CN106559765A - A kind of implementation method and device of SMS encryption defencive function - Google Patents
A kind of implementation method and device of SMS encryption defencive function Download PDFInfo
- Publication number
- CN106559765A CN106559765A CN201611093737.8A CN201611093737A CN106559765A CN 106559765 A CN106559765 A CN 106559765A CN 201611093737 A CN201611093737 A CN 201611093737A CN 106559765 A CN106559765 A CN 106559765A
- Authority
- CN
- China
- Prior art keywords
- note
- short message
- encrypted
- header type
- type character
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/18—Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
- H04W4/185—Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals by embedding added-value information into content, e.g. geo-tagging
Abstract
The invention discloses a kind of SMS encryption defencive function realizes device, described device includes:First setup module, knows for the note leader for including header type character is arranged for note, and the header type character is used for the type for indicating the note;Second setup module, is encrypted characters for arranging the header type character, and the encrypted characters are used to identify the note for Encrypted short message, and indicate short message sending end for note setting Crypted password;Encrypting module, for encrypting the note using the Crypted password, obtains Encrypted short message.The invention also discloses a kind of implementation method of SMS encryption defencive function.
Description
Technical field
The present invention relates to short message managing technology, more particularly to a kind of implementation method and device of SMS encryption function.
Background technology
Current era is an information age, and the work of people all be unable to do without exchanging for information with life;And people are
Wish that the information of mutual exchange can maintain secrecy.Therefore, the safety of information is increasingly taken seriously.Such as, people Jing in life
Communication for information is carried out usually through the SMS in mobile terminal such as mobile phone, it is clear that the safety for improving note is also increasingly weighed
Will.
For the protection of note, the Information Security of note is improved at present by the following method:User is by note
Function is set, is that SMS arranges password;When user needs the note checked in mobile phone, being input into correct password just can be with
The note checked in mobile phone.
During stating technical scheme in realization, inventor has found prior art, and at least there are the following problems:Work as user
It is seen that all notes in mobile phone, greatly reduce the safety of note after inputing correct password;In addition, if sending out
Send note person to wish that the note for oneself sending can be protected in destination, but the unpromising SMS of destination is arranged
Password, now, note cannot be protected.
The content of the invention
Present invention is primarily targeted at proposing a kind of implementation method and device of SMS encryption defencive function, solve short
In letter application, all notes use same Crypted password, and short message sending end cause to the note setting password for sending
The low problem of note safety;The effect for improving note safety is reached.
To reach above-mentioned purpose, the technical scheme is that what is be achieved in that:
Embodiments provide a kind of SMS encryption defencive function realizes device, and described device includes:
First setup module, knows for the note leader for including header type character is arranged for note, the message header
Type character is used for the type for indicating the note;
Second setup module, for arranging the header type character for encrypted characters, the encrypted characters are used to mark
It is Encrypted short message to know the note, and indicates short message sending end for note setting Crypted password;
Encrypting module, for encrypting the note using the Crypted password, obtains Encrypted short message.
Optionally, the encrypting module, specifically for when the first Crypted password of user input is received, using described
First Crypted password encrypts the note, obtains Encrypted short message;
Or,
The encrypting module includes:Arithmetic element and ciphering unit;Wherein,
The arithmetic element, for carrying out computing to the encrypted characters according to predetermined encryption algorithm, obtains the second encryption
Password;
The ciphering unit, for encrypting the note using second Crypted password, obtains Encrypted short message.
Optionally, the note head is designated the host-host protocol User Data Header ident value of note head.
What the embodiment of the present invention additionally provided a kind of SMS encryption defencive function realizes device, and described device includes:
First judge module, for when note is received, judging whether the note is provided with including header type
The note leader of character is known, and the header type character is used for the type for indicating the note;
Second judge module, for when the note is provided with the note leader knowledge including header type character, obtaining
The header type character is taken, and judges whether the header type character is encrypted characters, the encrypted characters are used for
Indicate that the note is Encrypted short message;
Reminding module, for when the header type character is encrypted characters, pointing out user input Crypted password, institute
State Crypted password and be decrypted for the note to receiving.
Optionally, the note head is designated the host-host protocol User Data Header ident value of note head.
The embodiment of the present invention provides a kind of implementation method of SMS encryption defencive function again, and methods described includes:
Arranging for note includes that the note leader of header type character is known, and the header type character is used to indicate institute
State the type of note;
It is encrypted characters to arrange the header type character, and it is that encryption is short that the encrypted characters are used to identify the note
Letter, and short message sending end is indicated for note setting Crypted password;
The note is encrypted using the Crypted password, Encrypted short message is obtained.
Optionally, it is described to encrypt the note using the Crypted password, Encrypted short message is obtained, including:When receiving use
During the first Crypted password of family input, the note is encrypted using first Crypted password, obtain Encrypted short message;
Or, it is described to encrypt the note using the Crypted password, Encrypted short message is obtained, including:
Computing is carried out to the encrypted characters according to predetermined encryption algorithm, the second Crypted password is obtained;
The note is encrypted using second Crypted password, Encrypted short message is obtained.
Optionally, the note head is designated the host-host protocol User Data Header ident value of note head.
The embodiment of the present invention provides a kind of implementation method of SMS encryption defencive function again, and methods described includes:
When note is received, judge whether the note is provided with the note leader knowledge including header type character,
The header type character is used for the type for indicating the note;
When the note is provided with the note leader knowledge including header type character, the header type word is obtained
Symbol, and judge whether the header type character is encrypted characters, the encrypted characters are used to indicate that the note is encryption
Note;
When the header type character is encrypted characters, user input Crypted password, the Crypted password is pointed out to use
It is decrypted in the note to receiving.
Optionally, the note head is designated the host-host protocol User Data Header ident value of note head.
The implementation method and device of SMS encryption defencive function provided in an embodiment of the present invention, by inciting somebody to action at short message sending end
Note is set to Encrypted short message so that when note receiving terminal receives note, and needing to be input into correct Crypted password just can be with
Open note;Scheme provided in an embodiment of the present invention can arrange respective password for each note, when user checks note
When, be required for different passwords to be decrypted for each note, with prior art in for note application arrange one it is close
Code, the scheme of all notes that can just check after one proper password of input in note application are compared, the embodiment of the present invention
Substantially increase the safety of note;In addition, the implementation method and dress of SMS encryption defencive function provided in an embodiment of the present invention
Put, note is set to into Encrypted short message at short message sending end, and password is set for note, so as to realize also may be used at short message sending end
To control whether password to be arranged as note, and then improve the safety of note.
Description of the drawings
Fig. 1 is a kind of hardware architecture diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is the communication system architecture schematic diagram that mobile terminal provided in an embodiment of the present invention is operable to;
Fig. 3 A are a kind of implementation method schematic diagram of SMS encryption defencive function provided in an embodiment of the present invention;
Fig. 3 B are a kind of method schematic diagram for selecting short message type provided in an embodiment of the present invention;
Fig. 3 C are a kind of method schematic diagram for notifying user to meet preset requirement character provided in an embodiment of the present invention;
Fig. 3 D are a kind of method schematic diagram of prompting user input Crypted password provided in an embodiment of the present invention;
Fig. 3 E are a kind of method schematic diagram for informing the second Crypted password of user provided in an embodiment of the present invention;
Fig. 4 provides the implementation method schematic diagram of another kind of SMS encryption defencive function for the embodiment of the present invention;
Fig. 5 provides the implementation method schematic diagram of another SMS encryption defencive function for the embodiment of the present invention;
Fig. 6 A realize schematic device for what the embodiment of the present invention provided a kind of SMS encryption defencive function;
Fig. 6 B are a kind of encrypting module schematic diagram provided in an embodiment of the present invention;
Fig. 7 for the present invention again embodiment a kind of SMS encryption defencive function is provided realize schematic device;
Fig. 8 for the present invention again embodiment a kind of SMS encryption defencive function is provided realize schematic device.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described.
The mobile terminal for realizing each embodiment of the invention is described referring now to accompanying drawing 1.In follow-up description, make
With the suffix of such as " module ", " part " or " unit " that are used to represent element only for being conducive to the explanation of the present invention, its
Body does not have specific meaning.Therefore, " module " mixedly can be used with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving
It is phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant (PDA), panel computer (PAD), portable
The mobile terminal of formula multimedia player (PMP), guider etc. and the such as fixation of numeral TV, desk computer etc.
Terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for moving mesh
Element outside, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration of the mobile terminal for realizing each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, audio/video (A/V) input block 120, user input
Unit 130, sensing unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190
Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups for illustrating
Part, can alternatively implement more or less of component, will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assemblies, and which allows mobile terminal 1 00 and wireless communication system
Or the radio communication between network.For example, wireless communication unit can include broadcasting reception module 111, mobile communication module
112nd, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel
Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent
The broadcast singal generated before the server or reception of broadcast singal and/or broadcast related information and/or broadcast related information
And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting
Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase
Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould
Block 112 is receiving.Broadcast singal can be present in a variety of manners, and for example, which can be with the electronics of DMB (DMB)
The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast
Receiver module 111 can receive signal broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111
Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video
Broadcast-hand-held (DVB-H), the Radio Data System of forward link media (MediaFLO@), received terrestrial digital broadcasting integrated service
Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively
Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/
Or broadcast related information can be stored in memorizer 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal
And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice
Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can including WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
ToothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybeeTMEtc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module
115 typical case is GPS (global positioning system).According to current technology, calculate as the location information module 115 of GPS
From the range information and correct time information and the Information application triangulation for calculating of three or more satellites,
So as to calculate according to longitude, latitude and highly accurately three-dimensional current location information.Currently, for calculating position and temporal information
The position that calculates using three satellites and by using other satellite correction of method and temporal information error.
Additionally, can be believed come calculating speed by Continuous plus current location information in real time as the location information module 115 of GPS
Breath.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include 121 He of camera
Mike 122, the static images that 121 pairs, camera is obtained by image capture apparatus in Video Capture pattern or image capture mode
Or the view data of video is processed.Picture frame after process is may be displayed on display unit 151.Jing cameras 121 are processed
Carry out sending out during picture frame afterwards can be stored in memorizer 160 (or other storage mediums) or via wireless communication unit 110
Send, two or more cameras 121 can be provided according to the construction of mobile terminal.Mike 122 can be in telephone calling model, note
Sound (voice data) is received via mike 122 in record pattern, speech recognition mode etc. operational mode, and can be by this
The acoustic processing of sample is voice data.Audio frequency (voice) data after process can be converted in the case of telephone calling model
The form output of mobile communication base station can be sent to via mobile communication module 112.Mike 122 can be implemented various types of
Noise eliminate (or suppress) algorithm with eliminate (or suppression) receive and the noise that produces during sending audio signal or
Interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input
Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch
Plate (for example, detection is due to the sensitive component of the change of touched and caused resistance, pressure, electric capacity etc.), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, and (for example, mobile terminal 1 00 opens or closes shape
State), the position of mobile terminal 1 00, user is for the presence or absence of contact (that is, touch input), the mobile terminal of mobile terminal 1 00
100 orientation, the acceleration or deceleration movement of mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00
The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed
The sliding-type phone is opened or is cut out.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 is coupled with external device (ED).Sensing unit 140 can will be combined below including proximity transducer 141
Touch screen is being described to this.
Interface unit 170 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..In addition, the device with identification module (hereinafter referred to as " identifying device ") can take the form of smart card, therefore, know
Other device can be connected with mobile terminal 1 00 via port or other attachment means.Interface unit 170 can be used for receive from
The input (for example, data message, electric power etc.) of external device (ED) and the input for receiving is transferred in mobile terminal 1 00
One or more elements can be used for the transmission data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing to pass through which by electricity
Power provides the path of mobile terminal 1 00 from base or can serve as allowing from base the various command signals being input into pass through which
It is transferred to the path of mobile terminal.Can serve as recognizing that mobile terminal is from the various command signals or electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner
Go out signal (for example, audio signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include showing
Unit 151, dio Output Modules 152, alarm unit 153 etc..
The information that display unit 151 is processed in may be displayed on mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity
During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia files
Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern
Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when the display unit 151 and touch pad touch screen with formation superposed on one another in the form of layer, display unit
151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
It is a kind of.Some in these display may be constructed such that transparence to allow user from outside viewing, and this is properly termed as transparent
Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific
The embodiment wanted, mobile terminal 1 00 can include two or more display units (or other display devices), for example, move
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touch
Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal in call signal reception pattern, call mode, logging mode,
It is when under the isotypes such as speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or in memorizer 160
The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement
The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed.
Dio Output Modules 152 can include speaker, buzzer etc..
Alarm unit 153 can provide output so that event is notified to mobile terminal 1 00.Typical event can be with
Including calling reception, message sink, key signals input, touch input etc..In addition to audio or video is exported, alarm unit
153 can provide output in a different manner with the generation of notification event.For example, alarm unit 153 can be in the form of vibrating
Output is provided, when calling, message or some other entrance communication (Incoming Communication) are received, alarm list
Unit 153 can provide tactile output (for example, vibrating) to notify to user.Tactile output as by providing, even if
When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153
The output of the generation of notification event can also be provided via display unit 151 or dio Output Modules 152.
Memorizer 160 can store software program for the process and control operation performed by controller 180 etc., Huo Zheke
Temporarily to store the data that exported or will export (for example, telephone directory, message, still image, video etc.).And
And, memorizer 160 can be storing the vibration of various modes with regard to exporting when touching and being applied to touch screen and audio signal
Data.
Memorizer 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many
Media card, card-type memorizer (for example, SD or DX memorizeies etc.), random access storage device (RAM), static random-access storage
Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memorizer with by network connection
The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data
The related control of communication, video calling etc. and process.In addition, controller 180 can be included for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or it is so structured that and control
Device 180 is separated.Controller 180 can be with execution pattern identifying processing, by the handwriting input for performing on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Appropriate electric power needed for part and component.
Various embodiments described herein can be with use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implementing.For hardware is implemented, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein
At least one in electronic unit implementing, in some cases, can be implemented in controller 180 by such embodiment.
For software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation
Software module is implementing.Software code can be come by the software application (or program) write with any appropriate programming language
Implement, perform during software code can be stored in memorizer 160 and by controller 180.
So far, mobile terminal is described according to its function.Below, for the sake of brevity, will description such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
As shown in Figure 1 mobile terminal 1 00 may be constructed such that using via frame or packet transmission data it is all if any
Line and wireless communication system and satellite-based communication system are operating.
The communication system that mobile terminal wherein of the invention is operable to is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.For example, used by communication system
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base stations (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link.
Back haul link can be constructed according to any one in some known interfaces, and the interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system can include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction
Each subregion that line is covered is radially away from BS270.Or, each subregion can by for diversity reception two or more
Antenna is covered.Each BS270 may be constructed such that the multiple frequency distribution of support, and each frequency distribution with specific frequency spectrum
(for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersect can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system
100.Broadcasting reception module 111 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT295 as shown in Figure 1
Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals
At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful
Location information.It is generally configured to coordinate to obtain with satellite 300 as the location information module 115 of GPS as shown in Figure 1
The location information that must be wanted.Substitute GPS tracking techniques or outside GPS tracking techniques, it is possible to use can track mobile whole
Other technologies of the position at end.In addition, at least one gps satellite 300 can optionally or additionally process satellite dmb biography
It is defeated.
Used as a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminal 1s 00
Signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of the reception of certain base station 270 is anti-
Processed in specific BS270 to link signal.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides call
Resource allocation and the mobile management function of the coordination including the soft switching process between BS270.BSC275 is also by the number for receiving
According to MSC280 is routed to, which is provided for the extra route service with PSTN290 formation interfaces.Similarly, PSTN290 with
MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS270 with by forward link signals
It is sent to mobile terminal 1 00.
Based on above-mentioned mobile terminal hardware configuration and communication system, the inventive method each embodiment is proposed.
Before each enforcement is introduced, the short message protocol third generation related to each embodiment of the invention is introduced first
Partner program technical specification (3GPPTS, the 3rd Generation Partnership Project Technical
Specifications) 9.2.3.24 retouching with regard to host-host protocol user data (TP-UD, TP-User Data) in 23.040
State.In 3GPPTS23.040, with regard to the description of TP-UD, 9.2.3.24 illustrates that short-message user data (note) can be by two
It is grouped into:A part is short message content, and another part is note head.Wherein, note head there may be, it is also possible to not exist;
Note head is with the presence or absence of host-host protocol User Data Header mark (TP-UDHI, the Transfer Protocol for being decided by note head
User Data Header Identify) value, when TP-UDHI is 0, note does not include note head, only short message content;
When TP-UDHI is non-zero numerical value, note includes the content of note head and note, i.e., add note before the content of note
The description of head.The form of note head is as shown in table 1.
Table 1
From the form of said short message head, include header type, header type in the configuration information of note head
Represented by different numerical value (being designated as header type character), each numerical value represents the message header definition of difference in functionality type, table
Show different short message types.Wherein, the message header of hexadecimal number 0x23-0x6F is defined as " Reserved forfuture
Use ", represents that this sector address is stayed in advance and uses for the extension of later function.
According to the description in above 3GPP TS23.040 agreements, defined in 0x23-0x6F in the inventive solutions
Any one numerical value be used to represent note be encipherment protection function type.It is defined as follows:Header type is 0x23-
Any one numerical value in 0x6F, the length of header data is 1, when protecting to SMS encryption, is generally put header data
For 1.So, it is exemplary, there was only a kind of information of header type in note head, and the numerical value of header type is 0x30
When, the extended field of the SMS encryption defencive function type that the note head of a note is included is 03 30 01 01.
Embodiment one
The embodiment of the present invention provides a kind of implementation method of SMS encryption defencive function, and the method is applied to short message sending
End, shown in reference picture 3A, the method is comprised the following steps:
Step 301, is that note arranges the note leader knowledge for including header type character.
Wherein, header type character is used for the type for indicating note;Header type character can for numeral, letter or
Combination of person's numeral and letter etc., different digital, the alphabetical or digital short message types different with alphabetical instruction.Wherein, it is short
The type of letter function can be distinguished according to specific to note.Such as, when note can support multimedia function, note
Type be multi-media SMS (multimedia message);When note has encipherment protection function, the type of note is Encrypted short message;Work as note
During without distinctive function, the type of note is normal short message.Exemplary, when header type character is hexadecimal number
During 0x30, instruction note is Encrypted short message.
Wherein, note leader is known for indicating whether note includes note head;From the content of said short message agreement,
It can be the value of TP-UDHI that note leader is known.
In addition, still from the content of said short message agreement:Header type character is arranged on the configuration information of note head
In, so when note includes note head, note can just include header type character;When the value of TP-UDHI is 0,
Note does not include note head;When the value of TP-UDHI is non-zero numerical value, note includes note head.Therefore in this step, note
It is 1 that transmitting terminal need to arrange the value of TP-UDHI, makes note include note head, and then can configuration greatly in the configuration information of note head
Header type, obtains including that the note leader of header type character is known.
Step 302, it is encrypted characters to arrange header type character, and it is Encrypted short message that encrypted characters are used to identify note,
And short message sending end is indicated for note setting Crypted password.
Still from the above-mentioned content about short message protocol, any one numerical value in hexadecimal number 0x23-0x6F is equal
For encrypted characters.Therefore, when it is encrypted characters to need to arrange header type character, as long as by the header type word
Symbol is set to any one in 0x23-0x6F.
Optionally, a numerical value in 0x23-0x6F can be set to add by short message sending end by the following two kinds method
Close character:
The first, when short message sending termination is received sends the instruction of Encrypted short message, according to default from 0x23-0x6F
Method chooses a numerical value, and the numerical value chosen is arranged encrypted characters.
Wherein, default method can be random choice method, gradually choose method from small to large according to numerical value and (often receive one
It is secondary send Encrypted short message instruction when, choose a numerical value) or according to numerical value gradually selection method etc. from big to small, the present invention is implemented
Example is without limitation.
In addition, Fig. 3 B are a kind of method schematic diagrams of the selection short message type for illustrating according to embodiments of the present invention, such as Fig. 3 B
It is shown, the option of different short message types, the choosing of different short message types can be set in the note application at short message sending end in advance
Item can be embodied with different key form respectively, and user selects the type of note to be sent by clicking on different buttons.Show
Example property, when user sends Encrypted short message, " Encrypted short message " button is clicked on, terminate short message sending and receive transmission Encrypted short message
Instruction.
Second, when short message sending termination is received sends the instruction of Encrypted short message, user input is pointed out to meet default wanting
The character asked;When the character of user input is received, the character of user input is set to into encrypted characters.
Further, Fig. 3 C are a kind of sides for notifying user to meet preset requirement character for illustrating according to embodiments of the present invention
Method schematic diagram, as shown in Figure 3 C, short message sending end can inform which character of user by way of display content to meet pre-
If the character for requiring.Such as, when short message sending termination is received sends the instruction of Encrypted short message, the content that short message sending end shows
Can be " numerical value that please be input into 25 to 111 arranges encrypted characters ".It should be noted that the conversion of hexadecimal number 0x23-0x6F
For decimal number when be 25-111.
Further, as encrypted characters are used to identify note for Encrypted short message, and indicate that short message sending end is set for note
Put Crypted password.So when header type character to be set to any one numerical value in 0x23-0x6F at short message sending end,
Represent that note corresponding with the header type character has been Encrypted short message by short message sending end, and SMS Tip transmitting terminal
For note, Crypted password is set.
Optionally, Crypted password can be numeral, alphabetical, underscore etc., and the embodiment of the present invention is without limitation.
Step 303, using Crypted password Encrypted short message, obtains Encrypted short message.
Optionally, when short message sending end indicates that it is note arranges Crypted password, short message sending end can pass through as follows
Two methods are that note arranges Crypted password, and use Crypted password Encrypted short message:
The first, is when it is encrypted characters that short message sending end detects header type character, instruction user input encryption
Password (is designated as the first Crypted password);When the first Crypted password of user input is received, encrypted using the first Crypted password
Note, obtains Encrypted short message.
Optionally, Fig. 3 D are the method schematic diagrams according to a kind of prompting user input Crypted password for implementing to exemplify, such as
Shown in Fig. 3 D, the first Crypted password of user input can be pointed out by the form of display content in short message sending end.
Second, when it is encrypted characters that short message sending end detects header type character, according to predetermined encryption algorithm
Computing is carried out to encrypted characters, Crypted password (being designated as the second Crypted password) is obtained;Using the second Crypted password Encrypted short message, obtain
To Encrypted short message.
It should be noted that after short message sending end obtains the second Crypted password, needing for the second Crypted password to inform use
Family.Optionally, Fig. 3 E are a kind of method schematic diagrams for informing the second Crypted password of user exemplified according to enforcement, such as Fig. 3 E institutes
Show, the second Crypted password can be informed user by the form of display content by short message sending end.
In addition, in order to easy to operate, when the character that encrypted characters are user oneself input, can also be by user input
Encrypted characters are directly disposed as Crypted password, so as to reduce user operation, raising experience.
Wherein, predetermined encryption algorithm can be symmetry algorithm, IDEA or Digital Signature Algorithm etc., this
Bright embodiment is without limitation.
In addition, short message sending end can be any terminal with SMS, such as mobile phone (mobile phone).Certainly originally
The method that invention is implemented is also applied in the encipherment protection of other message such as instant message, and the embodiment of the present invention is done to this
Limit.
In sum, the implementation method of SMS encryption defencive function provided in an embodiment of the present invention, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by method
Can control whether password to be arranged for note, and then improve the safety of note.
Embodiment two
The embodiment of the present invention provides a kind of implementation method of SMS encryption defencive function, and the method is applied to note reception
End.With reference to shown in Fig. 4, the method is comprised the following steps:
Step 401, when note is received, judges whether note is provided with the note leader including header type character
Know.
Wherein, header type character is used for the type for indicating note.
Optionally, it can be TP-UDHI that note leader is known;When note head is designated TP-UDHI, note receiving terminal is obtained
By the value of TP-UDHI, the value of TP-UDHI, determines whether note includes header type character.Further, work as TP-UDHI
Value be 0 when, note include note head;When the value of TP-UDHI is non-zero numerical value, note includes note head.Wherein, message
Head type character is configured in the configuration information of note head.
In addition, when note is not provided with including that the note leader of header type character is known, according to normal short message process;
When note is provided with the note leader knowledge including header type character, execution step 402.
Step 402, when note is provided with the note leader knowledge including header type character, obtains header type word
Symbol, and judge whether header type character is encrypted characters.
Wherein, encrypted characters are used to indicate that note is Encrypted short message.
Judge whether header type character is encrypted characters by the following method:By the header type character for getting
Compare with all data in hexadecimal number 0x23-0x6F, when the header type character for getting is 0x23-0x6F
In numerical value when, judge header type character for encrypted characters.
When header type character be not for encrypted characters when, according to normal short message process;When header type character is
During encrypted characters, execution step 403.
Step 403, when header type character is encrypted characters, points out user input Crypted password.
Wherein, Crypted password is decrypted for the note to receiving.
Optionally, the form that note receiving terminal can pass through to show points out user input Crypted password.
In addition, when note receiving terminal receives the Crypted password of user input, judge the Crypted password of user input with
Whether the Crypted password that short message sending end is arranged is identical, if identical, opens note;If it is different, then note can not be opened,
And the code error of user input is pointed out, re-enter.Further, when the errors number of the Crypted password of user input is more than
During default number of times, then Crypted password can not be input into again.
Optionally, note head is designated the value of the host-host protocol User Data Header ident value TP-UDHI of note head.
Other contents being related in the present embodiment, referring to the associated description in embodiment one, in the present embodiment not
Repeat.
In sum, the implementation method of SMS encryption defencive function provided in an embodiment of the present invention, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by method
Can control whether password to be arranged for note, and then improve the safety of note.
Embodiment three
The embodiment of the present invention provides a kind of implementation method of SMS encryption defencive function, and the method is applied to short message sending end
With note receiving terminal.With reference to shown in Fig. 5, the method is comprised the following steps:
Step 501, short message sending end are that note arranges the note leader knowledge for including header type character.
Step 502, short message sending end arrange header type character for encrypted characters, and encrypted characters for identifying note are
Encrypted short message, and short message sending end is indicated for note setting Crypted password.
Step 503, short message sending end use Crypted password Encrypted short message, obtain Encrypted short message.
Step 504, when note receiving terminal receives note, judges whether note is provided with including header type character
Note leader know.
Step 505, when note is provided with the note leader knowledge including header type character, note receiving terminal is obtained and is disappeared
Breath head type character, and judge whether header type character is encrypted characters.
Step 506, when header type character is encrypted characters, note receiving terminal prompting user input Crypted password.
Other contents being related in the present embodiment, referring to the associated description in embodiment one and enforcement two, in this reality
Do not repeat in applying example.
In sum, the implementation method of SMS encryption defencive function provided in an embodiment of the present invention, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by method
Can control whether password to be arranged for note, and then improve the safety of note.
Example IV
What the embodiment of the present invention provided a kind of SMS encryption defencive function realizes device 600, and device 600 can be note
Sending end.Shown in reference picture 6A, device 600 includes:First setup module 601, the second setup module 602 and encrypting module 603, its
In:
First setup module 601, knows for the note leader for including header type character is arranged for note, message header class
Ocra font ocr is used for the type for indicating note.
Second setup module 602, for arranging header type character for encrypted characters, encrypted characters are used to identify note
For Encrypted short message, and indicate short message sending end Crypted password is set for note.
Encrypting module 603, for using Crypted password Encrypted short message, obtaining Encrypted short message.
Optionally, encrypting module 603, specifically for when the first Crypted password of user input is received, using first
Crypted password Encrypted short message, obtains Encrypted short message.
Optionally, Fig. 6 B are a kind of encrypting module schematic diagrams for illustrating according to embodiments of the present invention, as shown in Figure 6B, encryption
Module 603 includes:Arithmetic element 6031 and ciphering unit 6032;Wherein,
Arithmetic element 6031, for carrying out computing to encrypted characters according to predetermined encryption algorithm, obtains the second Crypted password.
Ciphering unit 6032, for using the second Crypted password Encrypted short message, obtaining Encrypted short message.
Optionally, note head is designated the host-host protocol User Data Header ident value of note head.
In sum, SMS encryption defencive function provided in an embodiment of the present invention realizes device, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by device
Can control whether password to be arranged for note, and then improve the safety of note.
Embodiment five
What the embodiment of the present invention provided a kind of SMS encryption defencive function realizes device 700, and device 700 can be connect for note
Receiving end.With reference to shown in Fig. 7, the device 700 includes:First judge module 701, the second judge module 702 and reminding module 703,
Wherein:
First judge module 701, for when note is received, judging whether note is provided with including header type word
The note leader of symbol is known, and header type character is used for the type for indicating note.
Second judge module 702, for when note is provided with the note leader knowledge including header type character, obtaining
Header type character, and judge whether header type character is encrypted characters, encrypted characters are encryption for indicating note
Note.
Reminding module 703, for when header type character is encrypted characters, pointing out user input Crypted password, plus
Password is decrypted for the note to receiving.
Optionally, note head is designated the host-host protocol User Data Header ident value of note head.
In sum, SMS encryption defencive function provided in an embodiment of the present invention realizes device, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by device
Can control whether password to be arranged for note, and then improve the safety of note.
Embodiment six
What the embodiment of the present invention provided a kind of SMS encryption defencive function realizes system 800, with reference to shown in Fig. 8, the system
800 include the short message sending end 801 as described by example IV and the note receiving terminal 802 described by embodiment five.
It should be noted that about the content that is related in system embodiment referring in embodiment of the method and device embodiment
Concrete refinement description, will not be described here.
In sum, SMS encryption defencive function provided in an embodiment of the present invention realizes system, by short message sending
Note is set to Encrypted short message by end so that when note receiving terminal receives note, needs to be input into correct Crypted password
Note can be opened;Therefore scheme provided in an embodiment of the present invention can arrange respective password for each note, work as user
When checking note, be required for different passwords to be decrypted for each note, with prior art in set for note application
A password is put, the scheme of all notes that can just check after one proper password of input in note application is compared, this
Bright embodiment substantially increases the safety of note;In addition, the realization of SMS encryption defencive function provided in an embodiment of the present invention
Note is set to Encrypted short message at short message sending end, and arranges password for note, so as to realize at short message sending end by system
Can control whether password to be arranged for note, and then improve the safety of note.
It should be noted that herein, term " including ", "comprising" or its any other variant are intended to non-row
His property is included, so that a series of process, method, article or device including key elements not only include those key elements, and
And also include other key elements being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element for being limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), use so that a station terminal equipment including some instructions (can be mobile phone, computer, clothes
Business device, air-conditioner, or network equipment etc.) perform method described by each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the present invention is not thereby limited, it is every using this
Equivalent structure or equivalent flow conversion that bright description and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of SMS encryption defencive function realizes device, it is characterised in that described device includes:
First setup module, knows for the note leader for including header type character is arranged for note, the header type
Character is used for the type for indicating the note;
Second setup module, for arranging the header type character for encrypted characters, the encrypted characters are used to identify institute
It is Encrypted short message to state note, and indicates short message sending end for note setting Crypted password;
Encrypting module, for encrypting the note using the Crypted password, obtains Encrypted short message.
2. device according to claim 1, it is characterised in that
The encrypting module, it is specifically for when the first Crypted password of user input is received, close using the described first encryption
Note described in code encryption, obtains Encrypted short message;
Or,
The encrypting module includes:Arithmetic element and ciphering unit;Wherein,
The arithmetic element, for carrying out computing to the encrypted characters according to predetermined encryption algorithm, obtains the second Crypted password;
The ciphering unit, for encrypting the note using second Crypted password, obtains Encrypted short message.
3. device according to claim 1, it is characterised in that the note head is designated the host-host protocol user of note head
Data head ident value.
4. a kind of SMS encryption defencive function realizes device, it is characterised in that described device includes:
First judge module, for when note is received, judging whether the note is provided with including header type character
Note leader know, the header type character is used to indicate the type of the note;
Second judge module, for when the note is provided with the note leader knowledge including header type character, obtaining institute
Header type character is stated, and judges whether the header type character is encrypted characters, the encrypted characters are used to indicate
The note is Encrypted short message;
Reminding module, it is for when the header type character is encrypted characters, pointing out user input Crypted password, described to add
Password is decrypted for the note to receiving.
5. device according to claim 4, it is characterised in that the note head is designated the host-host protocol user of note head
Data head ident value.
6. a kind of implementation method of SMS encryption defencive function, it is characterised in that methods described includes:
Arranging for note includes that the note leader of header type character is known, and the header type character is described short for indicating
The type of letter;
It is encrypted characters to arrange the header type character, and it is Encrypted short message that the encrypted characters are used to identify the note,
And short message sending end is indicated for note setting Crypted password;
The note is encrypted using the Crypted password, Encrypted short message is obtained.
7. method according to claim 6, it is characterised in that
It is described to encrypt the note using the Crypted password, Encrypted short message is obtained, including:When receiving the first of user input
During Crypted password, the note is encrypted using first Crypted password, obtain Encrypted short message;
Or,
It is described to encrypt the note using the Crypted password, Encrypted short message is obtained, including:
Computing is carried out to the encrypted characters according to predetermined encryption algorithm, the second Crypted password is obtained;
The note is encrypted using second Crypted password, Encrypted short message is obtained.
8. method according to claim 6, it is characterised in that the note head is designated the host-host protocol user of note head
Data head ident value.
9. a kind of implementation method of SMS encryption defencive function, it is characterised in that methods described includes:
When note is received, judge whether the note is provided with the note leader knowledge including header type character, it is described
Header type character is used for the type for indicating the note;
When the note is provided with the note leader knowledge including header type character, the header type character is obtained,
And judging whether the header type character is encrypted characters, the encrypted characters are used to indicate that the note is short for encryption
Letter;
When the header type character is encrypted characters, user input Crypted password is pointed out, it is right that the Crypted password is used for
The note for receiving is decrypted.
10. method according to claim 9, it is characterised in that the note head is designated the host-host protocol of note head and uses
User data head ident value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611093737.8A CN106559765A (en) | 2016-11-30 | 2016-11-30 | A kind of implementation method and device of SMS encryption defencive function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611093737.8A CN106559765A (en) | 2016-11-30 | 2016-11-30 | A kind of implementation method and device of SMS encryption defencive function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106559765A true CN106559765A (en) | 2017-04-05 |
Family
ID=58446005
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611093737.8A Pending CN106559765A (en) | 2016-11-30 | 2016-11-30 | A kind of implementation method and device of SMS encryption defencive function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106559765A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111770232A (en) * | 2020-06-18 | 2020-10-13 | 深圳市诚立业科技发展有限公司 | Short message data management method based on intelligent Internet of things |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652625A (en) * | 2005-01-10 | 2005-08-10 | 章森 | Short message secret technique for cell phone communication |
CN1867094A (en) * | 2005-11-03 | 2006-11-22 | 华为技术有限公司 | Short message encryption protection realizing method and system |
CN1901694A (en) * | 2005-07-18 | 2007-01-24 | 乐金电子(中国)研究开发中心有限公司 | Secret short message transmission method and mobile communication terminal thereof |
CN101795315A (en) * | 2009-12-25 | 2010-08-04 | 深圳市杰普林数码科技有限公司 | System and method for encrypting short messages by using mobile phone terminal |
-
2016
- 2016-11-30 CN CN201611093737.8A patent/CN106559765A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1652625A (en) * | 2005-01-10 | 2005-08-10 | 章森 | Short message secret technique for cell phone communication |
CN1901694A (en) * | 2005-07-18 | 2007-01-24 | 乐金电子(中国)研究开发中心有限公司 | Secret short message transmission method and mobile communication terminal thereof |
CN1867094A (en) * | 2005-11-03 | 2006-11-22 | 华为技术有限公司 | Short message encryption protection realizing method and system |
CN101795315A (en) * | 2009-12-25 | 2010-08-04 | 深圳市杰普林数码科技有限公司 | System and method for encrypting short messages by using mobile phone terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111770232A (en) * | 2020-06-18 | 2020-10-13 | 深圳市诚立业科技发展有限公司 | Short message data management method based on intelligent Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105117123A (en) | Device and method for displaying hidden object | |
CN105376062A (en) | Communication safety interaction method, device and system | |
CN105681326A (en) | Multilink data transmission device and method | |
CN106027804A (en) | Unlocking method and unlocking apparatus of mobile terminal | |
CN106817377A (en) | A kind of data encryption device, decryption device and method | |
CN105184183A (en) | Chatting record encryption method and mobile terminal | |
CN106453056A (en) | Mobile terminal and method for safely sharing picture | |
CN106657606A (en) | Photograph processing method, device and terminal | |
CN104836884A (en) | Standby unlocking method of mobile terminal, and mobile terminal | |
CN105160264A (en) | Photograph encryption device and method | |
CN105099669A (en) | Recording encryption and decryption method and device | |
CN104834863A (en) | Wi-Fi password storage method and apparatus | |
CN104732162A (en) | File encryption processing method and device | |
CN105101186A (en) | Mobile terminal and method and device for preventing information leakage of virtual SIM card thereof | |
CN107437994A (en) | A kind of method and device of safe memory mobile terminal password | |
CN105101187A (en) | Method and system for processing encrypted information | |
CN106778212A (en) | A kind of mobile terminal and control method | |
CN105095705B (en) | A kind of information processing method and device | |
CN106507343A (en) | A kind of information processing method, mobile terminal and server | |
CN106548081A (en) | A kind of end message display packing and device | |
CN105282155A (en) | Authority control method, device and system for interaction among terminals | |
CN106899976A (en) | A kind of wireless network management method and electronic equipment | |
CN106604271A (en) | Mobile terminal and message check method | |
CN106650374A (en) | Mobile terminal and message check method | |
CN106131318A (en) | A kind of incoming information hidden method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170405 |