CN108427509A - The method for sending voice by input method - Google Patents

The method for sending voice by input method Download PDF

Info

Publication number
CN108427509A
CN108427509A CN201810039006.8A CN201810039006A CN108427509A CN 108427509 A CN108427509 A CN 108427509A CN 201810039006 A CN201810039006 A CN 201810039006A CN 108427509 A CN108427509 A CN 108427509A
Authority
CN
China
Prior art keywords
audio file
recipient
sender
encrypted
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810039006.8A
Other languages
Chinese (zh)
Inventor
姚明月
罗东平
庞潼川
杨成功
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Core Shield Net (beijing) Technology Development Co Ltd
Original Assignee
Core Shield Net (beijing) Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Core Shield Net (beijing) Technology Development Co Ltd filed Critical Core Shield Net (beijing) Technology Development Co Ltd
Priority to CN201810039006.8A priority Critical patent/CN108427509A/en
Publication of CN108427509A publication Critical patent/CN108427509A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • G06F3/0233Character input methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/174Redundancy elimination performed by the file system
    • G06F16/1744Redundancy elimination performed by the file system using compression, e.g. sparse files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/16Sound input; Sound output
    • G06F3/167Audio in a user interface, e.g. using voice commands for navigating, audio feedback
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The present invention provides a kind of methods sending voice by input method, include the following steps:Audio file, sender ID and recipient ID are sent to server by S1, sender;S2, server receive audio file, sender ID and recipient ID, and the recipient ID received is compared with preset ID, audio file assigned sequence number if consistent to receive, and sender ID, recipient ID and sequence number are packaged and generate index, audio file is stored according to index, while index is sent to sender;S3, sender receive index and are sent to recipient by input method, and the index received is uploaded to server by recipient, and server corresponds to audio file according to index search and sends to recipient.The present invention directly transmits voice by input method, convenient and efficient, low using threshold, meets the communication needs of user's daily life and work.

Description

The method for sending voice by input method
Technical field
The invention belongs to speech message fields, and in particular to a method of voice is sent by input method.
Background technology
With the development of social informatization, mobile phone is at the necessity of people's daily life, and input method is as use Family interacts approach, the almost most commonly used tool software of user with the important of mobile phone.Input method on the market is such as searched at present The input methods such as dog are all positioned at the function of words input, can only convert the operation of user to word, be then input to mobile phone system In system, input speed is slower, and user using threshold it is higher, such as certain customers can't phonetic, give user daily communication Bring very big inconvenience;Even if part input method contains speech voice input function, and converts speech into word, conversion success rate by To being affected for network and user's accent, can not meet the needs of most users.
Invention content
It is an object of the invention to solve the above problems, and provide the advantages of at least will be described later.
It is a still further object of the present invention to provide a kind of methods sending voice by input method, are directly sent out using input method Sending voice, it is convenient and efficient, it is low using threshold, meet the communication needs of user's daily life and work.
In order to realize these purposes and other advantages according to the present invention, provides and a kind of voice is sent by input method Method includes the following steps:
Audio file, sender ID and recipient ID are sent to server by S1, sender;
S2, server receive audio file, sender ID and recipient ID, and by the recipient ID received and preset ID be compared, be the audio file assigned sequence number received if consistent, and by sender ID, recipient ID and sequence Row number, which is packaged, generates index, audio file is stored according to index, while index is sent to sender;
S3, sender, which receive, to be indexed and is sent to recipient by input method, and the index received is uploaded to by recipient Server, server correspond to audio file according to index search and send to recipient.
Preferably, the method that voice is sent by input method, if recipient ID and preset ID in step S2 Prompt inconsistent, then that server is not present to sender transmitting and receiving side ID mistakes or recipient ID.
Preferably, the method for sending voice by input method, sender will be indexed with mobile phone by input method Short message mode is sent to recipient.
Preferably, the method for sending voice by input method, sender sends audio file in step S1 Further include before to server:
A1, audio file is divided into multiple audio file units, the wherein data of audio file unit by data width Width is positive integer;
A2, each audio file unit is encrypted, after encrypted multiple audio file cell compressions are merged To encrypted audio files;
Server corresponds to encrypted audio files according to index search and is sent to recipient in step S3, and recipient will receive To audio file decompression after obtain encrypted multiple audio file units, it is closely sealed to encrypted multiple audio file unit solutions It is played after and.
Preferably, the method that voice is sent by input method, in step A2 to each audio file unit into The encrypted method of row includes the following steps:
B1, each audio file unit is uniformly divided into multiple subregions, the data width of each subregion according to data width It is positive integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to every Four piecemeal section number consecutivelies in a subregion, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 are positive integer;
B2, the corresponding piecemeal section that number is odd number is respectively adopted by AES encryption algorithm is encrypted to it;
B3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA Encryption Algorithm is encrypted to it;
B4, encrypted piecemeal section is carried out completing to each after arrangement merges compression successively according to corresponding number The encryption of frequency file unit.
Preferably, it is described by input method send voice method, to each audio file unit decryption include:
C1, each audio file unit is divided into multiple subregions according to data width, the data width of each subregion is equal For positive integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to each Four piecemeal section number consecutivelies in subregion, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 is positive integer;
C2, the corresponding piecemeal section that number is odd number is respectively adopted by AES decipherment algorithms is decrypted to it;
C3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA decipherment algorithms is decrypted to it;
C4, the piecemeal section after decryption is carried out completing to each after arrangement merges compression successively according to corresponding number The decryption of frequency file unit.
The present invention includes at least following advantageous effect:
1, present invention utilization will be indexed is sent to sender by input method, and index only accounts for 26 bytes, and occupied bandwidth is small, can To be directly transmitted with short message, the index received is uploaded to server by recipient, and server is corresponded to according to the index search Audio file simultaneously sends it to recipient, realizes the function that speech message is sent out using short message.Input method is passed through to directly transmit Voice, it is convenient and efficient, it is low using threshold, meet the communication needs of user's daily life and work.
2, before the present invention sends audio file, audio file is uniformly divided into multiple audio texts by preset data width Then part unit is encrypted the audio file unit being divided into, obtained after encrypted multiple audio file cell compressions are merged Encrypted audio files retransmit the safety that ensure that audio file after encrypting audio file.
Part is illustrated to embody by further advantage, target and the feature of the present invention by following, and part will also be by this The research and practice of invention and be understood by the person skilled in the art.
Description of the drawings
Fig. 1 is the flow diagram for the method that the present invention sends voice by input method;
Fig. 2 is the flow diagram for the method that the audio file unit of the present invention is encrypted.
Specific implementation mode
Present invention will be described in further detail below with reference to the accompanying drawings, to enable those skilled in the art with reference to specification text Word can be implemented according to this.
It should be appreciated that such as " having ", "comprising" and " comprising " term used herein do not allot one or more The presence or addition of a other elements or combinations thereof.
As shown in Fig. 1~2, a method of voice is sent by input method, is included the following steps:
Audio file, sender ID and recipient ID are sent to server by S1, sender;
S2, server receive audio file, sender ID and recipient ID, and by the recipient ID received and preset ID be compared, be the audio file assigned sequence number received if consistent, and by sender ID, recipient ID and sequence Row number, which is packaged, generates index, audio file is stored according to index, while index is sent to sender;
S3, sender, which receive, to be indexed and is sent to recipient by input method, and the index received is uploaded to by recipient Server, server correspond to audio file according to index search and send to recipient.
The method that the input method of the present invention sends voice, before sending audio file, in the mobile phone of sender and recipient Client is respectively mounted the corresponding client of server, and sender and recipient register after installing client, are serviced after registration The ID of sender and recipient are generated on device, for example recipient ID is 12345678, recipient ID is 12378956, registration life At ID be preset ID on server.When sender needs to send audio file, first by audio file, sender ID, recipient ID are sent to server, and recipient ID here is the ID number of sender's input, for example inputs recipient ID and be 12345665, after server receives audio file, sender ID, recipient ID, recipient ID and preset ID is carried out Compare, audio file is sent into registered recipient by comparing the mode of ID, increases safety, such as sender's input The ID of recipient is 12345678 and ID that recipient generates after registering is consistent with preset ID as 12345678 recipient ID It is then the audio file assigned sequence number, for example is currently transmitted audio file assigned sequence n, then is next transmission Audio file assigned sequence n+1, and so on, i.e., be one between audio file and sequence number, sender ID, recipient ID One is corresponding, and sender ID, recipient ID, sequence number are packaged and generate index by server, and audio file is deposited according to index Storage, while the index is sent to sender by input method, due to indexing by sequence number, sender ID, recipient's ID groups At sender ID, recipient ID and sequence number are all 8 bytes, have the marker character of each 1 byte before and after index, 26 byte, accounts for together It is small with bandwidth, it can be directly transmitted with short message, the index received is uploaded to server by recipient, and server is according to the rope Draw the corresponding audio file of lookup and send it to recipient, realizes the function of sending out speech message using short message.
In another technical solution, the method that voice is sent by input method, if recipient ID in step S2 Prompt inconsistent with preset ID, then that server is not present to sender transmitting and receiving side ID mistakes or recipient ID.Such as It is 12345665 that sender, which inputs recipient ID, and the i.e. preset ID of ID that recipient generates after registering is 12345678, at this Sender recipient's ID mistakes are reminded in the prompt that transmitting and receiving side's ID mistakes or recipient ID are not present in the case of kind, send Side needs to re-enter recipient ID.
In another technical solution, the method for sending voice by input method, sender will by input method Index is sent to recipient with mobile phone short messages.Index is sent to recipient by sender by third-party mode, may be used also It is sent to recipient in a manner of by wechat, qq, mailbox etc..
In another technical solution, further include before audio file is sent to server by sender in step S1:
A1, audio file is divided into multiple audio file units, the wherein data of audio file unit by data width Width is positive integer;
A2, each audio file unit is encrypted, after encrypted multiple audio file cell compressions are merged To encrypted audio files;
Server corresponds to encrypted audio files according to index search and is sent to recipient in step S3, and recipient will receive To audio file decompression after obtain encrypted multiple audio file units, it is closely sealed to encrypted multiple audio file unit solutions It is played after and.
In the above-mentioned technical solutions, audio file is divided into multiple audio file units, such as one by data width Audio file is 10Mb, 10 audio file units can be divided into according to the data width of 1Mb, then the audio file to being divided into Unit is encrypted, and obtains encrypted audio files after encrypted multiple audio file cell compressions are merged, audio file is encrypted The safety that ensure that audio file is retransmited afterwards, and corresponding, recipient is added after decompressing the audio file received Close multiple audio file units play after merging to encrypted multiple audio file unit decryption.
In another technical solution, the method that voice is sent by input method, to each audio in step A2 The method that file unit is encrypted includes the following steps:
B1, each audio file unit is uniformly divided into multiple subregions, the data width of each subregion according to data width It is positive integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to every Four piecemeal section number consecutivelies in a subregion, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 are positive integer;
B2, the corresponding piecemeal section that number is odd number is respectively adopted by AES encryption algorithm is encrypted to it;
B3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA Encryption Algorithm is encrypted to it;
B4, encrypted piecemeal section is carried out completing to each after arrangement merges compression successively according to corresponding number The encryption of frequency file unit.
In the above-mentioned technical solutions, audio file unit is uniformly divided into multiple subregions, such as audio text by data width Part unit is 1Mb, is divided into 5 subregions with the data width of 2000kb, then by each subregion according to the data of N1, N2, N3, N4 Width is divided into four piecemeal sections, for example is divided into four piecemeal areas according to the data width of 300kb, 400kb, 600kb, 700kb Between, it is then odd number to number then successively to the piecemeal section number consecutively in each subregion, such as number 1,2,3,4. ... Piecemeal section it is encrypted using AES encryption algorithm, to number be even number piecemeal section using xTEA Encryption Algorithm to it Encryption carries out completing to each frequency file after arrangement merges compression successively to encrypted piecemeal section according to corresponding number Then each subregion is divided into four sections, respectively to each area by the encryption of unit by the way that audio file is divided into multiple subregions Between encrypt, this encryption method is more safer than conventional encryption method.
In another technical solution, the method that voice is sent by input method, to each audio file unit Decryption includes:
C1, each audio file unit is divided into multiple subregions according to data width, the data width of each subregion is equal For positive integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to each Four piecemeal section number consecutivelies in subregion, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 is positive integer;
C2, the corresponding piecemeal section that number is odd number is respectively adopted by AES decipherment algorithms is decrypted to it;
C3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA decipherment algorithms is decrypted to it;
C4, the piecemeal section after decryption is carried out completing to each after arrangement merges compression successively according to corresponding number The decryption of frequency file unit.
In the above-mentioned technical solutions, audio file unit is decrypted, is the encrypted reverse process of audio file, to number For the corresponding piecemeal section of odd number AES decipherment algorithms are respectively adopted it is decrypted, to the corresponding piecemeal area that number is even number Between xTEA decipherment algorithms are respectively adopted it are decrypted, arrangement conjunction is carried out successively according to corresponding number to the piecemeal section after decryption And i.e. decryption of the completion to each audio file unit after compressing.
Although the embodiments of the present invention have been disclosed as above, but its is not only in the description and the implementation listed With it can be fully applied to various fields suitable for the present invention, for those skilled in the art, can be easily Realize other modification, therefore without departing from the general concept defined in the claims and the equivalent scope, the present invention is simultaneously unlimited In specific details and legend shown and described herein.

Claims (6)

1. a kind of method sending voice by input method, which is characterized in that include the following steps:
Audio file, sender ID and recipient ID are sent to server by S1, sender;
S2, server receive audio file, sender ID and recipient ID, and by the recipient ID received and preset ID It is compared, is the audio file assigned sequence number received if consistent, and by sender ID, recipient ID and sequence number It is packaged and generates index, audio file is stored according to index, while index is sent to sender;
S3, sender, which receive, to be indexed and is sent to recipient by input method, and the index received is uploaded to service by recipient Device, server correspond to audio file according to index search and send to recipient.
2. the method for sending voice by input method as described in claim 1, which is characterized in that if recipient ID in step S2 Prompt inconsistent with preset ID, then that server is not present to sender transmitting and receiving side ID mistakes or recipient ID.
3. the method for sending voice by input method as described in claim 1, which is characterized in that sender will by input method Index is sent to recipient with mobile phone short messages.
4. passing through the method that input method sends voice as described in claim 1, which is characterized in that sender is by sound in step S1 Frequency file further includes before being sent to server:
A1, audio file is divided into multiple audio file units, the wherein data width of audio file unit by data width It is positive integer;
A2, each audio file unit is encrypted, is added after encrypted multiple audio file cell compressions are merged Close audio file;
In step S3 server corresponds to encrypted audio files according to index search and is sent to recipient, and recipient will receive Encrypted multiple audio file units are obtained after audio file decompression, after merging to encrypted multiple audio file unit decryption It plays.
5. the method for sending voice by input method as claimed in claim 4, which is characterized in that each audio in step A2 The method that file unit is encrypted includes the following steps:
B1, each audio file unit is uniformly divided into multiple subregions according to data width, the data width of each subregion is Positive integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to each point Four piecemeal section number consecutivelies in area, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 It is positive integer;
B2, the corresponding piecemeal section that number is odd number is respectively adopted by AES encryption algorithm is encrypted to it;
B3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA Encryption Algorithm is encrypted to it;
B4, encrypted piecemeal section is carried out completing to each frequency text after arrangement merges compression successively according to corresponding number The encryption of part unit.
6. the method for sending voice by input method as claimed in claim 5, which is characterized in that each audio file unit Decryption includes:
C1, each audio file unit is divided into multiple subregions according to data width, the data width of each subregion is just Integer;Then each subregion is divided into four piecemeal sections according to the data width of N1, N2, N3, N4 successively, and to each subregion Four interior piecemeal section number consecutivelies, and the piecemeal section number in two neighboring subregion is continuous, wherein N1, N2, N3, N4 are equal For positive integer;
C2, the corresponding piecemeal section that number is odd number is respectively adopted by AES decipherment algorithms is decrypted to it;
C3, the corresponding piecemeal section that number is even number is respectively adopted by xTEA decipherment algorithms is decrypted to it;
C4, the piecemeal section after decryption is carried out completing to each frequency text after arrangement merges compression successively according to corresponding number The decryption of part unit.
CN201810039006.8A 2018-01-16 2018-01-16 The method for sending voice by input method Pending CN108427509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810039006.8A CN108427509A (en) 2018-01-16 2018-01-16 The method for sending voice by input method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810039006.8A CN108427509A (en) 2018-01-16 2018-01-16 The method for sending voice by input method

Publications (1)

Publication Number Publication Date
CN108427509A true CN108427509A (en) 2018-08-21

Family

ID=63155905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810039006.8A Pending CN108427509A (en) 2018-01-16 2018-01-16 The method for sending voice by input method

Country Status (1)

Country Link
CN (1) CN108427509A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131008A (en) * 2020-01-10 2020-05-08 河南芯盾网安科技发展有限公司 Method and device for disguising hidden ciphertext

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007030685A2 (en) * 2005-09-09 2007-03-15 Robert Howe Pinckney Method and system for message storage and retrieval
CN101175047A (en) * 2006-10-30 2008-05-07 中兴通讯股份有限公司 System for actively acquiring message delivery state
CN101699879A (en) * 2007-07-03 2010-04-28 卢苇 Method for transmitting voice message by mobile terminal
CN103368821A (en) * 2012-04-10 2013-10-23 中兴通讯股份有限公司 Voice-message sending method and system and integrated-message server and clients
CN103929623A (en) * 2014-04-29 2014-07-16 浙江宇视科技有限公司 Method for processing video data in video monitoring system
CN104468326A (en) * 2014-11-27 2015-03-25 江苏天智互联科技有限公司 Group interaction method based on communication network
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007030685A2 (en) * 2005-09-09 2007-03-15 Robert Howe Pinckney Method and system for message storage and retrieval
CN101175047A (en) * 2006-10-30 2008-05-07 中兴通讯股份有限公司 System for actively acquiring message delivery state
CN101699879A (en) * 2007-07-03 2010-04-28 卢苇 Method for transmitting voice message by mobile terminal
CN103368821A (en) * 2012-04-10 2013-10-23 中兴通讯股份有限公司 Voice-message sending method and system and integrated-message server and clients
CN103929623A (en) * 2014-04-29 2014-07-16 浙江宇视科技有限公司 Method for processing video data in video monitoring system
CN104468326A (en) * 2014-11-27 2015-03-25 江苏天智互联科技有限公司 Group interaction method based on communication network
CN105893857A (en) * 2016-03-31 2016-08-24 北京金山安全软件有限公司 File encryption method, device and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131008A (en) * 2020-01-10 2020-05-08 河南芯盾网安科技发展有限公司 Method and device for disguising hidden ciphertext

Similar Documents

Publication Publication Date Title
JP5722260B2 (en) Multipart message communication between cellular devices using a standardized interface
KR20190114023A (en) Device identifier dependent operation processing of packet based data communication
CN101442742B (en) Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN1249586A (en) Method and device for establishing safety connection on single data channel
CN109257744A (en) 5G data transmission method, system and 5G data send and receive device
CN109450777B (en) Session information extraction method, device, equipment and medium
CN106982419B (en) Single call end-to-end encryption method and system for broadband cluster system
US8676236B1 (en) System, method, and computer program for generating a short message service (SMS) message using template codes
Pizzolante et al. Text compression and encryption through smart devices for mobile communication
US20140229386A1 (en) Secure mobile payments
AU2013224696A1 (en) An instant communication method and system
CN103338437A (en) Encryption method and system of mobile instant message
CN104767746A (en) Push message receiving method, message pushing method, client and server
WO2017185872A1 (en) Short message processing method, device, and system, and storage medium
CN112887429A (en) Data transmission method and device, electronic equipment and storage medium
JP5739006B2 (en) Method and apparatus for sending and receiving secure and non-secure data
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN103956163B (en) Common voice and encrypted voice interconversion system and method
JPWO2019220531A1 (en) Secret search device and secret search method
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN108427509A (en) The method for sending voice by input method
CN101500231A (en) Mobile terminal, audio data processing method and system
CN103595619A (en) Method, device and system for adding friend
CN106878277B (en) Method and device for realizing voice encryption based on DMR standard
WO2023236984A1 (en) Wireless network access method, apparatus and device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 450000 Building 10 of Microcloud Computing Industry Park, 166 Duying Street, Zhengzhou High-tech Industrial Development Zone, Henan Province

Applicant after: HENAN CORE SHIELD SECNET TECHNOLOGY DEVELOPMENT CO.,LTD.

Address before: 100193 Building 313-34, No. 4, 8th Hospital, Wangxi Road, Haidian District, Beijing

Applicant before: CORE SHIELD NETWORK SECURITY (BEIJING) TECHNOLOGY DEVELOPMENT CO.,LTD.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20180821

RJ01 Rejection of invention patent application after publication