privacy device with assignable secret key
CN104301097A (en) * 2014-10-15 2015-01-21 南京熊猫电子制造有限公司 Method for improving transmission safety of Bluetooth data
CN105338475A (en) * 2015-10-14 2016-02-17 公安部第三研究所 Bluetooth-based safety conversation system and method
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN108449178A (en) * 2018-03-26 2018-08-24 北京豆荚科技有限公司 The generation method of root key in a kind of secure and trusted performing environment
CN110650160A (en) * 2019-10-29 2020-01-03 北京天威诚信电子商务服务有限公司 Identity authentication method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203537408U (en) * 2013-05-06 2014-04-09 兰玉栋 End-to-end voice communication privacy device with assignable secret key
CN104301097A (en) * 2014-10-15 2015-01-21 南京熊猫电子制造有限公司 Method for improving transmission safety of Bluetooth data
CN105338475A (en) * 2015-10-14 2016-02-17 公安部第三研究所 Bluetooth-based safety conversation system and method
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN106412812A (en) * 2016-11-23 2017-02-15 建荣半导体(深圳)有限公司 Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN108449178A (en) * 2018-03-26 2018-08-24 北京豆荚科技有限公司 The generation method of root key in a kind of secure and trusted performing environment
CN110650160A (en) * 2019-10-29 2020-01-03 北京天威诚信电子商务服务有限公司 Identity authentication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115348579A (en) * 2022-10-18 2022-11-15 长江量子(武汉)科技有限公司 Voice encryption method applied to wireless earphone and encryption type wireless earphone
CN115348579B (en) * 2022-10-18 2023-02-17 长江量子(武汉)科技有限公司 Voice encryption method applied to wireless earphone and encryption type wireless earphone

Similar Documents

Publication Publication Date Title
KR102288899B1 (en) Symmetric quantum cryptography key based encryption device for voice communication
KR100430358B1 (en) Radio communication device and radio communication method
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
JPH04297157A (en) Data ciphering device
CN114867012A (en) Encryption earphone and voice communication method thereof
CN101420689B (en) Mobile terminal and method for implementing encoding and decoding process of audio code stream
CN103167494A (en) Information sending method and information sending system
US20030035542A1 (en) Apparatus and method for securing communication information in CDMA communication system
KR20030091239A (en) Method and apparatus for securing contents between mobile phones and their operating method
JP4615128B2 (en) Voice and data encryption method using encryption key split combiner
CN105827601A (en) Data encryption application method and system of mobile device
EP2809045A2 (en) Information security attachment device for voice communication and information security method for voice communication using the same
KR102308247B1 (en) Encryption communication device equipped with quantum encryption chip based a quantum random number and method of providing encryption communication service using the same
JPH01307341A (en) Mobile body data ciphered communication system
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
KR100572463B1 (en) Encrypted communication method in communication between wireless communication terminals using shared encryption key
CN108882182A (en) Short message ciphering and deciphering device
JP2000514934A (en) Method and apparatus for enhanced security enhancement of a private key to a lookup table to improve security of wireless telephone messages
KR20090024860A (en) Voice encrypted communication module for mobile communication terminal
KR20000054258A (en) Method of securing shot message and the system
JPH09149023A (en) Information communication processor and information communication processing method
CN103812652A (en) Computer information transmission intelligent encryption method
JPH02195377A (en) Ic card provided with key sharing function
KR20130068199A (en) Mobile communication terminal and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220805

RJ01 Rejection of invention patent application after publication