CN105610580A - External speech encryption device based on smart phone and implementation method thereof - Google Patents

External speech encryption device based on smart phone and implementation method thereof Download PDF

Info

Publication number
CN105610580A
CN105610580A CN201610175337.5A CN201610175337A CN105610580A CN 105610580 A CN105610580 A CN 105610580A CN 201610175337 A CN201610175337 A CN 201610175337A CN 105610580 A CN105610580 A CN 105610580A
Authority
CN
China
Prior art keywords
encryption device
external voice
mobile phone
voice encryption
smart mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610175337.5A
Other languages
Chinese (zh)
Inventor
左光磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Huiyan Technology Co Ltd
Original Assignee
Chengdu Huiyan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Huiyan Technology Co Ltd filed Critical Chengdu Huiyan Technology Co Ltd
Priority to CN201610175337.5A priority Critical patent/CN105610580A/en
Publication of CN105610580A publication Critical patent/CN105610580A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an external speech encryption device based on a smart phone and an implementation method thereof, and solves the problem of low information security of smart phones in the prior art. The external speech encryption device communicates with the phone via a data interface (USB (Universal Series Bus) interface) of the phone. Acquisition, compression and encryption of speech are performed in the external speech encryption device, a working key is merely stored in the external speech encryption device, and even if the smart phone is attacked by implanted bugs or Trojan, only the encrypted speech data can be acquired, but the working key cannot be acquired, so that the security of speech communication is ensured.

Description

Based on external voice encryption device and its implementation of smart mobile phone
Technical field
The present invention relates to coded communication technical field, specifically, relate to a kind of external voice encryption device and its implementation based on smart mobile phone.
Background technology
Along with the use of smart mobile phone is more and more universal, the Information Security that smart mobile phone uses is subject to the public's attention gradually. But smart mobile phone is compared to traditional non intelligent mobile phone, it is easy to the Malwares such as implanted wooden horse, virus, illegally obtains user's information, comprises calling record etc., and user is caused to very large harm. User adopts the dialog context of smart mobile phone call to relate to the aspects of contents such as individual privacy, commercial code, if be stolen, serious infringement user's legitimate rights and interests. In prior art, for preventing mobile phone, eavesdropping generally realizes by the embedded anti-eavesdrop software of mobile phone, although these softwares can play certain protection effect,, its anti-eavesdrop, anti-effect of stealing bad, user experience is extremely low.
Summary of the invention
The object of the invention is to overcome above-mentioned defect, a kind of external voice encryption device of the security that can effectively ensure voice call is provided.
To achieve these goals, the technical solution used in the present invention is as follows:
Based on the external voice encryption device of smart mobile phone, comprise Mike, receiver, coder, processor, power supply chip and communication interface; Described power supply chip is connected with described processor, between described coder and described processor, carries out two-way communication; Described processor connects the USB interface of smart mobile phone by described communication interface, realize thus and the communicating by letter of smart mobile phone; Described Mike exports voice signal to described coder, and described coder output voice signal is to described receiver.
Further, the external voice encryption device based on smart mobile phone also comprises the memory being connected with described processor.
Further, the external voice encryption device based on smart mobile phone also comprises the indicator lamp for showing external voice encryption device and smart mobile phone connection status.
A kind of smart mobile phone, comprise the mobile phone body that possesses data-interface, on described data-interface, insert the external voice encryption device based on smart mobile phone, described smart mobile phone is the described external voice encryption device power supply based on smart mobile phone by data-interface and sets up with it communication.
The implementation method of the external voice encryption device based on smart mobile phone, comprises the following steps:
(1) communicating pair completes the configuration of external voice encryption device:
(2) calling party initiates call request, and callee accepts, after call request, to enter talking state;
(3) calling party's external voice encryption device generates working key W1, PKI P1 and private key S1, and callee's external voice encryption device generates working key W2, PKI P2 and private key S2;
(4) calling party's external voice encryption device uses public-key after P2 cryptographic work key W1 and transfers to callee, and callee's external voice encryption device uses public-key after P1 cryptographic work key W2 and transfers to calling party;
(5) calling party's external voice encryption device uses private key S1 deciphering to obtain working key W2, and callee's external voice encryption device uses private key S2 deciphering to obtain working key W1;
(6) calling party's external voice encryption device uses W1 encrypted speech transfer of data to callee, and deciphers the speech data receiving with W2, after decompression, DA conversion, delivers to receiver;
Callee's external voice encryption device uses W2 encrypted speech transfer of data to calling party, and deciphers the speech data receiving with W1, after decompression, DA conversion, delivers to receiver;
Wherein, the concrete mode of described step (1) is as follows:
(11) external voice encryption device being inserted to the data-interface of smart mobile phone, is external voice encryption device power supply, and sets up communicating by letter of external voice encryption device and smart mobile phone;
(12) whether external voice encryption device checking smart mobile phone mates, and if so, carries out next step.
Further, while configuring external voice encryption device, external voice encryption device and smart mobile phone need be bound, specifically comprise the following steps:
(v1) by the data-interface of external voice encryption device insertion smart mobile phone;
(v2) user arranges user password A on smart mobile phone, meanwhile, and smart mobile phone generating indexes ID;
(v3) smart mobile phone transmission user password A and index ID are to external voice encryption device;
(v4) external voice encryption device is searched PKI P and private key S according to index ID, if search less than, generate;
(v5) external voice encryption device sends PKI P to smart mobile phone;
(v6) external voice encryption device storage index ID, user password A, PKI P and private key S; Smart mobile phone storage of public keys P.
Further, in described step (12), the concrete grammar whether external voice encryption device checking smart mobile phone mates is as follows:
(121) on smart mobile phone, input user password A1;
(122) after smart mobile phone adopts PKI P to user password A1 and index ID1 encryption, transfer to external voice encryption device;
(123) external voice encryption device uses private key S deciphering to obtain user password A1 and index ID1;
(124) whether external voice encryption device authentication of users password A1 and index ID1 mate with index ID, user password A, if coupling is carried out next step.
Compared with prior art, the present invention has following beneficial effect:
The present invention communicates with mobile phone by the data-interface (USB interface) of mobile phone, the acquisition process of voice, compression, encryption are all carried out on external voice encryption device, and can ensure that working key is only stored in external voice encryption device, even the implanted virus of smart mobile phone or wooden horse like this, also be merely able to obtain the speech data after encryption, and cannot obtain working key, thus the security of guarantee voice call.
Brief description of the drawings
Fig. 1 is the theory diagram of external voice encryption device.
Detailed description of the invention
Below in conjunction with embodiment, the invention will be further described, and embodiments of the present invention include but not limited to the following example.
Embodiment
Along with the development of mobile phone technique, smartphone data interface is unified substantially for data-interface, it is usb interface, and generally support usbotg function, can serve as host access external equipment (as u dish, mouse etc.), and the electric current that is no more than 100ma can be externally provided, making outer no longer needs battery that power supply is provided when being located at electric current and being no more than 100ma, can make the volume of peripheral hardware accomplish optimum.
As shown in Figure 1, the present embodiment provides a kind of external voice encryption device, between the USB interface of this encryption device by mobile phone and mobile phone, realize and communicating by letter, when work, external voice encryption device is inserted on smartphone data interface, provide power supply by data-interface (usb) for external voice encryption device by smart mobile phone, external voice encryption device completes the collection of voice signal and broadcasting, AD/DA conversion, compressed encoding, encryption, is sent to smart mobile phone; By the dedicated voice communication software being arranged on smart mobile phone, the encrypted speech data of receiving are sent to the communication server after framing again, the encrypted speech data retransmission that communication server handle is received is to recipient. By above-mentioned design, by to completing in the external voice encryption device of being encrypted in of dialog context, data information transfer between mobile phone, in fact transmission be through encryption after content, obtain after encrypted content calling party or callee, then via binding external voice encryption device complete deciphering, even the implanted virus of smart mobile phone or wooden horse like this, also be merely able to obtain the speech data after encryption, and cannot obtain working key, thus the security of guarantee voice call.
In the present embodiment, external voice encryption device includes following structure: Mike, receiver, coder, processor, power supply chip, communication interface and memory; Wherein, power supply chip is connected and is the operation power supply of each parts with processor; Between coder and processor, carry out two-way communication, be mainly responsible for the conversion of data; Processor connects the USB interface of smart mobile phone by communication interface, realize and the communicating by letter of smart mobile phone thus; When phonetic entry, Mike exports voice signal to coder; When voice output, coder output voice signal is to receiver. External voice encryption device has been used for collection, compression, the encryption work of upstream voice data, is sent to smart mobile phone; Meanwhile, complete deciphering, decompression, the broadcasting of downlink data. It is as follows that this installs operable cryptographic algorithm: the rivest, shamir, adelmans such as SM2, DES, 3DES; The symmetric encipherment algorithm such as SM4, AES.
In order better to implement external voice encryption device, the present embodiment is also provided with indicator lamp, and indicator lamp, after external voice encryption device and mobile phone successful connection, plays indicative function; Or indicator lamp is connected with mobile phone at external voice encryption device when unsuccessful, plays indicative function, also can be by the two combination, the different colours/state of employing is pointed out.
Calling party completes by the communication server with communicating by letter of callee, and the communication server has been responsible for the functions such as foundation, the communication link of talking link are safeguarded, communicating data forwards, dismounting communication link.
In order to make those skilled in the art, the present patent application is had and understands more clearly and be familiar with, to adopting external voice encryption device to realize the method for communication, be specifically introduced below.
First, communicating pair (calling party and callee) all needs to configure external voice encryption device; Secondly, the external voice encryption device that communicating pair configures should be the corresponding external voice encryption device of having bound in advance, otherwise, cannot normally realize communication, concrete binding mode is as follows: the data-interface that (v1) external voice encryption device is inserted to smart mobile phone; (v2) user arranges user password A on smart mobile phone, meanwhile, and smart mobile phone generating indexes ID; (v3) smart mobile phone transmission user password A and index ID are to external voice encryption device; (v4) external voice encryption device is searched PKI P and private key S according to index ID, if search less than, generate; (v5) external voice encryption device sends PKI P to smart mobile phone; (v6) external voice encryption device storage index ID, user password A, PKI P and private key S; Smart mobile phone storage of public keys P. Wherein, index ID is generated according to some information of mobile phone at random by voice communication software.
Based on above-mentioned, in the time that communicating pair adopts external voice encryption device to communicate, between the mobile phone that external voice encryption device and user hold, can verify, concrete grammar is as follows: (121) input user password A1 on smart mobile phone; (122) after smart mobile phone adopts PKI P to user password A1 and index ID1 encryption, transfer to external voice encryption device; (123) external voice encryption device uses private key S deciphering to obtain user password A1 and index ID1; (124) whether external voice encryption device authentication of users password A1 and index ID1 mate with index ID, user password A, if coupling is carried out next step.
Complete after checking, user's operating handset enters working interface, and calling party initiates call request, and callee accepts, after call request, to enter talking state. In communication process, carry out following steps: one, calling party's external voice encryption device generates working key W1, PKI P1 and private key S1, callee's external voice encryption device generates working key W2, PKI P2 and private key S2; Two, calling party's external voice encryption device uses public-key after P2 cryptographic work key W1 and transfers to callee, and callee's external voice encryption device uses public-key after P1 cryptographic work key W2 and transfers to calling party; Three, calling party's external voice encryption device uses private key S1 deciphering to obtain working key W2, and callee's external voice encryption device uses private key S2 deciphering to obtain working key W1; Four, the transmission of speech data between calling party and callee: calling party's external voice encryption device uses W1 encrypted speech transfer of data to callee, and deciphers the speech data receiving with W2 is delivered to receiver after decompression, DA conversion; Callee's external voice encryption device uses W2 encrypted speech transfer of data to calling party, and deciphers the speech data receiving with W1, after decompression, DA conversion, delivers to receiver.
According to above-described embodiment, just can realize well the present invention. What deserves to be explained is; under prerequisite based on above-mentioned design principle; for solving same technical problem; even if some that make on architecture basics disclosed in this invention are without substantial change or polishing; the essence of the technical scheme adopting is still the same with the present invention, therefore it also should be in protection scope of the present invention.

Claims (7)

1. the external voice encryption device based on smart mobile phone, is characterized in that, comprises Mike, receiver, coder, processor, power supply chip and communication interface; Described power supply chip is connected with described processor, between described coder and described processor, carries out two-way communication; Described processor connects the USB interface of smart mobile phone by described communication interface, realize thus and the communicating by letter of smart mobile phone; Described Mike exports voice signal to described coder, and described coder output voice signal is to described receiver.
2. the external voice encryption device based on smart mobile phone according to claim 1, is characterized in that, also comprises the memory being connected with described processor.
3. the external voice encryption device based on smart mobile phone according to claim 1, is characterized in that, also comprises the indicator lamp for showing external voice encryption device and smart mobile phone connection status.
4. a smart mobile phone, comprise the mobile phone body that possesses data-interface, it is characterized in that, on described data-interface, insert the external voice encryption device based on smart mobile phone as described in claim 1-3 any one, described smart mobile phone is the described external voice encryption device power supply based on smart mobile phone by data-interface and sets up with it communication.
5. the implementation method of the external voice encryption device based on smart mobile phone as described in claim 1-3 any one, is characterized in that, comprises the following steps:
(1) communicating pair completes the configuration of external voice encryption device:
(2) calling party initiates call request, and callee accepts, after call request, to enter talking state;
(3) calling party's external voice encryption device generates working key W1, PKI P1 and private key S1, and callee's external voice encryption device generates working key W2, PKI P2 and private key S2;
(4) calling party's external voice encryption device uses public-key after P2 cryptographic work key W1 and transfers to callee, and callee's external voice encryption device uses public-key after P1 cryptographic work key W2 and transfers to calling party;
(5) calling party's external voice encryption device uses private key S1 deciphering to obtain working key W2, and callee's external voice encryption device uses private key S2 deciphering to obtain working key W1;
(6) calling party's external voice encryption device uses W1 encrypted speech transfer of data to callee, and deciphers the speech data receiving with W2, after decompression, DA conversion, delivers to receiver;
Callee's external voice encryption device uses W2 encrypted speech transfer of data to calling party, and deciphers the speech data receiving with W1, after decompression, DA conversion, delivers to receiver;
Wherein, the concrete mode of described step (1) is as follows:
(11) external voice encryption device being inserted to the data-interface of smart mobile phone, is external voice encryption device power supply, and sets up communicating by letter of external voice encryption device and smart mobile phone;
(12) whether external voice encryption device checking smart mobile phone mates, and if so, carries out next step.
6. implementation method according to claim 5, is characterized in that, while configuring external voice encryption device, external voice encryption device and smart mobile phone need be bound, and specifically comprises the following steps:
(v1) by the data-interface of external voice encryption device insertion smart mobile phone;
(v2) user arranges user password A on smart mobile phone, meanwhile, and smart mobile phone generating indexes ID;
(v3) smart mobile phone transmission user password A and index ID are to external voice encryption device;
(v4) external voice encryption device is searched PKI P and private key S according to index ID, if search less than, generate;
(v5) external voice encryption device sends PKI P to smart mobile phone;
(v6) external voice encryption device storage index ID, user password A, PKI P and private key S; Smart mobile phone storage of public keys P.
7. implementation method according to claim 6, is characterized in that, in described step (12), the concrete grammar whether external voice encryption device checking smart mobile phone mates is as follows:
(121) on smart mobile phone, input user password A1;
(122) after smart mobile phone adopts PKI P to user password A1 and index ID1 encryption, transfer to external voice encryption device;
(123) external voice encryption device uses private key S deciphering to obtain user password A1 and index ID1;
(124) whether external voice encryption device authentication of users password A1 and index ID1 mate with index ID, user password A, if coupling is carried out next step.
CN201610175337.5A 2016-03-25 2016-03-25 External speech encryption device based on smart phone and implementation method thereof Pending CN105610580A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610175337.5A CN105610580A (en) 2016-03-25 2016-03-25 External speech encryption device based on smart phone and implementation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610175337.5A CN105610580A (en) 2016-03-25 2016-03-25 External speech encryption device based on smart phone and implementation method thereof

Publications (1)

Publication Number Publication Date
CN105610580A true CN105610580A (en) 2016-05-25

Family

ID=55990128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610175337.5A Pending CN105610580A (en) 2016-03-25 2016-03-25 External speech encryption device based on smart phone and implementation method thereof

Country Status (1)

Country Link
CN (1) CN105610580A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106604273A (en) * 2016-12-23 2017-04-26 成都三零嘉微电子有限公司 Mobile phone voice encrypted communication method based on secure voice SOC chip
CN106850210A (en) * 2017-02-28 2017-06-13 努比亚技术有限公司 Mobile terminal sound call handling method and mobile terminal
CN108092762A (en) * 2017-12-19 2018-05-29 安语(北京)科技有限公司 A kind of USB interface-based voice data encryption device, system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050036624A1 (en) * 2003-07-25 2005-02-17 Kent Adrian Patrick Quantum cryptography
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN104717074A (en) * 2015-04-02 2015-06-17 东南大学 Shared key security communication method for fusing private information
CN105050082A (en) * 2015-09-11 2015-11-11 深圳市九鼎安华科技有限公司 Voice communication method and device
CN105323060A (en) * 2015-11-05 2016-02-10 同济大学 Encryption method for secure communication based on joint channel and user identification code
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN205584214U (en) * 2016-03-25 2016-09-14 成都汇研科技有限公司 Smart mobile phone of external pronunciation encryption device and constitution based on smart mobile phone

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050036624A1 (en) * 2003-07-25 2005-02-17 Kent Adrian Patrick Quantum cryptography
CN103379486A (en) * 2013-06-08 2013-10-30 山东量子科学技术研究院有限公司 Plug and play type portable communication secrecy device and communication method thereof
CN104717074A (en) * 2015-04-02 2015-06-17 东南大学 Shared key security communication method for fusing private information
CN105050082A (en) * 2015-09-11 2015-11-11 深圳市九鼎安华科技有限公司 Voice communication method and device
CN105323060A (en) * 2015-11-05 2016-02-10 同济大学 Encryption method for secure communication based on joint channel and user identification code
CN105357226A (en) * 2015-12-16 2016-02-24 深圳市九鼎安华科技有限公司 Encryption communication method based on VOIP (voice over internet phone) communication
CN205584214U (en) * 2016-03-25 2016-09-14 成都汇研科技有限公司 Smart mobile phone of external pronunciation encryption device and constitution based on smart mobile phone

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106604273A (en) * 2016-12-23 2017-04-26 成都三零嘉微电子有限公司 Mobile phone voice encrypted communication method based on secure voice SOC chip
CN106850210A (en) * 2017-02-28 2017-06-13 努比亚技术有限公司 Mobile terminal sound call handling method and mobile terminal
CN108092762A (en) * 2017-12-19 2018-05-29 安语(北京)科技有限公司 A kind of USB interface-based voice data encryption device, system and method

Similar Documents

Publication Publication Date Title
CN102255730A (en) Digital certificate safety lock device and digital certificate authentication system and method
CN103905200A (en) Identity authentication method and system based on sound wave communications
CN104202299A (en) System and method of identity authentication based on Bluetooth
CN101150397B (en) Method and mobile terminal for secure communication between mobile terminal and computer
CN103458400A (en) Key management method for voice encryption communication system
CN105357226A (en) Encryption communication method based on VOIP (voice over internet phone) communication
CN104301011A (en) Method and system for realizing voice encryption communication between bluetooth devices
CN105610580A (en) External speech encryption device based on smart phone and implementation method thereof
CN101661563B (en) Safe multi-interface certificate mobile inquiry system and method thereof
CN103458401B (en) A kind of voice encryption communication system and communication means
CN103200002A (en) Intelligent combination lock based on headphone port
CN202177904U (en) Intelligent encrypted key based on audio interface
CN101567885A (en) Voice call device as well as system and method thereof
CN106412812A (en) Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset
CN205584214U (en) Smart mobile phone of external pronunciation encryption device and constitution based on smart mobile phone
CN103237306A (en) Usbkey of cellphone identity authentication terminal and application of Usbkey
WO2015067056A1 (en) User data terminal and intelligent system
CN202014304U (en) Mobile phone privacy protection system based on code authentication
CN104077686A (en) Device and method for safety processing and storage of mobile payment transaction data
CN102904718A (en) Audio communication based information security equipment and communication method thereof
CN203387524U (en) Multi-interface and multifunctional intelligent cipher key apparatus
CN113365268A (en) Intelligent card with encryption and decryption functions, intelligent terminal, data communication system and method
CN203708432U (en) Earphone shield and signature system
CN102026182A (en) Safety control method and system of mobile terminal
CN105184116A (en) Intelligent equipment software encryption and personal authentication device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525