CN106488047B - Call data transmission control method and system based on mobile terminal - Google Patents

Call data transmission control method and system based on mobile terminal Download PDF

Info

Publication number
CN106488047B
CN106488047B CN201611183395.9A CN201611183395A CN106488047B CN 106488047 B CN106488047 B CN 106488047B CN 201611183395 A CN201611183395 A CN 201611183395A CN 106488047 B CN106488047 B CN 106488047B
Authority
CN
China
Prior art keywords
sequence
encryption
data
strategy
numbers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611183395.9A
Other languages
Chinese (zh)
Other versions
CN106488047A (en
Inventor
俞斌
杨维琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Internet Service Co ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201611183395.9A priority Critical patent/CN106488047B/en
Publication of CN106488047A publication Critical patent/CN106488047A/en
Application granted granted Critical
Publication of CN106488047B publication Critical patent/CN106488047B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/20Automatic or semi-automatic exchanges with means for interrupting existing connections; with means for breaking-in on conversations
    • H04M3/205Eavesdropping prevention - indication of insecurity of line or network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/80Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
    • H04B10/85Protection from unauthorised access, e.g. eavesdrop protection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a conversation data transmission control method and a system based on a mobile terminal, wherein the method comprises the following steps: pre-agreeing to represent an encryption strategy by a number; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out; when the used time slot is reached each time, the receiving party in the two communication mobile terminals uses the encryption strategies corresponding to the numbers in the sequence to decrypt the received data in sequence, and the decryption is completed and the decryption result is output. The invention can dynamically change the data encryption in the communication process and enhance the safety in the communication process, thereby reducing the possibility of eavesdropping of normal communication and reducing inconvenience and loss brought to users.

Description

Call data transmission control method and system based on mobile terminal
Technical Field
The invention relates to the field of mobile terminals, in particular to a call data transmission control method and system based on a mobile terminal.
Background
In circuit switching, the resources (buffering, link transmission rate) provided for communication between end systems along a communication path are reserved during communication, thereby ensuring real-time communication between the end systems.
In the prior art, when a call is established, a time slot is allocated to be specially used for transmitting voice data in the call process; therefore, some lawbreakers can listen to a specific time slot by a special device, which will cause the communication content to be intercepted. Thereby affecting normal communication and bringing inconvenience and loss to users.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for controlling transmission of call data based on a mobile terminal, aiming at the above-mentioned defects in the prior art. The communication data transmission control method provided by the invention can dynamically change the data encryption in the communication process and enhance the safety in the communication process, thereby reducing the possibility of eavesdropping of normal communication and reducing inconvenience and loss brought to users.
The technical scheme adopted by the invention for solving the technical problem is as follows:
a conversation data transmission control method based on a mobile terminal comprises the following steps:
A. pre-agreeing to represent an encryption strategy by a number; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies;
B. when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out;
C. when the used time slot is reached each time, the receiving party in the two communication mobile terminals uses the encryption strategies corresponding to the numbers in the sequence to decrypt the received data in sequence, and the decryption is completed and the decryption result is output.
The call data transmission control method based on the mobile terminal, wherein the step a specifically includes:
a1, storing a strategy base in the mobile terminal in advance, wherein the strategy base comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data;
a2, representing the encryption strategy in the strategy library by a number;
a3, when two mobile terminals establish communication, a sequence is shared between the two communicating mobile terminals in advance, and the sequence is composed of a plurality of numbers representing the encryption strategy.
The call data transmission control method based on the mobile terminal, wherein the encryption strategy comprises the following steps: encryption strategy one: all input data are inverted; and an encryption policy two: the input data is inverted.
The call data transmission control method based on the mobile terminal, wherein the step B further comprises: when the sender uses the numbers in the sequence in turn, the sender will start using the first number of the sequence again until the transmission is completed.
The call data transmission control method based on the mobile terminal, wherein the step C further comprises: when the numbers in the sequence used by the receiver are used up, the receiver will start using the first number of the sequence again until the decryption is completed.
The call data transmission control method based on the mobile terminal, wherein the step B further comprises:
when the used time slot is reached, the sender firstly processes the data to be sent by using an encryption strategy corresponding to the first digit in the sequence and then sends the data; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; and the numbers in the sequence are used in a circulating mode in sequence until the transmission is completed.
The call data transmission control method based on the mobile terminal, wherein the step C further comprises:
when the used time slot is reached, the receiver processes the data to be sent by using the encryption strategy corresponding to the first digit in the sequence and then receives and decrypts the data; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; and the numbers in the sequence are used in a circulating way in turn until the decryption is completed.
A conversation data transmission control system based on a mobile terminal comprises:
the strategy sharing module is used for appointing an encryption strategy represented by a number in advance; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies;
the data sending and processing module is used for encrypting the data and sending the encrypted data by the sender in the two communicating mobile terminals by using the encryption strategy corresponding to the numbers in the sequence in turn each time when the used time slot is reached;
and the data receiving and processing module is used for sequentially decrypting the received data by the receivers in the two communication mobile terminals by using the encryption strategies corresponding to the numbers in the sequence each time the used time slot is reached, and outputting a decryption result after the decryption is completed.
The conversation data transmission control system based on the mobile terminal, wherein the strategy sharing module comprises:
the mobile terminal comprises a strategy base storage unit, a strategy base storage unit and a strategy base encryption unit, wherein the strategy base storage unit is used for storing a strategy base in the mobile terminal in advance, the strategy base comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data;
an encryption policy expression unit for controlling the expression of the encryption policy in the policy library by a number;
the sharing control unit is used for sharing a sequence in advance between the two mobile terminals when the two mobile terminals establish communication, and the sequence consists of a plurality of numbers representing the encryption strategy.
The conversation data transmission control system based on the mobile terminal, wherein the encryption strategy comprises: encryption strategy one: all input data are inverted; and an encryption policy two: inverting the input data;
the data sending and processing module comprises:
a first transmission control unit for starting to use from the first digit of the sequence again when the sender uses the digits in the sequence in turn until the transmission is completed;
the second sending control unit is used for sending the data to be sent after the data to be sent is processed by the sender by using the encryption strategy corresponding to the first digit in the sequence when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; repeating the use of numbers in the sequence until the transmission is finished;
the data receiving and processing module comprises:
a first reception control unit for starting to use again from the first digit of the sequence until the decryption is completed when the digits in the sequence used by the receiving side in turn are used up;
the second receiving control unit is used for processing the data to be sent by the receiver by using the encryption strategy corresponding to the first digit in the sequence and then receiving and decrypting the data when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; and the numbers in the sequence are used in a circulating way in turn until the decryption is completed.
The invention provides a conversation data transmission control method and a system based on a mobile terminal, wherein the method uses a number to represent an encryption strategy by pre-arrangement; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out; when the used time slot is reached each time, the receiving party in the two communicating mobile terminals uses the encryption strategy corresponding to the numbers in the sequence to decrypt the received data in sequence. The mobile terminal can dynamically change the encryption method of the data in the communication process, and the security in the communication process is enhanced, so that the possibility of eavesdropping of normal communication is reduced, and inconvenience and loss brought to users are reduced.
Drawings
Fig. 1 is a flowchart of a call data transmission control method based on a mobile terminal according to a preferred embodiment of the present invention.
Fig. 2 is a functional block diagram of a preferred embodiment of the call data transmission control system based on the mobile terminal according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer and clearer, the present invention is further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for controlling call data transmission based on a mobile terminal according to a preferred embodiment of the present invention. As shown in fig. 1, the method for controlling call data transmission based on a mobile terminal according to the embodiment of the present invention includes the following steps:
s100, pre-agreeing to represent an encryption strategy by a number; when two mobile terminals establish communication, a sequence is shared between the two communicating mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies.
Specifically, step S100 includes the following flow:
s101, storing a strategy library in a mobile terminal in advance, wherein the strategy library comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data; since the actual data communication is performed by 0 and 1, the data mentioned here is actually a sequence of 0 and 1;
two examples of encryption strategies are given below:
encryption strategy one: all input data are inverted; for example, the original data is 10010, the data becomes 01101 after passing through the first encryption strategy;
and (2) encryption strategy two: inverting the input data; for example, the original data is 011100, and the data becomes 001110 after passing through encryption policy two.
And S102, representing the encryption strategy in the strategy library by a number.
For example, numeral 7 denotes the encryption policy one, and numeral 6 denotes the encryption policy two;
s103, when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; such as sequence 667;
and S200, when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategies corresponding to the numbers in the sequence in sequence and sends the encrypted data.
When the used time slot is reached, a sender firstly processes data to be sent by using an encryption strategy corresponding to a first digit in a sequence and then sends the data; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; and the numbers in the sequence are used in a circulating mode in sequence until the transmission is completed. For example, the sequence is 667, and when the time slot used is reached, the sender sends the data to be sent after processing the data to be sent by using the encryption strategy corresponding to 6; the next time when the time slot is used, the corresponding encryption strategy of 6 is still used for processing and then sending; the encryption strategy corresponding to 7 is still used for processing and then sending when the time slot used is reached next time; the next time when the time slot is used, the encryption strategy corresponding to 6 is still used for processing and then is sent … …; i.e., processing the data to be transmitted in turn-by-time slots in order of 667667667 … ….
And S300, when the used time slot is reached each time, the receiving party in the two communication mobile terminals sequentially uses the encryption strategies corresponding to the numbers in the sequence to decrypt the received data, and the decryption is completed and the decryption result is output.
The step is actually the reverse process of step S200, and when the time slot used is reached, the receiver processes the data to be sent by using the encryption strategy corresponding to the first digit in the sequence, and then performs reception and decryption; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; and the numbers in the sequence are used in a circulating way in turn until the decryption is completed. For example, the sequence is 667, and when the time slot used is reached, the receiver decrypts the received data by using the encryption strategy corresponding to 6 to obtain the original data; when the time slot used is next time, the receiver decrypts the received data by using the encryption strategy corresponding to the 6 to obtain the original data; when the used time slot is reached again, the receiver decrypts the received data by using the encryption strategy corresponding to the 7, and then the original data is obtained; when the used time slot is reached again, the receiver decrypts the received data by using the encryption strategy corresponding to 6 to obtain the original data … …; that is, the original data can be obtained by processing the received data in turn-by-turn time slots in the order of 667667667 … ….
As can be seen from the above, in the embodiment of the method of the present invention, an encryption policy is represented by one number by a predetermined convention; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out; when the used time slot is reached each time, the receiving party in the two communicating mobile terminals uses the encryption strategy corresponding to the numbers in the sequence to decrypt the received data in sequence. The mobile terminal can dynamically change the encryption method of the data in the communication process, and the security in the communication process is enhanced, so that the possibility of eavesdropping of normal communication is reduced, and inconvenience and loss brought to users are reduced.
Based on the above method embodiment, the present invention further provides a call data transmission control system based on a mobile terminal, as shown in fig. 2, the system includes:
a policy sharing module 210 for agreeing in advance to represent an encryption policy by a number; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; as described above.
The data sending and processing module 220 is used for encrypting the data and sending the encrypted data by the sender in the two communicating mobile terminals in sequence by using the encryption strategy corresponding to the numbers in the sequence each time the used time slot is reached; as described above.
The data receiving and processing module 230 is configured to decrypt the received data sequentially by the receivers in the two communicating mobile terminals using the encryption strategies corresponding to the numbers in the sequence each time the used time slot is reached, and output a decryption result after decryption; as described above.
Further, the call data transmission control system based on the mobile terminal, wherein the policy sharing module includes:
the mobile terminal comprises a strategy base storage unit, a strategy base storage unit and a strategy base encryption unit, wherein the strategy base storage unit is used for storing a strategy base in the mobile terminal in advance, the strategy base comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data; as described above.
An encryption policy expression unit for controlling the expression of the encryption policy in the policy library by a number; as described above.
The sharing control unit is used for sharing a sequence in advance between the two mobile terminals when the two mobile terminals establish communication, wherein the sequence consists of a plurality of numbers representing encryption strategies; as described above.
The conversation data transmission control system based on the mobile terminal, wherein the encryption strategy comprises: encryption strategy one: all input data are inverted; and an encryption policy two: inverting the input data;
the data sending and processing module comprises:
a first transmission control unit for starting to use from the first digit of the sequence again when the sender uses the digits in the sequence in turn until the transmission is completed; as described above.
The second sending control unit is used for sending the data to be sent after the data to be sent is processed by the sender by using the encryption strategy corresponding to the first digit in the sequence when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; repeating the use of numbers in the sequence until the transmission is finished; as described above.
The data receiving and processing module comprises:
a first reception control unit for starting to use again from the first digit of the sequence until the decryption is completed when the digits in the sequence used by the receiving side in turn are used up; as described above.
The second receiving control unit is used for processing the data to be sent by the receiver by using the encryption strategy corresponding to the first digit in the sequence and then receiving and decrypting the data when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; repeating the use of numbers in the sequence until the receiving and the decryption are finished; as described above.
In summary, in the method and system for controlling transmission of call data based on a mobile terminal, an encryption policy is represented by a number by pre-engagement; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies; when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out; when the used time slot is reached each time, the receiving party in the two communicating mobile terminals uses the encryption strategy corresponding to the numbers in the sequence to decrypt the received data in sequence. The mobile terminal can dynamically change the encryption method of the data in the communication process, and the security in the communication process is enhanced, so that the possibility of eavesdropping of normal communication is reduced, and inconvenience and loss brought to users are reduced.
Of course, it will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program instructing relevant hardware (such as a processor, a controller, etc.), and the program may be stored in a computer readable storage medium, and when executed, the program may include the processes of the above method embodiments. The storage medium may be a memory, a magnetic disk, an optical disk, etc.
It is to be understood that the invention is not limited to the examples described above, but that modifications and variations may be effected thereto by those of ordinary skill in the art in light of the foregoing description, and that all such modifications and variations are intended to be within the scope of the invention as defined by the appended claims.

Claims (6)

1. A conversation data transmission control method based on a mobile terminal is characterized by comprising the following steps:
A. pre-agreeing to represent an encryption strategy by a number; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies;
the step A specifically comprises the following steps:
a1, storing a strategy base in the mobile terminal in advance, wherein the strategy base comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data;
a2, representing the encryption strategy in the strategy library by a number;
a3, when two mobile terminals establish communication, a sequence is shared in advance between the two mobile terminals of the communication, and the sequence consists of a plurality of numbers representing encryption strategies;
B. when the used time slot is reached each time, the sender in the two communication mobile terminals encrypts the data by using the encryption strategy corresponding to the numbers in the sequence in sequence and sends the data out;
when the used time slot is reached, the sender firstly processes the data to be sent by using an encryption strategy corresponding to the first digit in the sequence and then sends the data; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; repeating the use of numbers in the sequence until the transmission is finished;
C. when the used time slot is reached each time, the receiving party in the two communication mobile terminals sequentially uses the encryption strategies corresponding to the numbers in the sequence to decrypt the received data, and the decryption is completed and the decryption result is output;
when the used time slot is reached, the receiver processes the data to be sent by using the encryption strategy corresponding to the first digit in the sequence and then receives and decrypts the data; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; and the numbers in the sequence are used in a circulating way in turn until the decryption is completed.
2. The method for controlling transmission of call data based on a mobile terminal according to claim 1, wherein the encryption policy comprises: encryption strategy one: all input data are inverted; and an encryption policy two: the input data is inverted.
3. The method for controlling transmission of call data based on mobile terminal according to claim 1, wherein said step B further comprises: when the sender uses the numbers in the sequence in turn, the sender will start using the first number of the sequence again until the transmission is completed.
4. The method for controlling transmission of call data based on mobile terminal according to claim 1, wherein said step C further comprises: when the numbers in the sequence used by the receiver are used up, the receiver will start using the first number of the sequence again until the decryption is completed.
5. A conversation data transmission control system based on a mobile terminal is characterized by comprising:
the strategy sharing module is used for appointing an encryption strategy represented by a number in advance; when two mobile terminals establish communication, a sequence is shared between the two mobile terminals in advance, and the sequence consists of a plurality of numbers representing encryption strategies;
the policy sharing module includes:
the mobile terminal comprises a strategy base storage unit, a strategy base storage unit and a strategy base encryption unit, wherein the strategy base storage unit is used for storing a strategy base in the mobile terminal in advance, the strategy base comprises a plurality of encryption strategies, and the encryption strategies can generate encrypted output data according to input data;
an encryption policy expression unit for controlling the expression of the encryption policy in the policy library by a number;
the sharing control unit is used for sharing a sequence in advance between the two mobile terminals when the two mobile terminals establish communication, wherein the sequence consists of a plurality of numbers representing encryption strategies;
the data sending and processing module is used for encrypting the data and sending the encrypted data by the sender in the two communicating mobile terminals by using the encryption strategy corresponding to the numbers in the sequence in turn each time when the used time slot is reached;
the second sending control unit is used for sending the data to be sent after the data to be sent is processed by the sender by using the encryption strategy corresponding to the first digit in the sequence when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing and then sending; repeating the use of numbers in the sequence until the transmission is finished;
the data receiving and processing module is used for sequentially decrypting the received data by the receivers in the two communicating mobile terminals by using the encryption strategies corresponding to the numbers in the sequence each time the used time slot is reached, and outputting a decryption result after the decryption is completed;
the second receiving control unit is used for processing the data to be sent by the receiver by using the encryption strategy corresponding to the first digit in the sequence and then receiving and decrypting the data when the used time slot is reached; when the next time of using the time slot, the encryption strategy corresponding to the second number in the sequence is used for processing, and then the receiving and decryption are carried out; and the numbers in the sequence are used in a circulating way in turn until the decryption is completed.
6. The system according to claim 5, wherein the encryption policy comprises: encryption strategy one: all input data are inverted; and an encryption policy two: inverting the input data;
the data sending and processing module comprises:
a first transmission control unit for starting to use from the first digit of the sequence again when the sender uses the digits in the sequence in turn until the transmission is completed;
the data receiving and processing module comprises:
and a first receiving control unit for starting to use the first digit of the sequence again when the digits in the sequence used by the receiving party are used up in sequence until the decryption is completed.
CN201611183395.9A 2016-12-20 2016-12-20 Call data transmission control method and system based on mobile terminal Active CN106488047B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611183395.9A CN106488047B (en) 2016-12-20 2016-12-20 Call data transmission control method and system based on mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611183395.9A CN106488047B (en) 2016-12-20 2016-12-20 Call data transmission control method and system based on mobile terminal

Publications (2)

Publication Number Publication Date
CN106488047A CN106488047A (en) 2017-03-08
CN106488047B true CN106488047B (en) 2020-08-11

Family

ID=58285660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611183395.9A Active CN106488047B (en) 2016-12-20 2016-12-20 Call data transmission control method and system based on mobile terminal

Country Status (1)

Country Link
CN (1) CN106488047B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448913A (en) * 2019-08-28 2021-03-05 华东师范大学 Identity authentication and file encryption transmission system and method based on TCPIP
CN110995428B (en) * 2019-12-13 2020-10-23 夏侯淑琴 Electronic equipment using fusion access and corresponding access method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829144A (en) * 2005-02-28 2006-09-06 株式会社日立制作所 Cryptographic communication system and method
US7200233B1 (en) * 2002-12-10 2007-04-03 L-3 Communications Corporation System and method for fast data encryption/decryption using time slot numbering
CN102983963A (en) * 2012-12-11 2013-03-20 长春卓尔信息安全产业股份有限公司 Encryption conversation method and conversation encryption device
CN104113836A (en) * 2014-07-29 2014-10-22 深圳市中兴移动通信有限公司 Conversation encryption method, communication terminal and base station
CN104205987A (en) * 2010-11-09 2014-12-10 摩托罗拉解决方案公司 Compatible channel for efficient coexistence of voice and data traffic

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7200233B1 (en) * 2002-12-10 2007-04-03 L-3 Communications Corporation System and method for fast data encryption/decryption using time slot numbering
CN1829144A (en) * 2005-02-28 2006-09-06 株式会社日立制作所 Cryptographic communication system and method
CN104205987A (en) * 2010-11-09 2014-12-10 摩托罗拉解决方案公司 Compatible channel for efficient coexistence of voice and data traffic
CN102983963A (en) * 2012-12-11 2013-03-20 长春卓尔信息安全产业股份有限公司 Encryption conversation method and conversation encryption device
CN104113836A (en) * 2014-07-29 2014-10-22 深圳市中兴移动通信有限公司 Conversation encryption method, communication terminal and base station

Also Published As

Publication number Publication date
CN106488047A (en) 2017-03-08

Similar Documents

Publication Publication Date Title
CN110519742B (en) Audio synchronous playing method and device and TWS Bluetooth headset
US11864263B2 (en) Wireless connection establishing methods and wireless connection establishing apparatuses
US8989389B2 (en) Method and apparatus for device-to-device key management
CN101442742B (en) Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
US11924635B2 (en) Security authentication method and apparatus thereof, and electronic device
CN103491183A (en) Data sharing method, mobile terminals and cloud server
CN112906037A (en) Communication encryption system, method and device
CN111327605B (en) Method, terminal, server and system for transmitting private information
CN107707562B (en) Method and device for encrypting and decrypting algorithm of asymmetric dynamic token
WO2017140426A1 (en) Method and device for writing data into intelligent card
CN111788836B (en) Data transmission method and BLE equipment
CN106488047B (en) Call data transmission control method and system based on mobile terminal
CN111465873A (en) Data sending method and electronic equipment
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
US20180160302A1 (en) Methods and systems for establishing an encrypted-audio session
CN111431706A (en) Method, system and equipment for improving SM4 algorithm speed by using FPGA logic
KR20180005095A (en) Apparatus and method for sharing information
CN113438083B (en) Signature adding and checking method and device based on interface automatic test
CN112995210B (en) Data transmission method and device and electronic equipment
CN101753588B (en) Method and system for controlling integrated service operation
KR100572463B1 (en) Encrypted communication method in communication between wireless communication terminals using shared encryption key
US9949097B1 (en) Sharing SIM functionality between devices
CN110890968B (en) Instant messaging method, device, equipment and computer readable storage medium
CN113538129B (en) Cross-organization privacy query request method and device
CN117939414A (en) Method, device, equipment, medium and product for encrypting data in call forwarding

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20230831

Address after: Room 1203, No. 2 Houkenanli, Haicang District, Xiamen City, Fujian Province, 361000

Patentee after: Xiamen Luan Chuang Technology Co.,Ltd.

Address before: 516006 Zhongkai hi tech Zone, Huizhou, Guangdong, 86 Chang seven Road West

Patentee before: HUIZHOU TCL MOBILE COMMUNICATION Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231113

Address after: Room 606-609, Compound Office Complex Building, No. 757, Dongfeng East Road, Yuexiu District, Guangzhou, Guangdong Province, 510699

Patentee after: China Southern Power Grid Internet Service Co.,Ltd.

Address before: Room 1203, No. 2 Houkenanli, Haicang District, Xiamen City, Fujian Province, 361000

Patentee before: Xiamen Luan Chuang Technology Co.,Ltd.

TR01 Transfer of patent right