CN200990610Y - Communication ciphered cell phone - Google Patents

Communication ciphered cell phone Download PDF

Info

Publication number
CN200990610Y
CN200990610Y CN 200620047248 CN200620047248U CN200990610Y CN 200990610 Y CN200990610 Y CN 200990610Y CN 200620047248 CN200620047248 CN 200620047248 CN 200620047248 U CN200620047248 U CN 200620047248U CN 200990610 Y CN200990610 Y CN 200990610Y
Authority
CN
China
Prior art keywords
mobile phone
communication
chip
encrypting
circuit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200620047248
Other languages
Chinese (zh)
Inventor
俞军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fudan Microelectronics Group Co Ltd
Original Assignee
Shanghai Fudan Microelectronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Fudan Microelectronics Co Ltd filed Critical Shanghai Fudan Microelectronics Co Ltd
Priority to CN 200620047248 priority Critical patent/CN200990610Y/en
Application granted granted Critical
Publication of CN200990610Y publication Critical patent/CN200990610Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model relates to a communication encrypted cell phone and comprises an encrypt approving chip which is applied in identity authentication by the communication users and encryption and decryption of sound or data; an encrypted cell terminal is applied to operate the encrypted approving chip. The encrypted approving chip is connected with the encrypted cell terminal through a universal digital interface. The utility model adopts the method of separation the cell phone and a card and is able to carry out identity authentication and data encryption directly on card needless of the process of identity authentication through an unreliable communication channel, which has better safety.

Description

A kind of communication encryption mobile phone
Technical field
The utility model is about wireless communication field, relates in particular to a kind of mobile phone that can encrypt voice communications versus data communications.
Background technology
Mobile phone begins to come into our life before 20 years, today mobile phone become we the life in an important part, in the meantime, mobile phone has experienced external form from big to small, pattern from the analogue system to the digital system, the differentiation of digital system from 2G to 3G.Mobile phone of today is bright in luster, the small and exquisite fashion of external form, the shadow of " black and white brick " before not had already.People are when selecting to buy mobile phone, usually all be the outward appearance and the function of taking a fancy to mobile phone, but often ignored an important link, that is exactly the fail safe of mobile phone, even the client who notices this problem is arranged, when selecting mobile phone also and do not know which type of function fail safe is embodied on.
The mobile phone potential safety hazard is resolved:
The aspect that relates to mobile phone hidden danger is a lot, and along with the abundant aspect that jeopardizes mobile phone safety of cell-phone function also is day by day to increase.
A) communication mode
Analyze technically, in the former mobile phone, voice signal is the analog signal that does not have encryption fully, and mobile phone and mobile switch are used to set up the code of calling out contact and all transmit on wave point with the plaintext form, be easy to be eavesdropped, only need a wireless receiver, on corresponding frequencies, just can listen to the content of mobile phone communication.The network authentication and the coding system that with GSM and IS-95CDMA are the 2G of representative are encrypted, it is generally acknowledged that such signal of communication is difficult for by intercept, and Content of Communication is difficult to be cracked, but from present encryption technology, in fact the very big security threat of existence.At first, encryption system can be cracked, and at present, the Israel and the U.S. have all successfully cracked GSM coding system; Secondly, since many information of mobile communication by internet transmission, face by the assault and the possibility of stealing secret information; Its three, what 2G adopted is unidirectional ID authentication mechanism, that is to say to have only network that mobile phone is carried out identification, and mobile phone is to the network utmost good faith, like this, unique people just can adopt the base station to pretend to be the method for deception to steal secret information.Still more because American-European restriction to China's outlet cryptographic algorithm, China at present at the 2G of usefulness network except that minority areas such as Guangzhou, Shenzhen, the overwhelming majority is not opened encryption function, the danger of being eavesdropped is conspicuous.Be summarized as follows at the safety problem in the communication mode of the modal gsm system of daily use:
1, the authentication in the gsm system is unidirectional, has only the authentication of network to the user, and does not have the authentication of user to network.Therefore have security breaches, the legal network members that illegal equipment (as the base station) can disguise oneself as, thereby user cheating are stolen user's information.
2, the encryption in the gsm system is not end to end, just encrypts between the wireless channel part.Do not encrypt in fixed network, adopt plaintext transmission, this provides chance to the assailant.
3, when travelling carriage was registered for the first time and roamed, IMSI may send to VLR/MSC with clear-text way, if the assailant intercepts IMSI, mobile phone " clone " then can occur.
4, in mobile communication, travelling carriage and internetwork most of signaling information are highstrung, need obtain integrity protection.And in the GSM network, do not consider data integrity protection's problem, if being distorted in the process of transmission, data also are difficult to find.
5, improving constantly of the computational speed of bringing along with the computer hardware technology progress, decryption technology be constantly development also.The encryption key length of using among the GSM is 64, under present decryption technology, can be cracked within a short period of time.
6, in gsm system, cryptographic algorithm is covert, and the fail safe of these cryptographic algorithms can not obtain objective appraisal, in practice, also has been subjected to a lot of attacks.
7, in gsm system, cryptographic algorithm is changeless, does not have more key algorithm available, lacks the process that negotiating algorithm and encryption key are consulted
How is the situation to adopt the 3G mobile of new Security Architecture so?
With W-CDMA, CDMA-2000, TD-SCDMA is that the 3G of representative can provide the wireless data access mode up to 3Mbps, the Network kind will increase greatly, technology is more complicated, and performances such as network access security, network domain security, user domain safety improve greatly.At first, 3G system encryption algorithm has 10 kinds, can be applicable to different security services, and these algorithms have a kind of China that exports at least, guarantees that 3G network encrypts; Secondly, the key that 3G adopts is constantly to change, and key is a random digit, has sufficient length, can avoid by Replay Attack and cracks; Its three, 3G can realize the two-way authentication between network and the user, can prevent effectively that identity from pretending to be attack; Its four, 3G also provides privacy mechanism preferably on user identity, customer location.
But still there is certain safety defect in 3G communication, is faced with complicated and diversified security threat and attack.
1, the encryption system of 3G is still under one's control.Except that TD-SCDMA, the encryption system of all the other two kinds of standards all is external the development.This lock that uses like us is external production, and so apparent, producer is known the structure and the open method of this lock very much, even can keep a key of unblanking.
2, the wave point between terminal equipment and the service network is still pregnable weak spot.May on wave point, eavesdrop, distort and deleted data as the invador, also can interfere and implement the refusal business and block service attacks etc. by physical interference or agreement.
3 the same amount word signatures all of no use with the 2G system.Though 3G realizes the two-way authentication between network and the user,, do not have digital signature at user side, still can not solve problems such as denying, forge, distort and pretend to be.
4, the possibility that exists network to be attacked.The mass data of 3G system comprises that signaling, protocol authentication and Diffie-Hellman etc. all are to rely on Network Transmission, and the invador may reach by the diverse network attack means and steal secret purpose.
5, cryptographic algorithm is too much.International 3G (Third Generation) Moblie cooperation is organized in the 3G safeguard construction, has defined F0, F1, F1 *, F2, F3, F4, F5, F5 *, ten kinds of cryptographic algorithms such as F8, F9, and recommend to use two kinds of algorithms of F8, F9.Every kind of algorithm effect is not quite similar, and also respectively has superiority and weak link.
6, still there is potential safety hazard in mobile phone itself.The mobile phone major part that we use is external product, and the ax-grinder can implant the back door trap in mobile phone, and cellie's secret is stolen easily.
This shows that 3G is also also dangerous.
B) mobile phone viruses
Talk about virus, everybody hears malicious look to become.With regard to everybody the most familiar computer virus, general light operating system or certain software of then destroying is heavy then destroy computer hardware equipment.And on mobile phone, mobile phone viruses is to cause our mobile phone private to be revealed and an important channel of systemic breakdown, and it also is a kind ofly to write the program that forms by computer in fact, propagates by the mode of text or picture.The user has opened short message text or the picture that contains virus, will poison.General mobile phone viruses can influence mobile phone and receive information or send junk information to mobile phone, and directly attack virus in the mobile phone except starting recording function of telephone automatically, calling, delete hand-set data automatically, the most terrified is exactly also may " make " telephone bill that goes out great amount.Virus is all-pervasive, and we can be clearly seen that to crack case from the cell phone password of Hilton, and only dialog context is not dangerous, even the private data that leaves in the mobile phone memory is also dangerous.Perfect along with present cell-phone function, support the WAP function of surfing the Net to become a kind of standard feature of mobile phone, but along with the standardization gradually of the operating system in the mobile phone, allow the hacker can more easily find the leak of cell phone system, by this defective the mobile phone of surfing the Net is attacked, thereby stolen all data in the mobile phone.Perhaps have one day you also on the net the hand-set data of the discovery oneself of " pleasantly surprised " exposed by the people.
C) wireless transmission
The appearance of bluetooth cellular phone provides bigger convenience for us really, and its wireless transmission has been save wired worry, however the serious message of a series of bluetooth leaks that spreads out of recently, and this let us is turned pale with fright.Present many blue teeth wireless safe modes be set to optional function; and present bluetooth equipment does not activate it, makes data be easy to be intercepted and captured by other people when mobile phone is connected by bluetooth with the portable computer that cryptoguard is not set or other mobile phones midway.Last year, the program that first phase causes mobile phone to be divulged a secret at the Bluetooth technology defective is crossed by Britain BBC TV the Taiwan Affairs Office.In program, the hacker carries out mobile phone in the street randomly and attacks from London, and the result has 54 ones to return the mobile phone internal data under situation about not confirming through the phone-holder by in 192 mobile phones relating to.But information is stolen and can only be taken place under bluetooth unencrypted situation fortunately, and the transmission range of bluetooth compare nearer, so steal also easier being found.Needn't be stolen by excessive worry thus, as long as carry out encrypted work, with the Bluetooth transmission safety of data still be guaranteed except above these, what have in addition carry is exactly after the lost mobile phone, some people that have an ulterior motive utilize the phone directory in our mobile phone to plot a conspiracy, thereby let us some friends have dust thrown into the eyes, and such thing has been often can be reported in media.
Above-mentioned back mobile phone viruses and wireless transmission problem can solve in the system design of mobile phone scheme, as increasing virus firewall in the cell phone system software, block encryption storage for sensitive information, when secure communication, do not use radio function etc., but the fundamental issue of secret mobile phone development but is the change on communication pattern, could fundamentally solve the safety problem of mobile phone.
The utility model content
The purpose of this utility model is to provide a kind of communication encryption mobile phone, can overcome not privacy problem of all communication that existing mobile phone causes because of the communication pattern problem, the mode that proposes the employing separation between machine and card is carried out the handset structure of terminal authentication, has stopped COMSEC insecurity.
In order to realize above purpose, the utility model provides a kind of communication encryption mobile phone, comprising: be used for communication parties and carry out authentication and be used for sound or the encrypting and authenticating chip of data encrypting and deciphering; And the encryption mobile phone terminal that this encrypting and authenticating chip is operated; Adopt universal digital interface to connect between described encrypting and authenticating chip and the encryption mobile phone terminal.
Wherein, described universal digital interface is a kind of in the interface modes such as SD, Mini SD, T-Flash, USB.Described encrypting and authenticating chip belt memory function.Encrypting mobile phone terminal is GSM or GSM/GPRS mobile phone.Encrypt the voice communication after mobile phone terminal employing CSD interface modes is encrypted.Increase a ciphering unit circuit and a decrypt circuit in the digital baseband chip of encryption mobile phone terminal, this ciphering unit circuit is between GSM baseband chip compress speech circuit and the speech digit transtation mission circuit, encrypt for the voice messaging that sends, and this decrypt circuit is between speech digit receiving circuit and the GSM baseband chip voice decompression circuit, and the voice messaging that receives is decrypted.
Of the present utility modelly adopted CSD to serve to carry out voice communication, the expense that this method can make enciphoring voice telecommunication is identical with the expense that general mobile phone speech is communicated by letter, thereby be significantly less than the voice communication expense of GPRS pattern, overcome the problem of voice transfer real-time under the GPRS pattern simultaneously, thereby the quality that guarantees enciphoring voice telecommunication is identical with the voice communication quality of general mobile phone.
Encryption mobile phone of the present utility model can connect the authenticated encryption acp chip with general-purpose interface, can insert easily or take out from mobile phone terminal.Adopt the separation between machine and card mode, can directly carry out authentication and data encryption on card, do not need to carry out the authentication process by insecure communication channel, fail safe is higher.Card of an identity even be cracked, is an identity simultaneously, is unlikely to influence whole system.
Description of drawings
Fig. 1 is the mobile phone scheme schematic diagram that has the encrypting and authenticating chip of the present invention.
Fig. 2 is the encrypting and authenticating chip and the connection diagram of encrypting mobile phone that has general-purpose interface of the present invention.
Fig. 3 is the voice encryption mobile phone scheme schematic diagram of employing CSD of the present invention service.
Fig. 4 is for adopting the encryption mobile phone scheme schematic diagram that increases the encryption/decryption element circuit in digital baseband (Base Band) chip of GSM or GSM/GPRS mobile phone.
Embodiment
The present invention proposes a kind of implementation that is used for the mobile phone terminal of voice-and-data encryption, the characteristics of this scheme are to have adopted the encrypting and authenticating scheme of separation between machine and card, as shown in Figure 1, encrypting and authenticating chip (1) is responsible for the authentication of communicating pair and in communication voice or data is encrypted, and encrypts mobile phone terminal (2) and is responsible for carrying out exchanges data and finishing mobile phone speech and the foundation of data communication channel with encrypting and authenticating chip (1).The communication interface of encrypting and authenticating chip (1) and encryption mobile phone terminal adopts universal digital interface, is convenient to being connected of dissimilar mobile phones and encrypting and authenticating chip.The present invention is also special in the real-time encrypted communication of the voice of GSM/GPRS mobile phone, the communication pattern that has proposed employing CSD interface transmits the scheme of encrypted speech, this method is different from the mode that digital channel such as general employing GPRS is carried out enciphoring voice telecommunication, it is good to have real-time, the cheap advantages such as cost of the phone call by the air time charge.If further adopt the circuit that adds the voice encryption function in the baseband chip of GSM/GPRS mobile phone, then the implementation of this mobile phone will be more succinct.More than the encryption mobile phone terminal all can not start encryption function and uses as regular handset.
As shown in Figure 2, encryption mobile phone of the present utility model can connect the authenticated encryption acp chip with general-purpose interface, the interface mode of Contact Type Ic Card different from the past (ISO7816), the communication interface that is this encrypting and authenticating chip (1) and encryption mobile phone terminal (2) has been used universal digital interface, as interface modes such as SD, Mini SD, T-Flash, USB, can insert easily or from mobile phone terminal, take out, shown in figure two.This encrypting and authenticating chip is corresponding with user's identity, has all cryptographic algorithm relevant with authentication and coded communication on the chip, and encryption key comprises symmetric cryptography and rivest, shamir, adelman.This encryption chip can add the function of storage card simultaneously, when the encrypting and authenticating function is provided, also provides the function of common memory card, and this memory card function can the matching with mobile phone terminal be finished other the demand such as multimedia application.This storage card can provide the encryption memory function with the encrypting and authenticating chips incorporate simultaneously.
Adopt the separation between machine and card mode, can directly carry out authentication and data encryption on card, do not need to carry out the authentication process by insecure communication channel, fail safe is higher.Adopt various anti-deciphering means in the card, promote the reliability of authentication, card of an identity even be cracked, is an identity simultaneously, is unlikely to influence whole system.
Set up a timely login mechanism, can upgrade in time and nullify invalid loss card and black card, solve the easy loss of mobile phone and the needs that new machine is changed, further improve fail safe simultaneously.This need of work is set up a registration center, set up an Accreditation System by this registration center, this Accreditation System is a real-time online, at any time handling needs the regularly application for registration of the mobile phone of registration, but whether its card of being responsible for having issued needs the work of nullifying, and does not involve the content of digital signature and encryption key important in the card.The distribution of card (being that digital signature is relevant with encryption key) is managed by the issue center of the sealing that registration center sets up in addition, and security system builds on the basis of this issue center, need be perfectly safe.
Maintain secrecy and directly to adopt above-mentioned encrypting and authenticating chip that the data of transmission are carried out encryption and decryption in the data encryption mode with communication handset, but for the cryptography issue in the voice call, use voice channel rather than GPRS passage to carry out voice communication (or supporting simultaneously), solve the charge on traffic problem, the use cost of saving the user is a problem, adopt the GPRS passage that voice encryption is transmitted, not only can't solve conversation cost problem, and because the GPRS passage is not a fixed-bandwidth, the interruption of voice and communication quality descend in the time of might causing conversation.The present invention proposes on the basis of adopting common in the market GSM/GPRS mobile phone scheme, use CSD (Circuit Switch Data Service) interface, can make ciphering process realize real time implementation, because it is the CSD service is to adopt the air time charge, consistent simultaneously with the regular handset cost of the phone call.The specific implementation block diagram of such mobile phone is seen shown in Figure 3.The flow chart of data processing of Fig. 3: voice analog signal voice Codec (codec chip) in GSM mobile handset is converted to voice digital signal, encrypting control circuit (3) is input to the unencrypted voice digital signal from voice Codec in the common GSM mobile handset in the encrypting and authenticating chip (1), by encrypting and authenticating chip (1) it is compressed, again after encrypting, deliver to the CSD interface of common GSM mobile handset module (4) by control circuit (3), and send out the voice signal of encryption by GSM mobile handset module (4), simultaneously, the encrypted speech that GSM mobile handset module (4) receives passes through the CSD interface through encrypting control circuit (3), be input in the encrypting and authenticating chip (1), by encrypting and authenticating chip (1) it is decrypted, again after decompressing, the voice Codec that voice signal after the deciphering is delivered in the common GSM mobile handset module (4) by control circuit (3) decodes, and produces the unencrypted voice analog signal of simulation.
As shown in Figure 4, maintain secrecy and to adopt a kind of novel GSM or GSM/GPRS mobile phone with communication handset (2), it is characterized in that increasing in digital baseband (BaseBand) chip of this GSM or GSM/GPRS mobile phone a ciphering unit circuit and a decrypt circuit, this ciphering unit circuit is between GSM baseband chip compress speech circuit and the speech digit transtation mission circuit, encrypt for the voice messaging that sends, and above-mentioned decrypt circuit is between speech digit receiving circuit and the GSM baseband chip voice decompression circuit, and the voice messaging that receives is decrypted.
Above-described embodiment only is explanation technological thought of the present utility model and characteristics; its purpose makes those skilled in the art can understand content of the present utility model and is implementing according to this; can not limit protection range of the present utility model with this; promptly the equalization of doing according to the spirit that the utility model disclosed changes or modifies, and must be encompassed in the protection range of the present utility model.

Claims (6)

1, a kind of communication encryption mobile phone is characterized in that it comprises:
Being used for communication parties carries out authentication and is used for sound or the encrypting and authenticating chip of data encrypting and deciphering;
And the encryption mobile phone terminal that this encrypting and authenticating chip is operated;
Adopt universal digital interface to connect between described encrypting and authenticating chip and the encryption mobile phone terminal.
2, communication encryption mobile phone according to claim 1 is characterized in that described universal digital interface is a kind of in the interface modes such as SD, Mini SD, T-Flash, USB.
3, communication encryption mobile phone according to claim 1 is characterized in that described encrypting and authenticating chip belt memory function.
4, communication encryption mobile phone according to claim 1 is characterized in that described encryption mobile phone terminal is GSM or GSM/GPRS mobile phone.
5, communication encryption mobile phone according to claim 4 is characterized in that described encryption mobile phone terminal adopts the voice communication after the CSD interface modes is encrypted.
6, communication encryption mobile phone according to claim 4, it is characterized in that increasing in the digital baseband chip of described encryption mobile phone terminal a ciphering unit circuit and a decrypt circuit, this ciphering unit circuit is between GSM baseband chip compress speech circuit and the speech digit transtation mission circuit, encrypt for the voice messaging that sends, and this decrypt circuit is between speech digit receiving circuit and the GSM baseband chip voice decompression circuit, and the voice messaging that receives is decrypted.
CN 200620047248 2006-10-27 2006-10-27 Communication ciphered cell phone Expired - Lifetime CN200990610Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200620047248 CN200990610Y (en) 2006-10-27 2006-10-27 Communication ciphered cell phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200620047248 CN200990610Y (en) 2006-10-27 2006-10-27 Communication ciphered cell phone

Publications (1)

Publication Number Publication Date
CN200990610Y true CN200990610Y (en) 2007-12-12

Family

ID=38941644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200620047248 Expired - Lifetime CN200990610Y (en) 2006-10-27 2006-10-27 Communication ciphered cell phone

Country Status (1)

Country Link
CN (1) CN200990610Y (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010145337A1 (en) * 2009-11-05 2010-12-23 中兴通讯股份有限公司 Encryption device and method for controlling download and access of mobile terminal
CN102143486A (en) * 2010-01-28 2011-08-03 骆建军 Method for realizing cellphone encrypted communication by using memory card
CN102209318A (en) * 2011-05-18 2011-10-05 武汉天喻信息产业股份有限公司 Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN102325318A (en) * 2011-05-18 2012-01-18 武汉天喻信息产业股份有限公司 Method for improving information security of mobile phone based on intelligent TF (Trans-Flash) card and system
CN103458400A (en) * 2013-09-05 2013-12-18 中国科学院数据与通信保护研究教育中心 Key management method for voice encryption communication system
CN103458401A (en) * 2013-09-05 2013-12-18 北京一诺正思信息技术有限公司 Voice encryption communication system and voice encryption communication method
CN105471876A (en) * 2015-12-02 2016-04-06 东莞见达信息技术有限公司 Encryption communication method and device
CN106559393A (en) * 2015-09-29 2017-04-05 华为数字技术(苏州)有限公司 A kind of method of call encryption, apparatus and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010145337A1 (en) * 2009-11-05 2010-12-23 中兴通讯股份有限公司 Encryption device and method for controlling download and access of mobile terminal
US8661239B2 (en) 2009-11-05 2014-02-25 Zte Corporation Encryption device and method for controlling download and access operations performed to a mobile terminal
CN102143486A (en) * 2010-01-28 2011-08-03 骆建军 Method for realizing cellphone encrypted communication by using memory card
CN102209318A (en) * 2011-05-18 2011-10-05 武汉天喻信息产业股份有限公司 Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN102325318A (en) * 2011-05-18 2012-01-18 武汉天喻信息产业股份有限公司 Method for improving information security of mobile phone based on intelligent TF (Trans-Flash) card and system
CN103458400A (en) * 2013-09-05 2013-12-18 中国科学院数据与通信保护研究教育中心 Key management method for voice encryption communication system
CN103458401A (en) * 2013-09-05 2013-12-18 北京一诺正思信息技术有限公司 Voice encryption communication system and voice encryption communication method
CN103458401B (en) * 2013-09-05 2016-08-24 北京一诺正思信息技术有限公司 A kind of voice encryption communication system and communication means
CN103458400B (en) * 2013-09-05 2017-01-04 中国科学院数据与通信保护研究教育中心 A kind of key management method in voice encryption communication system
CN106559393A (en) * 2015-09-29 2017-04-05 华为数字技术(苏州)有限公司 A kind of method of call encryption, apparatus and system
CN105471876A (en) * 2015-12-02 2016-04-06 东莞见达信息技术有限公司 Encryption communication method and device

Similar Documents

Publication Publication Date Title
CN200990610Y (en) Communication ciphered cell phone
CN101203025B (en) Method for transmitting and receiving safe mobile message
CN1926802B (en) Safety data transmission
CN102572817B (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN203279187U (en) Voice encryption bluetooth earphone with fingerprint identification function
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
Paik Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications
CN102209318A (en) Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN101917711A (en) Mobile communication system and voice call encryption method thereof
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
CN112929339B (en) Message transmitting method for protecting privacy
Nie et al. Mobile banking information security and protection methods
CN202818612U (en) System capable of blocking unauthorized SMS text messages or bulk SMS text messages
CN106027560A (en) Intelligent terminal oriented security transmission method and system
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN104284328A (en) Method and device for encrypting mobile phone communication content
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN100479568C (en) Implementation scheme for secrecy phone of the smart mobile terminal
CN108270917B (en) Encrypted smart phone
Gindraux From 2G to 3G: a guide to mobile security
CN102413462B (en) Method and system for improving safety of voice communication of mobile terminal system based on safety micro secure digital (TF) card
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof
Kumar et al. Security issues in m-government

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHANGHAI FUDAN MICROELECTRONICS GROUP COMPANY LIMI

Free format text: FORMER NAME: FUDAN MICROELECTRONICS CO., LTD., SHANGHAI

CP03 Change of name, title or address

Address after: 200433 building 4, Fudan Science Park, 127 Cathay Pacific Road

Patentee after: Shanghai Fudan Microelectronic Group Co., Ltd.

Address before: 200433 building 127, 4 Cathay Road, Shanghai

Patentee before: Fudan Microelectronics Co., Ltd., Shanghai

CX01 Expiry of patent term

Granted publication date: 20071212

EXPY Termination of patent right or utility model