CN101374251A - Method for encrypting short message and used terminal equipment thereof - Google Patents

Method for encrypting short message and used terminal equipment thereof Download PDF

Info

Publication number
CN101374251A
CN101374251A CNA2007100764937A CN200710076493A CN101374251A CN 101374251 A CN101374251 A CN 101374251A CN A2007100764937 A CNA2007100764937 A CN A2007100764937A CN 200710076493 A CN200710076493 A CN 200710076493A CN 101374251 A CN101374251 A CN 101374251A
Authority
CN
China
Prior art keywords
note
pseudo
key
short message
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100764937A
Other languages
Chinese (zh)
Other versions
CN101374251B (en
Inventor
何斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Konka Group Co Ltd
Original Assignee
Konka Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Konka Group Co Ltd filed Critical Konka Group Co Ltd
Priority to CN2007100764937A priority Critical patent/CN101374251B/en
Publication of CN101374251A publication Critical patent/CN101374251A/en
Application granted granted Critical
Publication of CN101374251B publication Critical patent/CN101374251B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a short message encryption method and terminal equipment used thereof. The method comprises the following steps: mutually negotiating a digital key between a transmission terminal equipment and a receiving terminal equipment according to respective key-cipher table, wherein a pseudo short message table is stored in the terminal equipment; respectively encrypting the text content of a short message by using symmetrical encryption technique during transmission and after reception, so that the content of the short message is displayed as the content of one of the short messages in the pseudo short message table; and forging the encrypted short message to a normal short message by the pseudo short message table. Accordingly, a common short message can be encrypted through a smart method without spending more cost, thereby well protecting the privacy information of mobile phone users.

Description

A kind of method of SMS encryption and the terminal equipment of application thereof
Technical field
The present invention relates to field of mobile communication, relate in particular to a kind of method of SMS encryption of field of mobile communication and the terminal equipment of application thereof.
Background technology
At present, utilize note to come communication links more and more frequent between friend, a lot of people even note has been used as a kind of chat tool.But some note belongs to privacy information, if mobile phone is lost because of carelessness or watched wherein note, just situation about might divulge a secret conveniently by other people.Short message on the mobile phone might relate to military-political secrets, business secret, individual privacy of machine master etc. and not be preferably content known to other people.So; invent a kind of method of SMS encryption and the terminal equipment of application thereof, can encrypt the usual note of people by a kind of method cleverly, and can not spend more user's expense; can well protect cellphone subscriber's privacy information, be very necessary.
Summary of the invention
Have in view of that; the invention provides a kind of method of SMS encryption and the terminal equipment of application thereof; can encrypt the usual note of people by a kind of method cleverly, and can not spend more user's expense, can well protect cellphone subscriber's privacy information.
A kind of method of SMS encryption, wherein, this method comprises:
Consult a digital cipher mutually according to secret key cipher epiphase separately sending between terminal equipment and the receiving terminal apparatus, and terminal equipment and terminal equipment store pseudo-note table;
When sending and after receiving, all use symmetric cryptosystem respectively the short message text content to be encrypted, the note of encrypting is forged into normal note by pseudo-note table so that short message content is shown as the wherein content of a note in the pseudo-note table.
Described pseudo-note table is identical with note transmit leg both sides the note recipient, comprises that the short message text of sequence number and sequence number correspondence is all just the same.
Described pseudo-note table comprises many pseudo-short message contents, and pseudo-note table has editting function, in order to revise, increase, the clauses and subclauses of the pseudo-note table of deletion.
Described note sends and specifically comprises: select a pseudo-note in the pseudo-note table, according to secret key cipher table and pseudo-note table digital cipher is encrypted then, key after obtaining encrypting, the key that re-uses after the encryption is encrypted the note of real transmission, at last the note of encrypting is sent to the recipient.
Described note sends and specifically comprises: send in note and select the interface, start hiding menu by the special key sequence, select pseudo-note table sequence number and input key by the note transmit leg, adopt method of encrypting to send note then.
Described note receives and specifically comprises: secret key cipher table according to a preconcerted arrangement and pseudo-note table are decrypted digital cipher, the key after obtaining deciphering, and the key according to after the deciphering is decrypted note, shows the real short message content after deciphering.
Described note receives and specifically comprises: at the note read interface, note recipient starts hiding menu by the special key sequence, import pseudo-note table sequence number and key, after the note recipient has imported correct pseudo-note table sequence number and key, according to algorithm correct data decryption is come out, show the real short message content after deciphering.
Described secret key cipher table is several the forms that are used for key is carried out encryption and decryption, adopts digital cipher, and key is made up of ten numerals of 0-9, arranges N secret key cipher table according to the list item number N of pseudo-note table.
Compared with prior art, because the present invention uses symmetric cryptosystem respectively the short message text content to be encrypted when sending and after receiving so that the interior of a wherein note that short message content is shown as in the pseudo-note table leads to, and by pseudo-note table the note of encrypting is forged into normal note.So, can encrypt the usual note of people by a kind of method cleverly, and can not spend more user's expense, can well protect cellphone subscriber's privacy information.
Description of drawings
Fig. 1 is the process of transmitting schematic diagram of the SMS encryption of better embodiment of the present invention;
Fig. 2 is the receiving course schematic diagram of the SMS encryption of better embodiment of the present invention.
Embodiment
For the purpose, technical scheme, the advantage that make the present invention is clearer and more definite, clear, the present invention's technical scheme is described in further detail below in conjunction with embodiment, accompanying drawing.
The method of a kind of SMS encryption provided by the present invention, between terminal equipment and terminal equipment, can consult a digital cipher mutually, when sending and after receiving, all use symmetric cryptosystem that the short message text content is encrypted then by oral or other modes of maintaining secrecy.
Symmetry algorithm (symmetric algorithm) is the conventional cipher algorithm sometimes again, is exactly that encryption key can be calculated from decruption key, and decruption key also can be calculated from encryption key simultaneously.And in most symmetry algorithm, encryption key is identical with decruption key.So claim that also this cryptographic algorithm is secret-key algorithm or single key algorithm.It requires transmit leg and recipient before secure communication, decides through consultation a key.The fail safe of symmetry algorithm depends on key, leaks the decrypt messages that key just means that anyone can send or receive them, so the confidentiality of key is most important to communicativeness.For this general requirements of note, use single key algorithm to get final product.
The advantage of symmetric cryptography is that efficient height, the speed after algorithm is realized is fast.So, be proper in this application demand higher of SMS encryption to time requirement.Simultaneously, because except the small part smart mobile phone, other mobile phone operating system relative closure, very difficult note is derived from mobile phone card or mobile phone memory space of ordinary people uses the method for exhaustion that enciphered data is decrypted then.So the present invention is very helpful for the privacy SMS of the most common cellphone user of protection.
In view of the length of note, can adopt the sequence algorithm (streamalgorithm) in the symmetric encipherment algorithm: once only single position in the plaintext (being byte sometimes) encrypted or decrypt operation.
For note, data encrypted requires to be less than or equal to the length of initial data, so as long as sequence algorithm meets this requirement, just can use among the present invention.
Sequence algorithm has a variety of optional schemes, permutation cipher for example, and vigenere cipher, caesar cipher all can use among the present invention.The present invention has simultaneously also proposed a kind of new sequential encryption algorithm, encrypts at SMS specially, and can obtain good cipher round results.
Permutation cipher (permutation cipher) summary: claim transversal cipher (transpositioncipher) again, it is identical that letter expressly keeps, but order is upset.
Vigenere cipher: vigenere cipher is to expand polyalphabetic cipher on single happy spreads the basis of password, is called " Virginia " password.Vigenere cipher has been introduced the notion of " key ", promptly decides with which close table according to key and replaces, and resists word frequency statistic with this.
Caesar cipher is a kind of encryption method very commonly used, a simple example: " baidu " encrypts the back character string with the caesar cipher method and becomes " edlgx ", what is its principle? each letter in " baidu " is alphabetically moved 3 backward, and the result of gained is exactly the ciphertext that we saw just now.
Sequence algorithm of the present invention develops on the vigenere cipher basis; also be to adopt the polyalphabetic cipher system, but on the basis of polyalphabetic cipher, done optimization again at note specially; introduced secret key cipher table and pseudo-note table again, can the better protection privacy of user.
Pseudo-note table
Because if the note after encrypting is non-decrypting, the effect that shows is exactly a pile mess code, the present invention if being seen by other people, such note just may know that arcane truth is arranged, so just can be forged into normal note with the note of encrypting by pseudo-note table.
The sample of pseudo-note table is as follows:
Sequence number Short message content
1 Our company's loan is also sold gun counterfeit money magic potion illegal vehicle tapping device, also revenges and the private detective for the people, also does online diploma car plate invoice.Details please get in touch with 13012345678.
2 Our company has the discounting air ticket to sell, and price 3 is turned up 7 foldings and ended.Detailed please asking gets in touch with 13012345678.
3 Brand-new telephone number card, never the line is busy can insert a plurality of numbers simultaneously, and competitively priced, the wholesale quantity heavy discount is low to moderate eighty percent discount most, and details please be seeked advice from Chen Sheng 13012345678.
4 Teach invincible board skill, wrap your every war and be sure to win, very rich.Details please be seeked advice from Chen Sheng 13012345678.
5 Our company provides usury to the person of lacking of capital, and the interest rate whole city is minimum.Details please be seeked advice from Chen Sheng 13012345678.
6 It is professional that our company provides air-conditioning telephone-moving, punching, maintenance, installation and fluoridize to reclaim.Competitively priced.Long-term client can enjoy eighty percent discount.Details please be seeked advice from Chen Sheng 13012345678.
7 Private eye's sincerity is served for you! Competitively priced.Details please be seeked advice from Chen Sheng 13012345678.
8 The bath center big discount.Evening 8 is up to 12 o'clock, comprehensively eighty percent discount.Please electricity 85216666 consultings of details.
Note: pseudo-note table must be identical with note transmit leg both sides the note recipient, comprises that the short message text of sequence number and sequence number correspondence all must be just the same.Pseudo-note table can provide editting function, and in order to the clauses and subclauses of revising, increasing, delete pseudo-note table, for example Shang Mian pseudo-note table can be increased to list item 31.
As shown in Figure 1, be the process of transmitting schematic diagram of the SMS encryption of better embodiment of the present invention, the note transmit leg is when sending, and the user selects addressee's number, then, ejects the delivery option interface and selects to the user.
For example, adopting sequence number note recipient and note transmit leg agreement week first is 1 pseudo-note, second adopting sequence number week is 2 pseudo-note ... and the like, then adopting sequence number Sunday is 7 pseudo-note, select a pseudo-note in the pseudo-note table, according to secret key cipher table and pseudo-note table digital cipher is encrypted then, the key after obtaining encrypting is imported the key of both sides' agreement again the note of real transmission is encrypted.At last the note of encrypting is sent to the recipient.In addition, if the number of special agreement then sends in note and selects the interface, can also start hiding menu by the special key sequence of similar " * #1234# ", select pseudo-note table sequence number and input key by the note transmit leg, adopt method of encrypting to send note then.
As shown in Figure 2, be the receiving course schematic diagram of the SMS encryption of better embodiment of the present invention, the recipient judges whether to belong to the note that special agreement number sends after receiving note, if not, show and read according to normal note.
If during the note of this particular number that transmit leg sends, unified according to pseudo-note agreement, note is shown as note in the pseudo-note table, rather than is shown as note after the encryption or the note after the deciphering.Note recipient is after seeing this " pseudo-note ", just can know that this note is the note of encrypting, according to secret key cipher table and pseudo-note table digital cipher is decrypted, key after obtaining deciphering, according to the key after the deciphering, note is decrypted, shows that the real short message content after the deciphering is read to the user.In addition, at the note read interface, note recipient can also start hiding menu by the special key sequence of similar " * #1234# ", imports pseudo-note table sequence number and key by the note recipient.After the note recipient has imported correct pseudo-note table sequence number and key, just can correct data decryption be come out according to algorithm, show that the real short message content after the deciphering is read to the user.
The secret key cipher table
The secret key cipher table is several the forms that are used for key is carried out encryption and decryption, can adopt digital cipher, so key is made up of ten numerals of 0-9, can arrange N secret key cipher table according to the list item number N of pseudo-note table.The list item number of for example pseudo-note table is 3, and then the secret key cipher table just has 3.
The sample of these 3 secret key cipher tables is as follows:
Secret key cipher table 1:
Numeral expressly 0 1 2 3 4 5 6 7 8 9
The numeral ciphertext ? 1 ? 2 ? 6 ? 7 ? 8 ? 9 ? 0 ? 3 ? 4 ? 5
Secret key cipher table 2:
Numeral expressly 0 1 2 3 4 5 6 7 8 9
The numeral ciphertext 5 2 6 8 7 9 0 3 4 1
Secret key cipher table 3:
Numeral expressly 0 1 2 3 4 5 6 7 8 9
The numeral ciphertext 0 2 7 6 9 8 1 3 4 5
Like this, supposing that the key of note recipient and note transmit leg agreement is 123456, is after 1 the pseudo-note, just can use secret key cipher table 1 to come key is encrypted when the sender-selected employing sequence number of note, and at this moment key has just become 267890.When next encrypting, just can use 267890 as secret key encryption.
Note recipient according to pseudo-note agreement, can be shown as note sequence number in the pseudo-note table and be 1 note after receiving note, note recipient just can know that the sequence number of this pseudo-note is 1 after seeing this " pseudo-note ".At the note read interface, note recipient starts hiding menu by the special key sequence of " * #1234# ", imports pseudo-note table sequence number 1 and key 123456.Just can generate the key 267890 of deciphering, use key 267890 to decipher at last, rather than use key 123456 to decipher earlier according to pseudo-note table sequence number 1 and secret key cipher table 1.
By the agreement of pseudo-note table and secret key cipher table, both can allow the note after encrypting seem similar common short message, many one heavy protection can be provided on the basis of Virginia polyalphabetic cipher again.
The Virginia polyalphabetic cipher
The present invention so the Virginia polyalphabetic cipher just only needs ten password tables to get final product, is respectively password table 0 because use numeral as key, 1,2,3,4,5,6,7,8,9, when encrypt/decrypt, the numeral of key is what just carries out encryption and decryption according to the password table of corresponding sequence number and gets final product.
Be to adopt sequence algorithm when encryption and decryption, according to key (supposing that key length is 6), carry out encryption and decryption at each byte, the span of each byte is 0-255, so the length of each password table all is 256, from 0-255 totally 256 list items, the numeral of each list item all is between 0-255, and do not repeat mutually, during encryption earlier according to the position of byte to key length 6 deliverys (if obtain the result be 0 then add key length), obtain the numeral of current key, find the password table of corresponding sequence number, according to the value of plaintext byte, retrieve the list item of corresponding sequence number then, and replace expressly with the corresponding digital value in this list item.
For example, suppose that key is 123456, can be when encrypting the 1st byte, 1 pair 6 delivery gets 1, and this moment, we adopted password table 1 to encrypt; We are when encrypting the 6th byte, and 6 pairs 6 deliverys get 0, and add that key length 6 obtains 6 this moment, and adopt password table 6 to encrypt this moment.The digital value of supposing the 1st byte is 65, and then finding sequence number in the password table 1 is 65 list item, and the value of supposing this list item is 96, and then ciphertext is exactly 96.
During deciphering, earlier according to the position of byte to key length 6 deliverys (if obtain the result be 0 then add key length), obtain the numeral of current key, find the password table of corresponding sequence number, then according to the value of ciphertext byte, retrieve the list item that equals the ciphertext digital value, then this list item sequence number value is exactly expressly.
For example, suppose that key is 123456, when the 1st byte of deciphering, 1 pair 6 delivery gets 1, and adopt password table 1 to be decrypted this moment; When the 6th byte of deciphering, 6 pairs 6 deliverys get 0, and add that key length 6 obtains 6 this moment, and adopt password table 6 to be decrypted this moment.The ciphertext digital value of supposing the 1st byte is 96, and then finding sequence number in the password table 1 is 96 list item, and the sequence number of finding this list item is 65, is exactly 65 expressly then.
Though the present invention is described with reference to current better embodiment; but those skilled in the art will be appreciated that; above-mentioned better embodiment only is used for illustrating the present invention; be not to be used for limiting protection scope of the present invention; any within the spirit and principles in the present invention scope; any modification of being done, equivalence replacement, improvement etc. all should be included within the scope of the present invention.

Claims (8)

1. the method for a SMS encryption is characterized in that, this method comprises:
Consult a digital cipher mutually according to secret key cipher epiphase separately sending between terminal equipment and the receiving terminal apparatus, and terminal equipment and terminal equipment store pseudo-note table;
All use symmetric cryptosystem respectively the short message text content to be encrypted when sending and after receiving so that the interior of a wherein note that short message content is shown as in the pseudo-note table leads to, the note of encrypting is forged into normal note by pseudo-note table.
2. the method for claim 1 is characterized in that, described pseudo-note table is identical with note transmit leg both sides the note recipient, comprises that the short message text of sequence number and sequence number correspondence is all just the same.
3. the method for claim 1 is characterized in that, described pseudo-note table comprises many pseudo-short message contents, and pseudo-note table has editting function, in order to revise, increase, the clauses and subclauses of the pseudo-note table of deletion.
4. the method for claim 1, it is characterized in that, described note sends and specifically comprises: select a pseudo-note in the pseudo-note table, according to secret key cipher table and pseudo-note table digital cipher is encrypted then, key after obtaining encrypting, re-use encrypted secret key the note of real transmission is encrypted, at last the note of encrypting is sent to the recipient.
5. the method for claim 1, it is characterized in that described note sends and specifically comprises: send in note and select the interface, start hiding menu by the special key sequence, select pseudo-note table sequence number and input key by the note transmit leg, adopt method of encrypting to send note then.
6. the method for claim 1, it is characterized in that, described note receives and specifically comprises: secret key cipher table according to a preconcerted arrangement and pseudo-note table are decrypted digital cipher, key after obtaining deciphering, according to the key after the deciphering, note is decrypted, shows the real short message content after deciphering.
7. the method for claim 1, it is characterized in that, described note receives and specifically comprises: at the note read interface, note recipient starts hiding menu by the special key sequence, import pseudo-note table sequence number and key, after the note recipient has imported correct pseudo-note table sequence number and key, according to algorithm correct data decryption is come out, show the real short message content after deciphering.
8. the method for claim 1, it is characterized in that described secret key cipher table is several the forms that are used for key is carried out encryption and decryption, adopts digital cipher, key is made up of ten numerals of 0-9, according to N secret key cipher table of list item number N agreement of pseudo-note table.
CN2007100764937A 2007-08-21 2007-08-21 Method for encrypting short message and used terminal equipment thereof Expired - Fee Related CN101374251B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100764937A CN101374251B (en) 2007-08-21 2007-08-21 Method for encrypting short message and used terminal equipment thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100764937A CN101374251B (en) 2007-08-21 2007-08-21 Method for encrypting short message and used terminal equipment thereof

Publications (2)

Publication Number Publication Date
CN101374251A true CN101374251A (en) 2009-02-25
CN101374251B CN101374251B (en) 2012-04-04

Family

ID=40448136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100764937A Expired - Fee Related CN101374251B (en) 2007-08-21 2007-08-21 Method for encrypting short message and used terminal equipment thereof

Country Status (1)

Country Link
CN (1) CN101374251B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
WO2011009263A1 (en) * 2009-07-21 2011-01-27 中兴通讯股份有限公司 Method and apparatus for keeping short messages secret
CN102299800A (en) * 2011-08-29 2011-12-28 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN105162693A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Message display method and device
CN106156638A (en) * 2015-04-22 2016-11-23 腾讯科技(深圳)有限公司 Message record processing method and equipment
CN106301790A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Security information exchange method, mobile terminal
CN107103247A (en) * 2017-03-13 2017-08-29 宇龙计算机通信科技(深圳)有限公司 One kind application encryption method and device
CN117880762A (en) * 2024-03-12 2024-04-12 深圳市诚立业科技发展有限公司 Short message data security encryption method based on wireless communication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652625A (en) * 2005-01-10 2005-08-10 章森 Short message secret technique for cell phone communication
CN100450208C (en) * 2005-11-03 2009-01-07 华为技术有限公司 Short message encryption protection realizing method and system

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011009263A1 (en) * 2009-07-21 2011-01-27 中兴通讯股份有限公司 Method and apparatus for keeping short messages secret
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
CN102299800A (en) * 2011-08-29 2011-12-28 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN102299800B (en) * 2011-08-29 2014-01-29 杭州弗兰科信息安全科技有限公司 Method for realizing switchable multi-cipher local information encryption box
CN106156638A (en) * 2015-04-22 2016-11-23 腾讯科技(深圳)有限公司 Message record processing method and equipment
CN106156638B (en) * 2015-04-22 2020-12-04 腾讯科技(深圳)有限公司 Message record processing method and device
CN105162693A (en) * 2015-09-16 2015-12-16 小米科技有限责任公司 Message display method and device
CN105162693B (en) * 2015-09-16 2018-09-11 小米科技有限责任公司 message display method and device
CN106301790A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Security information exchange method, mobile terminal
CN107103247A (en) * 2017-03-13 2017-08-29 宇龙计算机通信科技(深圳)有限公司 One kind application encryption method and device
CN117880762A (en) * 2024-03-12 2024-04-12 深圳市诚立业科技发展有限公司 Short message data security encryption method based on wireless communication
CN117880762B (en) * 2024-03-12 2024-05-14 深圳市诚立业科技发展有限公司 Short message data security encryption method based on wireless communication

Also Published As

Publication number Publication date
CN101374251B (en) 2012-04-04

Similar Documents

Publication Publication Date Title
CN101374251B (en) Method for encrypting short message and used terminal equipment thereof
CN103795533B (en) Encryption based on identifier, the method and its performs device of decryption
CN101188496B (en) A SMS encryption transport method
US7095851B1 (en) Voice and data encryption method using a cryptographic key split combiner
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN1859081B (en) Immediate news enciphering transmission method and system
US8600059B2 (en) Short message service cipher
CN104022872B (en) Data encryption method
CN105450395A (en) Information encryption and decryption processing method and system
CN101789865A (en) Dedicated server used for encryption and encryption method
CN101203025A (en) Method for transmitting and receiving safe mobile message
CN111698084B (en) Block chain-based concealed communication method
CN105391676A (en) Instant communication message processing method, device and system
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN106605419A (en) Method and system for secure SMS communications
WO2001084766A2 (en) System and method for encryption using transparent keys
CN102088352A (en) Data encryption transmission method and system for message-oriented middleware
CN101841785B (en) Method for sending encrypted message by cellphone and system thereof
CN1321537C (en) Electronic paymenting service system and realizing method based on fixed telephone net short message
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
CN112534790A (en) Encryption device, communication system and method for exchanging encrypted data in communication network
CN103188665A (en) System, method and device of improving safety of cell phone receiving advertising
CN101369887B (en) E-mail enciphered transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120404

Termination date: 20120821