CN105634729A - Mobile phone encryption and decryption method based on bluetooth equipment - Google Patents

Mobile phone encryption and decryption method based on bluetooth equipment Download PDF

Info

Publication number
CN105634729A
CN105634729A CN201510993057.0A CN201510993057A CN105634729A CN 105634729 A CN105634729 A CN 105634729A CN 201510993057 A CN201510993057 A CN 201510993057A CN 105634729 A CN105634729 A CN 105634729A
Authority
CN
China
Prior art keywords
mobile phone
mac address
bluetooth equipment
encrypting
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510993057.0A
Other languages
Chinese (zh)
Inventor
刘志坚
苗健
戴智毅
金海建
李松
杨巨伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yunchengju Intelligent Technology Co Ltd
Original Assignee
Shanghai Yunchengju Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yunchengju Intelligent Technology Co Ltd filed Critical Shanghai Yunchengju Intelligent Technology Co Ltd
Priority to CN201510993057.0A priority Critical patent/CN105634729A/en
Publication of CN105634729A publication Critical patent/CN105634729A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces

Abstract

The invention discloses a mobile phone encryption and decryption method based on bluetooth equipment, and aims at realizing the data and application encryption and decryption operation process of a mobile phone by relying on other bluetooth equipment (such as a smart wristband and a smart watch). The specific bluetooth equipment (such as the smart wristband or the smart watch) is required in the mobile phone encryption and decryption process and is in the connection state, or decryption cannot be performed so that privacy of data files and impenetrability of sensitive application in the mobile phone can be greatly maintained even the user's mobile phone is lost. More abundant choices are provided for the data and application encryption and decryption method in the age that smart wearable equipment is increasingly popular so that convenience and operability are high.

Description

Based on mobile phone cipher and the deciphering method of bluetooth equipment
Technical field
The present invention relates to mobile phone cipher technical field, in particular to a kind of mobile phone cipher based on bluetooth equipment and deciphering method.
Background technology
Our life today of information-based high speed development becomes very convenient, mobile phone is not merely a pure communication tool, mobile phone becomes more and more important in our work with the effect in daily life, we use in the process of mobile phone and store a large amount of individual privacy data on mobile phone, such as address list, information, photo, recording, video, the data of payment account and other application. Once mobile phone is lost, what cause is not only the loss of a mobile phone, it is also possible to cause the leakage of privacy, the loss of significant data and the loss of property.
Meanwhile, it is also more and more universal that smart bluetooth dresses equipment, such as Intelligent bracelet, and intelligent watch etc. Having had some common methods in mobile phone cipher at present, such as mobile phone arranges numerical ciphers, pattern password, just can enter mobile phone after input password. If adding the link (optional) with other particular bluetooth equipment connection in the encryption and decryption process of data in mobile phone, can make cellie that the Encrypt and Decrypt operation of personal data (application) is become very convenient.
To sum up, need at present to provide a kind of new technical scheme, to meet above-mentioned demand.
Summary of the invention
It is an object of the invention to provide a kind of mobile phone cipher based on bluetooth equipment and deciphering method, solve defect and deficiency that current technology exists.
The present invention provides a kind of mobile phone cipher based on bluetooth equipment and deciphering method, comprises the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
The present invention also provides a kind of to the method for data in mobile phone encryption and deciphering, comprises the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
The present invention also provides a kind of to the method for application program of mobile phone encryption and deciphering, comprises the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
As an embodiment, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
As an embodiment, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
In the present invention, existing owing to mobile phone encryption and decryption process all must have specific bluetooth equipment (Intelligent bracelet or intelligent watch etc.) and it is in connection state, if not being specific bluetooth equipment, cannot decipher. Even if the mobile phone of user is lost like this, the secret of the data file in mobile phone and the impenetrability of sensitive application also can be kept well. In the epoch that Intelligent worn device is popularized day by day, it provides more abundant selection to the encipher-decipher method of data and application, convenient and workable. The present invention is also suitable for user and uses multiple bluetooth equipment to encrypt or decipher, and can go switching according to practical situation for the bluetooth equipment encrypted, so the present invention requires that each encryption all needs to connect bluetooth equipment, to improve confidentiality.
Accompanying drawing explanation
Fig. 1 is the data encryption schema described in an embodiment;
Fig. 2 is the data deciphering schema described in an embodiment;
Fig. 3 is the application program encryption flow figure described in an embodiment;
Fig. 4 is the deciphering schema of the application program described in an embodiment.
Embodiment
The technical scheme of the present invention is described further below in conjunction with drawings and embodiments.
The present invention provides a kind of mobile phone cipher based on bluetooth equipment and deciphering method, comprises the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
See Fig. 1 and Fig. 2, the present invention also provides a kind of to the method for data in mobile phone encryption and deciphering, comprises the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
As shown in Figure 1, data encryption flow process starts, it is desired to mobile phone and target Bluetooth devices connect, and needs the mac address obtaining target Bluetooth devices as the key of DES symmetry encryption algorithm simultaneously, after encryption algorithm success, can generate data file encryption. If not and target Bluetooth devices connect, then encrypt failure. As shown in Figure 2, data deciphering flow process starts, and also requires that mobile phone and target Bluetooth devices connect, and connects if not establishing bluetooth, then directly deciphers failure. Afterwards, the bluetooth equipment establishing connection is done mac address check, if with keep before to add decryption key identical, then verification succeeds, then uses mac to be decrypted operation for double secret key ciphertext data file.
See Fig. 3 and Fig. 4, the present invention also provides a kind of to the method for application program of mobile phone encryption and deciphering, comprises the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
As an embodiment, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
As an embodiment, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
Described binding relationship is a kind of corresponding relation between application and specific mac address. Comprise but not only for the information such as sequence number (may there is many group bindings relation) of the application identification code bag name of application (in such as android system), the bluetooth equipment mac address participating in encryption and decryption and binding relationship between the two above. In ciphering process, it is necessary to obtain application identification code to be encrypted, and participate in the mac address of the bluetooth equipment of encryption, to realize binding. In the database that complete binding relationship can be stored in handheld device or file.
As shown in Figure 3, application program encryption flow starts, require that mobile phone and target Bluetooth devices connect, need to obtain the mac address of the bluetooth equipment setting up connection afterwards, then, the binding relationship of bluetooth equipment mac address and application program can be saved in mobile phone, preserve after successfully, application encipher flow process terminates, other situation, and application encipher all can be failed. As shown in Figure 4, application program deciphering flow process starts, require that mobile phone and target Bluetooth devices connect, read the mac address being kept in advance in mobile phone and the relation of application binding afterwards, then need to verify the Bluetooth address coupling that the mac address of bluetooth equipment is and preserves before, if can mate, then successful decryption, enter the normal Booting sequence of application smoothly, otherwise decipher unsuccessfully, encrypted application cannot be entered.
It is an object of the invention to realize mobile phone and rely on the Encrypt and Decrypt operating process that other bluetooth equipment (such as Intelligent bracelet, intelligent watch) completes data and application.
Data in mobile phone ciphering process of the present invention, using the mac address of bluetooth equipment specified as key in ciphering process, removes data file encryption by encryption algorithm. Data in mobile phone decrypting process needs the bluetooth equipment verifying specific mac address be just in connection state with mobile phone, otherwise failure can be deciphered, protect the secret of cellphone subscriber's data with this.
Mobile phone application encipher process of the present invention, using the mac address of bluetooth equipment specified as key in ciphering process, and the binding relationship establishing mac address and application preserves in advance. Mobile phone application decrypting process needs the bluetooth equipment verifying specific mac address be just in connection state with mobile phone, otherwise failure can be deciphered, protect the secret of application program of mobile phone with this.
The present invention relates to data Encrypt and Decrypt process, encryption system mathematics denotational description is as follows: S={P, C, K, E, D}, wherein plaintext space P is various data files to be encrypted, and ciphertext space C is the data file after having encrypted, and key space K is the MAC address of bluetooth equipment, encryption algorithm adopts the symmetrical algorithm of E DES, and deciphering algorithm D is the inverse of E.
The present invention relates to application Encrypt and Decrypt process. Cellphone subscriber can select the application specified such as notepad appli-cation, to be encrypted. When application encipher, it is necessary to mobile phone and bluetooth equipment match and connects, encryption application can form bundle relation with the MAC address of specific bluetooth equipment, and this relation is kept in mobile phone. Time user opens related application, it is necessary to first go deciphering, when deciphering, can judge to be kept in advance whether bluetooth equipment corresponding to MAC address of that inside mobile phone has established connection with mobile phone, if, then successful decryption, otherwise, application program cannot be opened.
The invention reside in and the MAC address of particular bluetooth equipment is kept in mobile phone in advance, as the key that enciphering and deciphering algorithm must be used, require to specify the bluetooth equipment belonging to MAC address must be in connection state (if mobile phone is lost, specify the bluetooth equipment belonging to MAC address can not be in connection state) during encryption and decryption simultaneously.
Those of ordinary skill in the art will be appreciated that, above enforcement mode is only used to the present invention is described, and not it is used as limitation of the invention, as long as in the spirit of the present invention, to the change of above enforcement mode, modification all by the Claims scope dropping on the present invention.

Claims (5)

1. the mobile phone cipher based on bluetooth equipment and deciphering method, it is characterised in that, comprise the following steps:
1.1 encrypting steps: every time to when encrypting for the program file of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and described mac address is generated with described program file and associates relation, store described association pass and tie up in described mobile phone;
1.2 decryption step: every time to when the program file of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the described association relation stored further, if meeting, deciphering the program file of described encryption, if not meeting, display is deciphered unsuccessfully.
2. method data in mobile phone encrypted and deciphers based on claim 1, it is characterised in that, comprise the following steps:
2.1 encrypting steps: every time to when encrypting for the data in mobile phone of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, described mobile phone is made to obtain the mac address of described bluetooth equipment, and the data in mobile phone to be encrypted of double secret key that algorithm is encrypted as symmetry in described mac address is encrypted, generate the data file after encryption;
2.2 decryption step: every time to when the data in mobile phone of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets the described key in the last described encrypting step further, if meeting, deciphering the data in mobile phone of described encryption, if not meeting, display is deciphered unsuccessfully.
3. method application program of mobile phone encrypted and deciphers based on claim 1, it is characterised in that, comprise the following steps:
3.1 encrypting steps: every time to when encrypting for the application program of encryption in mobile phone, whether first detect has bluetooth equipment and mobile phone to set up bluetooth to be connected, if having, make described mobile phone obtain the mac address of described bluetooth equipment, described mac address with the application program formation binding relationship to be encrypted and is stored;
3.2 decryption step: every time to when the application program of described encrypting step is deciphered, whether first detect has the bluetooth equipment to be identified to establish bluetooth with mobile phone to be connected, if having, the mac address of the bluetooth equipment identified described in obtaining, judge whether the described mac address that this step obtains meets in the last described encrypting step the binding relationship formed further, if meeting, starting described application program, if not meeting, display is deciphered unsuccessfully.
4. method as claimed in claim 3, it is characterized in that, when described encrypting step making described mac address form binding relationship with the application program to be encrypted, first obtain the application identification code of described application program, then itself and the binding of described mac address are formed binding relationship.
5. method as claimed in claim 4, it is characterised in that, described binding relationship comprises following information: the sequence number of described application identification code, described mac address, between the two binding relationship.
CN201510993057.0A 2015-12-25 2015-12-25 Mobile phone encryption and decryption method based on bluetooth equipment Pending CN105634729A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510993057.0A CN105634729A (en) 2015-12-25 2015-12-25 Mobile phone encryption and decryption method based on bluetooth equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510993057.0A CN105634729A (en) 2015-12-25 2015-12-25 Mobile phone encryption and decryption method based on bluetooth equipment

Publications (1)

Publication Number Publication Date
CN105634729A true CN105634729A (en) 2016-06-01

Family

ID=56049285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510993057.0A Pending CN105634729A (en) 2015-12-25 2015-12-25 Mobile phone encryption and decryption method based on bluetooth equipment

Country Status (1)

Country Link
CN (1) CN105634729A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709362A (en) * 2016-12-06 2017-05-24 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN106897632A (en) * 2017-02-28 2017-06-27 深圳天珑无线科技有限公司 A kind of decryption method, system, electronic equipment and decryption device
CN107948178A (en) * 2017-12-04 2018-04-20 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
CN104469752A (en) * 2014-11-17 2015-03-25 深圳市中兴移动通信有限公司 Encryption method and device and terminal
CN105162605A (en) * 2015-09-28 2015-12-16 东南大学 Digital signature and authentication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
CN104469752A (en) * 2014-11-17 2015-03-25 深圳市中兴移动通信有限公司 Encryption method and device and terminal
CN105162605A (en) * 2015-09-28 2015-12-16 东南大学 Digital signature and authentication method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709362A (en) * 2016-12-06 2017-05-24 武汉斗鱼网络科技有限公司 File encryption method and device and file decryption method and device
CN106897632A (en) * 2017-02-28 2017-06-27 深圳天珑无线科技有限公司 A kind of decryption method, system, electronic equipment and decryption device
CN106897632B (en) * 2017-02-28 2020-12-25 深圳天珑无线科技有限公司 Decryption method, system, electronic equipment and decryption equipment
CN107948178A (en) * 2017-12-04 2018-04-20 深圳绿米联创科技有限公司 Intelligent domestic system and information ciphering method and device, terminal
CN113795023A (en) * 2021-09-26 2021-12-14 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and block encryption
CN113795023B (en) * 2021-09-26 2024-03-19 深圳市芯中芯科技有限公司 Bluetooth data transmission encryption method based on chaotic sequence and packet encryption

Similar Documents

Publication Publication Date Title
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN109040090A (en) A kind of data ciphering method and device
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN106101150B (en) The method and system of Encryption Algorithm
CN101196855A (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN101626567A (en) Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN105634729A (en) Mobile phone encryption and decryption method based on bluetooth equipment
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN110535641A (en) Key management method and device, computer equipment and storage medium
CN105208028A (en) Data transmission method and related device and equipment
CN105407109A (en) Data secure transmission method between Bluetooth devices
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN102938762B (en) A kind of file safety management system based on mobile terminal
CN101281498A (en) Ciphering type mobile storage apparatus
CN102332077A (en) Hand-held equipment data encryption and decryption method and hand-held equipment peripheral equipment thereof
CN100431297C (en) Method for preventing user's pin from illegal use by double verification protocol
CN103237302A (en) Sensing information safety protection method for RFID (radio frequency identification) tags in Internet of Things
CN103458401B (en) A kind of voice encryption communication system and communication means
CN105701390A (en) Encryption terminal remote management method, encryption terminal and manager
CN101420687B (en) Identity verification method based on mobile terminal payment
CN107483187A (en) A kind of data guard method and device based on credible password module
JP6540381B2 (en) Information processing system and encryption communication method
CN106027553B (en) A kind of encryption and decryption method based on dynamic password
CN110022213A (en) A kind of more level of confidentiality processing methods based on quantum key protection computer data
CN115499118A (en) Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160601

WD01 Invention patent application deemed withdrawn after publication