CN105634729A - Mobile phone encryption and decryption method based on bluetooth equipment - Google Patents
Mobile phone encryption and decryption method based on bluetooth equipment Download PDFInfo
- Publication number
- CN105634729A CN105634729A CN201510993057.0A CN201510993057A CN105634729A CN 105634729 A CN105634729 A CN 105634729A CN 201510993057 A CN201510993057 A CN 201510993057A CN 105634729 A CN105634729 A CN 105634729A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- mac address
- bluetooth equipment
- encrypting
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
Abstract
The invention discloses a mobile phone encryption and decryption method based on bluetooth equipment, and aims at realizing the data and application encryption and decryption operation process of a mobile phone by relying on other bluetooth equipment (such as a smart wristband and a smart watch). The specific bluetooth equipment (such as the smart wristband or the smart watch) is required in the mobile phone encryption and decryption process and is in the connection state, or decryption cannot be performed so that privacy of data files and impenetrability of sensitive application in the mobile phone can be greatly maintained even the user's mobile phone is lost. More abundant choices are provided for the data and application encryption and decryption method in the age that smart wearable equipment is increasingly popular so that convenience and operability are high.
Description
Technical field
The present invention relates to mobile phone cipher technical field, in particular to a kind of mobile phone cipher based on bluetooth equipment and deciphering method.
Background technology
Our life today of information-based high speed development becomes very convenient, mobile phone is not merely a pure communication tool, mobile phone becomes more and more important in our work with the effect in daily life, we use in the process of mobile phone and store a large amount of individual privacy data on mobile phone, such as address list, information, photo, recording, video, the data of payment account and other application. Once mobile phone is lost, what cause is not only the loss of a mobile phone, it is also possible to cause the leakage of privacy, the loss of significant data and the loss of property.
Meanwhile, it is also more and more universal that smart bluetooth dresses equipment, such as Intelligent bracelet, and intelligent watch etc. Having had some common methods in mobile phone cipher at present, such as mobile phone arranges numerical ciphers, pattern password, just can enter mobile phone after input password. If adding the link (optional) with other particular bluetooth equipment connection in the encryption and decryption process of data in mobile phone, can make cellie that the Encrypt and Decrypt operation of personal data (application) is become very convenient.
To sum up, need at present to provide a kind of new technical scheme, to meet above-mentioned demand.
Summary of the invention
It is an object of the invention to provide a kind of mobile phone cipher based on bluetooth equipment and deciphering method, solve defect and deficiency that current technology exists.
The present invention provides a kind of mobile phone cipher based on bluetooth equipment and deciphering method, comprises the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
The present invention also provides a kind of to the method for data in mobile phone encryption and deciphering, comprises the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
The present invention also provides a kind of to the method for application program of mobile phone encryption and deciphering, comprises the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
As an embodiment, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
As an embodiment, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
In the present invention, existing owing to mobile phone encryption and decryption process all must have specific bluetooth equipment (Intelligent bracelet or intelligent watch etc.) and it is in connection state, if not being specific bluetooth equipment, cannot decipher. Even if the mobile phone of user is lost like this, the secret of the data file in mobile phone and the impenetrability of sensitive application also can be kept well. In the epoch that Intelligent worn device is popularized day by day, it provides more abundant selection to the encipher-decipher method of data and application, convenient and workable. The present invention is also suitable for user and uses multiple bluetooth equipment to encrypt or decipher, and can go switching according to practical situation for the bluetooth equipment encrypted, so the present invention requires that each encryption all needs to connect bluetooth equipment, to improve confidentiality.
Accompanying drawing explanation
Fig. 1 is the data encryption schema described in an embodiment;
Fig. 2 is the data deciphering schema described in an embodiment;
Fig. 3 is the application program encryption flow figure described in an embodiment;
Fig. 4 is the deciphering schema of the application program described in an embodiment.
Embodiment
The technical scheme of the present invention is described further below in conjunction with drawings and embodiments.
The present invention provides a kind of mobile phone cipher based on bluetooth equipment and deciphering method, comprises the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
See Fig. 1 and Fig. 2, the present invention also provides a kind of to the method for data in mobile phone encryption and deciphering, comprises the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
As shown in Figure 1, data encryption flow process starts, it is desired to mobile phone and target Bluetooth devices connect, and needs the mac address obtaining target Bluetooth devices as the key of DES symmetry encryption algorithm simultaneously, after encryption algorithm success, can generate data file encryption. If not and target Bluetooth devices connect, then encrypt failure. As shown in Figure 2, data deciphering flow process starts, and also requires that mobile phone and target Bluetooth devices connect, and connects if not establishing bluetooth, then directly deciphers failure. Afterwards, the bluetooth equipment establishing connection is done mac address check, if with keep before to add decryption key identical, then verification succeeds, then uses mac to be decrypted operation for double secret key ciphertext data file.
See Fig. 3 and Fig. 4, the present invention also provides a kind of to the method for application program of mobile phone encryption and deciphering, comprises the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
As an embodiment, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
As an embodiment, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
Described binding relationship is a kind of corresponding relation between application and specific mac address. Comprise but not only for the information such as sequence number (may there is many group bindings relation) of the application identification code bag name of application (in such as android system), the bluetooth equipment mac address participating in encryption and decryption and binding relationship between the two above. In ciphering process, it is necessary to obtain application identification code to be encrypted, and participate in the mac address of the bluetooth equipment of encryption, to realize binding. In the database that complete binding relationship can be stored in handheld device or file.
As shown in Figure 3, application program encryption flow starts, require that mobile phone and target Bluetooth devices connect, need to obtain the mac address of the bluetooth equipment setting up connection afterwards, then, the binding relationship of bluetooth equipment mac address and application program can be saved in mobile phone, preserve after successfully, application encipher flow process terminates, other situation, and application encipher all can be failed. As shown in Figure 4, application program deciphering flow process starts, require that mobile phone and target Bluetooth devices connect, read the mac address being kept in advance in mobile phone and the relation of application binding afterwards, then need to verify the Bluetooth address coupling that the mac address of bluetooth equipment is and preserves before, if can mate, then successful decryption, enter the normal Booting sequence of application smoothly, otherwise decipher unsuccessfully, encrypted application cannot be entered.
It is an object of the invention to realize mobile phone and rely on the Encrypt and Decrypt operating process that other bluetooth equipment (such as Intelligent bracelet, intelligent watch) completes data and application.
Data in mobile phone ciphering process of the present invention, using the mac address of bluetooth equipment specified as key in ciphering process, removes data file encryption by encryption algorithm. Data in mobile phone decrypting process needs the bluetooth equipment verifying specific mac address be just in connection state with mobile phone, otherwise failure can be deciphered, protect the secret of cellphone subscriber's data with this.
Mobile phone application encipher process of the present invention, using the mac address of bluetooth equipment specified as key in ciphering process, and the binding relationship establishing mac address and application preserves in advance. Mobile phone application decrypting process needs the bluetooth equipment verifying specific mac address be just in connection state with mobile phone, otherwise failure can be deciphered, protect the secret of application program of mobile phone with this.
The present invention relates to data Encrypt and Decrypt process, encryption system mathematics denotational description is as follows: S={P, C, K, E, D}, wherein plaintext space P is various data files to be encrypted, and ciphertext space C is the data file after having encrypted, and key space K is the MAC address of bluetooth equipment, encryption algorithm adopts the symmetrical algorithm of E DES, and deciphering algorithm D is the inverse of E.
The present invention relates to application Encrypt and Decrypt process. Cellphone subscriber can select the application specified such as notepad appli-cation, to be encrypted. When application encipher, it is necessary to mobile phone and bluetooth equipment match and connects, encryption application can form bundle relation with the MAC address of specific bluetooth equipment, and this relation is kept in mobile phone. Time user opens related application, it is necessary to first go deciphering, when deciphering, can judge to be kept in advance whether bluetooth equipment corresponding to MAC address of that inside mobile phone has established connection with mobile phone, if, then successful decryption, otherwise, application program cannot be opened.
The invention reside in and the MAC address of particular bluetooth equipment is kept in mobile phone in advance, as the key that enciphering and deciphering algorithm must be used, require to specify the bluetooth equipment belonging to MAC address must be in connection state (if mobile phone is lost, specify the bluetooth equipment belonging to MAC address can not be in connection state) during encryption and decryption simultaneously.
Those of ordinary skill in the art will be appreciated that, above enforcement mode is only used to the present invention is described, and not it is used as limitation of the invention, as long as in the spirit of the present invention, to the change of above enforcement mode, modification all by the Claims scope dropping on the present invention.
Claims (5)
1. the mobile phone cipher based on bluetooth equipment and deciphering method, it is characterised in that, comprise the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
2. method data in mobile phone encrypted and deciphers based on claim 1, it is characterised in that, comprise the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
3. method application program of mobile phone encrypted and deciphers based on claim 1, it is characterised in that, comprise the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
4. method as claimed in claim 3, it is characterized in that, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
5. method as claimed in claim 4, it is characterised in that, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510993057.0A CN105634729A (en) | 2015-12-25 | 2015-12-25 | Mobile phone encryption and decryption method based on bluetooth equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510993057.0A CN105634729A (en) | 2015-12-25 | 2015-12-25 | Mobile phone encryption and decryption method based on bluetooth equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105634729A true CN105634729A (en) | 2016-06-01 |
Family
ID=56049285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510993057.0A Pending CN105634729A (en) | 2015-12-25 | 2015-12-25 | Mobile phone encryption and decryption method based on bluetooth equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105634729A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709362A (en) * | 2016-12-06 | 2017-05-24 | 武汉斗鱼网络科技有限公司 | File encryption method and device and file decryption method and device |
CN106897632A (en) * | 2017-02-28 | 2017-06-27 | 深圳天珑无线科技有限公司 | A kind of decryption method, system, electronic equipment and decryption device |
CN107948178A (en) * | 2017-12-04 | 2018-04-20 | 深圳绿米联创科技有限公司 | Intelligent domestic system and information ciphering method and device, terminal |
CN113795023A (en) * | 2021-09-26 | 2021-12-14 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and block encryption |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
CN104182676A (en) * | 2014-09-04 | 2014-12-03 | 北京邮电大学 | Intelligent terminal data encryption method and device |
CN104469752A (en) * | 2014-11-17 | 2015-03-25 | 深圳市中兴移动通信有限公司 | Encryption method and device and terminal |
CN105162605A (en) * | 2015-09-28 | 2015-12-16 | 东南大学 | Digital signature and authentication method |
-
2015
- 2015-12-25 CN CN201510993057.0A patent/CN105634729A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
CN104182676A (en) * | 2014-09-04 | 2014-12-03 | 北京邮电大学 | Intelligent terminal data encryption method and device |
CN104469752A (en) * | 2014-11-17 | 2015-03-25 | 深圳市中兴移动通信有限公司 | Encryption method and device and terminal |
CN105162605A (en) * | 2015-09-28 | 2015-12-16 | 东南大学 | Digital signature and authentication method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106709362A (en) * | 2016-12-06 | 2017-05-24 | 武汉斗鱼网络科技有限公司 | File encryption method and device and file decryption method and device |
CN106897632A (en) * | 2017-02-28 | 2017-06-27 | 深圳天珑无线科技有限公司 | A kind of decryption method, system, electronic equipment and decryption device |
CN106897632B (en) * | 2017-02-28 | 2020-12-25 | 深圳天珑无线科技有限公司 | Decryption method, system, electronic equipment and decryption equipment |
CN107948178A (en) * | 2017-12-04 | 2018-04-20 | 深圳绿米联创科技有限公司 | Intelligent domestic system and information ciphering method and device, terminal |
CN113795023A (en) * | 2021-09-26 | 2021-12-14 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and block encryption |
CN113795023B (en) * | 2021-09-26 | 2024-03-19 | 深圳市芯中芯科技有限公司 | Bluetooth data transmission encryption method based on chaotic sequence and packet encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107358441B (en) | Payment verification method and system, mobile device and security authentication device | |
CN109040090A (en) | A kind of data ciphering method and device | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
CN106101150B (en) | The method and system of Encryption Algorithm | |
CN101196855A (en) | Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method | |
CN101626567A (en) | Short message sending and receiving method, short message sending and receiving device and mobile terminal | |
CN105634729A (en) | Mobile phone encryption and decryption method based on bluetooth equipment | |
CN102833075A (en) | Identity authentication and digital signature method based on three-layered overlapping type key management technology | |
CN110535641A (en) | Key management method and device, computer equipment and storage medium | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN105407109A (en) | Data secure transmission method between Bluetooth devices | |
CN107707562A (en) | A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm | |
CN102938762B (en) | A kind of file safety management system based on mobile terminal | |
CN101281498A (en) | Ciphering type mobile storage apparatus | |
CN102332077A (en) | Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof | |
CN100431297C (en) | Method for preventing user's pin from illegal use by double verification protocol | |
CN103237302A (en) | Sensing information safety protection method for RFID (radio frequency identification) tags in Internet of Things | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
CN105701390A (en) | Encryption terminal remote management method, encryption terminal and manager | |
CN101420687B (en) | Identity verification method based on mobile terminal payment | |
CN107483187A (en) | A kind of data guard method and device based on credible password module | |
JP6540381B2 (en) | Information processing system and encryption communication method | |
CN106027553B (en) | A kind of encryption and decryption method based on dynamic password | |
CN110022213A (en) | A kind of more level of confidentiality processing methods based on quantum key protection computer data | |
CN115499118A (en) | Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160601 |
|
WD01 | Invention patent application deemed withdrawn after publication |