SI24698A - An encryption coding modules - Google Patents
An encryption coding modules Download PDFInfo
- Publication number
- SI24698A SI24698A SI201400137A SI201400137A SI24698A SI 24698 A SI24698 A SI 24698A SI 201400137 A SI201400137 A SI 201400137A SI 201400137 A SI201400137 A SI 201400137A SI 24698 A SI24698 A SI 24698A
- Authority
- SI
- Slovenia
- Prior art keywords
- data
- communication device
- encryption
- encryption module
- communication
- Prior art date
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Šifrirno kodirni modul rešuje problem kodiranja oz. šifriranja/kriptiranja govora (podatkov, sporočil) pri žičnih ali brezžičnih komunikacijskih sistemih. Omenjeni modul vsebuje možnost avtonomnega napajanja z interno baterijo (112) preko napajalnega modula (107). Ta vsebuje upravljalnik z baterijo in ima možnost priključitve zunanjega napajanja. Lastna procesna enota (113), ki je lahko izvedena z, a ne omejeno na, mikrokrmilnik, FPGA vezje ali drugim mikro-procesorskim sistemom. Modul je opremljen strajnim pomnilnikom (106), NFC sprejemno/oddajnim brezstičnim modulom (102), Bluetooth ali drugim modulom za zagotavljanje brezžične komunikacije (103), avdio vtikačem (104), avdio vtičnico (108), mikrofonom za zajem zvoka (110), zvočnikom za predvajanje zvoka (111), USB priključkom (101), varnostnim elementom (105), ki skrbi za varno shranjevanje ključnih podatkov, hkrati pa vsebuje tudi mehanizme za preprečevanje in zaznavanje dostopa v modul in zvočnikom za motenje vgrajenega mikrofona v modulu (109).Ohišje šifrirno kodirnega modula je varnostno prirejeno na način, da kakršenkoli poseg v notranjost naprave onemogoči njegovo nadaljnjo uporabo hkrati pa lahko tudi onemogoča delovanje primarnega mikrofona na komunikacijski napravi (100).Encryption coding module solves the encoding problem. encryption / encryption of speech (data, messages) in wired or wireless communication systems. This module contains the possibility of autonomous power supply with an internal battery (112) via the power module (107). This includes a battery controller and has the ability to connect external power. An own processing unit (113) which can be implemented with, but not limited to, a microcontroller, a FPGA circuit, or another microprocessor system. The module is equipped with a strenuous memory (106), a NFC Receiver / Broadband Module (102), Bluetooth or another module for providing wireless communication (103), an audio plug (104), an audio outlet (108), a microphone for capturing audio (110) , a sound playback loudspeaker (111), a USB connector (101), a security element (105) that ensures the safe storage of key data, while also includes mechanisms for preventing and detecting access to the module and the speaker for interfering the built-in microphone in the module 109). The encryption code encoder module is securely configured in such a way that any interference to the inside of the device prevents its further use while it also prevents the operation of the primary microphone on the communication device (100).
Description
ŠIFRIRNO KODIRNI MODULCODING MODULE
Predmet izuma je naprava »šifrirno kodirni modul«, ki je predvidena za kodiranje oz. šifriranje/kriptiranje govora (podatkov, sporočil) pri žičnem ali brezžičnem telefonskem aparatu, pametnem telefonu, pametni napravi, tablici, osebnem računalniku in podobnim napravam (v nadaljevanju »komunikacijska naprava«).The subject of the invention is a device "encryption coding module", which is intended for coding or. encryption / encryption of speech (data, messages) on a wired or wireless telephone, smartphone, smartphone, tablet, PC and similar devices (hereinafter referred to as "communication device").
Tehnični problem, ki ga rešuje izum, predstavlja zasnovo naprave, ki omogoča dvema ali več uporabnikom (napravam) varen pogovor ali prenos podatkov (sporočil), ki mu ni mogoče prisluškovati oz. je prisluškovalna vsebina nerazumevajoča in s tem neuporabna.A technical problem solved by the invention is the design of a device that enables two or more users (devices) to have a secure conversation or transfer of data (messages) that cannot be eavesdropped or the eavesdropping content is unintelligible and thus useless.
Z razvojem telekomunikacij v zadnjih dveh desetletjih se je prisluškovanje pogovorom v realnem času poenostavilo. Različne obveščevalne agencije in zasebne organizacije izvajajo rutinsko prestrezanje klicev in/ali podatkovnih povezav, ki omogoča na nezakonit način pridobivanje občutljivih političnih, vojaških in gospodarskih in drugih informacij. Oprema za brezžično prestrezanje mobilnih telefonskih klicev in sporočil je postala cenovno ugodna in lažje dostopna, kar je razlog, da so prisluškovanja v današnjem času postala tako razširjena, preprosta in nenadzorovana. Zato je uporaba naprave, ki je osnova predlaganega patenta popolnoma upravičena, saj omogoča zaščito zasebnosti v času vzpostavljene glasovne povezave.With the development of telecommunications over the last two decades, real-time wiretapping has become easier. Various intelligence agencies and private organizations carry out a routine interception of calls and / or data links, which enables the acquisition of sensitive political, military and economic and other information in an unlawful manner. Equipment for wireless interception of mobile phone calls and messages has become affordable and easily accessible, which is why eavesdropping has become so widespread, simple and uncontrolled today. Therefore, the use of a device that is the basis of the proposed patent is fully justified, since it allows for the protection of privacy during a voice connection.
Zaščita govornih podatkov z močnim in zaupanja vrednim kodiranjem oz. šifriranjem/kriptiranjem ni enostavna. Večina danes uporabljenih algoritmov za kodiranje je dvomljive kakovosti, saj obstaja vedno več študij in dokazov, da le-ti vsebujejo različne in relativno enostavne načine »vpogleda« v vsebino kodiranih paketov oz. t.i. stranska vrata. Dodatni razlog prinaša dejstvo, da današnji superračunalniki z izjemno računsko močjo izkoriščajo šibke zaščite nekaterih splošno uporabljenih algoritmov za kodiranje oz. šifriranje/kriptiranje. Omenjene slabe lastnosti so v javnosti običajno prikrite z različnimi marketinškimi prizadevanji, da se to čim manj objavlja in o tem razpravlja. Ne nazadnje so te iste agencije-institucije, ki izdajajo certifikate o ustreznosti algoritmov za kodiranje, na drugi strani odgovorne za prestrezanje in prisluškovanje telekomunikacijskim informacijam.Protecting speech data with strong and trusted encryption. encryption / encryption is not easy. Most of the coding algorithms used today are of dubious quality, as there is a growing body of studies and evidence that they contain different and relatively straightforward ways of "seeing" the contents of coded packages. i.e. side door. An additional reason is the fact that today's supercomputers with extreme computational power take advantage of the weak protections of some commonly used encryption algorithms. encryption / encryption. The aforementioned disadvantages are usually masked in the public by various marketing efforts to keep this public and to discuss it as little as possible. Last but not least, these same agency agencies that certify the adequacy of coding algorithms, on the other hand, are responsible for intercepting and tapping into telecommunications information.
Znanih je nekaj podobnih rešitev od katerih pa nobena ne omogoča prenosa podatkov in sporočil z uporabo visoke stopnje kodiranja oz. šifriranja/kriptiranja na vseh komunikacijskih členih med dvema ali več napravami (uporabniki) kot naš predlagani izum. Znani sta rešitvi po patentih EP 21There are some similar solutions known, none of which allow for the transmission of data and messages using a high rate of encoding. encryption / encryption on all communication links between two or more devices (users) as our proposed invention. EP 21 patent solutions are known
580 in DE 10 20 10 01 79 36, ki pa celoten kodirni (šifrirni/kriptirni) postopek izvedejo znotraj mobilne naprave na programskem (ang. softvvare) nivoju. Na ta način je sicer omogočen prenos šifriranih podatkov po omrežju, a so le-ti na nivoju operacijskega sistema mobilne naprave še vedno dostopni za prestrezanje iz strani drugih aplikacij na mobilni napravi.580 and DE 10 20 10 01 79 36, which, however, perform the entire encryption (encryption / encryption) process within the mobile device at the software level. This enables the transfer of encrypted data over the network, but it is still accessible at the mobile device operating system level to be intercepted by other applications on the mobile device.
Poleg teh dveh so najbolj značilne rešitve še po patentih US 20 13 02 36 015, US 20 13 02 52 585, US 80 05 223, CN 10 20 75 321, WO 20 08 15 02 24, VVO20 11 11 27 67, US 85 26 616, WO 20 08 12 95 46, US 08 63 87 16, CN 20 11 88 646, CN 10 13 04 306, JP 20 05 19 77 86, EP 21 75 580, US 85 55 068, US 20 08 01 41 331, US 20 06 01 54 695, WO 20 13 00 93 19, WO 20 13 13 38 36.In addition to these two, the most typical solutions are the patents US 20 13 02 36 015, US 20 13 02 52 585, US 80 05 223, CN 10 20 75 321, WO 20 08 15 02 24, VVO20 11 11 27 67, US 85 26 616, WO 20 08 12 95 46, US 08 63 87 16, CN 20 11 88 646, CN 10 13 04 306, JP 20 05 19 77 86, EP 21 75 580, US 85 55 068, US 20 08 01 41 331, US 20 06 01 54 695, WO 20 13 00 93 19, WO 20 13 13 38 36.
Bistvo predlagane rešitve je omogočanje varnega pogovora, prenosa podatkov ali sporočil med končnima uporabnikoma/-! oz. napravama/-! s pomočjo šifrirno kodirnega modula. Predlagan šifrirno kodirni modul je sestavljen iz osnovnih komponent prikazanih na sliki 1:The point of the proposed solution is to allow secure conversation, transfer of data or messages between end users / -! oz. devices / -! by means of an encryption module. The proposed encryption module consists of the basic components shown in Figure 1:
- šifrirno kodirni modul z možnostjo avtonomnega napajanja (lahko vsebuje interno baterijo (112)), napajalnim modulom (107), ki vsebuje upravljalnik z baterijo in ima možnost priključitve zunanjega napajanja, lastno procesno enoto (113), katera je lahko izvedena z, a ne omejeno na, mikrokrmilnikom, FPGA vezjem ali drugim mikro-procesorskim sistemom. Naprava je opremljena s trajnim pomnilnikom (106), NFC sprejemno/oddajnim brezstičnim modulom (102), Bluetooth modulom (103), avdio vtikačem (104), avdio vtičnico (108), mikrofonom za zajem zvoka (110), zvočnikom za predvajanje zvoka (111), USB priključkom (101), varnostnim elementom (105), kateri skrbi za varno shranjevanje ključnih podatkov, hkrati pa vsebuje tudi mehanizme za preprečevanje in zaznavanje dostopa v modul in zvočnikom za motenje vgrajenega mikrofona v napravi (109). Ohišje šifrirno kodirnega modula je varnostno prirejeno na način, da kakršenkoli poseg v notranjost naprave onemogoči njegovo nadaljnjo uporabo (tamper-evident, tamper-responsive in tamperresistant) hkrati pa lahko tudi onemogoča delovanje primarnega mikrofona na komunikacijski napravi (100),- an encrypted coding module with autonomous power supply (may include an internal battery (112)), a power module (107) comprising a battery controller and having the ability to connect an external power supply, its own processing unit (113), which can be implemented by, a not limited to, microcontrollers, FPGAs or other micro-processor systems. The device is equipped with permanent memory (106), NFC transceiver / transmitter contactless module (102), Bluetooth module (103), audio plug (104), audio jack (108), microphone for audio capture (110), speaker for audio playback (111), a USB port (101), a security element (105) that provides secure storage of key data, while also providing mechanisms to prevent and detect access to the module and speakers to interfere with the built-in microphone in the device (109). The encryption module enclosure housing is adapted in such a way that any interference with the interior of the device prevents its further use (tamper-evident, tamper-responsive and tamperresistant) and at the same time can also prevent the primary microphone from operating on the communication device (100),
- aplikacija na komunikacijski napravi za upravljanje s šifrirno kodirnim modulom, ki deluje na komunikacijski napravi.- an application on a communication device for managing an encryption module operating on a communication device.
Zgradba šifrirno kodirnega modula je podana na sliki 1. Šifrirno kodirni modul se lahko nahaja v ohišju naprave. Ohišje lahko med drugim služi onemogočanju zajemanja zvoka na uporabljeni napravi.The structure of the encryption module is given in Figure 1. The encryption module may be located in the housing of the device. The enclosure may, inter alia, disable audio capture on the device used.
Notranja elektronika šifrirno kodirnega modula opravlja naslednje osnovne funkcije:The internal electronics of the encryption module performs the following basic functions:
- zajemanje zvoka.- sound capture.
- predvajanje zvoka,- audio playback,
- kodiranje oz. šifriranje/kriptiranje in dekodiranje oz. dešifriranje/dekriptiranje zvoka, podatkov in sporočil,- coding or. encryption / encryption and decoding or encryption. decrypt / decrypt audio, data and messages,
- komunikacijo preko različnih komunikacijskih vmesnikov.- communication through different communication interfaces.
Šifrirno kodirni modul (205) lahko s komunikacijsko napravo (204) (npr. mobilnim telefonom) vzpostavi povezavo na več različnih načinov (slika 2):The encryption module (205) can be connected to the communication device (204) (eg by mobile phone) in several different ways (Figure 2):
- USB vmesnik (200),- USB interface (200),
- NFC brezstičnim vmesnikom (201),- NFC contactless interfaces (201),
- Bluetooth vmesnikom (202) (možna je uporaba tudi drugih brezžičnih vmesnikov, kot npr. RF, ZigBee, VViFi, IR in podobno),- Bluetooth interfaces (202) (other wireless interfaces such as RF, ZigBee, VViFi, IR, etc. may be used),
- elektro-akustičnim sklopom (203).- electro-acoustic assembly (203).
Poleg različnih možnosti povezav s komunikacijsko napravo, lahko šifrirno kodirni modul sočasno vzpostavi in vzdržuje komunikacijo preko vseh možnih povezav, ki so na razpolago na komunikacijski napravi (vzpostavi in vzdržuje komunikacijski multipleks), kar dodatno onemogoča oz. otežuje prestrezanje podatkov.In addition to the various connection options with the communication device, the encryption module can simultaneously establish and maintain communication through all possible connections available on the communication device (establish and maintain a communication multiplex), which further disables or prevents communication. makes it difficult to intercept data.
Šifrirno kodirni modul (300) omogoča priključitev zunanjih naprav (npr. (303), (304) in druge zunanje naprave) preko naslednjih komunikacijskih vmesnikov (slika 3):The encryption module (300) allows the connection of external devices (eg (303), (304) and other external devices) via the following communication interfaces (Figure 3):
- Bluetooth vmesnik - (302) (npr. brezžična slušalka - (304), avtoradio - (305), možna je tudi uporaba drugih brezžičnih vmesnikov, kot npr. RF, ZigBee, VViFi, IR),- Bluetooth interface - (302) (eg wireless headset - (304), car radio - (305), other wireless interfaces such as RF, ZigBee, VViFi, IR are also possible),
- avdio vmesnik - (301) (npr. žične slušalke - (303)).- audio interface - (301) (eg wired headphones - (303)).
Šifrirno kodirni modul lahko deluje v dveh načinih:The encryption module can operate in two modes:
- kot popolnoma samostojna naprava, kjer se komunikacijska naprava njegove prisotnosti ne zaveda in nima vpliva na njegovo delovanje,- as a completely stand-alone device where the communication device of its presence is unaware and does not affect its operation,
- v kombinaciji z aplikacijo na komunikacijski napravi. Postopek varne komunikacije:- in combination with an application on a communication device. Safe communication process:
uporabnik požene aplikacijo na komunikacijski napravi (601), se avtenticira s pomočjo PIN številke ali biometričnega senzorja (602), če avtentikacija ni uspešna, se mora uporabnik ponovno avtenticirati (603),the user launches the application on the communication device (601), authenticates himself with a PIN number or biometric sensor (602), if authentication fails, the user must re-authenticate (603),
- v primeru uspešne avtentikacije uporabnik vnese številko oz. naslov klicanega ali iz imenika izbere enega ali več uporabnikov (604),- in case of successful authentication, the user enters the number or. the caller's address or select one or more users (604) from the directory,
- s pritiskom na gumb požene postopek vzpostavitve varne povezave (605), ob uspešno (606) ali neuspešno (609) vzpostavljeni varni povezavi med šifrirno kodirnimi moduli povezanih komunikacijskih naprav uporabnikov aplikacija na komunikacijski napravi obvesti uporabnika, prenos zvoka/govora/podatkov/sporočil (607),- Press the button to initiate the process of establishing a secure connection (605), having successfully (606) or unsuccessfully (609) established a secure connection between the encryption coding modules of the connected communication devices of users, the application on the communication device notifies the user, audio / voice / data / message transmission (607),
- po zaključku pogovora/prenosa podatkov/ izmenjave sporočil, uporabnik prekine povezavo (608).- after the end of the conversation / data transmission / messaging, the user disconnects (608).
Aplikacija na komunikacijski napravi, ki upravlja s šifrirno kodirnim modulom, omogoča:An application on a communication device that manages the encryption module enables:
- neposredni nadzor nad šifrirno kodirnim modulom (nastavitve, izbira tipa komunikacijskega vmesnika, ...),- direct control of the encryption module (settings, choice of type of communication interface, ...),
- vzpostavitev varne povezave,- establishing a secure connection,
- varen pogovorni klic,- secure conversation call,
- varno komuniciranje,- secure communication,
- varen prenos podatkov,- secure data transmission,
- varno pošiljanje sporočil,- secure messaging,
- zaščiten dostop do aplikacije na komunikacijski napravi (uporaba PIN številke, biometrična verifikacija, ipd...),- secure access to the application on the communication device (use of PIN number, biometric verification, etc.),
- upravljanje s podatki uporabnikov drugih šifrirno kodirnih modulov s katerimi poteka varna povezava,- managing the data of users of other encryption modules with which a secure connection is made,
- posodobitev programske opreme in konfiguracije šifrirno kodirnega modula na daljavo.- Remote software update and configuration of the encryption module.
Šifrirno kodirna modula oz. moduli lahko med seboj vzpostavijo povezavo neposredno ali z uporabo komunikacijskih vmesnikov komunikacijske naprave. Vzpostavitev varne povezave je izvedena z uporabo dveh komunikacijskih vmesnikov:Encryption coding modules the modules can connect to each other directly or through the communication interfaces of the communication device. A secure connection is made using two communication interfaces:
- podatkovna povezava (možna je uporaba tudi drugih brezžičnih vmesnikov, kot npr. RF, ZigBee, VViFi),- data connection (other wireless interfaces such as RF, ZigBee, VViFi may be used),
- zvočna povezava (vzpostavitev klica).- audio connection (making a call).
Povezava med šifrirno kodirnimi moduli je lahko izvedena na dva načina:There are two ways to link the encryption modules:
- neposredna povezava, kjer šifrirno kodirni modul (403) z uporabo komunikacijskega vmesnika na napravi (402) vzpostavi varno povezavo (401) neposredno z napravo (404), ki podatke preda šifrirno kodirnemu modulu (405) (slika 4),- a direct connection where the encryption module (403), through the communication interface on the device (402), establishes a secure connection (401) directly with the device (404) which transmits the data to the encryption module (405) (Figure 4),
- posredna povezava, kjer šifrirno kodirni modul (501) z uporabo komunikacijskega vmesnika naprave (502) najprej vzpostavi varno povezavo (503) do vmesne naprave (504). Ta naprava vzpostavi novo varno sejo (505) do končne naprave (506), ta pa prejete podatke pošlje šifrirno kodirnemu modulu (507) (slika 5).- indirect connection, where the encryption module (501) first establishes a secure connection (503) to the intermediate device (504) using the communication interface of the device (502). This device establishes a new secure session (505) to the end device (506), which transmits the received data to the encryption module (507) (Figure 5).
Režimi delovanja šifrirno kodirnega modula, ki se izvajajo v primeru uspešno vzpostavljene varne povezave med šifrirno kodirnimi moduli:Modes of operation of the encryption module, which are implemented in the case of successfully established secure connection between the encryption modules:
- prenos podatkov: Podatki za pošiljanje se nahajajo na komunikacijski napravi. Naprava podatke pošlje do šifrirno kodirnega modula. Ta jih kodira oz. šifrira/kriptira in posreduje napravi, ki jih pošlje do naslovne komunikacijske ali vmesne naprave (prehoda). Ta naprava podatke pošlje šifrirno kodirnemu modulu, ki jih odkodira oz. dešifrira/dekriptira in posreduje rezultat napravi.- data transmission: The sending data is located on the communication device. The device sends the data to the encryption module. It encodes them. encrypts / encrypts and forwards to the device that sends them to the address communication or intermediate device (gateway). This device sends data to the encryption module that decodes or encodes it. decrypts / decrypts and transmits the result to the device.
- prenos sporočil: Sporočila za pošiljanje se nahajajo na komunikacijski napravi. Naprava ta sporočila pošlje do šifrirno kodirnega modula. Ta jih kodira oz. šifrira/kriptira in posreduje napravi, ki jih pošlje do naslovne komunikacijske naprave. Naprava sporočila pošlje šifrirno kodirnemu modulu, ki jih odkodira oz. dešifrira/dekriptira in posreduje rezultat komunikacijski napravi.- Message transmission: The sending messages are located on the communication device. The device sends these messages to the encryption module. It encodes them. encrypts / encrypts and transmits to the device which sends them to the address communication device. The device sends a message to the encrypting module which decodes them. decrypts / decrypts and transmits the result to the communication device.
- vzpostavitev klicne povezave: Zajemanje zvoka poteka preko mikrofona, kateri se lahko nahaja na šifrirno kodirnem modulu, komunikacijski napravi ali na zunanji napravi, povezani neposredno na šifrirno kodirni modul z žičnim ali brezžičnim vmesnikom. Če se zvok zajema s pomočjo komunikacijske naprave, se zvok v obliki zajetih podatkov najprej posreduje šifrirno kodirnemu modulu, v nasprotnem primeru so ti podatki že na šifrirno kodirnem modulu, saj pridejo neposredno z internega mikrofona oz. preko zunanje naprave. Ta jih kodira oz. šifrira/kriptira in posreduje napravi, ki jih posreduje do naslovne komunikacijske naprave. Naslovna komunikacijska naprava prejete podatke posreduje šifrirno kodirnemu modulu, ki jih odkodira oz. dešifrira/dekriptira in predvaja na izbranem komunikacijskem vmesniku (zvočnik komunikacijske naprave, zvočnik šifrirno kodirnega modula, posredovanje drugim zunanjim napravam).- dial-up connection: Audio is captured via a microphone, which can be located on the encryption module, communication device or on an external device connected directly to the encryption module with a wired or wireless interface. If the audio is captured by a communication device, the audio in the form of the captured data is first transmitted to the encryption module, otherwise this information is already on the encryption module, as they come directly from the internal microphone or microphone. via an external device. It encodes them. encrypts / encrypts and transmits to the device, which transmits them to the address communication device. The address communication device transmits the received data to the encrypting module, which decodes them. decrypts / decrypts and plays on the selected communication interface (speaker of the communication device, speaker of the encryption module, forwarding to other external devices).
SEZNAM KRATICLIST OF ABBREVIATIONS
NFC - (ang. Near Field Communication) visokofrekvenčna komunikacijska tehnologija kratkega dosegaNFC - Near Field Communication is a high frequency short range communication technology
USB - (ang. Universal Serial Bus) univerzalno serijsko vodiloUSB - Universal Serial Bus Universal Serial Bus
Bluetooth - varna brezžična visokofrekvenčna tehnologija za povezovanje različnih digitalnih elektronskih naprav na razdaljah do nekaj metrovBluetooth - Secure wireless high-frequency technology for connecting various digital electronic devices at distances of up to several meters
ZigBee - brezžični komunikacijski protokol namenjen osebnim omrežjem z nizko porabo energijeZigBee - A wireless communication protocol designed for low-power personal networks
RF - radiofrekvenčni prenosRF - radio frequency transmission
VViFi - brezžično računalniško omrežjeVViFi - wireless computer network
FPGA - (ang. Field-Programmable Gate Array) Strojno programabilno logično vezje Tamper-Evident - sledljivost na nedovoljene posege Tamper-Responsive - odzivnost na nedovoljene posege Tamper-Resistant - odpornost pred nedovoljenimi posegiFPGA - Field-Programmable Gate Array Hardware Programmable Tamper-Evident Logic Circuit - Tamper-Responsive Traceability - Tamper-Resistant Response - Tamper Resistance
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SI201400137A SI24698A (en) | 2014-04-09 | 2014-04-09 | An encryption coding modules |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SI201400137A SI24698A (en) | 2014-04-09 | 2014-04-09 | An encryption coding modules |
Publications (1)
Publication Number | Publication Date |
---|---|
SI24698A true SI24698A (en) | 2015-10-30 |
Family
ID=54345688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SI201400137A SI24698A (en) | 2014-04-09 | 2014-04-09 | An encryption coding modules |
Country Status (1)
Country | Link |
---|---|
SI (1) | SI24698A (en) |
-
2014
- 2014-04-09 SI SI201400137A patent/SI24698A/en not_active IP Right Cessation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6938702B2 (en) | Hearing devices with communication protection and related methods | |
US10154059B2 (en) | Hearing device with communication protection and related method | |
US8762715B2 (en) | Event triggered pairing of wireless communication devices based on time measurements | |
US10038676B2 (en) | Call encryption systems and methods | |
EP2963854A1 (en) | Device for secure peer-to-peer communication for voice and data | |
CN203279187U (en) | Voice encryption bluetooth earphone with fingerprint identification function | |
EP3032845B1 (en) | Hearing device configured to authenticate a mode request and related method | |
JP6807153B2 (en) | Devices and related methods for secure hearing device communication | |
CN103986503A (en) | Safety Bluetooth headset and voice communication method thereof | |
CN103945039A (en) | External information source encryption and anti-eavesdrop interference device for voice communication device | |
EP3139564B1 (en) | Encryption coding module | |
CN107070659B (en) | Authentication of base station and headset | |
KR20160121828A (en) | Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals | |
CN101304306A (en) | Method and apparatus for safety call | |
CN108270917B (en) | Encrypted smart phone | |
EP2809045B1 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
CN203537408U (en) | End-to-end voice communication privacy device with assignable secret key | |
CN201188646Y (en) | Telephone secrecy apparatus | |
SI24698A (en) | An encryption coding modules | |
CN104080080B (en) | A kind of data handling system of voice call | |
CN206932340U (en) | Secrecy intercom based on quantum key service station transfer communication | |
JP2020063605A (en) | Locking/unlocking system and wireless communication method | |
RU2819563C1 (en) | Method of organizing voice communication with end-to-end encryption and user authentication | |
CN106899898A (en) | Secrecy intercom based on quantum key service station transfer communication | |
CN104066080A (en) | Data processing method of voice communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
OO00 | Grant of patent |
Effective date: 20151118 |
|
KO00 | Lapse of patent |
Effective date: 20221208 |