TW321808B - - Google Patents

Download PDF

Info

Publication number
TW321808B
TW321808B TW080106958A TW80106958A TW321808B TW 321808 B TW321808 B TW 321808B TW 080106958 A TW080106958 A TW 080106958A TW 80106958 A TW80106958 A TW 80106958A TW 321808 B TW321808 B TW 321808B
Authority
TW
Taiwan
Prior art keywords
received message
data
message data
cryptographic
information
Prior art date
Application number
TW080106958A
Other languages
Chinese (zh)
Original Assignee
Toshiba Co Ltd
Toshiba Ave Kk
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Co Ltd, Toshiba Ave Kk filed Critical Toshiba Co Ltd
Application granted granted Critical
Publication of TW321808B publication Critical patent/TW321808B/zh

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Description

321808 Λ 6 13 6 經濟部中央標準局貝工消費合作社印製 五、發明説明(1 ) <産業上之利用領域> 本發明僳關於例如選擇呼收接收機之移動用通信之無 線電通信終端裝置者,尤指備有自基地台(Base station )送出之訊息資料加以表示之功能的裝置。 <先前技術> 以往之做為移動無線電通信条統者,通常有選擇呼叫 糸統,這是大家都知道的通信方式。至於選擇呼叫条統則 如第8圖所示俗使用選擇呼叫信號,所諝選擇呼叫信號像 將一幀(frame)如(a)所不以分時(time share)方 式分為複數群(Group)(在圖中係分為η群),而這群 係再如(b)所示仍以分時方式分為同步語(word)及複 數之呼叫語(word)(在圖中僳分為m語)。再者,這些 呼叫語僳如(c)所示,乃由選擇呼叫接受機之個別號碼 符號(ID碼)及訊息碼(message code)所構成。 當要呼叫指定之^擇呼叫接收機時,主叫者則撥出對 應該選擇呼叫接收機之電話號碼,與基地台完成連接,並 將訊息情報輸送給基地台(BS)。然後基地台則先將上 述選擇呼叫接收機中事先编給之ID碼,與將上述訊息情 報编碼之訊息编碼一起産生出來,之後在構成1幀(fra-me)複數群之中,上述選擇呼叫接收機所屬之空間待叫群 的呼叫語,各插入上述ID碼及訊息碼後並發送之。 一方面,第9圖所示偽構成選擇呼叫接收機之一例者 。在同一圖中自基地台發送之選擇呼叫信號,偽經由天線 (請先閲讀背面之注意事項再填窝本頁) 本紙張尺度边用中a國家標準(CNS)甲4規格(210x297公龙) -3 - A 6 13 6 經濟部中央標準局貝工消費合作社印製 五、發明説明(2 ) 1並由無線電路2加以接收後,利用解調電路3加以解調 然後輸入控制電路4。控制電路4僳將包含在上述解調之 選擇呼叫信號之ID碼,與事先記億在個別號碼符號儲存 器(ID-ROM) 5之本機之ID碼互相加以對照。然 後按照其對照結果若檢出之兩符號成一致時,卽認為本接 收機己被呼叫,然後經由驅動電路6將鳴音信號供給揚聲 器7,令揚磬器發出呼叫聲,藉此將呼叫告知值機人員, 再者上述呼叫聲可因按下停止開關11來切斷呼叫聲。 上述控制電路4則當上述ID碼檢出來是一致時,逋 ID碼將接收之訊息碼加以校正處理後施予解調,再將解 調而得之訊息數據供至表示驅動回路8,然後使訊息情報 顯示在液晶表示器(LCD) 9。值機員獲得呼叫通知時 ,則可由上述LCD9知道主叫者發送之信息。再者上述 接收訊息碼則被轉送至訊息儲存器(Μ — R A Μ ) 1 0並 加以記億之,該訊息儲存器1 〇所記億之訊息碼則當按下 表示開關12時便再顯示在LCD9。 <擬解決之問題> 可是就該此種習知之選擇呼叫接收機而言,當呼叫進 來時,接收訊息則無條件地表示在LCD9,接收後只要 按押表示開關12之簡單操作則可將記億在訊息儲存器 10之接收訊息顯示在LCD9。為此,有時候會有洩漏 接收訊息之機密性之顧盧。 再者,為要將接收訊息責料加以保密,則須將接收訊 (請先閲請背面之注意事項再填寫本頁) 裝· 本紙張尺度埠用中國囷家樣毕(CNS)甲4規格(210x29’〖公釐) -4 - 321808 Λ 6 13 6 經濟部中央標準局員工消费合作社印製 五、發明説明(3 ) 息情報全部施予密碼化,然而為要解讀密碼,則必須先輸 入規定之口令(pass word),才能夠將原文之接收訊息 表示出來,這種也有人曽經想過,可是這種習有之方式, 因為會將全部訊息資料無條件地加以密碼化,所以對於那 些機密等级較低並不必保密之訊息資料而言,為要解讀訊 息,也必須輸入規定之口令,因此為要顯示接收訊息情報 ,其操作變得很麻煩。 本發明之目的係為要提供一種將重要之接收訊息情報 可賦予機密性,而且操作簡易之無線電通信终端裝置。 本發明之另一目的偽提供將接收訊息情報加以密碼化 ,並賦予機密性,而且並不必持別執行密碼解讀操作,則 可確認接收訊息資料之無線電通信終端裝置。 <解決問題之手段> 為要達成上述目的,本發明則將對應每一接收訊息情 報是否要執行密碼化之密碼化控制情報,記億在記億手段 ,同時設有密碼化手段,當要將接收訊息情報顯示在表示 手段時,則利用該密碼化手段,自上述記億手段讀出對應 之密碼化控制情報,並判定有否必要加以密碼化,如果判 定若有必要加以密碼化時,則按照所定之密碼化規則,將 上述接收訊息情報施予密碼化後再表示者。 再者,為達成上述之另一目的,其發明則將接收訊息 資料之文字或符號,以其文字體糸或符號髏条上取代所定 之相對位置有關某一其他文字或符號,藉此將要加以密碼 (請先閲讀背面之注意事項再塡寫本頁) 装- 線< 本紙張尺度逍用中a B家標準(CNS)甲4規格(210X297公龙) Λ 6 13 6 經濟部中央標準局貝工消費合作社印製 五、發明説明(4 ) 化之取代密碼化規則,記億在密碼化規則之記億手段中, 而當要將上述接收訊息情報顯示在表示手段時,利用密碼 化手段將上述接收訊息倩報,依據記億在上述密碼化規則 記億手段之取代密碼化規則,施予密碼化者。 再者,本發明傜將複數之取代密碼化規則記億在密碼 化情報記億手段中,同時事先將對應每一接受訊息情報之 上述複數的取代密碼化規則中,到底要使用那一組之密碼 化控制情報加以記億,當要將接收訊息情報加以顯示時, 則將該接收密碼化規則所對應之取代密碼化規則,利用上 述密碼化控制情報來加以判別,並依據該取代密碼化規則 ,將該各接收訊息情報施予密碼化後供做顯示用者。 <作用> 按本發明之裝置而言,因為可以按照每一接收訊息資 料,分別設定是否有必要執行密碼化,對於重要之接收訊 息則施予密碼化,以保持機密性之狀態下加以顯示,而且 對於不十分重要之接收訊息情報,則不必施予密碼化可以 直接顯出來。為此對於較不具重要性之接收訊息情報,則 不須執行解密很簡單地可確認出來,藉此便可同時具有保 持機密性之裝置及簡便之使用裝置。 再者,就其他之本發明而言,因為接收訊息情報僳利 用解密比較容易之取代密碼化規則來執行然後加以表示者 ,所以對於不諳密碼化規則的第三者而言乃無法正確地知 曉接收訊息情報内容,可是對於熟諳密碼化規則之操作者 (請先閱讀背面之注意事項再塡寫本頁) 裝· 訂- 線- 一 6 _ 經濟部中央標準局員工消費合作社印製 五、發明説明(5 ) 而言,則比較容易自所顯示之密碼化接收訊息情報解讀原 文之意思。因此,對於接收訊息不僅可保持其機密性,而 且使用者為要解密也不必做特別操作,就可以確認接收訊 息情報,藉此可再提其使用簡便性。 再者,按本發明裝置而言,乃備有複數組之取代密碼 化規則,且將該等取代密碼化規則在各每接收訊息情報指 定成為可選擇之狀態,所以可提高對第三者之機密性。 <賁施例> 玆將適用於選擇呼叫接收機之實施例説明如后。第1 圖所示為其構成之方塊圖,再者在同一圖中若與上述第9 圖相同的部份則標示相同的符號,並省掉詳細說明。 在本實施例中所示之選擇呼叫接收機、僳另設有模態 (mode)開關1 3、密碼化情報儲存器(N - RAM) 1 4及密碼化電路1 5。而模態開闊1 3主要係用以指定 密碼化規則之輸入模(Input mode),而密碼化情報儲存 器14傜將上述密碼化情報輸入模態所輸入之密碼化情報 ,分別對應於訊息儲存器1 0之各儲存號碼並加以記億之 。密碼化情報,則例如第6圖所示,傺由護衛樣式(pro-tection pattern )情報與口令(Pass word)而成者。在 護衛樣式情報中備有" 1 " 2 ' '' 3 "、 4〃等,而且這些编號係各對應於「無密碼化」、「全 部以X取代」、「1移位密碼化規則」、「2移位密碼化 規則」< 「3移位密碼化規則」,再者口令(Pass word (請先閱讀背面之注意事項再填寫本頁) 本紙張尺A逍用中a B家標準(CNS)甲4規格(210x297公;《:) Λ 6 13 6 經濟部中央標準局員工消費合作社印製 五、發明説明(6 ) )則例如四位數字串形成。而密碼化電路15傜如上述第 6圖所示,記億有三種取代密碼化規則,亦即為「1移位 」、「2移位」、「3移位」之各密碼化規則,這些密碼 化規則之中皆依據在控制電路40所示之密碼化規則,將 接收訊息倩報施予密碼化。再者,密碼化電路1 5、傺當 自控制電路40有對應上述* 1 "之指示時,則發出全由 ''来〃所構成之訊息情報。 可是控制電路40僳例如以微電腦為主控制部而成者 ,有關接收訊息之表示功能,則備有密碼化情報输入控制 手段41,與密碼化表示控制手段42,以及密碼解謓表 示控制手段4 3。 至於密碼化情報輸入控制手段41,像於呼叫待機狀 態中,執行當模態開關Uode switch) 1 3被操作時, 變為密碼化情報輸入模態,並在這種狀態下,利用各開阕 11、 12、 13等之操作,將輸入之密碼化情報,記億 在密碼情報諸存器14之一連串控制工作。 密碼化表示控制手段42,於呼叫待機狀態中,執行 當按押表示開關12時,自記憶在密碼化情報儲存器14 之密碼化情報,來判定是否要加以密碼化,或全部以米取 代、或要以何種移位密碼化規則施行密碼化等,然後按照 判定結果來控制執行,到底要將接收訊息情報保持不變、 或全部以¥取代、或按照各移位密碼化規則施予密碼化, 然後顯示在L C D 9之控制工作。 密碼解除表示控制手段43,傜於藉上述密碼化表示 (請先閲讀背面之注意事項再填寫本頁) -8 - 321808 經濟部中央標準局貝工消费合作杜印製 Λ 6 13 6 五、發明説明(7 ) 控制手段42,將密碼化接收訊息情報表示在LCD9之 狀態下,模態開關1 3被操作時才會動作。然後進行口令 之輸入控制,同時藉此將輸入之口令,做為密碼化情報, 與事先記億之口令加以對照,如果兩口令互為一致時,則 將表示中之密碼化訊息情報之密碼解除,然後將原文顯示 者。 以下將上述所構成選擇呼叫接收機之動作,按照控制 電路40之控制順序說明之。而訊息儲存器1 0僳備有6 個訊息記億領域(對應儲存號碼1〜6),在該等訊息記 億領域内,傺以曾有記億接收訊息情報之狀態下來説明之 〇 在呼叫待機狀態時,控制電路4 ◦像如第2圖所示, 於步階2 a就監視本機所屬機群是否進入接收期間,一旦 發現進入該等機群之接收期間時,則移轉至接收控制。在 該接收控制之情形下,則將接收選擇呼叫信號中所含之 ID碼,與記億於ID-ROM5之本機之ID碼加以對 照。然後當兩ID碼若一致時,則自揚聲器發出鳴聲,同 時插入於上述接收選擇呼叫信號之訊息情報便被解讀然後 顯示於LCD9。 再者,該接收訊息情報,則取代訊息儲存器1 0之六 個記億領域之中,接收時序最早之所記億之訊息情報領域 中,仍被記億之接收訊息情報,並被記億之。 控制電路,則在步階2 b中執行操作監視顯示開關 12,又於步階2c執行操作監視顯示開關13,當確認 本紙張尺Α逍用中困Η家標毕(CNS)甲4規格(210x297公;¢) (請先閲讀背面之注意事項再填寫本頁) 裝· 訂· —9 — Λ 6 13 6 經濟部中央標準局员工消費合作社印製 五、發明説明(8 ) 了顯示開關12被按押時,則將記億在訊息儲存器10之 接收訊息情報移送至表示控制狀態。再者當確認了模態開 闊13被操作時,控制電路40則變成密碼化情報之輸入 模態,並執行密碼化情報之輸入控制工作。 目前,如果選擇呼叫接收機之使用人,為要設定密碼 化情報,而按下模態開關13時,於是乎控制電路40則 如第3圖(a)所示,先在步階3a將訊息儲存器10之 儲存號碼η (n=l〜6)設定為n=l之初期設定後, 在步階3b先將記億在訊息儲存器10之儲存號碼1的接 收訊息情報讀出,然後將該接收訊息顯示在LCD9,該 接收訊息情報僳僅表示一定時間(例如數秒鐘)就消失。 因此,使用者則可自該顯確認記億在訊息儲存器1 0之儲 存號碼1内之接收訊息情報。再者,控制電路40則將在 步階3C之護衛式樣情報之初期值,例如"1 "産生出來 ,然後以明滅方式顯在LCD9。 如斯,當護衛式樣(protection pattern)情報表示 出來時,控制電路40便在步階3d、 3e、 3f反覆監 視各模態開關13之操作,及停止開關1 1之操作,以及 顯示開關12之操作。然後,在這種狀態下,當使用者為 要選擇其他之護衛樣式情報而按下顯示開關12,於是控 制電路4 0則於步階3 g,將護衛樣式情報之數值增加, 並選擇下一個數值(例如2),然後返回到步階3c將該 值顯在LCD9,以後則反覆執行相同的控制工作,因此 ,每按押一次表示開關12, LCD9則依序顯出護衛樣 (請先閲請背面之注意事項再填寫本頁) 裝- 訂* 本紙張尺度逍用中a Η家標準(CNS)甲4規格(210x297公放) -10 - Λ 6 13 6 經濟部中央標準局貝工消費合作社印製 五、發明説明(9 ) 式情報,然後當到達所要的護衛樣式情報顯示出來之狀態 下,使用者若按下停止開關11時,控制電路40則判斷 認為選到顯示中之護衛樣式情報,並在步階3h將該情報 暫時保管在控制電路40内之記錄器中。 一 再者,當模態開關13被按下時,控制電路40則判 斷已選到下一個下一個儲存器號碼,並自步階3d移轉至 第3圖(b)之步階3 r*,在此判定儲存號碼η是否達到 最大值6之狀態。如果未到η=6時,則在步階3s將儲 存號碼η增加,並選擇下一個儲存號碼(例如在此時為2 )後返回步階3b,就該儲存號碼2進行護衛樣式情報之 輸入監視控制工作。以後則以相同的方式,每按押一次模 態開關13,則依序選出下一値儲存號碼,再者按照上述 模態開關13之操作,而當儲存號碼η之值變為最大值6 時,則判斷密碼化情報之輸入操作乙事已完畢,並恢復呼 叫待機狀態。 於是當上述護衛樣式情報之輸入設定完畢時,控制電 路40則繼而自步階3h移轉至第3圖(b)之步階3 i ,在此先將口令之號碼m (m=l〜4)設定為m=l之 後,在步階3 j將口令之第1位初期值(例如為1)顯示 出來。然後在步階3 k及步驟3 反覆操作監視各停止開 關1 1及表示開關1 2。在此狀態下,當使用者按下表示 開關12時,控制電路40便在步階3m將口令值增加後 ,就返回到步階3 j ,並將增加後之口令值表示出來,以 後便反覆相同的控制工作。因此當使用者每一按下一次表 (請先閲讀背面之注意事項再填寫本頁) 装. 線< -11 - Λ 6 13 6 經濟部中央標準局貝工消費合作社印製 五、發明説明(10) 示開關12時,在LCD9則依序表示第1位之口令值2 、3、4。然後當在希望值所表示之狀態下,使用者若按 下停止開關11時,控制電路40則判斷已選到口令之第 1位之數值,並移轉至步階3η,在此便表示中之數值暫 時保存在控制電路40内之記錄器中。然後判定在步階 3 0是否將口令之全部位數(4位)之口令值設定完畢, 如果尚未完畢,就在步階3ρ增加位數m (此時m=2) 然後返回步階3 j ,以後則反覆執行相同的控制工作。 然後,當將口令之全部位數之數值設定完畢後,控制 電路4 0則判定關於儲存號碼1之密碼化情報之設定工作 已完畢,並移轉至步階3q,在此便將保存在控制電路 40内之記錄器的護衛樣式情報及口令所形成之密碼化情 報,轉送至密碼化情報儲存器14,並記億在對應該密碼 化情報儲存器14内之儲存號碼1之記億領域中。如斯便 完成一個儲存號碼之密碼化情報工作之設定程序。 然後控制電路40則在步階3 r判定全部儲存號碼之 密碼化情報之設定工作是否完畢,如果尚未完畢就在步階 3s選擇下一個儲存號碼η後,返回至步階3b,並反覆 執行相同的控制工作。 一方面,當將全部儲存號碼之密碼化情報之設定工作 完畢後,就恢復呼叫待機狀態。 如斯,在訊息儲存器10之每一儲存號碼,設定期望 之密碼化情報之狀態下,若於呼叫待機期間中使用者按下 表示開關12時,控制電路40在以後執行密碼化表示控 (請先閲讀背面之注意事項再場寫本頁) 本紙張又A逍用中國國家標準(CNS)甲4規格(210><297公釐) -12 - 321808 Λ 6 J3 6 經濟部中央標準局员工消#合作社印製 五、發明説明(11) 制工作。亦即如第4圖所示,先於步階4 a選擇在訊息餘 存器10之各儲存號碼之中,其記億接收時序最新之接收 訊息情報之儲存號碼i,然後在步階4b將對應儲存號碼 i之密碼化情報。自密碼化情報儲存器14讀出,並藉步 階4c來判別其護衛樣式情報。經判斷結果,如果讀衛樣 式情報為〃時,其控制電路4 0則判斷沒有必要施予 密碼化,然後在步階4d諛出對應訊息儲存器10之儲存 號碼i之記億領域所儲存之接收訊息情報,並將該接收訊 息情報,在步階4 e原封未動地表示於LCD9。因此, 使用者若認為並非重要接收訊息情報,而將0對應於記億 之儲存號碼,事先設定做為護衛樣式情報時,只要操作該 P收訊息情報之表示開開12便可即時確認接收訊息。 當將上述接收訊息情報表示時,控制電路40則在步 -4Ϊ、4k、反覆執行各模態開關13及停止開蘭 Ϊ1、以及表示開關12之操作監視工作。然後當表示開 關1 2被按押時,則在步階4m將儲存號碼i予以增加, 並返回步階4b,之後反覆相同之控制工作。一方面當按 押停止開關時,則於步階4η將接收訊息情報OFF,然 後恢復待機狀態。 另一方面,如果現在對應於儲存號碼i之護衛樣式情 報設定為'' 1 〃時,控制電路4 ◦則判定有必要將接收訊 息情報以¥取代,從步階4c移轉至4 f,在此從密碼化 電路15,産生如第7圖所示僅由来所成之訊息情報,並 將該訊息情報於步階4g表示在LCD9。易言之亦卽取 本紙張尺;t遑用中珥B家標準(CNS)甲4規格(210父297公龙) (請先閲讀背面之注意事項再填寫本頁) 裝· -13 - Λ 6 13 6 經濟部中央橾準局员工消费合作社印製 五、發明説明(12) 代記億在儲存號碼i之接收訊息情報,僅表示¥之密碼訊 息。為此假若第三者想要盗視記億在上述儲存號碼i之接 收訊息情報時,也無法確認接收訊息情報。 再者,如斯將接收訊息情報以¥來取代加以表示時, 則連使用本身也不可能確認接收訊息之内容。然而上述接 收訊息情報則可用以下之方式來確認,亦邸用上述¥所成 之訊息表示之狀態下按押模態開開13時,控制電路40 則於步階4j檢出模態開關13之操作狀態,以後便實行 密碼解除表示控制工作。亦即如第5圖所示,在步階5 a 先選擇口令之第1位,然後在步階5b將該第1位口令值 之初期值(例如1)顯示在LCD9。然後在步階5c及 步階5d,反覆執行各停止開關11之操作監視,及顯示 開關1 2之操作監視工作。在此種狀態下,當使用者若按 下顯示開關12時,控制電路40則移轉至步階5e,在 此將上述口令值增加後返回至步階5b,然後將下一個口 令值(2)顯示於LCD9。以下皆相同,使用者每按下 一次顯示開關12, 口令值則依序以3、4、5 ......顯示 於LCD9。然後當在規定之口令值表示出來之狀態下, 使用者若按押停止開關時,控制電路40則判定已選到口 令值,在步階5 f將選擇之口令值保持於控制電路4 0内 之記錄器。如斯便完成口令之第1位輸入工作。 當該口令第1位之輸入完畢後,控制電路40則繼續 在步階5 g判定口令之全部位數(4位)是否全部都有輸 入口令值,如果還有未輸入之位數時,則增加口令之位數 (請先閲讀背面之注意事項再場寫本頁) 裝< 線· 本紙張尺度边用中國困家標準(CNS)甲4規格(210x297公货) _ 14 一 經濟部中央標準局貝工消费合作社印製 五、發明説明(13) m,然後返回至步階5b,並反覆相同之動作。 然後,當確認到口令4位均輸入時,控制電路40貝11 於步階5 i將剛才輸入口令,與對應於密碼化情報儲存器 1 4中之儲存號碼i所記億之口令加以對照。然後若發現 兩口令互成一致時,就移轉.至步階4 d ,在此自訊息儲存 器1 ◦之儲存號碼i所對應之記億領域中,謓出接收訊息 情報,並表示在步階4e。然而,儲存號碼i之接收訊息 情報則以原文狀態顯示在LCD9,因此使用者則利用該 表示,知曉接收訊息情報之内容。再者,如果口令不一致 時,便切斷顯示而恢復呼叫待機狀態。 再者,現在假如對應於儲存號碼i所設定之護衛樣式 情報為2、 3或4時,控制電路40則執行如次之密碼化 表示控制工作。亦即,控制電路40便先自在步階4h, 將對應訊息儲存器1 〇之儲存號碼i之記億領域,謓出接 收訊息情報,並將該接收訊息(receiving message)情 報轉送至密碼化電路15。同時由控制電路40産生對應 上述經識別後之護衛樣式情報之移位密碼化規則的指示情 報,並將該指示情報輸至密碼化電路1 5。例如現在假設 護衛樣式情報為a 2 〃時,則將為要指示1移位密碼化規 則所需之資料輸至密碼化電路15。 如斯在密碼化電路15,便依照上述指示資料所指示 之移位密碼化規則,執行接收訊息資料之密碼化工作。例 如,當指示1移位密碼化規則時,則如第7圖所示,在接 收訊息資料之數值中執行每次加1的加法,藉此來完成1 本紙張尺度边用中國困家標準(CNS)甲4規格(210父297公龙) (請先閱讀背而之注意事項再填寫本頁) -15 - A 6 ΙΪ6 經濟部屮央櫺準局貝工消費合作社印製 五、發明説明(14) 移位密碼化之工作。再者,當指示2移位密碼化規則時, 則在接收訊息資料之數值中執行毎次加2的加法,藉此來 完成2移位密碼化之工作。再者,當指示3移位密碼化規 則時,則在接收訊息資料之數值中執行毎次加3的加法, 藉此來完成3移位密碼化之工作。然後,其在密碼化電路 1 5完成密碼化之接收訊息資料,係經由控制電路4 0供 給表示驅動電路8,然後顯示在LCD9。 因此,如斯經密碼化接收訊息資料,即使被不諳密碼 規則之第三者看到,也無法讀取正確的内容,所以能夠確 保接收訊息資料之機密性。再者,當熟悉移位密碼化規則 之使用者看到時,則可用心算方式簡單地解謓資料内容。 為此,為要解除密碼,並不必要執行口令之輸入操作,是 故可提高工作效率。 再者,也可以對按照上述密碼化規則,施予密碼化之 接收訊息資料,與上述米之情形同樣,利用口令之輸入操 作,將密碼解除後顯示原文資料。 按照上述之本實施例而言,具有如下之功效。 ①、因為於每一訊息儲存器1〇之各記億領域中,設 定密碼化資料,並依據該等密碼化資料,將各値接收訊息 資料分別顯示控制者,所以也可以分別於每一接收訊息資 料施予密碼化後加以表示,或者不施予密碼化而直接表示 。因此,例如對於重要性較高之訊息資料,則施予密碼化 後才表示以資確保機密性。一方面對於不必要有機密性之 訊息資料,就可以直接表示出來。為此,比其須將全部接 (請先閲讀背面之注意事項再塡寫本頁) 訂_ 本紙張尺度边用中ffl國家猱準(CNS) T4規格(210x297公;g:) -16 - Λ 6 »6 經濟部中央標準局貝工消费合作社印製 五、發明説明(15) 收訊息資料集合起來,再施予密碼化表示之情形,相較之 下,可提高使用效率。 ② 、因為本案對接收訊息資料之密碼化規則,偽採用 移位密碼化規則,所以對於不密碼化規則之第三者,則具 有充分的機密性,而且對於熟諳密碼化規則之使用者而言 ,則可以利用心算方式簡單地解謓出來。是故,為要解讀 密碼,並不一定要輸入口令之操作,其結果更可提高使用 效率。 ③ 、因為本案可準備複數種之密碼化規則,並使該等 密碼化規則對於各接收訊息資料,設定成為可選擇狀態者 ,所以第三者若要解讀也是難上加難,藉此可以提高機密 性。這一種功效在本實施例之選擇呼叫接收機而言,傜採 用比較容易解讀之移位密碼化規則,對於確保某一程度之 機密性乙事乃極重要。 再者,本發明並不受上述實施例之限制,例如在上述 實施例中偽僅對於記億在訊息儲存器10之接收訊息資料 施行密碼化表示控制方式者,但是對於呼叫發生時,就接 收之訊息資料,也可以執行密碼化表示控制。 再者,在上述實施例中,傜以訊息資料為由數字列串 構成者加以說明,如果以其他片假名或英文字母等所構成 時也照樣可適用。例如使Η假名時則將'"7 〃移位做Α V "則可以,再當,當採用英文字母時,則將a A "移位做 v B 〃則可以。再者,關於移位方向也可設定反向移位, 至於移位量也可以任意設定。 (請先閲讀背面之注意事項再填、寫本頁) 装· 線· 本紙張尺A逍用中國國家樣準(CNS)肀4規格(210x297公釐) -17 - 經濟部中央標準局员工消费合作社印製 Λ 6 __Β_6 五、發明説明(16) 再者,在上述實施例中,僳就選擇呼叫接收機為例如 以説明者,此外對於攜帶電話裝置,或汽車行動電路裝置 、電話無線分機、電信終端糸統等所使用之無線電數據終 端裝置均可適用。 此外,對於密碼化資料之構成或其输入方法,密碼化 表示控制及密碼解除表示控制之順序或控制内容等,只要 不離開本發明之要旨範圍,均可變化各種實施。 <發明之功效> 如上所詳述,本發明係將對應毎一接收訊息資料,是 否執行密碼化加以表示之密碼化控制資料,記億在記億手 段,並設有密碼化手段,當要將接收訊息資料顯示在表示 手段時,藉該密碼化手段自上述記億手段,來判定有否必 要將對應之密碼化控制資料讀出,加以密碼化,如果有必 要時,則按照所規之密碼化規則,將上述接收訊息資料施 予密碼化後表示之。 因此就本發明裝置而言,對於重要之接收訊息資料, 可使他保持機密性,而且可提供使用效率良好之無線電通 信終端裝置。 再者,本發明在另一方面,可以在密碼化規則之記億 手段中,將接收訊息資料之文字或符號,以其文字體条或 記號體条上所規之相對位置關傜中,以某種其他之文字或 記號取代之,藉此將取代密碼化規則加以記億,而當要將 上述之接收訊息資料顯示在表示手段時,則利用密碼化手 本紙張尺度Ϊ4Λ1中S Η家料(哪)甲很格(210X297公;¢)~~: " -18 - (請先閲讀背面之注意事項再攝寫本頁} 裝< 線. 經济部中央標準局貝工消#合作社印製 ____l^6_ 五、發明説明(17) 段,將上述接收訊息資料,按照記億在上述密碼化規則手 段中之取代密碼化規則,施予密碼化後供用之。 因此,就本發明而言,則可利用密碼使接收訊息資料 保持機密性,提供一種對於密碼之解除工作並不須刻意執 行,也可以確認接收訊息之無線電通信终端裝置。 <圓面之簡單説明> 第1圖所示係本發明之一實施例之選擇呼叫接收機之 功能構成方塊圖。 第2圖至第5圖所示僳第1圖之選擇呼叫接收機之控 制電路順序及控制内容之流程圖。 第6圖所示係密碼資料之一例圖。 第7圖所示偽移位密碼化之一例圖。 第8圖所示像選擇呼叫信號之一例圖。 第9圖所示偽習有選擇呼叫接收機之電路方塊圖。 1 :天線,2:無線電路,3:解調電路,5:個別 號碼符號儲存器(ID — ROM) , 6:喇叭驅動電路, 7 :喇叭,8 :顯示驅動電路,9 :液晶顯示器(LCD ).10:訊息儲存器(Μ — RAM) , 11 :停止開關 ,12:表示開關,13:模態開關,14:密碼化資料 儲存器(N — RAM) , 15:密碼化電路,40:控制 電路,41:密碼化資料輸入控制手段,42:密碼化顯 示控制手段,43 :密碼化解除表示控制手段。 (請先閱讀背面之注意事項再填寫本頁) 本紙張尺度逍用中國國家標準(CNS)甲4規格(210x297公茇) -19 -321808 Λ 6 13 6 Printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Description of the invention (1) < Utilization field in the industry > The person who installs, especially the device that has the function of expressing the message data sent from the base station (Base station). < Prior art > As a mobile radio communication system in the past, there is usually a selective call system, which is a well-known communication method. As for the selective call system, the selective call signal is commonly used as shown in Fig. 8. The selective call signal is like dividing a frame (frame) into multiple groups (Group) by time share. ) (In the figure, it is divided into η groups), and this group is still divided into synchronous words (word) and plural call words (word) in the time-sharing mode (as shown in (b)). m language). Furthermore, these call phrases are shown in (c), and are composed of individual number symbols (ID codes) and message codes of selective call receivers. When calling the designated selective call receiver, the caller dials the telephone number corresponding to the selective call receiver, completes the connection with the base station, and sends the message information to the base station (BS). Then, the base station first generates the ID code pre-programmed in the selective call receiver together with the message code that encodes the message information, and then forms a frame (fra-me) complex group. Select the calling language of the space to be called group to which the calling receiver belongs, insert each of the above ID code and message code and send it. On the one hand, the pseudo configuration shown in Figure 9 is an example of a selective call receiver. In the same figure, the selective call signal sent from the base station is passed through the antenna (please read the precautions on the back before filling the nest page). This paper is used in the national standard (CNS) A4 specification (210x297 male dragon) -3-A 6 13 6 Printed by the Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Description of Invention (2) 1 After being received by the wireless circuit 2, demodulated by the demodulation circuit 3 and input to the control circuit 4. The control circuit 4 compares the ID code contained in the demodulated selective call signal with the ID code of the unit previously recorded in the ID-ROM 5 in the ID number memory. Then according to the comparison result, if the detected two symbols are consistent, then the receiver is considered to be called, and then the beep signal is supplied to the speaker 7 via the drive circuit 6, so that the loudspeaker emits a calling sound, thereby informing the call Check-in staff, the above call sound can be cut off by pressing the stop switch 11. The above control circuit 4 when the above ID codes are detected to be consistent, the ID code corrects the received message code and performs demodulation, and then supplies the demodulated message data to the display drive circuit 8, and then makes The message information is displayed on the liquid crystal display (LCD) 9. When the check-in operator gets the call notification, the above LCD 9 can know the information sent by the caller. In addition, the above received message code is transferred to the message memory (Μ — RA Μ) 10 and recorded with 100 million, the message code of 100 million recorded in the message memory 10 is displayed when the indication switch 12 is pressed On the LCD9. < Problems to be solved > However, as far as the conventional selective call receiver is concerned, when a call comes in, the received message is unconditionally indicated on the LCD 9, and after receiving, as long as the simple operation of the switch 12 is pressed, the The received message recorded in the message storage 10 is displayed on the LCD 9. For this reason, Gu Lu sometimes leaks the confidentiality of received messages. In addition, in order to keep the responsibilities of the received message confidential, you must keep the received message (please read the precautions on the back and then fill out this page). The standard size of this paper is China National Standard (CNS) A4. (210x29 '〖mm>) -4-321808 Λ 6 13 6 Printed by the Employee Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Invention Instructions (3) All information information is encrypted, however, in order to interpret the password, you must enter it first Only the prescribed password (pass word) can express the received message in the original text. Some people have thought about it, but this conventional method, because all the message data is unconditionally encrypted, so for those In the case of message data with a low level of confidentiality that does not need to be kept secret, in order to interpret the message, the specified password must also be entered, so the operation of the message to display received information becomes very troublesome. The object of the present invention is to provide a radio communication terminal device which can give important reception message information confidentiality and is easy to operate. Another object of the present invention is to provide a radio communication terminal device that can encrypt received message information and impart confidentiality, and can confirm the received message data without having to perform a password interpretation operation. < Means for solving the problem > In order to achieve the above purpose, the present invention will correspond to the encryption control information for each received message information whether to perform encryption. To display the received message information on the display means, use the encryption means to read out the corresponding encryption control information from the above-mentioned billion-counting means, and determine whether it is necessary to encrypt, if it is determined that it is necessary to encrypt , According to the ciphering rules, the information received above will be ciphered and then expressed. Furthermore, in order to achieve the above-mentioned other purpose, the invention will replace the text or symbol of the received message data with the text body or symbol on the crossbones of the other relative text or symbol. Password (please read the precautions on the back before writing this page) Install-Line < This paper standard is used in a standard (CNS) A 4 specifications (210X297 male dragon) Λ 6 13 6 Central Bureau of Standards Printed by Beigong Consumer Cooperative V. Description of the invention (4) Replace the cryptographic rules by the tokenization, and record the billions in the cryptographic means of the cryptographic rules, and use the cryptographic means when displaying the above-mentioned received message information on the representation means The above-mentioned received message Qianbao will be given to the cipherer according to the ciphering rules replaced by the ciphering means in the above ciphering rules. Furthermore, the present invention records the plural replacement cryptographic rules in billions of cryptographic intelligence recording methods, and at the same time, in advance, which group of replacement cryptographic rules corresponding to each received message intelligence is used in the above The cryptographic control information is recorded in billions. When the received message information is to be displayed, the corresponding cryptographic rule corresponding to the received cryptographic rule is used, and the above cryptographic control information is used to discriminate and based on the substituted cryptographic rule , Encrypt the information of each received message for display. < Function > According to the device of the present invention, it is possible to separately set whether it is necessary to perform encryption according to each received message data, and to encrypt important received messages to maintain confidentiality. It is displayed, and for receiving information that is not very important, it can be directly displayed without being encrypted. For this reason, it is very easy to confirm that it is not necessary to perform decryption for the received message information that is less important, so that both a device that maintains confidentiality and a simple device can be used. Furthermore, as far as other inventions are concerned, because it is relatively easy to receive the message information using decryption instead of the cryptographic rules to execute and then express them, it is impossible for a third party who is not familiar with the cryptographic rules to know correctly Receiving information content, but for operators who are familiar with encryption rules (please read the precautions on the back and then write this page). Packing and Ordering-Line-1 6 _ Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs As far as explanation (5) is concerned, it is easier to interpret the meaning of the original text from the information of the encrypted received message displayed. Therefore, not only the confidentiality of the received message can be maintained, but also the user can confirm the received message information without any special operation to decrypt it, so as to mention its ease of use. In addition, according to the device of the present invention, there are multiple sets of replacement encryption rules, and these replacement encryption rules are designated as selectable states for each received message information, so the third party ’s Confidentiality. < Example 2 > The following is an explanation of an example applicable to the selective call receiver. Figure 1 shows the block diagram of its composition. In addition, if the same parts as in Figure 9 above are marked with the same symbols in the same figure, the detailed description is omitted. In the selective call receiver shown in this embodiment, a mode switch 1 3, a cryptographic information storage (N-RAM) 14 and a cryptographic circuit 15 are additionally provided. The open mode 13 is mainly used to specify the input mode of the cryptographic rules, and the cryptographic information storage unit 14 enters the cryptographic information input by the above cryptographic information into the modal, respectively corresponding to the message storage Each number of the device 10 is stored and recorded in billions. For encrypted information, for example, as shown in Figure 6, Ye is made up of guard pattern (pro-tection pattern) information and password (Pass word). There are " 1 " 2 '' '3 ", 4〃, etc. in the guard style information, and these numbers correspond to "no encryption", "replace all with X", "1 shift password" Rules "," 2 Shift Encryption Rules "<" 3 Shift Encryption Rules ", and then the password (Pass word (please read the precautions on the back before filling out this page) This paper ruler A Xiao used in a The B standard (CNS) A4 specification (210x297 g; ":) Λ 6 13 6 Printed by the Employees Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs 5. The invention description (6)) is formed by, for example, a four-digit string. As shown in Fig. 6 above, the encryption circuit 15 傜 has three alternative encryption rules, namely, "1 shift", "2 shift", and "3 shift". These All of the encryption rules are based on the encryption rules shown in the control circuit 40, and the received message is reported to be encrypted. In addition, the encryption circuit 15 and Ye, when the self-control circuit 40 has an instruction corresponding to the above * 1 ", it sends out the message information composed entirely of ''. However, the control circuit 40 is, for example, a microcomputer as the main control unit, and the display function of the received message is provided with a cryptographic information input control means 41, a cryptographic display control means 42, and a password decryption display control means 4 3. As for the cryptographic information input control means 41, like in the call standby state, when the modal switch Uode switch 1 13 is operated, it becomes the cryptographic information input mode, and in this state, use each switch The operations of 11, 12, 13 and so on, the input of the encrypted information is recorded in a series of control operations in one of the memory 14 of the password information. The cryptographic representation control means 42 executes the cryptographic information stored in the cryptographic information storage 14 when the representation switch 12 is pressed in the call standby state to determine whether it is to be cryptographic, or to replace all with meters, Or what kind of shift ciphering rules should be used to implement ciphering, etc., and then control the execution according to the judgment result. In the end, the received message information should remain unchanged, or all should be replaced with ¥, or the password should be given according to each shift ciphering rule And then displayed on the LCD 9 to control the work. Password release indication control means 43, Yu borrowed the above password expression (please read the notes on the back before filling in this page) -8-321808 The Ministry of Economic Affairs Central Standards Bureau Beigong Consumer Cooperation Du Duan Λ 6 13 6 V. Inventions Description (7) The control means 42 indicates that the ciphered reception message information is displayed in the state of the LCD 9 when the modal switch 13 is operated. Then control the input of the password, and at the same time, use the entered password as the encrypted information and compare it with the password recorded in advance. If the two passwords are consistent with each other, the password of the encrypted information information in the display will be released. , And then show the original text. The operation of the selective call receiver constructed as described above will be described in accordance with the control sequence of the control circuit 40. The message memory 10 has six message-recording fields (corresponding to storage numbers 1 to 6). In these message-recording fields, Ye explained that he had received message information in the state of having recorded messages. In the standby state, the control circuit 4 ◦As shown in Figure 2, at step 2 a, it monitors whether the machine group to which the machine belongs enters the reception period, and once it is found to enter the reception period of these groups, it shifts to the reception control. In the case of the reception control, the ID code contained in the reception selective call signal is compared with the ID code of the local machine recorded in the ID-ROM 5. Then, if the two ID codes match, a beep will sound from the speaker, and the message information inserted into the above-mentioned selective call reception signal will be interpreted and displayed on the LCD9. Furthermore, the received message intelligence replaces the message memory area of the message memory 10, and the earliest received message information field is still recorded in the 100 million received message information and recorded in the billion Of it. The control circuit performs the operation monitoring and display switch 12 in step 2 b, and the operation monitoring and display switch 13 in step 2 c. 210x297 public; ¢) (Please read the precautions on the back before filling out this page) Binding · Order · — 9 — Λ 6 13 6 Printed by the Employee Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (8) Display switch 12 When pressed, the received message information stored in the message storage 10 is transferred to the control state. Furthermore, when it is confirmed that the modal open 13 is operated, the control circuit 40 becomes the input mode of the encrypted information, and performs the input control operation of the encrypted information. At present, if the user who calls the receiver is selected to set the encrypted information, and the modal switch 13 is pressed, then the control circuit 40 is as shown in FIG. 3 (a), and the message is first step 3a. After the storage number η (n = l ~ 6) of the memory 10 is set to the initial setting of n = l, in step 3b, first read the received message information stored in the memory number 1 of the message storage 10, and then read The received message is displayed on the LCD 9, and the received message information only indicates that it disappears within a certain time (for example, a few seconds). Therefore, the user can confirm the received message information recorded in the storage number 1 of the message storage 10 from the display. Furthermore, the control circuit 40 will generate the initial value of the guard pattern information at step 3C, such as " 1 ", and then display it on the LCD 9 in an extinct manner. As such, when the protection pattern information is displayed, the control circuit 40 repeatedly monitors the operation of each modal switch 13 at steps 3d, 3e, 3f, and stops the operation of the switch 11 and the display switch 12 operating. Then, in this state, when the user presses the display switch 12 to select other guard style information, the control circuit 40 will step 3 g, increase the guard style information value, and select the next one The value (for example, 2), and then return to step 3c to display the value on LCD9, and then perform the same control work repeatedly. Therefore, every time you press the switch 12, LCD9 displays the guard sample in sequence (please read Please fill out the notes on the back and then fill out this page) Binding-Order * This paper size is used in a standard (CNS) A 4 specifications (210x297 public release) -10-Λ 6 13 6 Beicong consumption of the Central Standards Bureau of the Ministry of Economic Affairs The cooperative prints 5. The description of invention (9) type information, then when the desired guard style information is displayed, if the user presses the stop switch 11, the control circuit 40 judges that the guard style currently displayed is selected Information, and temporarily store the information in the recorder in the control circuit 40 at step 3h. Again and again, when the modal switch 13 is pressed, the control circuit 40 judges that the next next memory number has been selected and moves from step 3d to step 3 r * in Figure 3 (b), Here, it is determined whether the storage number η has reached the maximum value of 6. If η = 6 is not reached, increase the storage number η in step 3s, and select the next storage number (for example, 2 at this time), then return to step 3b, and enter the guard style information for the stored number 2 Monitor and control work. From now on, in the same way, every time the modal switch 13 is pressed, the next stored number is selected in sequence, and then the operation of the modal switch 13 is followed, and when the value of the stored number η becomes the maximum value 6, , It is judged that the input operation of the encrypted information has been completed, and the call standby state is restored. Therefore, when the input of the above-mentioned guard style information is set, the control circuit 40 then shifts from step 3h to step 3 i of FIG. 3 (b), and then the password number m (m = l ~ 4) ) After setting m = l, the initial value of the first digit of the password (for example, 1) is displayed in step 3 j. Then, in step 3 k and step 3, the operation of each stop switch 1 1 and display switch 12 is repeated. In this state, when the user presses the indicating switch 12, the control circuit 40 returns to the step 3 j after increasing the password value at step 3m, and displays the increased password value, and then repeats The same control works. Therefore, when the user presses the table every time (please read the precautions on the back and then fill out this page), install it. Line < -11-Λ 6 13 6 Printed by Beigong Consumer Cooperative of Central Bureau of Standards, Ministry of Economic Affairs (10) When the switch 12 is displayed, the LCD 9 sequentially displays the password value 2, 3, and 4 of the first digit. Then, when the user presses the stop switch 11 in the state indicated by the desired value, the control circuit 40 judges that the value of the first digit of the password has been selected, and shifts to step 3η, which means The value is temporarily stored in the recorder in the control circuit 40. Then it is determined whether the password value of all digits (4 digits) of the password is set at step 30. If it is not completed, increase the number of digits m at step 3ρ (in this case m = 2) and then return to step 3 j In the future, the same control work will be executed repeatedly. Then, after the value of all digits of the password is set, the control circuit 40 determines that the setting of the cryptographic information for the stored number 1 has been completed, and moves to step 3q, where it will be saved in the control The cryptographic information formed by the guard style information and password of the recorder in the circuit 40 is transferred to the cryptographic information storage 14, and the billion is recorded in the field corresponding to the storage number 1 in the cryptographic information storage 14 . In this way, a setting procedure for storing the encrypted information of the number is completed. Then, the control circuit 40 determines whether the setting of the encryption information of all the stored numbers is completed at step 3 r. If it is not completed, after selecting the next stored number η at step 3s, it returns to step 3b and repeats the same operation. Control work. On the one hand, when the setting of the encrypted information of all stored numbers is completed, the call standby state is restored. As such, in a state where the desired encrypted information is set for each stored number of the message storage 10, if the user presses the presentation switch 12 during the call standby period, the control circuit 40 executes the encrypted presentation control later ( Please read the precautions on the back before writing this page.) This paper is also used in China National Standard (CNS) A 4 specifications (210 > < 297mm) -12-321808 Λ 6 J3 6 Central Bureau of Standards, Ministry of Economic Affairs Employee consumption #Cooperative printing 5. V. Instruction (11) System work. That is, as shown in Fig. 4, before step 4a, select the storage number i of the received message information with the latest reception timing of 100 million in the storage number of the message memory 10, and then at step 4b Corresponding to the encrypted information of the stored number i. It is read from the encrypted information storage 14 and the step 4c is used to discriminate its guard pattern information. According to the judgment result, if the reading guard style information is 〃, the control circuit 40 judges that it is not necessary to apply cryptography, and then at step 4d, the memory area corresponding to the storage number i of the message storage 10 is stored out Receive message information, and display the received message information on LCD 9 in step 4 e as it is. Therefore, if the user thinks that it is not important to receive the message information, and 0 corresponds to the stored number of billions, and it is set as the guard style information in advance, as long as the P message receiving information display is turned on, you can immediately confirm the received message . When displaying the received message information, the control circuit 40 repeatedly executes each modal switch 13 and stops the open blue Ϊ1, and indicates the operation monitoring operation of the switch 12 at steps -4Ϊ, 4k. Then, when the switch 12 is pressed, the stored number i is increased at step 4m, and returns to step 4b, after which the same control work is repeated. On the one hand, when the stop switch is pressed, the received message information is turned off at step 4η, and then the standby state is restored. On the other hand, if the guard pattern information corresponding to the stored number i is now set to '' 1 〃, the control circuit 4 determines that it is necessary to replace the received message information with ¥ and move from step 4c to 4 f. This cryptographic circuit 15 generates the message information only formed from the origin as shown in FIG. 7, and displays the message information on the LCD 9 at step 4g. It is easy to say that the paper ruler is also used; t use the Zhonger B Family Standard (CNS) A 4 specifications (210 father 297 male dragons) (please read the precautions on the back before filling out this page) 装 · -13-Λ 6 13 6 Printed by Employee Consumer Cooperative of the Central Department of Economics of the Ministry of Economic Affairs 5. Description of Invention (12) The information of the received message of the code i stored in the number i only represents the password message of ¥. For this reason, if the third party wants to pirate Jiyi to receive the message information at the storage number i above, it cannot confirm the received message information. In addition, if the information of the received message is replaced by ¥, it is impossible to confirm the content of the received message even by itself. However, the above-mentioned received message information can be confirmed in the following manner. Also, when the modal switch 13 is opened in the state indicated by the above-mentioned message, the control circuit 40 detects the modal switch 13 at step 4j. In the operation state, the password will be released to indicate the control work. That is, as shown in Fig. 5, in step 5a, the first digit of the password is selected, and then in step 5b, the initial value of the password of the first digit (for example, 1) is displayed on the LCD 9. Then, in steps 5c and 5d, the operation monitoring of each stop switch 11 and the operation monitoring of the display switch 12 are repeatedly performed. In this state, when the user presses the display switch 12, the control circuit 40 moves to step 5e, where the above password value is increased and returns to step 5b, and then the next password value (2 ) Is displayed on LCD9. The following are the same. Each time the user presses the display switch 12, the password value is displayed on the LCD 9 in the order of 3, 4, 5 ... Then, when the user presses the stop switch in the state where the specified password value is displayed, the control circuit 40 determines that the password value has been selected, and keeps the selected password value in the control circuit 40 in step 5 f The recorder. This completes the input of the first digit of the password. After the input of the first digit of the password is completed, the control circuit 40 continues to determine whether all the digits (4 digits) of the password have the input password value at step 5 g, and if there are uninput digits, then Increase the number of passwords (please read the precautions on the back before writing this page) Install & Thread · Use the standard of this paper (CNS) A4 specifications (210x297 public goods) _ 14 One Ministry of Economic Affairs Printed by the Bureau of Standards, Pongong Consumer Cooperative V. Description of invention (13) m, then return to step 5b, and repeat the same action. Then, when it is confirmed that all four digits of the password are input, the control circuit 40B11 compares the password just entered at step 5 i with the password corresponding to the billion recorded in the storage number i in the encrypted information storage 14. Then, if it is found that the two passwords are consistent with each other, it will be transferred. Step 4 d, from the billions of fields corresponding to the storage number i of the message storage 1 ◦, will receive the received message information and indicate that it is in the step Stage 4e. However, the received message information of the stored number i is displayed on the LCD 9 in the original text state, so the user uses this indication to know the content of the received message information. Furthermore, if the passwords do not match, the display is turned off and the call standby state is restored. Furthermore, if the guard pattern information set corresponding to the storage number i is 2, 3, or 4, the control circuit 40 performs the following cryptographic representation control operation. That is, the control circuit 40 first free steps 4h, corresponding to the memory area of the storage number i of the message memory 10, the received message information is obtained, and the received message (receiving message) information is transferred to the encryption circuit 15. At the same time, the control circuit 40 generates an indication message corresponding to the above-mentioned identified guard pattern information shift encryption rule, and outputs the indication information to the encryption circuit 15. For example, assuming now that the guard style information is a 2 〃, the data required to indicate the 1 shift encryption rule will be input to the encryption circuit 15. In this case, the encryption circuit 15 performs the encryption of the received message data according to the shift encryption rules indicated by the above instruction data. For example, when the 1 shift encryption rule is instructed, as shown in Figure 7, the addition of 1 is performed every time in the value of the received message data, thereby completing 1 paper scale while using the Chinese standard for the poor family ( CNS) A4 specifications (210 father, 297 male dragon) (please read the precautions before filling in this page) -15-A 6 ΙΪ6 Printed by the Beigong Consumer Cooperative of the Central Bureau of Economics, Ministry of Economy V. Description of invention ( 14) The work of shift encryption. Furthermore, when the 2 shift ciphering rule is instructed, the addition of 2 is performed every time in the value of the received message data, thereby completing the work of 2 shift ciphering. Furthermore, when the 3 shift encryption rule is instructed, the addition of 3 is performed every time in the value of the received message data, thereby completing the work of 3 shift encryption. Then, the received message data which is encrypted in the encryption circuit 15 is supplied to the display driving circuit 8 through the control circuit 40, and then displayed on the LCD 9. Therefore, even if the received message data is encrypted through encryption, even if it is seen by a third party who does not understand the password rule, the correct content cannot be read, so the confidentiality of the received message data can be ensured. Furthermore, when users who are familiar with the rules of shift ciphering see it, they can simply decipher the data content by means of mental arithmetic. Therefore, in order to cancel the password, it is not necessary to perform the input operation of the password, so the work efficiency can be improved. In addition, the received message data that has been encrypted according to the above encryption rules may be inputted with the password as in the case of the above-mentioned rice, and the original data will be displayed after the password is released. According to this embodiment described above, it has the following effects. ①, because the encrypted data is set in each message storage area of each message storage 10, and according to the encrypted data, each value-received message data is separately displayed to the controller, so it can also be received separately for each The message data is expressed after being encrypted, or directly expressed without being encrypted. Therefore, for example, the message data of higher importance is encrypted before it is indicated to ensure confidentiality. On the one hand, information that is not necessary for confidentiality can be directly expressed. For this reason, it is better to connect all of them (please read the precautions on the back before writing this page) to order _ This paper is used in the ffl national standard (CNS) T4 specification (210x297 g; g :) -16- Λ 6 »6 Printed by Beigong Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economy V. Description of invention (15) The situation in which the collected information is collected and then given a cryptographic representation, which can improve the efficiency of use. ② As the encryption rules of the received message data in this case are pseudo-shift encryption rules, so the third party who does not encrypt the rules has sufficient confidentiality, and for users who are familiar with the encryption rules , You can use the mental arithmetic method to simply solve it. Therefore, in order to interpret the password, it is not necessary to input the password, and the result is to improve the efficiency of use. ③ Because multiple encryption rules can be prepared in this case, and these encryption rules can be set to be selectable for each received message data, it is more difficult for a third party to interpret, which can improve Confidentiality. This kind of effect is very important for the selective call receiver in this embodiment to adopt the shift encryption rules that are easier to interpret. This is very important for ensuring a certain degree of confidentiality. Furthermore, the present invention is not limited by the above-mentioned embodiment. For example, in the above-mentioned embodiment, it is assumed that the control method is encrypted for the received message data stored in the message storage 10, but for the call, it is received. The message data can also be controlled by cryptographic representation. In addition, in the above embodiment, the message data is composed of numeric strings, and it can be applied if it is composed of other katakana or English letters. For example, in the case of pseudonyms Η, it is possible to shift '" 7 〃 to Α V ", but when English letters are used, it is ok to shift a A " to v B 〃. In addition, the shift direction can also be set in the reverse direction, and the shift amount can also be set arbitrarily. (Please read the precautions on the back and then fill in and write this page) Pack · Line · This paper ruler A Xiao uses the Chinese National Standard (CNS) 4 specifications (210x297 mm) -17-Employee consumption of the Central Standards Bureau of the Ministry of Economic Affairs Printed by cooperatives Λ 6 __Β_6 V. Description of the invention (16) Furthermore, in the above-mentioned embodiment, Xu chose the call receiver as an example, in addition, for mobile phone devices, car mobile circuit devices, telephone wireless extensions, The radio data terminal devices used in telecommunication terminal systems, etc. are applicable. In addition, with regard to the composition of the encrypted data or its input method, the sequence or content of control of the cryptographic representation control and the password release representation control can be changed in various ways without departing from the scope of the invention. < Efficacy of the invention > As described in detail above, the present invention corresponds to the encrypted control data corresponding to each received message data, whether to perform encryption or not, and means for remembering billions in billions. To display the received message data in the presentation means, use the cryptographic means to determine whether it is necessary to read out the corresponding cryptographic control data and encrypt it from the above-mentioned billion-means means. If necessary, follow the regulations Cryptographic rules are expressed after the above-mentioned received message data is encrypted. Therefore, as far as the device of the present invention is concerned, it is possible to maintain confidentiality of important received message data and to provide a radio communication terminal device with good use efficiency. Furthermore, in another aspect of the present invention, in the means of billions of cryptographic rules, the text or symbol of the received message data can be related to the relative position specified on the text or symbol body of the text. It is replaced by another kind of text or symbol, which will replace the ciphering rules to count billions, and when the above-mentioned received message data is to be displayed on the representation means, the ciphered manuscript paper standard Ϊ4Λ1 S Η 家 料 ( Where) Jia very grid (210X297 male; ¢) ~~: " -18-(please read the notes on the back before writing this page) Install & line. Printed by the Ministry of Economic Affairs Central Standards Bureau Bei Gong Xiao # Cooperative ____ l ^ 6_ Fifth, the invention description (17), the above-mentioned received message data, in accordance with the billions of the above-mentioned cryptographic rule means in place of the ciphering rules, the ciphering rules are applied after ciphering. Therefore, in terms of the present invention , You can use the password to maintain the confidentiality of the received message data, provide a radio communication terminal device that does not need to be deliberately performed to cancel the password, and can also confirm the received message. ≪ Simple description of the round face > Figure 1 It is a block diagram showing the functional configuration of a selective call receiver according to an embodiment of the present invention. A flow chart of the control circuit sequence and control contents of the selective call receiver shown in FIGS. 2 to 5 is shown in FIG. 1. The figure shows an example of cryptographic data. The figure 7 shows an example of pseudo-shift ciphering. The figure 8 shows an example of a selective call signal. The figure 9 shows the example of a selective call receiver. Circuit block diagram. 1: Antenna, 2: Wireless circuit, 3: Demodulation circuit, 5: Individual number symbol storage (ID — ROM), 6: Speaker drive circuit, 7: Speaker, 8: Display drive circuit, 9: Liquid crystal display (LCD). 10: message memory (Μ — RAM), 11: stop switch, 12: display switch, 13: modal switch, 14: encrypted data storage (N — RAM), 15: encrypted Circuit, 40: Control circuit, 41: Encrypted data input control means, 42: Encrypted display control means, 43: Encrypted display control means. (Please read the precautions on the back before filling out this page) Use China National Standard (CNS) Grade 4 (210x297 gong) -19-

Claims (1)

321808 B: CT D7_ 六、申請專利範園 (請先聞讀背面之注意事項再填寫本頁一 1 . 一種無線電通信終端裝置,其特徵僳具備: 接收判定手段(means),用以接收包括自基地台發 射之訊息資料之信號,與; 訊息記憶手段,用以判定該接收判定手段之接收信號 若為針對使用者本身時,則將包含在上述接收信號之接收 訊息資料加以記億,與; 顯示手段,用以至少將上述接收訊息資料加以表示, 與; 密碼化控制資料記億手段,用以對應每一接收訊息資 料,並對該所接收之訊息資料是否要執行密碼化之密碼化 控制資料加以記億,與; 密碼化手段,用以當要將上述接收訊息資料顯示於上 述顯示手段時,自上述密碼化控制資料記億手段,將對應 之密碼化控制資料讀出,並判定有否必要施予密碼化,如 果,有必要施予密碼化時,則按照所規定之密碼化規則, 將上述接收訊息執行密碼化,之後予以顯示之。 經濟部中央標準局員工消费合作社印製 2.—種無線電通信終端裝置,其特擻榛具備: 接收判定手段(means),用以接收包括自基地台發 射之訊息資料之信號,與; 訊息記億手段,用以控制該接收判定手段之接收信號 若為針對使用者本身時,則將包含在上述接收信號之接收 訊息資料加以記億,與; 顯示手段,用以至少將上述接收訊息資料加以表示, 與; -20 - 本纸張尺度速用中國國家標準(CNS)甲4規格(210x297公努). -_-_07 A: B: C: 申請專利範園 密碼化資料記億手段,用以將上述接收訊息資料之文 字或記號,以在其文字體条或記號體上所定之相對位置關 像而有其他之文字或記號所取代,藉此將要密碼化之取代 密碼化規則加以記億,與; 密碼化手段,用以當要將上述接收訊息資料顯示於上 述顯示手段時,將該接收訊息資料,依據記億在上述密碼 化資料記億手段之取代密碼化規則,施予密碼化,之後予 以顯示之。 3.如申請專利範圍第2項所述之無線電通信終端裝 置,其中密碼化資料記億手段,俗記億有複數之取代密碼 化規則,同時對應毎一接收訊息資料,且在上述複數之取 代密碼化規定中,到底要使用那一個密碼化控制資料乙事 表示資料加以記億,且密碼化手段偽當要將接收訊息資料 加以表示時,使該接收訊息資料對應之取代密碼化規則, 利用上述密碼化控制資料來加以判別,然後依據該取代密 碼化規則,將上述接收訊息資料施予密碼化,之後做為顯 示者。 (請先«!讀背面.之注意事項再填寫本頁) 經濟部中央標準局貝工消費合作社印製 •線- -21 -321808 B: CT D7_ VI. Applying for a patent fan garden (please read the precautions on the back and then fill in this page 1. 1. A radio communication terminal device, its features include: receiving judgment means (means), used to receive The signals of the message data transmitted by the base station, and; Message memory means, used to determine if the received signal of the receiving determination means is directed to the user itself, the received message data included in the received signal will be recorded in billions, and; Display means, used to represent at least the above received message data, and; Encrypted control data billion means, corresponding to each received message data, and whether to perform encrypted password control on the received message data The data is recorded in billions, and; cryptographic means is used to read the corresponding cryptographic control data from the cryptographic control data billion means when the above-mentioned received message data is to be displayed on the display means, and judge that there is Is cryptography necessary, and if cryptography is necessary, follow the prescribed cryptographic rules , Encrypt the above-mentioned received message, and then display it. The Ministry of Economic Affairs Central Standards Bureau Employee Consumer Cooperative printed 2. A type of radio communication terminal device, its special features are: Reception judgment means (means), used to receive including The signal of the message data transmitted from the base station, and; the message billion means, which is used to control the reception determination means if the received signal is directed to the user itself, the received message data included in the above-mentioned received signal will be charged 100 million, And; display means to represent at least the above-mentioned received message data, and; -20-this paper scale uses the Chinese National Standard (CNS) A 4 specifications (210x297 public). -_-_ 07 A: B: C: 100 million means of applying for the patent Fanyuan cryptographic data, used to replace the text or symbol of the above-mentioned received message data with the relative position specified on the text bar or symbol body and replaced by other text or symbols , Which will be used to replace the ciphering rules to be ciphered to account for billions, and; ciphering means to display the received message data on the above When displaying the means, the received message data will be encrypted according to the rules for replacing the ciphering in the above ciphering means for ciphering data, and then displayed. 3. The radio as described in item 2 of the patent application scope Communication terminal device, among which the means of recording billions of encrypted data, the common way of remembering billions has plural replacement encryption rules, corresponding to each received message data, and in the above plural replacement encryption rules, which encryption control should be used in the end Data B indicates that the data is recorded in billions, and the cryptographic means is false. When the received message data is to be represented, the corresponding cryptographic rules corresponding to the received message data are used, and the above-mentioned cryptographic control data is used for discrimination, and then based on the substitution Cryptographic rules, the above-mentioned received message data is encrypted, and then used as a display. (Please «! Read the back. Note before filling in this page) Printed by Beigong Consumer Cooperative of Central Bureau of Standards of the Ministry of Economy • Line--21-
TW080106958A 1990-09-05 1991-09-02 TW321808B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2236153A JP2909177B2 (en) 1990-09-05 1990-09-05 Wireless communication terminal

Publications (1)

Publication Number Publication Date
TW321808B true TW321808B (en) 1997-12-01

Family

ID=16996552

Family Applications (1)

Application Number Title Priority Date Filing Date
TW080106958A TW321808B (en) 1990-09-05 1991-09-02

Country Status (2)

Country Link
JP (1) JP2909177B2 (en)
TW (1) TW321808B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07143537A (en) * 1993-11-15 1995-06-02 Nec Corp Paging device
JP2772252B2 (en) * 1995-04-20 1998-07-02 静岡日本電気株式会社 Wireless paging device
JPH08340566A (en) * 1995-06-13 1996-12-24 Nec Shizuoka Ltd Selective call radio receiver with display device
JPH0965401A (en) * 1995-08-24 1997-03-07 Nec Shizuoka Ltd Radio selective calling receiver
JP2953998B2 (en) * 1995-07-27 1999-09-27 静岡日本電気株式会社 Radio selective call receiver
JP2818564B2 (en) * 1995-11-27 1998-10-30 静岡日本電気株式会社 Radio selective call receiver
JP2919354B2 (en) 1996-05-28 1999-07-12 静岡日本電気株式会社 Individually selected paging receiver

Also Published As

Publication number Publication date
JPH04115729A (en) 1992-04-16
JP2909177B2 (en) 1999-06-23

Similar Documents

Publication Publication Date Title
US8892901B2 (en) Method and apparatus for encrypting user data
WO2016045469A1 (en) Information encryption method and mobile terminal
JPH01212041A (en) Cryptographic communication system
JPH07298065A (en) Communication equipment
TW321808B (en)
JP2008097485A (en) Mobile terminal setting system, mobile terminal setting method and mobile terminal setting program
CN105391677A (en) Information transmission method and mobile terminal
JPS60176339A (en) Radio calling system
JP2772252B2 (en) Wireless paging device
JPH0918601A (en) Communication method
CN107889102B (en) Method and device for encrypting and decrypting information in short message
KR100222813B1 (en) Radio pager with a display control catability
JPH11150554A (en) Data communication equipment, data communication method and storage medium
KR970029151A (en) Data acquisition device
CN105635100A (en) Information encryption method, information decryption method and terminal
WO2007052677A1 (en) Image processing apparatus
KR100416743B1 (en) A Method for Encryption of SMS Message
JPH09149023A (en) Information communication processor and information communication processing method
CN101834721A (en) Data encryption and decryption method and system
KR20210134931A (en) Transfer, Acquisition, Storage and Use of Phone Numbers
KR101245182B1 (en) Portable Terminal capable of protecting privacy against character be inputted and Method thereof
JP2000244475A (en) File encryption system
JPH07154611A (en) Facsimile equipment with ciphering communication function
CN107871092A (en) Anti- keyboard recording method based on Windows
JP2000059354A (en) Method for generating session key while utilizing portable recording medium and data distribution system