CN101765066A - Secret information transmission method based on multimedia message on intelligent mobile communication terminal - Google Patents

Secret information transmission method based on multimedia message on intelligent mobile communication terminal Download PDF

Info

Publication number
CN101765066A
CN101765066A CN200810220244A CN200810220244A CN101765066A CN 101765066 A CN101765066 A CN 101765066A CN 200810220244 A CN200810220244 A CN 200810220244A CN 200810220244 A CN200810220244 A CN 200810220244A CN 101765066 A CN101765066 A CN 101765066A
Authority
CN
China
Prior art keywords
secret information
key
multimedia message
secret
session key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810220244A
Other languages
Chinese (zh)
Inventor
陆哲明
刘继新
陆震扬
陈冰冰
季统凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Computing Technology of CAS
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CN200810220244A priority Critical patent/CN101765066A/en
Publication of CN101765066A publication Critical patent/CN101765066A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of communications, in particular to a secret information transmission method based on a multimedia message on an intelligent mobile communication terminal. In the method, after secret information is encrypted by a secret information encrypting module, and a secret information embedding module uses an information hiding algorithm to embed the encrypted secret information into a medium of a multimedia message file; the secret information is sent to a receiver together with the multimedia message file; after being received by the receiver, the secret information is decrypted by a secret information decrypting module, and then, a secret information extracting module extracts the secret information from the medium of the multimedia message file. The method adopts the multimedia message as a carrier, realizes the safe transmission of the secret information, effectively solves the safety problems of multimedia message and short message service, and can be widely applied to the multimedia message and short message service.

Description

On the intelligent mobile communication terminal based on the secret information transmission method of multimedia message
Technical field
The present invention relates to the communications field, refer in particular on a kind of intelligent mobile terminal secret information transmission method based on multimedia message.
Background technology
In recent years, along with the fast development of mobile communication technology, the mobile network was also more and more abundanter to the business that user terminal provides; And the number of users of mobile communication fast development and perfect basic network thereof, for the development of mobile communication value-added service provides advantage.In many value-added services, short message (SMS) service because of it is cheap, easy to use, the information transmission accurately and timely, storage transmits advantage such as offline communications and enjoys the user to welcome.Short Message Service has been grown into the important revenue source of telecom operators, in the short message service fast development; Because there are some limitation in existing short message, as transmitting text message, can't finish high-quality bell sound, wallpaper and animation and download, can't transmit high-quality picture and sound etc.; Multimedia Message service (hereinafter to be referred as " MMS ") is just arisen at the historic moment.Based on the good market of present Short Message Service, present domestic mobile operator is very good to these two new messenger service, and plan is greatly developed.But the MMS of present stage service only provides the service of multimedia information content, and does not consider the safety problem in the transmission of messages; For example want to send the information (as Bank Account Number or password, information such as the password of business documentation) of one section secret between the user, cause certain loss thereby then be easy to be intercepted and captured to the user by the third party listener-in.
Summary of the invention
The technical problem that the present invention solves is to provide a kind of secret information transmission method based on intelligent mobile communication terminal can effectively solve the information security issue of MMS service; Its fail safe is good, cost is lower, easy realization, has higher utility.
The technical scheme that the present invention solves the problems of the technologies described above is: after secret information is encrypted via the secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded in the medium of multimedia message files by the secret information merge module; Send to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by the secret information extraction module via the secret information deciphering module.
Transmission course mainly comprises authentication, key generation and exchange, secret information transmission several sections; A side who promptly sends multimedia message is behind input right user name and password; Can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence; Transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and sending it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering.
Described key produces and exchange is that Sender imports or selection secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key Dialog
Secret information transmission concrete steps are as follows:
Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;
Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Ene, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;
Step 3, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;
Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;
Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
The present invention utilizes the powerful disposal ability and the abundant software and hardware support of intelligent mobile communication terminal, is carrier with the media file in the multimedia message, is aided with enciphering and deciphering algorithm and Information hiding algorithm, just can solve the safety problem in multimedia message and the Short Message Service.
Description of drawings
The present invention is further described below in conjunction with accompanying drawing:
Fig. 1 is a functional block diagram of the present invention;
Fig. 2 is the block diagram of system of the present invention;
Fig. 3 is software workflow figure of the present invention.
Embodiment
See shown in the accompanying drawing 1, the secret information transmission method based on multimedia message on the intelligent mobile terminal that the present invention proposes is a secret information (text, picture etc.) via after 1 encryption of secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded into multimedia message files by secret information merge module 2 (as image, audio frequency and voice or video) in the medium, and the distortion that guarantees the multimedia message files medium do not discovered, and sends to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by secret information extraction module 4 via secret information deciphering module 3.By making full use of the hardware environment of intelligent mobile communication terminal, be the secret transmissions that carrier is realized secret information with the multimedia message.Sender of secret information and secret information recipient hold the intelligent mobile communication terminal of same configuration, support the transmitting-receiving of MMS multimedia message, and native system all is installed.A side who promptly sends multimedia message is behind input right user name and password, can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence, transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and send it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering, has so just finished a secret information transmission.
For preventing the illegal use of unauthorized person to native system, this method has taked the method for asymmetric key algorithm commonly used in the actual engineering and symmetric key algorithm combination to realize the encryption and decryption and the communications of secret information.Concrete system forms as shown in Figure 2, is divided into two processes of key generation and exchange and secret information transmission.For convenience of description, the spy has stipulated following symbolic representation: Sender represents sender of secret information; Receiver represents the secret information recipient; Secret represents secret information; Key DialogThe expression session key; Secret EncSecret information after expression is encrypted; Key R_PublicThe PKI of expression Receiver; Enc and Dec represent the process of encryption and decryption respectively; Carrier represents the carrier file; Carrier EmbeddedExpression has embedded the carrier file of secret information.
Sender imports or selects secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key Dialog, so far, finished the generation and the exchange process of communication key; Afterwards, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded among carrier media file (as image, audio frequency and voice or the video) Carrier and obtains Carriere Mbedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver; Receiver uses the multimedia message analytical capabilities of intelligent mobile communication terminal that the multimedia message files medium of receiving are saved as independently file respectively in addition, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards.
As shown in Figure 3, be software workflow figure of the present invention; Its concrete course of work is described below:
Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;
Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;
Step 3, Sender uses secret information merge module 2 with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;
Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information that secret information extraction module 4 extracts in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;
Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
The development of digital technology make mobile communication terminal function from strength to strength, majority has functions such as phone, data processing and multimedia recreation, becomes intelligent mobile communication terminal; They generally have the powerful processor of processing capacity and (are generally by the DSP that finishes data processing and finish controlled function ARM and form, dominant frequency can reach 200~500MHz) and jumbo memory (built-in Flash and external storage card or even micro harddisk, capacity generally can reach 1~10GB), functions such as recording playback sound, the video recording of taking pictures, multimedia, radio digital communication can be easily finished, encryption and decryption and Information hiding algorithm that operational capability is had relatively high expectations can be finished.Because multimedia message information is that various media files (as audio frequency, voice, picture and video etc.) are combined by the SMIL descriptive language in editing process, the content of media file is not changed; Simultaneously media file that extracts at receiving terminal and transmitting terminal editor's media file are consistent.Therefore as long as multimedia message can be successfully received the media file that parses of also energy success, then can think the Information hiding algorithm, can in these media files, extract the secret information of embedding less than under fire.Generally speaking, utilize the powerful disposal ability and the abundant software and hardware support of intelligent mobile communication terminal, with the media file in the multimedia message is carrier, is aided with enciphering and deciphering algorithm and Information hiding algorithm, just can solve the safety problem in multimedia message and the Short Message Service.

Claims (6)

  1. On the intelligent mobile communication terminal based on the secret information transmission method of multimedia message, it is characterized in that: after secret information is encrypted via the secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded in the medium of multimedia message files by the secret information merge module; Send to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by the secret information extraction module via the secret information deciphering module.
  2. 2. based on the secret information transmission method of multimedia message, it is characterized in that on the intelligent mobile communication terminal according to claim 1: transmission course mainly comprises authentication, key generation and exchange, secret information transmission several sections; A side who promptly sends multimedia message is behind input right user name and password; Can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence; Transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and sending it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering.
  3. 3. on the intelligent mobile communication terminal according to claim 2 based on the secret information transmission method of multimedia message, it is characterized in that: described key produces and exchange is that Sender imports or selection secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key Dialog
  4. According on claim 2 or the 3 described intelligent mobile communication terminals based on the secret information transmission method of multimedia message, it is characterized in that: the transmission of described secret information is that Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded among carrier media file (as image, audio frequency and voice or the video) Carrier and obtains Carri Erembedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver; Receiver uses the multimedia message analytical capabilities of intelligent mobile communication terminal that the multimedia message files medium of receiving are saved as independently file respectively in addition, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards.
  5. According on claim 1, the 2 or 3 described intelligent mobile communication terminals based on the secret information transmission method of multimedia message, it is characterized in that: secret information transmission concrete steps are as follows:
    Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;
    Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;
    Step 3, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;
    Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;
    Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
  6. 6. based on the secret information transmission method of multimedia message, it is characterized in that on the intelligent mobile communication terminal according to claim 4: secret information transmission concrete steps are as follows:
    Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;
    Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_PublicSession key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;
    Step 3, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;
    Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;
    Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
CN200810220244A 2008-12-24 2008-12-24 Secret information transmission method based on multimedia message on intelligent mobile communication terminal Pending CN101765066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810220244A CN101765066A (en) 2008-12-24 2008-12-24 Secret information transmission method based on multimedia message on intelligent mobile communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810220244A CN101765066A (en) 2008-12-24 2008-12-24 Secret information transmission method based on multimedia message on intelligent mobile communication terminal

Publications (1)

Publication Number Publication Date
CN101765066A true CN101765066A (en) 2010-06-30

Family

ID=42496026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810220244A Pending CN101765066A (en) 2008-12-24 2008-12-24 Secret information transmission method based on multimedia message on intelligent mobile communication terminal

Country Status (1)

Country Link
CN (1) CN101765066A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103262117A (en) * 2010-12-20 2013-08-21 国际商业机器公司 Paired carrier and pivot steganographic objects for stateful data layering
CN103442156A (en) * 2013-08-20 2013-12-11 宁波大学 Image steganography and secret information extraction method based on intelligent mobile terminal
CN105657028A (en) * 2016-01-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 System virtualization technology implementation method and terminal
CN106301790A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Security information exchange method, mobile terminal
CN106454778A (en) * 2016-10-18 2017-02-22 惠州Tcl移动通信有限公司 Short message processing method, short message center and communication system
CN107040921A (en) * 2017-06-22 2017-08-11 东华大学 One kind is based on point-to-point SMS encryption system
CN108243095A (en) * 2016-12-27 2018-07-03 可可株式会社 For the instant message method of servicing and user terminal of classified information

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103262117A (en) * 2010-12-20 2013-08-21 国际商业机器公司 Paired carrier and pivot steganographic objects for stateful data layering
CN103442156A (en) * 2013-08-20 2013-12-11 宁波大学 Image steganography and secret information extraction method based on intelligent mobile terminal
CN105657028A (en) * 2016-01-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 System virtualization technology implementation method and terminal
CN106301790A (en) * 2016-08-18 2017-01-04 中国联合网络通信集团有限公司 Security information exchange method, mobile terminal
CN106454778A (en) * 2016-10-18 2017-02-22 惠州Tcl移动通信有限公司 Short message processing method, short message center and communication system
CN108243095A (en) * 2016-12-27 2018-07-03 可可株式会社 For the instant message method of servicing and user terminal of classified information
CN108243095B (en) * 2016-12-27 2022-01-25 可可株式会社 Instant message service method for secret message and user terminal
CN107040921A (en) * 2017-06-22 2017-08-11 东华大学 One kind is based on point-to-point SMS encryption system
CN107040921B (en) * 2017-06-22 2020-02-11 东华大学 Short message encryption system based on point-to-point

Similar Documents

Publication Publication Date Title
CN101203025B (en) Method for transmitting and receiving safe mobile message
CN101420303B (en) Communication method for audio data and apparatus thereof
CN100425084C (en) secure peer-to-peer messaging invitation architecture
CN102740239B (en) The method and system of secure transmission of media information
CN101765066A (en) Secret information transmission method based on multimedia message on intelligent mobile communication terminal
CN203279187U (en) Voice encryption bluetooth earphone with fingerprint identification function
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN101909290A (en) Method, system and mobile terminal for encrypting voice call
CN102916869A (en) Instant messaging method and system
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
US8693686B2 (en) Secure telephone devices, systems and methods
US20110135093A1 (en) Secure telephone devices, systems and methods
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN103096304A (en) Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal
CN111787495A (en) System and method for realizing RCS enhanced short message encryption
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN109951378B (en) File encryption transmission and sharing method in instant messaging
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN115348579A (en) Voice encryption method applied to wireless earphone and encryption type wireless earphone
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN100479568C (en) Implementation scheme for secrecy phone of the smart mobile terminal
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN108270917B (en) Encrypted smart phone
CN201623859U (en) System for encrypting short messages through mobile phone terminal
CN112054905B (en) Secure communication method and system of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20100630