CN101056176A - End-to-end encryption method and control device for the mobile phone SMS - Google Patents
End-to-end encryption method and control device for the mobile phone SMS Download PDFInfo
- Publication number
- CN101056176A CN101056176A CN 200710099892 CN200710099892A CN101056176A CN 101056176 A CN101056176 A CN 101056176A CN 200710099892 CN200710099892 CN 200710099892 CN 200710099892 A CN200710099892 A CN 200710099892A CN 101056176 A CN101056176 A CN 101056176A
- Authority
- CN
- China
- Prior art keywords
- message
- key
- module
- diffie
- hellman
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
A method for the end-end encryption of message sent by mobile, before communication, two mobile users may mutually negotiate through the Diffie-Hellman key switching algorithm and calculate respectively to establish a shared key for both parties; then after encrypted the mobile message with the shared key, sent to the other party; after another user received this encrypted message, decrypts the encrypted message with the shared key, presents the original information to the receiver. The control device for the invention is a control component equipped in the mobile for mutual communicating with the message transmitting and receiving module, consists of decryption module, interface presenting module, encryption message storage module, key management module and key negotiation module. The invention method is easier to realize, high feasibility, the structure of control device is simple, the operating of user is almost identical with the receiving and transmitting of ordinary mobile messages, but the method has higher safety, meets with the high safety demand for mobile messages.
Description
Technical field
The present invention relates to a kind of new technology of mobile communication, exactly, relate to method and control device that a kind of message that mobile phone is transmitted is carried out End to End Encryption, belong to the technical field of mobile communication and information security.
Background technology
Cipher key change is the process that communicating pair is set up session key.Diffie and Hellman have invented a kind of Diffie-Hellman that is used for cipher key delivery and distribution, this algorithm can not be directly used in to be encrypted or deciphering, but be used as Internet Key Exchange by many commercial products, purpose is to make two users can exchange a privacy key safely on the normal transmission circuit, adds, separates dense processing for use in later communication message.
The theoretical foundation of Diffie-Hellman Diffie-Hellman is to calculate very difficulty of discrete logarithm.Below this Diffie-Hellman Diffie-Hellman is briefly introduced:
1, two disclosed parameters of the overall situation are arranged: a prime number q and an integer a, a are the primitive roots of q.
2, suppose that two user A and B wish to exchange a key, user A selects the random number Xa as a private cipher key<q, and calculates public-key cryptography Ya=a
XaMod q.A maintains secrecy the numerical value of private cipher key Xa and deposits, and another public-key cryptography Ya can openly be obtained by B.Similarly, user B also selects a random number Xb as private cipher key<q, and calculates public-key cryptography Yb=a
XbMod q.B also maintains secrecy the numerical value of private cipher key Xb and deposits, and the key Yb that exposes can openly be obtained by A.
3, the account form of the shared key of user A generation is K=(Yb)
XaMod q.Equally, the calculating of the shared key of user B generation is K=(Ya)
XbMod q.These two are calculated the identical result of generation:
K=(Yb)
XaMod q=(a
XbMod q)
XaMod q=(a
Xb)
XaMod q (obtaining)=a according to the modulo operation rule
XbXaMod q=(a
Xa)
XbMod q=(a
XaMod q)
XbMod q=(Ya)
XbMod q, therefore being equivalent to both sides has exchanged an identical secret key K.
4, because two users' private cipher key Xa and Xb maintain secrecy, the utilizable parameter of any one adverse party has only q, a, Ya and Yb.Thereby adverse party is forced to calculate discrete logarithm and is determined key.For example, obtain the privacy key of user B, adverse party must be calculated Xb=inda earlier, q (Yb), and then the same quadrat method of using user B to be adopted is calculated its secret key K.
Referring to Fig. 1, introduce a simple communication agreement of utilizing the Diffie-Hellman Diffie-Hellman.Suppose that user A wishes that setting up one with user B is connected, and with the message of shared secret key encryption transmission on this connects.User A produces a disposable private cipher key Xa (Xa<q), calculate public-key cryptography Ya again and send it to user B.User B produces a private cipher key Xb (Xb<q), calculate public-key cryptography Yb again and it is sent to user A in response.User A and B just can calculate the shared key K between them then.Here need to prove: open numerical value q and a both sides need to know in advance.Another kind method is to be selected the value of q and a by user A, and these numerical value are included in first message, and Ya sends to user B together in company with its public-key cryptography.
The fail safe of Diffie-Hellman Diffie-Hellman is according to being based on such fact: though the index that to calculate with a prime number be mould is relatively easy, it but is very difficult calculating discrete logarithm on finite field.For big prime number, calculating discrete logarithm almost is impossible (referring to shown in Figure 2),
Two features of Diffie-Hellman Diffie-Hellman are attractive especially: 1, only just generate key when needs, reduced key stored a very long time and the chance that causes it to be attacked.2, except that the agreement to global parameter, cipher key change does not need the foundation structure of existence in advance; It is very convenient to use.Therefore, this Diffie-Hellman has obtained application in many occasions.
Now, the use of mobile messagings such as note and multimedia message is more and more universal, and nearly all mobile phone can both be supported the transmitting-receiving of mobile messaging.Because the convenience and the universality of mobile messaging, in daily work, life, people may send some sensitive informations by mobile messaging, for example identification card number, account No., withdraw the money and/or trading password, stock or fund card number or the like.Yet the transmission of these message at present all is expressly to send, and does not have security guarantee.These responsive privacies, Financial Information are in case learned that by unique lawless people user's interests will be inflicted heavy losses on or damage.Therefore, how to utilize the modern communication technology to come to provide reliable guidance, just become the urgent task that those skilled in the art are duty-bound for the safety transmission of mobile messaging.
Summary of the invention
In view of this, the purpose of this invention is to provide a kind of message that mobile phone is transmitted and carry out the method and the control device of End to End Encryption, the implementation procedure of this method is simple, convenient, feasible, the common mobile messaging of user's use operation and transmitting-receiving does not almost have difference, but safe, can satisfy people's security requirement to mobile messaging.Control device of the present invention is simple in structure, realization is easy, only needs to set up a dedicated software modules in existing mobile phone and gets final product, and helps applying.
In order to achieve the above object, the invention provides a kind of message that mobile phone is transmitted and carry out the method for End to End Encryption, it is characterized in that: before communication, two cellphone subscribers use Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient.
The Diffie-Hellman of described mutual negotiation, calculating is the Diffie-Hellman Diffie-Hellman.
The described mobile messaging of encrypting comprises note SMS, multimedia message MMS or Email EMAIL.
Described method comprises following operating procedure:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
Described method also comprises following operating procedure:
(4) user is when checking received common message, can push specific keys or select the control assembly of specific menu item in Activating Phone, so that with this message encryption and store the encrypting messages memory module into.
Described step (1) further comprises following content of operation:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
Described step (2) further comprises following content of operation:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains shared key to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
Described step (3) further comprises following content of operation:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
In order to achieve the above object, the present invention also provides a kind of message that mobile phone is transmitted to carry out the control device of End to End Encryption, it is characterized in that: this device is set up one and carries out mutual control assembly with the message sending/receiving module that this control assembly comprises following software module in cell phone control circuit:
The encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module, encrypting messages memory module and key management module respectively, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively;
The interface presents module, as the interface of this control assembly and user interactions, connects mobile phone display screen, presents the various interactive operations that module comprises editor, sends, checks message for the user by this interface;
The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent;
Key management module is used to manage and store the key that both sides consult, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing;
Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.
This device can use different program languages to develop development, both can be embedded in the new cell-phone of new production, also can make dedicated software modules and increase and fit in the existing mobile phone.
The present invention is a kind of Diffie-Hellman of utilization Diffie-Hellman, carries out key agreement by sending message between two mobile phones of transmitting-receiving, utilizes the shared secret key encryption message that consults then, to realize that the safety of message sends and receives between the mobile phone.
Advantage of the present invention and effect: use by universally recognized Diffie-Hellman Diffie-Hellman in the industry and carry out the exchange and the negotiation of public-key cryptography, its process safety, reliable, even malice third party listens to negotiation message, also can't crack out the shared key that communicating pair uses.Moreover this key agreement operation is extremely simple, and cost is cheap; Only need communicating pair to send 1 negotiation message separately, just can consult what a common each other communication key safely.Therefore, concerning the user, very simple, easily, the practicality of the inventive method, processes such as the transmission of encrypting messages and reception are all in full accord with the information receiving and transmitting function of existing mobile phone, learning cost that need not be extra.The user does not almost have difference to use experience of the present invention and transmission, reception normal short message, and these characteristics all help applying of this method.
In addition, the inventive method can be used various program language (for example JAVA, C
++Deng) develop development.This software both can be the application program that mobile terminal operating system is embedded, need not install again, also can be the application program that the needs developed on mobile phone operating system are installed on portable terminal specially.
Description of drawings
Fig. 1 is the diagram introduction of the operating process of Diffie-Hellman Diffie-Hellman.
Fig. 2 is the diagram introduction of the security performance of Diffie-Hellman Diffie-Hellman.
Fig. 3 is the present invention carries out End to End Encryption to the message of mobile phone transmission a method operating procedure flow chart.
Fig. 4 is the key agreement flow chart of the step (1) among Fig. 3.
Fig. 5 is the message encryption transmission flow figure of the step (2) among Fig. 3.
Fig. 6 is that the decrypt messages of the step (3) among Fig. 3 presents flow chart.
Fig. 7 is that the control device structure that the present invention carries out End to End Encryption to the message of mobile phone transmission is formed schematic diagram.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
The present invention is the method that a kind of message that mobile phone is transmitted is carried out End to End Encryption, and it is before communication, and two cellphone subscribers use the Diffie-Hellman Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient; So just can on unsafe radio communication channel, realize coded communication end to end.In addition, the user can push specific keys or select the control assembly of specific menu item in Activating Phone when checking received common message, so that with this message encryption and store the encrypting messages memory module into.Wherein the mobile messaging of Jia Miing comprises note SMS, multimedia message MMS or Email EMAIL.
Referring to Fig. 3, introduce the concrete operations step of the inventive method:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
Fig. 4 has described the key agreement flow process-step (1) of communicating pair: before coded communication, user A and user B need consult a common key, are responsible for realization by this step, and its concrete operations content is:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
Fig. 5 has described the operating process-step (2) of mobile message transmit leg, and its concrete operations content is:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
Fig. 6 has described operating process-step (3) of mobile message recipient, and its concrete operations content is:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
Referring to Fig. 7, the present invention is again the control device that a kind of message that mobile phone is transmitted is carried out End to End Encryption, this device is set up one and carries out mutual control assembly with the message sending/receiving module in cell phone control circuit, this control assembly comprises following software module: the encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module respectively, encrypting messages memory module and key management module, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively; When the user pushes specific keys or selects specific menu item, this encryption and decryption module can be forwarded to this encryption and decryption module via the message sending/receiving module with the common message of just checking and carry out encryption on display screen, so that this message stores is arrived the encrypting messages memory module.The interface presents module, and as the interface of this control assembly and user interactions, the connection mobile phone display screen presents module for the user by this interface message is comprised editor, various interactive operations such as sends, checks.The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent.Key management module is used to manage and store the key that both sides consult, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing.Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.
Claims (10)
1, a kind of message that mobile phone is transmitted is carried out the method for End to End Encryption, it is characterized in that: before communication, two cellphone subscribers use Diffie-Hellman to consult mutually, calculate respectively earlier, set up a cipher key shared by both parties; After adopting this shared key that consults that mobile messaging is encrypted again, send to the other side; After another user receives this encrypting messages, after according to described shared key this encrypting messages being decrypted, raw information is presented to the recipient.
2, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: the Diffie-Hellman of described mutual negotiation, calculating is the Diffie-Hellman Diffie-Hellman.
3, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: the described mobile messaging of encrypting comprises note SMS, multimedia message MMS or Email EMAIL.
4, the message that mobile phone is transmitted according to claim 1 is carried out the method for End to End Encryption, and it is characterized in that: described method comprises following operating procedure:
(1) two cellphone subscriber sends a piece of news to the other side respectively, is used to consult and calculate both sides' shared key, handles so that mobile messaging is carried out encryption and decryption;
(2) the transmit leg user sends to the other side after adopting this shared key that mobile messaging is encrypted;
(3) recipient user is decrypted the encrypting messages that receives with this shared key, knows origination message.
5, carry out the method for End to End Encryption according to claim 1 or the 4 described message that mobile phone is transmitted, it is characterized in that: described method also comprises following operating procedure:
(4) user is when checking received common message, can push specific keys or select the control assembly of specific menu item in Activating Phone, so that with this message encryption and store the encrypting messages memory module into.
6, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (1) further comprises following content of operation:
(11) the transmit leg negotiation message that will be used for interchange key sends to communication counterpart, and this message comprises the public-key cryptography Ya that transmit leg uses in the Diffie-Hellman Diffie-Hellman;
(12) after the recipient received key negotiation request, loopback key agreement response message, this message comprised the public-key cryptography Yb that the recipient uses in the Diffie-Hellman Diffie-Hellman;
(13) the other side's public-key cryptography Yb and the Ya in the communicating pair basis negotiation message that receives, and separately private cipher key Xa and Xb calculate shared key K respectively separately according to the Diffie-Hellman Diffie-Hellman again.
7, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (2) further comprises following content of operation:
(21) after the user had write message, input recipient's phone number and request sent;
(22) check and whether store and the corresponding shared key of this recipient's phone number that if do not have, then order is carried out subsequent operation; Otherwise, redirect execution in step (24);
(23) key agreement of execution in step (1) operation, and wait obtains shared key to sharing the key agreement success;
(24) use the shared key that consults that message is carried out encryption;
(25) send encrypting messages to the recipient.
8, the message that mobile phone is transmitted according to claim 4 is carried out the method for End to End Encryption, and it is characterized in that: described step (3) further comprises following content of operation:
(31) user receives new encrypting messages;
(32) use the shared key that consulted originally that this message is decrypted processing;
(33) will decipher good message and present to the user.
9, a kind of message that mobile phone is transmitted is carried out the control device of End to End Encryption, it is characterized in that: this device is set up one and carries out mutual control assembly with the message sending/receiving module that this control assembly comprises following software module in cell phone control circuit:
The encryption and decryption module, core as this control assembly, interface in connection message sending/receiving module and these parts presents module, encrypting messages memory module and key management module respectively, and adopt the cryptographic algorithm of setting, carry out encryption and decryption to sent message and the cipher-text message that receives respectively;
The interface presents module, as the interface of this control assembly and user interactions, connects mobile phone display screen, presents the various interactive operations that module comprises editor, sends, checks message for the user by this interface;
The encrypting messages memory module, the mobile messaging after being used to store all and encrypting comprises: the message that receives, transmitted message and message to be sent;
Key management module is used to manage and store the key that both sides have consulted, and connects key negotiation module, both cooperations finish jointly select suitable key to mobile messaging encrypt, decryption processing;
Key negotiation module, the connection message sending/receiving module is used for consulting interchange key according to the key agreement flow process for the mobile communication both sides.
10, the message that mobile phone is transmitted according to claim 9 is carried out the control device of End to End Encryption, it is characterized in that: this device can use different program languages to develop development, both can be embedded in the mobile phone of new production, and also can make dedicated software modules and increase and fit in the existing mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710099892 CN101056176A (en) | 2007-05-31 | 2007-05-31 | End-to-end encryption method and control device for the mobile phone SMS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710099892 CN101056176A (en) | 2007-05-31 | 2007-05-31 | End-to-end encryption method and control device for the mobile phone SMS |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101056176A true CN101056176A (en) | 2007-10-17 |
Family
ID=38795804
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710099892 Pending CN101056176A (en) | 2007-05-31 | 2007-05-31 | End-to-end encryption method and control device for the mobile phone SMS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101056176A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521580A (en) * | 2009-03-25 | 2009-09-02 | 刘建 | Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system |
CN101795315A (en) * | 2009-12-25 | 2010-08-04 | 深圳市杰普林数码科技有限公司 | System and method for encrypting short messages by using mobile phone terminal |
CN101931949A (en) * | 2010-08-11 | 2010-12-29 | 中兴通讯股份有限公司 | Method and system for switching clear text communication and cipher text communication between mobile terminals |
WO2011079717A1 (en) * | 2009-12-28 | 2011-07-07 | 华为技术有限公司 | Message transmitting method, equipment and system |
WO2012071846A1 (en) * | 2010-12-01 | 2012-06-07 | 中兴通讯股份有限公司 | Method and system for encrypting short message |
CN103178964A (en) * | 2013-03-05 | 2013-06-26 | 中国地质大学(武汉) | QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
CN104144412A (en) * | 2013-05-09 | 2014-11-12 | 腾讯科技(北京)有限公司 | Information manager and information management method |
CN105847002A (en) * | 2016-06-06 | 2016-08-10 | 北京京东尚科信息技术有限公司 | Method for sharing key in multi-party communication |
CN106161376A (en) * | 2015-04-13 | 2016-11-23 | 中国移动通信集团公司 | The machinery of consultation of a kind of end-to-end encrypted communication and device |
CN106535144A (en) * | 2016-10-27 | 2017-03-22 | 珠海格力电器股份有限公司 | Method and terminal for sending encrypted short message |
CN108040269A (en) * | 2017-12-18 | 2018-05-15 | 西安邮电大学 | A kind of method and system of video monitoring system key agreement, computer |
US11528601B1 (en) * | 2021-06-09 | 2022-12-13 | T-Mobile Usa, Inc. | Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption |
-
2007
- 2007-05-31 CN CN 200710099892 patent/CN101056176A/en active Pending
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101521580A (en) * | 2009-03-25 | 2009-09-02 | 刘建 | Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system |
CN101521580B (en) * | 2009-03-25 | 2014-12-10 | 中兴通讯股份有限公司 | Wireless LAN authentication and privacy infrastructure unicast key negotiation method and system |
CN101795315A (en) * | 2009-12-25 | 2010-08-04 | 深圳市杰普林数码科技有限公司 | System and method for encrypting short messages by using mobile phone terminal |
WO2011079717A1 (en) * | 2009-12-28 | 2011-07-07 | 华为技术有限公司 | Message transmitting method, equipment and system |
CN101931949B (en) * | 2010-08-11 | 2014-11-05 | 中兴通讯股份有限公司 | Method and system for switching clear text communication and cipher text communication between mobile terminals |
CN101931949A (en) * | 2010-08-11 | 2010-12-29 | 中兴通讯股份有限公司 | Method and system for switching clear text communication and cipher text communication between mobile terminals |
WO2012019443A1 (en) * | 2010-08-11 | 2012-02-16 | 中兴通讯股份有限公司 | Method and system for mobile terminals handing over between clear session and encrypted session communications |
US8804961B2 (en) | 2010-08-11 | 2014-08-12 | Zte Corporation | Method and system for mobile terminals handing over between clear session and encrypted session communications |
WO2012071846A1 (en) * | 2010-12-01 | 2012-06-07 | 中兴通讯股份有限公司 | Method and system for encrypting short message |
CN103178964A (en) * | 2013-03-05 | 2013-06-26 | 中国地质大学(武汉) | QR-code-based (quick response code-based) key exchange method for intelligent terminal authentication |
CN104144412B (en) * | 2013-05-09 | 2018-05-11 | 腾讯科技(北京)有限公司 | Information manager and approaches to IM |
WO2014180214A1 (en) * | 2013-05-09 | 2014-11-13 | Tencent Technology (Shenzhen) Company Limited | Information management device and method |
CN104144412A (en) * | 2013-05-09 | 2014-11-12 | 腾讯科技(北京)有限公司 | Information manager and information management method |
CN103684783A (en) * | 2013-12-06 | 2014-03-26 | 青岛海信电子设备股份有限公司 | Communication encryption method based on communication network |
CN106161376B (en) * | 2015-04-13 | 2020-01-14 | 中国移动通信集团公司 | End-to-end encrypted communication negotiation method and device |
CN106161376A (en) * | 2015-04-13 | 2016-11-23 | 中国移动通信集团公司 | The machinery of consultation of a kind of end-to-end encrypted communication and device |
CN105847002B (en) * | 2016-06-06 | 2019-02-12 | 北京京东尚科信息技术有限公司 | The method of shared key in multi-party communication |
CN105847002A (en) * | 2016-06-06 | 2016-08-10 | 北京京东尚科信息技术有限公司 | Method for sharing key in multi-party communication |
CN106535144A (en) * | 2016-10-27 | 2017-03-22 | 珠海格力电器股份有限公司 | Method and terminal for sending encrypted short message |
CN108040269A (en) * | 2017-12-18 | 2018-05-15 | 西安邮电大学 | A kind of method and system of video monitoring system key agreement, computer |
US11528601B1 (en) * | 2021-06-09 | 2022-12-13 | T-Mobile Usa, Inc. | Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption |
US20220400376A1 (en) * | 2021-06-09 | 2022-12-15 | T-Mobile Usa, Inc. | Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption |
US11706615B2 (en) | 2021-06-09 | 2023-07-18 | T-Mobile Usa, Inc. | Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption |
US12015912B2 (en) | 2021-06-09 | 2024-06-18 | T-Mobile Usa, Inc. | Determining and ameliorating wireless telecommunication network functionalities that are impaired when using end-to-end encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101056176A (en) | End-to-end encryption method and control device for the mobile phone SMS | |
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
CN102571702B (en) | Key generation method, system and equipment in Internet of things | |
CN1126345C (en) | Secure session set up based on wireless application protocol | |
CN1249586A (en) | Method and device for establishing safety connection on single data channel | |
CN103338437B (en) | The encryption method of a kind of mobile instant message and system | |
CN102857479B (en) | The encryption method of network communication and system | |
CN1234662A (en) | Enciphered ignition treatment method and apparatus thereof | |
CN102740239B (en) | The method and system of secure transmission of media information | |
TW201417546A (en) | Instant messaging method and system | |
CN105610847B (en) | A method of support more switching node electronic government documents safe transmissions to exchange | |
CN100350816C (en) | Method for implementing wireless authentication and data safety transmission based on GSM network | |
CN101707767B (en) | Data transmission method and devices | |
CN102185691A (en) | Method for encrypting information of comprehensive service card based on digital home | |
CN105376261A (en) | Encryption method and system for instant communication message | |
CN102857889A (en) | Method and device for encrypting short messages | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN103167494B (en) | Method for sending information and system | |
CN102088352A (en) | Data encryption transmission method and system for message-oriented middleware | |
CN102869009B (en) | Communication encryption application process and communication system | |
CN102098307A (en) | Password type instant message (IM) encryption method and system in self-service bank | |
CN114173328B (en) | Key exchange method and device and electronic equipment | |
CN103973543A (en) | Method and device for instant messaging | |
CN104618397A (en) | Encryption method and system for instant messaging software | |
CN1688171A (en) | Apparatus and method for implementing data safety transmission of mobile communication apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20071017 |