CN101056176A - End-to-end encryption method and control device for the mobile phone SMS - Google Patents

End-to-end encryption method and control device for the mobile phone SMS Download PDF

Info

Publication number
CN101056176A
CN101056176A CN 200710099892 CN200710099892A CN101056176A CN 101056176 A CN101056176 A CN 101056176A CN 200710099892 CN200710099892 CN 200710099892 CN 200710099892 A CN200710099892 A CN 200710099892A CN 101056176 A CN101056176 A CN 101056176A
Authority
CN
China
Prior art keywords
message
key
module
diffie
hellman
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200710099892
Other languages
Chinese (zh)
Inventor
邹仕洪
林宇
史文勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Netqin Technology Co Ltd
Original Assignee
Beijing Netqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Netqin Technology Co Ltd filed Critical Beijing Netqin Technology Co Ltd
Priority to CN 200710099892 priority Critical patent/CN101056176A/en
Publication of CN101056176A publication Critical patent/CN101056176A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A method for the end-end encryption of message sent by mobile, before communication, two mobile users may mutually negotiate through the Diffie-Hellman key switching algorithm and calculate respectively to establish a shared key for both parties; then after encrypted the mobile message with the shared key, sent to the other party; after another user received this encrypted message, decrypts the encrypted message with the shared key, presents the original information to the receiver. The control device for the invention is a control component equipped in the mobile for mutual communicating with the message transmitting and receiving module, consists of decryption module, interface presenting module, encryption message storage module, key management module and key negotiation module. The invention method is easier to realize, high feasibility, the structure of control device is simple, the operating of user is almost identical with the receiving and transmitting of ordinary mobile messages, but the method has higher safety, meets with the high safety demand for mobile messages.

Description

The message of mobile phone transmission is carried out the method and the control device of End to End Encryption
Technical field
The present invention relates to a kind of new technology of mobile communication, exactly, relate to method and control device that a kind of message that mobile phone is transmitted is carried out End to End Encryption, belong to the technical field of mobile communication and information security.
Background technology
Cipher key change is the process that communicating pair is set up session key.Diffie and Hellman have invented a kind of Diffie-Hellman that is used for cipher key delivery and distribution, this algorithm can not be directly used in to be encrypted or deciphering, but be used as Internet Key Exchange by many commercial products, purpose is to make two users can exchange a privacy key safely on the normal transmission circuit, adds, separates dense processing for use in later communication message.
The theoretical foundation of Diffie-Hellman Diffie-Hellman is to calculate very difficulty of discrete logarithm.Below this Diffie-Hellman Diffie-Hellman is briefly introduced:
1, two disclosed parameters of the overall situation are arranged: a prime number q and an integer a, a are the primitive roots of q.
2, suppose that two user A and B wish to exchange a key, user A selects the random number Xa as a private cipher key<q, and calculates public-key cryptography Ya=a XaMod q.A maintains secrecy the numerical value of private cipher key Xa and deposits, and another public-key cryptography Ya can openly be obtained by B.Similarly, user B also selects a random number Xb as private cipher key<q, and calculates public-key cryptography Yb=a XbMod q.B also maintains secrecy the numerical value of private cipher key Xb and deposits, and the key Yb that exposes can openly be obtained by A.
3, the account form of the shared key of user A generation is K=(Yb) XaMod q.Equally, the calculating of the shared key of user B generation is K=(Ya) XbMod q.These two are calculated the identical result of generation:
K=(Yb) XaMod q=(a XbMod q) XaMod q=(a Xb) XaMod q (obtaining)=a according to the modulo operation rule XbXaMod q=(a Xa) XbMod q=(a XaMod q) XbMod q=(Ya) XbMod q, therefore being equivalent to both sides has exchanged an identical secret key K.
4, because two users' private cipher key Xa and Xb maintain secrecy, the utilizable parameter of any one adverse party has only q, a, Ya and Yb.Thereby adverse party is forced to calculate discrete logarithm and is determined key.For example, obtain the privacy key of user B, adverse party must be calculated Xb=inda earlier, q (Yb), and then the same quadrat method of using user B to be adopted is calculated its secret key K.
Referring to Fig. 1, introduce a simple communication agreement of utilizing the Diffie-Hellman Diffie-Hellman.Suppose that user A wishes that setting up one with user B is connected, and with the message of shared secret key encryption transmission on this connects.User A produces a disposable private cipher key Xa (Xa<q), calculate public-key cryptography Ya again and send it to user B.User B produces a private cipher key Xb (Xb<q), calculate public-key cryptography Yb again and it is sent to user A in response.User A and B just can calculate the shared key K between them then.Here need to prove: open numerical value q and a both sides need to know in advance.Another kind method is to be selected the value of q and a by user A, and these numerical value are included in first message, and Ya sends to user B together in company with its public-key cryptography.
The fail safe of Diffie-Hellman Diffie-Hellman is according to being based on such fact: though the index that to calculate with a prime number be mould is relatively easy, it but is very difficult calculating discrete logarithm on finite field.For big prime number, calculating discrete logarithm almost is impossible (referring to shown in Figure 2),
Two features of Diffie-Hellman Diffie-Hellman are attractive especially: 1, only just generate key when needs, reduced key stored a very long time and the chance that causes it to be attacked.2, except that the agreement to global parameter, cipher key change does not need the foundation structure of existence in advance; It is very convenient to use.Therefore, this Diffie-Hellman has obtained application in many occasions.
Now, the use of mobile messagings such as note and multimedia message is more and more universal, and nearly all mobile phone can both be supported the transmitting-receiving of mobile messaging.Because the convenience and the universality of mobile messaging, in daily work, life, people may send some sensitive informations by mobile messaging, for example identification card number, account No., withdraw the money and/or trading password, stock or fund card number or the like.Yet the transmission of these message at present all is expressly to send, and does not have security guarantee.These responsive privacies, Financial Information are in case learned that by unique lawless people user's interests will be inflicted heavy losses on or damage.Therefore, how to utilize the modern communication technology to come to provide reliable guidance, just become the urgent task that those skilled in the art are duty-bound for the safety transmission of mobile messaging.
Summary of the invention
In view of this, the purpose of this invention is to provide a kind of message that mobile phone is transmitted and carry out the method and the control device of End to End Encryption, the implementation procedure of this method is simple, convenient, feasible, the common mobile messaging of user's use operation and transmitting-receiving does not almost have difference, but safe, can satisfy people's security requirement to mobile messaging.Control device of the present invention is simple in structure, realization is easy, only needs to set up a dedicated software modules in existing mobile phone and gets final product, and helps applying.
In order to achieve the above object, the invention provides a kind of message that mobile phone is transmitted and carry out the method for End to End Encryption, it is characterized in that: before communication, two cellphone subscribers use Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient.
The Diffie-Hellman of described mutual negotiation, calculating is the Diffie-Hellman Diffie-Hellman.
The described mobile messaging of encrypting comprises note SMS, multimedia message MMS or Email EMAIL.
Described method comprises following operating procedure:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
Described method also comprises following operating procedure:
(4) user is when checking received common message, can push specific keys or select the control assembly of specific menu item in Activating Phone, so that with this message encryption and store the encrypting messages memory module into.
Described step (1) further comprises following content of operation:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
Described step (2) further comprises following content of operation:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains shared key to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
Described step (3) further comprises following content of operation:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
In order to achieve the above object, the present invention also provides a kind of message that mobile phone is transmitted to carry out the control device of End to End Encryption, it is characterized in that: this device is set up one and carries out mutual control assembly with the message sending/receiving module that this control assembly comprises following software module in cell phone control circuit:
The encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module, encrypting messages memory module and key management module respectively, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively;
The interface presents module, as the interface of this control assembly and user interactions, connects mobile phone display screen, presents the various interactive operations that module comprises editor, sends, checks message for the user by this interface;
The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent;
Key management module is used to manage and store the key that both sides consult, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing;
Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.
This device can use different program languages to develop development, both can be embedded in the new cell-phone of new production, also can make dedicated software modules and increase and fit in the existing mobile phone.
The present invention is a kind of Diffie-Hellman of utilization Diffie-Hellman, carries out key agreement by sending message between two mobile phones of transmitting-receiving, utilizes the shared secret key encryption message that consults then, to realize that the safety of message sends and receives between the mobile phone.
Advantage of the present invention and effect: use by universally recognized Diffie-Hellman Diffie-Hellman in the industry and carry out the exchange and the negotiation of public-key cryptography, its process safety, reliable, even malice third party listens to negotiation message, also can't crack out the shared key that communicating pair uses.Moreover this key agreement operation is extremely simple, and cost is cheap; Only need communicating pair to send 1 negotiation message separately, just can consult what a common each other communication key safely.Therefore, concerning the user, very simple, easily, the practicality of the inventive method, processes such as the transmission of encrypting messages and reception are all in full accord with the information receiving and transmitting function of existing mobile phone, learning cost that need not be extra.The user does not almost have difference to use experience of the present invention and transmission, reception normal short message, and these characteristics all help applying of this method.
In addition, the inventive method can be used various program language (for example JAVA, C ++Deng) develop development.This software both can be the application program that mobile terminal operating system is embedded, need not install again, also can be the application program that the needs developed on mobile phone operating system are installed on portable terminal specially.
Description of drawings
Fig. 1 is the diagram introduction of the operating process of Diffie-Hellman Diffie-Hellman.
Fig. 2 is the diagram introduction of the security performance of Diffie-Hellman Diffie-Hellman.
Fig. 3 is the present invention carries out End to End Encryption to the message of mobile phone transmission a method operating procedure flow chart.
Fig. 4 is the key agreement flow chart of the step (1) among Fig. 3.
Fig. 5 is the message encryption transmission flow figure of the step (2) among Fig. 3.
Fig. 6 is that the decrypt messages of the step (3) among Fig. 3 presents flow chart.
Fig. 7 is that the control device structure that the present invention carries out End to End Encryption to the message of mobile phone transmission is formed schematic diagram.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
The present invention is the method that a kind of message that mobile phone is transmitted is carried out End to End Encryption, and it is before communication, and two cellphone subscribers use the Diffie-Hellman Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient; So just can on unsafe radio communication channel, realize coded communication end to end.In addition, the user can push specific keys or select the control assembly of specific menu item in Activating Phone when checking received common message, so that with this message encryption and store the encrypting messages memory module into.Wherein the mobile messaging of Jia Miing comprises note SMS, multimedia message MMS or Email EMAIL.
Referring to Fig. 3, introduce the concrete operations step of the inventive method:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
Fig. 4 has described the key agreement flow process-step (1) of communicating pair: before coded communication, user A and user B need consult a common key, are responsible for realization by this step, and its concrete operations content is:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
Fig. 5 has described the operating process-step (2) of mobile message transmit leg, and its concrete operations content is:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
Fig. 6 has described operating process-step (3) of mobile message recipient, and its concrete operations content is:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
Referring to Fig. 7, the present invention is again the control device that a kind of message that mobile phone is transmitted is carried out End to End Encryption, this device is set up one and carries out mutual control assembly with the message sending/receiving module in cell phone control circuit, this control assembly comprises following software module: the encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module respectively, encrypting messages memory module and key management module, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively; When the user pushes specific keys or selects specific menu item, this encryption and decryption module can be forwarded to this encryption and decryption module via the message sending/receiving module with the common message of just checking and carry out encryption on display screen, so that this message stores is arrived the encrypting messages memory module.The interface presents module, and as the interface of this control assembly and user interactions, the connection mobile phone display screen presents module for the user by this interface message is comprised editor, various interactive operations such as sends, checks.The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent.Key management module is used to manage and store the key that both sides consult, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing.Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.

Claims (10)

1, a kind of message that mobile phone is transmitted is carried out the method for End to End Encryption, it is characterized in that: before communication, two cellphone subscribers use Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient.
2, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: the Diffie-Hellman of described mutual negotiation, calculating is the Diffie-Hellman Diffie-Hellman.
3, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: the described mobile messaging of encrypting comprises note SMS, multimedia message MMS or Email EMAIL.
4, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: described method comprises following operating procedure:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
5, carry out the method for End to End Encryption according to claim 1 or the 4 described message that mobile phone is transmitted, it is characterized in that: described method also comprises following operating procedure:
(4) user is when checking received common message, can push specific keys or select the control assembly of specific menu item in Activating Phone, so that with this message encryption and store the encrypting messages memory module into.
6, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (1) further comprises following content of operation:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
7, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (2) further comprises following content of operation:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains shared key to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
8, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (3) further comprises following content of operation:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
9, a kind of message that mobile phone is transmitted is carried out the control device of End to End Encryption, it is characterized in that: this device is set up one and carries out mutual control assembly with the message sending/receiving module that this control assembly comprises following software module in cell phone control circuit:
The encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module, encrypting messages memory module and key management module respectively, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively;
The interface presents module, as the interface of this control assembly and user interactions, connects mobile phone display screen, presents the various interactive operations that module comprises editor, sends, checks message for the user by this interface;
The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent;
Key management module is used to manage and store the key that both sides have consulted, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing;
Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.
10, the message that mobile phone is transmitted according to claim 9 is carried out the control device of End to End Encryption, it is characterized in that: this device can use different program languages to develop development, both can be embedded in the mobile phone of new production, and also can make dedicated software modules and increase and fit in the existing mobile phone.
CN 200710099892 2007-05-31 2007-05-31 End-to-end encryption method and control device for the mobile phone SMS Pending CN101056176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200710099892 CN101056176A (en) 2007-05-31 2007-05-31 End-to-end encryption method and control device for the mobile phone SMS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200710099892 CN101056176A (en) 2007-05-31 2007-05-31 End-to-end encryption method and control device for the mobile phone SMS

Publications (1)

Publication Number Publication Date
CN101056176A true CN101056176A (en) 2007-10-17

Family

ID=38795804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200710099892 Pending CN101056176A (en) 2007-05-31 2007-05-31 End-to-end encryption method and control device for the mobile phone SMS

Country Status (1)

Country Link
CN (1) CN101056176A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521580A (en) * 2009-03-25 2009-09-02 刘建 Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
CN101931949A (en) * 2010-08-11 2010-12-29 中兴通讯股份有限公司 Method and system for switching clear text communication and cipher text communication between mobile terminals
WO2011079717A1 (en) * 2009-12-28 2011-07-07 华为技术有限公司 Message transmitting method, equipment and system
WO2012071846A1 (en) * 2010-12-01 2012-06-07 中兴通讯股份有限公司 Method and system for encrypting short message
CN103178964A (en) * 2013-03-05 2013-06-26 中国地质大学(武汉) QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication
CN103684783A (en) * 2013-12-06 2014-03-26 青岛海信电子设备股份有限公司 Communication encryption method based on communication network
CN104144412A (en) * 2013-05-09 2014-11-12 腾讯科技(北京)有限公司 Information manager and information management method
CN105847002A (en) * 2016-06-06 2016-08-10 北京京东尚科信息技术有限公司 Method for sharing key in multi-party communication
CN106161376A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 The machinery of consultation of a kind of end-to-end encrypted communication and device
CN106535144A (en) * 2016-10-27 2017-03-22 珠海格力电器股份有限公司 Method and terminal for sending encrypted short message
CN108040269A (en) * 2017-12-18 2018-05-15 西安邮电大学 A kind of method and system of video monitoring system key agreement, computer
US11528601B1 (en) * 2021-06-09 2022-12-13 T-Mobile Usa, Inc. Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521580A (en) * 2009-03-25 2009-09-02 刘建 Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system
CN101521580B (en) * 2009-03-25 2014-12-10 中兴通讯股份有限公司 Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
WO2011079717A1 (en) * 2009-12-28 2011-07-07 华为技术有限公司 Message transmitting method, equipment and system
CN101931949B (en) * 2010-08-11 2014-11-05 中兴通讯股份有限公司 Method and system for switching clear text communication and cipher text communication between mobile terminals
CN101931949A (en) * 2010-08-11 2010-12-29 中兴通讯股份有限公司 Method and system for switching clear text communication and cipher text communication between mobile terminals
WO2012019443A1 (en) * 2010-08-11 2012-02-16 中兴通讯股份有限公司 Method and system for mobile terminals handing over between clear session and encrypted session communications
US8804961B2 (en) 2010-08-11 2014-08-12 Zte Corporation Method and system for mobile terminals handing over between clear session and encrypted session communications
WO2012071846A1 (en) * 2010-12-01 2012-06-07 中兴通讯股份有限公司 Method and system for encrypting short message
CN103178964A (en) * 2013-03-05 2013-06-26 中国地质大学(武汉) QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication
CN104144412B (en) * 2013-05-09 2018-05-11 腾讯科技(北京)有限公司 Information manager and approaches to IM
WO2014180214A1 (en) * 2013-05-09 2014-11-13 Tencent Technology (Shenzhen) Company Limited Information management device and method
CN104144412A (en) * 2013-05-09 2014-11-12 腾讯科技(北京)有限公司 Information manager and information management method
CN103684783A (en) * 2013-12-06 2014-03-26 青岛海信电子设备股份有限公司 Communication encryption method based on communication network
CN106161376B (en) * 2015-04-13 2020-01-14 中国移动通信集团公司 End-to-end encrypted communication negotiation method and device
CN106161376A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 The machinery of consultation of a kind of end-to-end encrypted communication and device
CN105847002B (en) * 2016-06-06 2019-02-12 北京京东尚科信息技术有限公司 The method of shared key in multi-party communication
CN105847002A (en) * 2016-06-06 2016-08-10 北京京东尚科信息技术有限公司 Method for sharing key in multi-party communication
CN106535144A (en) * 2016-10-27 2017-03-22 珠海格力电器股份有限公司 Method and terminal for sending encrypted short message
CN108040269A (en) * 2017-12-18 2018-05-15 西安邮电大学 A kind of method and system of video monitoring system key agreement, computer
US11528601B1 (en) * 2021-06-09 2022-12-13 T-Mobile Usa, Inc. Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
US20220400376A1 (en) * 2021-06-09 2022-12-15 T-Mobile Usa, Inc. Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
US11706615B2 (en) 2021-06-09 2023-07-18 T-Mobile Usa, Inc. Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption
US12015912B2 (en) 2021-06-09 2024-06-18 T-Mobile Usa, Inc. Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption

Similar Documents

Publication Publication Date Title
CN101056176A (en) End-to-end encryption method and control device for the mobile phone SMS
CN101340443B (en) Session key negotiating method, system and server in communication network
CN102571702B (en) Key generation method, system and equipment in Internet of things
CN1126345C (en) Secure session set up based on wireless application protocol
CN1249586A (en) Method and device for establishing safety connection on single data channel
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN102857479B (en) The encryption method of network communication and system
CN1234662A (en) Enciphered ignition treatment method and apparatus thereof
CN102740239B (en) The method and system of secure transmission of media information
TW201417546A (en) Instant messaging method and system
CN105610847B (en) A method of support more switching node electronic government documents safe transmissions to exchange
CN100350816C (en) Method for implementing wireless authentication and data safety transmission based on GSM network
CN101707767B (en) Data transmission method and devices
CN102185691A (en) Method for encrypting information of comprehensive service card based on digital home
CN105376261A (en) Encryption method and system for instant communication message
CN102857889A (en) Method and device for encrypting short messages
CN107666395A (en) One population file management method, user terminal, group chat system
CN103167494B (en) Method for sending information and system
CN102088352A (en) Data encryption transmission method and system for message-oriented middleware
CN102869009B (en) Communication encryption application process and communication system
CN102098307A (en) Password type instant message (IM) encryption method and system in self-service bank
CN114173328B (en) Key exchange method and device and electronic equipment
CN103973543A (en) Method and device for instant messaging
CN104618397A (en) Encryption method and system for instant messaging software
CN1688171A (en) Apparatus and method for implementing data safety transmission of mobile communication apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20071017