TWI390474B - Mobile communicating device, encryption method and decryption method thereof - Google Patents

Mobile communicating device, encryption method and decryption method thereof Download PDF

Info

Publication number
TWI390474B
TWI390474B TW97146362A TW97146362A TWI390474B TW I390474 B TWI390474 B TW I390474B TW 97146362 A TW97146362 A TW 97146362A TW 97146362 A TW97146362 A TW 97146362A TW I390474 B TWI390474 B TW I390474B
Authority
TW
Taiwan
Prior art keywords
encrypted
voice
text
decrypted
mobile communication
Prior art date
Application number
TW97146362A
Other languages
Chinese (zh)
Other versions
TW201020993A (en
Inventor
Tsung Cheng Yang
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW97146362A priority Critical patent/TWI390474B/en
Publication of TW201020993A publication Critical patent/TW201020993A/en
Application granted granted Critical
Publication of TWI390474B publication Critical patent/TWI390474B/en

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Description

行動通訊裝置及其加密方法與解密方法Mobile communication device, encryption method and decryption method thereof

本發明是有關於一種行動通訊裝置及其加密方法與解密方法,且特別是有關於一種採用加密語音來保障資訊安全之行動通訊裝置及其加密方法與解密方法。The present invention relates to a mobile communication device, an encryption method and a decryption method thereof, and more particularly to a mobile communication device using encryption voice to secure information security, and an encryption method and a decryption method thereof.

隨著科技的發展,行動通訊裝置的功能越來越強大,舉凡通訊、照相、錄音、網路瀏覽、暫存資料或行事曆等等。各項功能所衍生之個人資訊均可保存於行動通訊裝置內,帶給人們生活上相當大的便利。With the development of technology, mobile communication devices are becoming more and more powerful, such as communication, photography, recording, web browsing, temporary storage of data or calendars. The personal information derived from each function can be stored in the mobile communication device, bringing considerable convenience to people's lives.

然而,個人資訊攸關於個人隱私與人身安全。在行動通訊裝置之個人資訊越來越多的情況下,更必須特別注意個人資訊的安全。因此,如何在行動通訊裝置建立一套有效的加密方法與解密方法,實為目前業界努力研發之一重要方向。However, personal information about personal privacy and personal safety. In the case of more and more personal information of mobile communication devices, it is necessary to pay special attention to the security of personal information. Therefore, how to establish an effective encryption method and decryption method in mobile communication devices is an important direction for the industry to strive for research and development.

本發明係有關於一種行動通訊裝置及其加密方法與解密方法,其利用對開機程序或特定檔案的開啟程序設定加密語音,以保障資訊安全。The invention relates to a mobile communication device and an encryption method and a decryption method thereof, which use the startup program of a booting program or a specific file to set an encrypted voice to ensure information security.

根據本發明之一方面,提出一種行動通訊裝置之解密方法。行動通訊裝置之解密方法包括以下步驟。判斷一執行程序是否被要求啟動。若執行程序被要求啟動,則判斷 執行程序是否已加密。若執行程序已加密,則擷取一解密語音。擷取對應於執行程序之一加密語音。辨識解密語音為一解密文字,並辨識加密語音為一加密文字。判斷解密文字與加密文字是否相同。若解密文字與加密文字相同,則啟動執行程序。若解密文字與加密文字不相同,則擷取一當時時間並將當時時間及解密語音傳送至一網路伺服器。According to an aspect of the present invention, a decryption method of a mobile communication device is proposed. The decryption method of the mobile communication device includes the following steps. Determine if an executive is required to start. If the execution program is required to start, then judge Whether the executable is encrypted. If the execution program is encrypted, a decrypted speech is retrieved. Capture encrypted speech corresponding to one of the executive programs. The decrypted voice is recognized as a decrypted text, and the encrypted voice is recognized as an encrypted text. Determine whether the decrypted text is the same as the encrypted text. If the decrypted text is the same as the encrypted text, the execution program is started. If the decrypted text is not the same as the encrypted text, then a current time is retrieved and the current time and decrypted voice are transmitted to a web server.

根據本發明之另一方面,提出一種行動通訊裝置之加密方法。行動通訊裝置之加密方法包括以下步驟。擷取一加密語音。判斷加密語音是否能夠辨識為一加密文字。若加密語音能夠辨識為加密文字,則儲存加密語音於行動通訊裝置之一記憶體或一記憶卡或一網路伺服器。若加密語音無法辨識為加密文字,則重新執行加密語音之擷取步驟。According to another aspect of the present invention, an encryption method of a mobile communication device is proposed. The encryption method of the mobile communication device includes the following steps. Capture an encrypted voice. Determine whether the encrypted voice can be recognized as an encrypted text. If the encrypted voice can be recognized as encrypted text, the encrypted voice is stored in one of the memory of the mobile communication device or a memory card or a network server. If the encrypted voice cannot be recognized as encrypted text, the steps of capturing the encrypted voice are re-executed.

根據本發明之再一方面,提出一種行動通訊裝置。行動通訊裝置包括一記憶體、一語音擷取模組、一語音辨識模組、一安控模組及一網路傳輸單元。記憶體用以儲存至少一加密語音。加密語音對應於一執行程序。語音擷取模組用以擷取一解密語音,解密語音對應於執行程序。語音辨識模組用以將解密語音辨識為一解密文字,並將加密語音辨識為一加密文字。安控模組用以判斷解密文字與加密文字是否相同,若解密文字與加密文字相同,則安控模組啟動執行程序。若解密文字與加密文字不相同,則安控模組記錄一當時時間並將當時時間及解密語音透過網路傳 輸單元傳送至一網路伺服器。According to still another aspect of the present invention, a mobile communication device is proposed. The mobile communication device comprises a memory, a voice capture module, a voice recognition module, a security control module and a network transmission unit. The memory is used to store at least one encrypted voice. The encrypted voice corresponds to an executive program. The voice capture module is configured to capture a decrypted voice, and the decrypted voice corresponds to an execution program. The speech recognition module is configured to recognize the decrypted speech as a decrypted text and recognize the encrypted speech as an encrypted text. The security control module is used to judge whether the decrypted text and the encrypted text are the same. If the decrypted text is the same as the encrypted text, the security control module starts the execution program. If the decrypted text is different from the encrypted text, the security module records a current time and transmits the current time and decrypted voice through the network. The transmission unit transmits to a network server.

根據本發明之另一方面,提出一種行動通訊裝置。行動通訊裝置包括一記憶體傳輸單元、一語音擷取模組、一語音辨識模組及一安控模組。記憶體傳輸單元用以連接一記憶卡。記憶卡儲存至少一加密語音。加密語音對應於一執行程序。語音擷取模組用以擷取一解密語音。解密語音對應於執行程序。語音辨識模組用以將解密語音辨識為一解密文字,並將加密語音辨識為一加密文字。安控模組用以判斷解密文字與加密文字是否相同,若解密文字與加密文字相同,則安控模組啟動執行程序。According to another aspect of the present invention, a mobile communication device is proposed. The mobile communication device comprises a memory transmission unit, a voice capture module, a voice recognition module and a security control module. The memory transfer unit is used to connect a memory card. The memory card stores at least one encrypted voice. The encrypted voice corresponds to an executive program. The voice capture module is used to capture a decrypted voice. Decrypting the voice corresponds to executing the program. The speech recognition module is configured to recognize the decrypted speech as a decrypted text and recognize the encrypted speech as an encrypted text. The security control module is used to judge whether the decrypted text and the encrypted text are the same. If the decrypted text is the same as the encrypted text, the security control module starts the execution program.

根據本發明之再一方面,提出一種行動通訊裝置。行動通訊裝置包括一網路傳輸單元、一語音擷取模組、一語音辨識模組、一安控模組及一網路傳輸單元。網路傳輸單元用以透過網際網路連接至一網路伺服器。網路伺服器儲存至少一加密語音。加密語音對應於一執行程序。語音擷取模組用以擷取一解密語音。解密語音對應於執行程序。語音辨識模組用以將解密語音辨識為一解密文字,並將加密語音辨識為一加密文字。安控模組用以判斷解密文字與加密文字是否相同,若解密文字與加密文字相同,則安控模組啟動執行程序。若解密文字與加密文字不相同,則安控模組記錄一當時時間並將當時時間及解密語音透過網路傳輸單元傳送至一網路伺服器。According to still another aspect of the present invention, a mobile communication device is proposed. The mobile communication device comprises a network transmission unit, a voice capture module, a voice recognition module, a security control module and a network transmission unit. The network transmission unit is used to connect to a network server via the Internet. The web server stores at least one encrypted voice. The encrypted voice corresponds to an executive program. The voice capture module is used to capture a decrypted voice. Decrypting the voice corresponds to executing the program. The speech recognition module is configured to recognize the decrypted speech as a decrypted text and recognize the encrypted speech as an encrypted text. The security control module is used to judge whether the decrypted text and the encrypted text are the same. If the decrypted text is the same as the encrypted text, the security control module starts the execution program. If the decrypted text is different from the encrypted text, the security module records a current time and transmits the current time and the decrypted voice to a network server through the network transmission unit.

為讓本發明之上述內容能更明顯易懂,下文特舉較佳 實施例,並配合所附圖式,作詳細說明如下:In order to make the above content of the present invention more obvious, the following is preferred. The embodiments, together with the drawings, are described in detail as follows:

第一實施例First embodiment

請同時參照第1圖及第2圖,第1圖繪示本發明第一實施例之行動通訊裝置100之加密方法的流程圖,第2圖繪示本發明第一實施例之行動通訊裝置100之方塊圖。本實施例提出行動通訊裝置100之加密方法及解密方法,以下先以加密方法說明之。Please refer to FIG. 1 and FIG. 2 simultaneously. FIG. 1 is a flow chart showing the encryption method of the mobile communication device 100 according to the first embodiment of the present invention, and FIG. 2 is a diagram showing the mobile communication device 100 according to the first embodiment of the present invention. Block diagram. This embodiment proposes an encryption method and a decryption method of the mobile communication device 100, which are first described by an encryption method.

如第2圖所示,本實施例之行動通訊裝置100包括一記憶體110、一語音擷取單元120、一語音辨識單元130、一安控模組140、一記憶體傳輸單元150、一網路傳輸單元160、一顯示單元170及一計時器180。其中記憶體傳輸單元150例如是一記憶卡插槽或一通用串列匯流排連接埠(Universal Serial Bus Port,USB Port),用以連接至一記憶卡200。網路傳輸單元160用以透過網際網路900連接至一網路伺服器300。As shown in FIG. 2, the mobile communication device 100 of the present embodiment includes a memory 110, a voice capture unit 120, a voice recognition unit 130, a security control module 140, a memory transmission unit 150, and a network. The circuit transmission unit 160, a display unit 170 and a timer 180. The memory transfer unit 150 is, for example, a memory card slot or a universal serial bus port (USB Port) for connecting to a memory card 200. The network transmission unit 160 is configured to connect to a network server 300 via the Internet 900.

首先,在步驟S101中,以語音擷取單元120擷取一加密語音EV。First, in step S101, an encrypted speech EV is captured by the speech capture unit 120.

接著,在步驟S103中,以語音辨識單元130判斷加密語音EV是否能夠辨識為一加密文字EW。若加密語音EV能夠辨識為加密文字EW,則執行步驟S105;若加密語音EV無法辨識為加密文字EW,則重新執行步驟S101。Next, in step S103, the voice recognition unit 130 determines whether the encrypted voice EV can be recognized as an encrypted text EW. If the encrypted voice EV can be recognized as the encrypted text EW, step S105 is performed; if the encrypted voice EV cannot be recognized as the encrypted text EW, step S101 is re-executed.

接著,在步驟S105中,直接儲存加密語音EV於行動 通訊裝置100之記憶體110,或透過記憶體傳輸單元150儲存加密語音EV於記憶卡200,或者透過透過網路傳輸單元160儲存加密語音EV於網路伺服器300。在本實施例中,加密語音EV係儲存於行動通訊裝置100之記憶體110中。Next, in step S105, the encrypted voice EV is directly stored in the action. The memory 110 of the communication device 100 stores the encrypted voice EV on the memory card 200 through the memory transfer unit 150 or the encrypted voice EV on the network server 300 through the network transmission unit 160. In the embodiment, the encrypted voice EV is stored in the memory 110 of the mobile communication device 100.

請同時參照第3A~3B圖及第2圖,第3A~3B圖繪示本發明第一實施例之行動通訊裝置100之解密方法的流程圖。首先,在步驟S201中,以安控模組140判斷一執行程序P是否被要求啟動。執行程序P例如是一開機程序或一特定檔案之開啟程序。如第2圖所示,執行程序P係儲存於記憶體110中。在此步驟中,若執行程序P被要求啟動,則執行步驟S203;若執行程序P未被要求啟動,則結束本流程。Please refer to FIG. 3A to FIG. 3B and FIG. 2 together. FIG. 3A to FIG. 3B are flowcharts showing the decryption method of the mobile communication device 100 according to the first embodiment of the present invention. First, in step S201, the security control module 140 determines whether an execution program P is required to be started. The execution program P is, for example, a boot program or an open program of a specific file. As shown in FIG. 2, the execution program P is stored in the memory 110. In this step, if the execution program P is required to be started, step S203 is performed; if the execution program P is not required to be started, the flow is ended.

接著,在步驟S203中,以安控模組140判斷執行程序P是否已加密。若執行程序P未被加密,則執行步驟S221;若執行程序P已加密,則執行步驟S205。Next, in step S203, the security control module 140 determines whether the execution program P is encrypted. If the execution program P is not encrypted, step S221 is performed; if the execution program P is encrypted, step S205 is performed.

在步驟S221中,安控模組140直接啟動執行程序P。In step S221, the security control module 140 directly starts the execution of the program P.

在步驟S205中,以語音擷取單元120擷取一解密語音DV。在此步驟中,當使用者不甚忘記解密語音DV了,安控模組140亦可控制顯示單元170顯示一解密提示資訊DI。使用者可藉由解密提示資訊DI回想起正確之解密語音DV,或者藉由回答解密提示資訊DI來獲得正確之解密語音DV。In step S205, the speech capture unit 120 captures a decrypted speech DV. In this step, when the user does not forget to decrypt the voice DV, the security control module 140 can also control the display unit 170 to display a decryption prompt information DI. The user can retrieve the correct decrypted voice DV by decrypting the prompt information DI, or obtain the correct decrypted voice DV by answering the decryption prompt information DI.

接著,執行步驟S206,以安控模組140擷取對應於 執行程序P之加密語音EV。其中,步驟S206包括步驟S207、步驟S209、步驟S211、步驟S213及步驟S215。Then, step S206 is executed, and the security control module 140 retrieves the corresponding Encrypted voice EV of program P is executed. The step S206 includes step S207, step S209, step S211, step S213, and step S215.

其中,加密語音EV係可儲存於行動通訊裝置100之記憶體110、外部之記憶卡200或外部之網路伺服器300中。The encrypted voice EV can be stored in the memory 110 of the mobile communication device 100, the external memory card 200, or the external network server 300.

如第2圖所示,當加密語音EV儲存於記憶體110時,安控模組140可以直接由記憶體110擷取到加密語音EV。As shown in FIG. 2, when the encrypted voice EV is stored in the memory 110, the security control module 140 can directly capture the encrypted voice EV from the memory 110.

請參照第4圖,其繪示加密語音EV儲存於記憶卡200之行動通訊裝置100之方塊圖。如第4圖所示,記憶卡200係可透過記憶體傳輸單元150(例如是記憶卡插槽或通用串列匯流排連接埠)與行動通訊裝置100溝通。所以安控模組140可透過記憶體傳輸單元150擷取到加密語音EV。Referring to FIG. 4, a block diagram of the encrypted voice EV stored in the mobile communication device 200 of the memory card 200 is shown. As shown in FIG. 4, the memory card 200 can communicate with the mobile communication device 100 via the memory transfer unit 150 (for example, a memory card slot or a universal serial bus port). Therefore, the security control module 140 can capture the encrypted voice EV through the memory transmission unit 150.

請參照第5圖,其繪示加密語音EV儲存於網路伺服器300之行動通訊裝置100之方塊圖。如第5圖所示,網路伺服器300係可透過網路傳輸單元160及網際網路900與行動通訊裝置100溝通。所以安控模組140可過網路傳輸單元160擷取到加密語音EV。Referring to FIG. 5, a block diagram of the encrypted voice EV stored in the mobile communication device 100 of the network server 300 is shown. As shown in FIG. 5, the network server 300 can communicate with the mobile communication device 100 via the network transmission unit 160 and the Internet 900. Therefore, the security control module 140 can capture the encrypted voice EV through the network transmission unit 160.

就第1圖之步驟S206的流程而言,首先,在步驟S207中,安控模組140先判斷加密語音EV是否儲存於行動通訊裝置100之記憶體110。若加密語音EV儲存於記憶體110,則執行步驟S209;若加密語音EV未儲存於記憶體110,則執行步驟S211。In the flow of step S206 of FIG. 1, first, in step S207, the security control module 140 first determines whether the encrypted voice EV is stored in the memory 110 of the mobile communication device 100. If the encrypted voice EV is stored in the memory 110, step S209 is performed; if the encrypted voice EV is not stored in the memory 110, step S211 is performed.

在步驟S209中,安控模組140直接由記憶體110擷取加密語音EV。In step S209, the security module 140 directly retrieves the encrypted voice EV from the memory 110.

在步驟S211中,安控模組140進一步判斷加密語音EV是否可由行動通訊裝置100之記憶體傳輸單元150或網路傳輸單元160擷取。若加密語音EV可由記憶體傳輸單元150擷取,則執行步驟S213;若加密語音EV可由網路傳輸單元160擷取,則執行步驟S215;若加密語音EV無法由記憶體傳輸單元150或網路傳輸單元160擷取,則執行步驟S223。In step S211, the security control module 140 further determines whether the encrypted voice EV can be captured by the memory transmission unit 150 or the network transmission unit 160 of the mobile communication device 100. If the encrypted voice EV can be retrieved by the memory transmission unit 150, step S213 is performed; if the encrypted voice EV can be retrieved by the network transmission unit 160, step S215 is performed; if the encrypted voice EV cannot be used by the memory transmission unit 150 or the network When the transmission unit 160 retrieves, step S223 is performed.

在步驟S213中,安控模組140直接由記憶體傳輸單元150擷取儲存於記憶卡200之加密語音EV。In step S213, the security control module 140 directly retrieves the encrypted voice EV stored in the memory card 200 from the memory transfer unit 150.

在步驟S215中,安控模組140直接由網路傳輸單元160擷取儲存於網路伺服器300之加密語音EV。In step S215, the security control module 140 directly retrieves the encrypted voice EV stored in the network server 300 by the network transmission unit 160.

在步驟S223中,安控模組140禁止啟動此執行程序P。In step S223, the security control module 140 prohibits starting the execution program P.

在執行步驟S209、步驟S213或步驟S215之後,安控模組140已擷取到對應於執行程序P之加密語音EV,於是接著再執行步驟S217。After performing step S209, step S213 or step S215, the security control module 140 has retrieved the encrypted speech EV corresponding to the execution program P, and then proceeds to step S217.

在步驟S217中,以語音辨識單元130辨識解密語音DV為一解密文字DW,並辨識加密語音EV為一加密文字EW。In step S217, the speech recognition unit 130 recognizes the decrypted speech DV as a decrypted character DW, and recognizes the encrypted speech EV as an encrypted text EW.

接著,在步驟S219中,安控模組140判斷解密文字DW與加密文字EW是否相同。若解密文字DW與加密文字EW相同,則執行步驟S221;若解密文字DW與加密文字EW不相同,則執行步驟222及步驟S223。Next, in step S219, the security control module 140 determines whether the decrypted character DW is the same as the encrypted character EW. If the decrypted character DW is the same as the encrypted character EW, step S221 is performed; if the decrypted character DW is different from the encrypted character EW, step 222 and step S223 are executed.

在步驟S221中,安控模組140直接啟動執行程序P。In step S221, the security control module 140 directly starts the execution of the program P.

在步驟S222中,安控模組140更可由計時器180擷 取當時時間T,並將當時時間T及解密語音DV傳送至網路伺服器300。也就是說,當有竊盜者欲執行開機程序或開啟特定檔案時,在本實施例之解密方法的保護下,竊盜者不僅無法順利開機或開啟特定檔案,更可將竊盜者使用的時間及其語音傳遞至網路伺服器300,以供檢警單元追查。In step S222, the security control module 140 can be further controlled by the timer 180. The time T is taken, and the time T and the decrypted voice DV are transmitted to the network server 300. That is to say, when a thief wants to perform a booting process or open a specific file, under the protection of the decryption method of the embodiment, the thief can not only successfully boot or open a specific file, but also use the thief. The time and its voice are passed to the web server 300 for tracking by the police unit.

在步驟S223中,安控模組140禁止啟動執行程序P。In step S223, the security control module 140 prohibits the execution of the execution program P.

透過上述之實施方式,行動通訊裝置100可以設定對開機程序或任何的檔案的開啟程序設定加密語音EV,以保障資訊安全。Through the above embodiments, the mobile communication device 100 can set an encrypted voice EV for the booting procedure or any file opening procedure to ensure information security.

第二實施例Second embodiment

請參照第6A~6C圖,其繪示本發明第二實施例之行動通訊裝置100之解密方法的流程圖。本實施例之解密方法與第一實施例之解密方法不同之處在於更限制解密之次數,以進一步避免機器人程式(Robot program)的破解本解密方法,其餘相同之處不再重述。Please refer to FIGS. 6A-6C for a flowchart of a method for decrypting the mobile communication device 100 according to the second embodiment of the present invention. The decryption method of this embodiment is different from the decryption method of the first embodiment in that the number of decryptions is more limited to further avoid the cracking method of the robot program, and the rest of the similarities are not repeated.

如第6C圖所示,在步驟S219之後,若解密文字DW與加密文字EW不相同,則不直接進入步驟S222及步驟S223,而是進入步驟S225。As shown in FIG. 6C, if the decrypted character DW is different from the encrypted character EW after step S219, the process proceeds to step S225 instead of directly proceeding to step S222 and step S223.

在步驟S225中,判斷步驟S219之執行次數是否大於一預定次數(例如是三次)。若步驟S219之執行次數不大於預定次數,則重複執行步驟S205;若步驟S219之執行次數大於欲預定次數,則執行步驟S227。In step S225, it is determined whether the number of executions of step S219 is greater than a predetermined number of times (for example, three times). If the number of executions of step S219 is not greater than the predetermined number of times, step S205 is repeatedly performed; if the number of executions of step S219 is greater than the predetermined number of times, step S227 is performed.

在步驟S227,禁止執行此執行程序P之解密方法, 並進入步驟S222及步驟S223。In step S227, the decryption method of the execution program P is prohibited from being executed. Go to step S222 and step S223.

其中,在步驟205之前,更新增步驟S229。在步驟S229中,判斷此執行程序P之解密方法是否已被禁止。若此執行程序P之解密方法已被禁止,則執行步驟S222及步驟S223;若此執行程序P之解密方法未被禁止,則執行步驟S205。Wherein, before step 205, the step S229 is updated. In step S229, it is judged whether or not the decryption method of the execution program P has been prohibited. If the decryption method of the execution program P has been disabled, step S222 and step S223 are performed; if the decryption method of the execution program P is not prohibited, step S205 is performed.

也就是說,本實施例之解密方法只允許使用者在執行次數以內嘗試,若超過了執行次數則此執行程序P立即被鎖定,而無法執行步驟S205、步驟S206、步驟S217、步驟S279及步驟S221。使得機器人程式無法順利破解加密。That is to say, the decryption method of the embodiment only allows the user to try within the number of executions. If the number of executions is exceeded, the execution program P is immediately locked, and steps S205, S206, S217, S279, and steps cannot be performed. S221. This makes the robot program unable to crack the encryption smoothly.

本發明上述實施例所揭露之行動通訊裝置及其加密方法與解密方法,具有多項優點,以下僅列舉部分優點說明如下:The mobile communication device, the encryption method and the decryption method thereof disclosed in the above embodiments of the present invention have a plurality of advantages, and only some of the advantages described below are as follows:

第一、行動通訊裝置可以對開機程序或特定檔案的開啟程序設定加密語音,以保障資訊安全。First, the mobile communication device can set encrypted voice for the booting program or the opening program of the specific file to ensure information security.

第二、加密語音可儲存於記憶體、記憶卡或網路伺服器中,方便使用者複製、備份或攜帶。Second, the encrypted voice can be stored in a memory, a memory card or a web server, which is convenient for the user to copy, backup or carry.

第三、透過加密語音及解密語音的比對,使用者不需要再輸入任何文字,相當地方便使用。Third, through the comparison of encrypted speech and decrypted speech, the user does not need to input any text, which is quite convenient to use.

第四、當使用者不甚忘記了解密語音,安控模組亦可控制顯示單元顯示一解密提示資訊。使用者可藉由解密提示資訊回想起正確之解密語音,或者藉由回答解密提示資訊來獲得正確之解密語音,相當地符合人性化的設計。Fourth, when the user does not forget to decrypt the voice, the security control module can also control the display unit to display a decryption prompt information. The user can retrieve the correct decrypted speech by decrypting the prompt information, or obtain the correct decrypted speech by answering the decryption prompt information, which is quite ergonomic.

第五、當有竊盜者欲執行開機程序或開啟特定檔案時,在本實施例之解密方法的保護下,竊盜者不僅無法順利開機或開啟特定檔案,更可將竊盜者使用的時間及其語音傳遞至網路伺服器,以供檢警單元追查。Fifth, when a thief wants to perform a booting process or open a specific file, under the protection of the decryption method of the embodiment, the thief can not only successfully boot or open a specific file, but also use the thief to use the time. And its voice is passed to the web server for tracking by the police unit.

第六、解密之次數更可限制於一預定次數之內,以進一步避免機器人程式(Robot program)的破解本解密方法。Sixth, the number of decryptions can be limited to a predetermined number of times to further avoid the cracking method of the robot program.

綜上所述,雖然本發明已以較佳實施例揭露如上,然其並非用以限定本發明。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾。因此,本發明之保護範圍當視後附之申請專利範圍所界定者為準。In conclusion, the present invention has been disclosed in the above preferred embodiments, and is not intended to limit the present invention. A person skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.

100‧‧‧行動通訊裝置100‧‧‧Mobile communication device

110‧‧‧記憶體110‧‧‧ memory

120‧‧‧語音擷取單元120‧‧‧Voice capture unit

130‧‧‧語音辨識單元130‧‧‧Voice recognition unit

140‧‧‧安控模組140‧‧‧Security module

150‧‧‧記憶體傳輸單元150‧‧‧Memory Transfer Unit

160‧‧‧網路傳輸單元160‧‧‧Network transmission unit

170‧‧‧顯示單元170‧‧‧ display unit

180‧‧‧計時器180‧‧‧Timer

200‧‧‧記憶卡200‧‧‧ memory card

300‧‧‧網路伺服器300‧‧‧Web server

900‧‧‧網際網路900‧‧‧Internet

DI‧‧‧解密提示資訊DI‧‧‧Decryption prompt information

DV‧‧‧解密語音DV‧‧‧Decrypted voice

DW‧‧‧解密文字DW‧‧‧Decrypted text

EV‧‧‧加密語音EV‧‧‧Encrypted voice

EW‧‧‧加密文字EW‧‧‧Encrypted text

P‧‧‧執行程序P‧‧‧execution procedures

T‧‧‧當時時間T‧‧‧Time

第1圖繪示本發明第一實施例之行動通訊裝置之加密方法的流程圖;第2圖繪示本發明第一實施例之行動通訊裝置之方塊圖;第3A~3B圖繪示本發明第一實施例之行動通訊裝置之解密方法的流程圖;第4圖繪示加密語音儲存於記憶卡之行動通訊裝置之方塊圖;第5圖繪示加密語音儲存於網路伺服器之行動通訊 裝置之方塊圖;以及第6A~6C圖繪示本發明第二實施例之行動通訊裝置之解密方法的流程圖。1 is a block diagram showing a method of encrypting a mobile communication device according to a first embodiment of the present invention; FIG. 2 is a block diagram showing a mobile communication device according to a first embodiment of the present invention; and FIG. 3A to FIG. 3B are diagrams showing the present invention. A flowchart of a decryption method of the mobile communication device of the first embodiment; FIG. 4 is a block diagram of a mobile communication device stored in a memory card; and FIG. 5 is a mobile communication of encrypted voice stored on a network server; FIG. 6A to FIG. 6C are flowcharts showing a decryption method of the mobile communication device according to the second embodiment of the present invention.

Claims (13)

一種行動通訊裝置之解密方法,包括:判斷一執行程序是否被要求啟動;若該執行程序被要求啟動,則判斷該執行程序是否已加密;若該執行程序已加密,則擷取一解密語音;擷取對應於該執行程序之一加密語音;辨識該解密語音為一解密文字,並辨識該加密語音為一加密文字;判斷該解密文字與該加密文字是否相同;若該解密文字與該加密文字相同,則啟動該執行程序;以及若該解密文字與該加密文字不相同,則擷取一當時時間並將該當時時間及該解密語音傳送至一網路伺服器;其中該加密語音之擷取步驟包括:判斷該加密語音是否儲存於該行動通訊裝置之一記憶體;若該加密語音儲存於該記憶體,則由該記憶體擷取該加密語音;若該加密語音未儲存於該記憶體,則判斷該加密語音是否可由該行動通訊裝置之一記憶體傳輸單元或一網路傳輸單元擷取;以及若該加密語音可由該記憶體傳輸單元擷取,則由該記憶體傳輸單元擷取該加密語音;以及 若該加密語音可由該網路傳輸單元擷取,則由該網路傳輸單元擷取該加密語音。 A method for decrypting a mobile communication device, comprising: determining whether an execution program is required to be started; if the execution program is required to be initiated, determining whether the execution program is encrypted; and if the execution program is encrypted, capturing a decrypted speech; Extracting an encrypted voice corresponding to one of the execution programs; identifying the decrypted voice as a decrypted text, and identifying the encrypted voice as an encrypted text; determining whether the decrypted text is the same as the encrypted text; and if the decrypted text and the encrypted text Similarly, the execution program is started; and if the decrypted text is different from the encrypted text, capturing a current time and transmitting the current time and the decrypted voice to a network server; wherein the encrypted voice is captured The step includes: determining whether the encrypted voice is stored in a memory of the mobile communication device; if the encrypted voice is stored in the memory, the encrypted voice is captured by the memory; if the encrypted voice is not stored in the memory Determining whether the encrypted voice can be a memory transmission unit or a network transmission unit of the mobile communication device Taken; and if the encrypted speech transmission unit may retrieve the memory, by the memory means to retrieve the encrypted voice transmission; and If the encrypted voice can be retrieved by the network transmission unit, the encrypted voice is retrieved by the network transmission unit. 如申請專利範圍第1項所述之行動通訊裝置之解密方法,更包括:若該解密文字與該加密文字不相同,則禁止啟動該執行程序。 The decryption method of the mobile communication device according to claim 1, further comprising: if the decrypted text is different from the encrypted text, prohibiting the execution of the execution program. 如申請專利範圍第1項所述之行動通訊裝置之解密方法,更包括:若該解密文字與該加密文字不相同,則判斷該解密文字及加密文字之判斷步驟之執行次數是否大於一預定次數;若該解密文字及該加密文字之判斷步驟之執行次數不大於該預定次數,則重複執行該解密語音之擷取步驟;以及若該解密文字及該加密文字之判斷步驟之執行次數大於該預定次數,則禁止執行該執行程序之解密方法。 The method for decrypting the mobile communication device according to claim 1, further comprising: if the decrypted text is different from the encrypted text, determining whether the number of executions of the decrypted text and the encrypted text is greater than a predetermined number of times And if the number of executions of the decrypted text and the judging step of the encrypted text is not greater than the predetermined number of times, the step of capturing the decrypted speech is repeated; and if the decrypted text and the step of determining the encrypted text are performed more than the predetermined number of times The number of times, the decryption method of the execution program is prohibited. 如申請專利範圍第3項所述之行動通訊裝置之解密方法,其中該預定次數係為三次。 The decryption method of the mobile communication device according to claim 3, wherein the predetermined number of times is three times. 如申請專利範圍第1項所述之行動通訊裝置之解密方法,更包括:顯示一解密提示資訊。 The method for decrypting the mobile communication device according to claim 1, further comprising: displaying a decryption prompt information. 如申請專利範圍第1項所述之行動通訊裝置之解密方法,其中該執行程序包括一開機程序或一特定檔案之開啟程序。 The method for decrypting a mobile communication device according to claim 1, wherein the execution program comprises a booting procedure or a specific file opening procedure. 一種行動通訊裝置,包括:一記憶體,用以儲存至少一加密語音,該加密語音對應於一執行程序;一語音擷取模組,用以擷取一解密語音,該解密語音對應於該執行程序;一語音辨識模組,用以將該解密語音辨識為一解密文字,並將該加密語音辨識為一加密文字;一安控模組,用以判斷該解密文字與該加密文字是否相同,若該解密文字與該加密文字相同,則該安控模組啟動該執行程序;以及一網路傳輸單元,若該解密文字與該加密文字不相同,則該安控模組記錄一當時時間並將該當時時間及該解密語音透過該網路傳輸單元傳送至一網路伺服器。 A mobile communication device includes: a memory for storing at least one encrypted voice, the encrypted voice corresponding to an execution program; and a voice capture module for capturing a decrypted voice, the decrypted voice corresponding to the execution a voice recognition module, configured to identify the decrypted voice as a decrypted text, and identify the encrypted voice as an encrypted text; a security control module, configured to determine whether the decrypted text is the same as the encrypted text, If the decrypted text is the same as the encrypted text, the security control module starts the execution program; and a network transmission unit, if the decrypted text is different from the encrypted text, the security control module records a current time and Transmitting the current time and the decrypted voice to the network server through the network transmission unit. 如申請專利範圍第7項所述之行動通訊裝置,其中若該解密文字與該加密文字不相同,則該安控模組禁止啟動該執行程序。 The mobile communication device according to claim 7, wherein if the decrypted text is different from the encrypted text, the security control module prohibits starting the execution program. 一種行動通訊裝置,包括:一記憶體傳輸單元,用以連接一記憶卡,該記憶卡儲存至少一加密語音,該加密語音對應於一執行程序;一語音擷取模組,用以擷取一解密語音,該解密語音對應於該執行程序;以及一語音辨識模組,用以將該解密語音辨識為一解密文字,並將該加密語音辨識為一加密文字;以及一安控模組,用以判斷該解密文字與該加密文字是否 相同,若該解密文字與該加密文字相同,則該安控模組啟動該執行程序;以及一網路傳輸單元,若該解密文字與該加密文字不相同,則該安控模組記錄一當時時間並將該當時時間及該解密語音透過該網路傳輸單元傳送至一網路伺服器。 A mobile communication device includes: a memory transfer unit for connecting to a memory card, the memory card storing at least one encrypted voice, the encrypted voice corresponding to an execution program; and a voice capture module for capturing a Decrypting the voice, the decrypted voice corresponding to the executing program; and a voice recognition module, configured to identify the decrypted voice as a decrypted text, and identify the encrypted voice as an encrypted text; and a security control module, To determine whether the decrypted text and the encrypted text are Similarly, if the decrypted text is the same as the encrypted text, the security control module starts the execution program; and a network transmission unit, if the decrypted text is different from the encrypted text, the security control module records a The time and the time and the decrypted voice are transmitted to the network server through the network transmission unit. 如申請專利範圍第9項所述之行動通訊裝置,其中若該解密文字與該加密文字不相同,則該安控模組禁止啟動該執行程序。 The mobile communication device according to claim 9, wherein if the decrypted text is different from the encrypted text, the security control module prohibits starting the execution program. 一種行動通訊裝置,包括:一網路傳輸單元,用以透過一網際網路連接至一網路伺服器,該網路伺服器儲存至少一加密語音,該加密語音對應於一執行程序;一語音擷取模組,用以擷取一解密語音,該解密語音對應於該執行程序;以及一語音辨識模組,用以將該解密語音辨識為一解密文字,並將該加密語音辨識為一加密文字;以及一安控模組,用以判斷該解密文字與該加密文字是否相同,若該解密文字與該加密文字相同,則該安控模組啟動該執行程序;以及一網路傳輸單元,若該解密文字與該加密文字不相同,則該安控模組記錄一當時時間並將該當時時間及該解密語音透過該網路傳輸單元傳送至一網路伺服器。 A mobile communication device includes: a network transmission unit for connecting to a network server through an internet, the network server storing at least one encrypted voice, the encrypted voice corresponding to an execution program; a voice The capture module is configured to capture a decrypted voice corresponding to the execution program, and a voice recognition module configured to identify the decrypted voice as a decrypted text and identify the encrypted voice as an encryption And a security control module for determining whether the decrypted text is the same as the encrypted text; if the decrypted text is the same as the encrypted text, the security control module starts the execution program; and a network transmission unit, If the decrypted text is different from the encrypted text, the security control module records a current time and transmits the current time and the decrypted voice to the network server through the network transmission unit. 如申請專利範圍第11項所述之行動通訊裝置,其中若該解密文字與該加密文字不相同,則該安控模組禁 止啟動該執行程序。 The mobile communication device according to claim 11, wherein if the decrypted text is different from the encrypted text, the security control module is forbidden Start the execution of the program. 如申請專利範圍第11項所述之行動通訊裝置,其中若該解密文字與該加密文字不相同,則該安控模組記錄一當時時間並將該當時時間及該解密語音透過該網路傳輸單元傳送至一網路伺服器將該解密語音傳送至該網路伺服器。The mobile communication device of claim 11, wherein if the decrypted text is different from the encrypted text, the security control module records a current time and transmits the current time and the decrypted voice through the network. The unit transmits to a network server to transmit the decrypted voice to the network server.
TW97146362A 2008-11-28 2008-11-28 Mobile communicating device, encryption method and decryption method thereof TWI390474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97146362A TWI390474B (en) 2008-11-28 2008-11-28 Mobile communicating device, encryption method and decryption method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97146362A TWI390474B (en) 2008-11-28 2008-11-28 Mobile communicating device, encryption method and decryption method thereof

Publications (2)

Publication Number Publication Date
TW201020993A TW201020993A (en) 2010-06-01
TWI390474B true TWI390474B (en) 2013-03-21

Family

ID=44832493

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97146362A TWI390474B (en) 2008-11-28 2008-11-28 Mobile communicating device, encryption method and decryption method thereof

Country Status (1)

Country Link
TW (1) TWI390474B (en)

Also Published As

Publication number Publication date
TW201020993A (en) 2010-06-01

Similar Documents

Publication Publication Date Title
US7962755B2 (en) System and method for biometrically secured, transparent encryption and decryption
JP2008047085A (en) Data security system, apparatus and method using usb device
WO2017143879A1 (en) File permission management method and device
WO2016192165A1 (en) Data encryption method and apparatus
US10789372B2 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
CN104573485A (en) Method and device for starting terminal application
CN102611555A (en) Data processing apparatus
US20130262876A1 (en) Method, Apparatus, and System for Performing Authentication on Bound Data Card and Mobile Host
CN103198037A (en) Reliable pipe control method and system for IO (input output) equipment
WO2018113537A1 (en) Method and system for encrypting photograph on the basis fingerprint identification
JP2009230178A (en) Security policy observance device
WO2020073916A1 (en) Encryption method and apparatus for storage device, and storage medium
CN106663158A (en) Managing user data for software services
JP2007517287A (en) Method for releasing access to a computer system or program
TWI390474B (en) Mobile communicating device, encryption method and decryption method thereof
JP2007122731A (en) Hard disk apparatus with biometrics sensor and method of protecting data therein
CN114980025B (en) Information viewing method of security chip and security chip device
JP2006146358A (en) Usb peripheral equipment control system and usb peripheral equipment control method
CN105844137B (en) Device and method for identifying picture browsing operation authority
JP2005234809A (en) Attachable/detachable external storage device and automatic start program
CN101754195A (en) Encryption method and decryption method for mobile communication device
JP2008059575A (en) System and method for monitoring seat-leaving of user
JP2004070849A (en) Information processor and information processing system
JP2005149093A (en) Storage device with access right control function, control program for storage device with access right control function and method for controlling access right
JP2009211487A (en) Information processor, information processing system and program

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees