CN101765066A - Secret information transmission method based on multimedia message on intelligent mobile communication terminal - Google Patents
Secret information transmission method based on multimedia message on intelligent mobile communication terminal Download PDFInfo
- Publication number
- CN101765066A CN101765066A CN200810220244A CN200810220244A CN101765066A CN 101765066 A CN101765066 A CN 101765066A CN 200810220244 A CN200810220244 A CN 200810220244A CN 200810220244 A CN200810220244 A CN 200810220244A CN 101765066 A CN101765066 A CN 101765066A
- Authority
- CN
- China
- Prior art keywords
- secret information
- key
- multimedia message
- secret
- session key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 41
- 238000010295 mobile communication Methods 0.000 title claims abstract description 35
- 238000000034 method Methods 0.000 title claims abstract description 24
- 239000000284 extract Substances 0.000 claims abstract description 15
- 238000004891 communication Methods 0.000 claims abstract description 13
- 238000000605 extraction Methods 0.000 claims description 12
- 230000008676 import Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the field of communications, in particular to a secret information transmission method based on a multimedia message on an intelligent mobile communication terminal. In the method, after secret information is encrypted by a secret information encrypting module, and a secret information embedding module uses an information hiding algorithm to embed the encrypted secret information into a medium of a multimedia message file; the secret information is sent to a receiver together with the multimedia message file; after being received by the receiver, the secret information is decrypted by a secret information decrypting module, and then, a secret information extracting module extracts the secret information from the medium of the multimedia message file. The method adopts the multimedia message as a carrier, realizes the safe transmission of the secret information, effectively solves the safety problems of multimedia message and short message service, and can be widely applied to the multimedia message and short message service.
Description
Technical field
The present invention relates to the communications field, refer in particular on a kind of intelligent mobile terminal secret information transmission method based on multimedia message.
Background technology
In recent years, along with the fast development of mobile communication technology, the mobile network was also more and more abundanter to the business that user terminal provides; And the number of users of mobile communication fast development and perfect basic network thereof, for the development of mobile communication value-added service provides advantage.In many value-added services, short message (SMS) service because of it is cheap, easy to use, the information transmission accurately and timely, storage transmits advantage such as offline communications and enjoys the user to welcome.Short Message Service has been grown into the important revenue source of telecom operators, in the short message service fast development; Because there are some limitation in existing short message, as transmitting text message, can't finish high-quality bell sound, wallpaper and animation and download, can't transmit high-quality picture and sound etc.; Multimedia Message service (hereinafter to be referred as " MMS ") is just arisen at the historic moment.Based on the good market of present Short Message Service, present domestic mobile operator is very good to these two new messenger service, and plan is greatly developed.But the MMS of present stage service only provides the service of multimedia information content, and does not consider the safety problem in the transmission of messages; For example want to send the information (as Bank Account Number or password, information such as the password of business documentation) of one section secret between the user, cause certain loss thereby then be easy to be intercepted and captured to the user by the third party listener-in.
Summary of the invention
The technical problem that the present invention solves is to provide a kind of secret information transmission method based on intelligent mobile communication terminal can effectively solve the information security issue of MMS service; Its fail safe is good, cost is lower, easy realization, has higher utility.
The technical scheme that the present invention solves the problems of the technologies described above is: after secret information is encrypted via the secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded in the medium of multimedia message files by the secret information merge module; Send to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by the secret information extraction module via the secret information deciphering module.
Transmission course mainly comprises authentication, key generation and exchange, secret information transmission several sections; A side who promptly sends multimedia message is behind input right user name and password; Can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence; Transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and sending it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering.
Described key produces and exchange is that Sender imports or selection secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously
Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm
Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver
R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI
Dialog, Key
R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key
Dialog, Key
R_Public), use the private key of oneself that it is deciphered Dec (Key
Dialog, Key
R_Public) obtain session key Key
Dialog
Secret information transmission concrete steps are as follows:
Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey
DialogDestroy, begin new secret information transmission course.
The present invention utilizes the powerful disposal ability and the abundant software and hardware support of intelligent mobile communication terminal, is carrier with the media file in the multimedia message, is aided with enciphering and deciphering algorithm and Information hiding algorithm, just can solve the safety problem in multimedia message and the Short Message Service.
Description of drawings
The present invention is further described below in conjunction with accompanying drawing:
Fig. 1 is a functional block diagram of the present invention;
Fig. 2 is the block diagram of system of the present invention;
Fig. 3 is software workflow figure of the present invention.
Embodiment
See shown in the accompanying drawing 1, the secret information transmission method based on multimedia message on the intelligent mobile terminal that the present invention proposes is a secret information (text, picture etc.) via after 1 encryption of secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded into multimedia message files by secret information merge module 2 (as image, audio frequency and voice or video) in the medium, and the distortion that guarantees the multimedia message files medium do not discovered, and sends to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by secret information extraction module 4 via secret information deciphering module 3.By making full use of the hardware environment of intelligent mobile communication terminal, be the secret transmissions that carrier is realized secret information with the multimedia message.Sender of secret information and secret information recipient hold the intelligent mobile communication terminal of same configuration, support the transmitting-receiving of MMS multimedia message, and native system all is installed.A side who promptly sends multimedia message is behind input right user name and password, can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence, transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and send it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering, has so just finished a secret information transmission.
For preventing the illegal use of unauthorized person to native system, this method has taked the method for asymmetric key algorithm commonly used in the actual engineering and symmetric key algorithm combination to realize the encryption and decryption and the communications of secret information.Concrete system forms as shown in Figure 2, is divided into two processes of key generation and exchange and secret information transmission.For convenience of description, the spy has stipulated following symbolic representation: Sender represents sender of secret information; Receiver represents the secret information recipient; Secret represents secret information; Key
DialogThe expression session key; Secret
EncSecret information after expression is encrypted; Key
R_PublicThe PKI of expression Receiver; Enc and Dec represent the process of encryption and decryption respectively; Carrier represents the carrier file; Carrier
EmbeddedExpression has embedded the carrier file of secret information.
Sender imports or selects secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously
Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm
Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver
R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI
Dialog, Key
R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key
Dialog, Key
R_Public), use the private key of oneself that it is deciphered Dec (Key
Dialog, Key
R_Public) obtain session key Key
Dialog, so far, finished the generation and the exchange process of communication key; Afterwards, Sender uses the secret information merge module with Secret
EncMode by Information hiding is embedded among carrier media file (as image, audio frequency and voice or the video) Carrier and obtains Carriere
Mbedded, again with this Carrier
EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver; Receiver uses the multimedia message analytical capabilities of intelligent mobile communication terminal that the multimedia message files medium of receiving are saved as independently file respectively in addition, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards.
As shown in Figure 3, be software workflow figure of the present invention; Its concrete course of work is described below:
Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey
DialogDestroy, begin new secret information transmission course.
The development of digital technology make mobile communication terminal function from strength to strength, majority has functions such as phone, data processing and multimedia recreation, becomes intelligent mobile communication terminal; They generally have the powerful processor of processing capacity and (are generally by the DSP that finishes data processing and finish controlled function ARM and form, dominant frequency can reach 200~500MHz) and jumbo memory (built-in Flash and external storage card or even micro harddisk, capacity generally can reach 1~10GB), functions such as recording playback sound, the video recording of taking pictures, multimedia, radio digital communication can be easily finished, encryption and decryption and Information hiding algorithm that operational capability is had relatively high expectations can be finished.Because multimedia message information is that various media files (as audio frequency, voice, picture and video etc.) are combined by the SMIL descriptive language in editing process, the content of media file is not changed; Simultaneously media file that extracts at receiving terminal and transmitting terminal editor's media file are consistent.Therefore as long as multimedia message can be successfully received the media file that parses of also energy success, then can think the Information hiding algorithm, can in these media files, extract the secret information of embedding less than under fire.Generally speaking, utilize the powerful disposal ability and the abundant software and hardware support of intelligent mobile communication terminal, with the media file in the multimedia message is carrier, is aided with enciphering and deciphering algorithm and Information hiding algorithm, just can solve the safety problem in multimedia message and the Short Message Service.
Claims (6)
- On the intelligent mobile communication terminal based on the secret information transmission method of multimedia message, it is characterized in that: after secret information is encrypted via the secret information encrypting module, use the secret information after the Information hiding algorithm will be encrypted to be embedded in the medium of multimedia message files by the secret information merge module; Send to the recipient place in company with multimedia message files; After the recipient receives, it is decrypted, then secret information is extracted from the medium of multimedia message files by the secret information extraction module via the secret information deciphering module.
- 2. based on the secret information transmission method of multimedia message, it is characterized in that on the intelligent mobile communication terminal according to claim 1: transmission course mainly comprises authentication, key generation and exchange, secret information transmission several sections; A side who promptly sends multimedia message is behind input right user name and password; Can prompting generate a random key as session key, require the user to use recipient's PKI to encrypt this session key again, session key after afterwards this being encrypted sends to the recipient by note, the recipient use oneself the private key deciphering and obtain the session key of this confidential corespondence; Transmit leg is opened the medium and the secret information of the multimedia message of desire transmission then, and use the Information hiding algorithm to be embedded in the media file of multimedia message it after using the session key secret information, transmit leg uses multimedia message that comprises this media file of MMS editing multimedia messages device editor that intelligent mobile communication terminal carries then, and sending it to the recipient, the MMS multimedia message resolver that the recipient also uses intelligent mobile communication terminal to carry is deposited the back in addition with media file and is used this software and session key to carry out obtaining the secret information that transmit leg sends after secret information extraction and the deciphering.
- 3. on the intelligent mobile communication terminal according to claim 2 based on the secret information transmission method of multimedia message, it is characterized in that: described key produces and exchange is that Sender imports or selection secret information Secret, produces only effective session key Key in this communication of a random number conduct simultaneously Dialog, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message; Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key Dialog
- According on claim 2 or the 3 described intelligent mobile communication terminals based on the secret information transmission method of multimedia message, it is characterized in that: the transmission of described secret information is that Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded among carrier media file (as image, audio frequency and voice or the video) Carrier and obtains Carri Erembedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver; Receiver uses the multimedia message analytical capabilities of intelligent mobile communication terminal that the multimedia message files medium of receiving are saved as independently file respectively in addition, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards.
- According on claim 1, the 2 or 3 described intelligent mobile communication terminals based on the secret information transmission method of multimedia message, it is characterized in that: secret information transmission concrete steps are as follows:Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_Public, session key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;Step 3, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
- 6. based on the secret information transmission method of multimedia message, it is characterized in that on the intelligent mobile communication terminal according to claim 4: secret information transmission concrete steps are as follows:Step 1, sender of secret information Sender opens the secret information transmission procedure based on multimedia message on intelligent mobile communication terminal, input user name respectively and user cipher enters program according to prompting;Step 2, Sender uses keyboard input secret information or select secret information Secret in terminal storage, and produces a random number as session key Key Dialog, only effective in this communication, the secret information Secret after Sender obtains encrypting to this secret information encryption with this session key employing symmetric key algorithm Enc, and from the conbined public or double key database, find the PKI Key of secret information recipient Receiver R_PublicSession key is obtained the ciphertext Enc (Key of session key with this PKI Dialog, Key R_Public), it is sent to Receiver by short message;Step 3, Sender uses the secret information merge module with Secret EncMode by Information hiding is embedded in the carrier media file (as image, audio frequency and voice or video) and obtains Carrier Embedded, again with this Carrier EmbeddedMedia file and other media files are compiled the form of multimedia message together and are sent to Receiver;Step 4, Receiver receives Enc (Key Dialog, Key R_Public), use the private key of oneself that it is deciphered Dec (Key Dialog, Key R_Public) obtain session key Key DialogThe multimedia message analytical capabilities that re-uses intelligent mobile communication terminal is saved as independently file respectively in addition with the multimedia message files medium of receiving, re-use the secret information extraction module and extract secret information in these files, use the secret information deciphering module to use session key that the secret information deciphering that extracts is just obtained Secret afterwards;Step 5 has so far just been finished the secret information transmission course one time, and both sides are with session key K ey DialogDestroy, begin new secret information transmission course.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810220244A CN101765066A (en) | 2008-12-24 | 2008-12-24 | Secret information transmission method based on multimedia message on intelligent mobile communication terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810220244A CN101765066A (en) | 2008-12-24 | 2008-12-24 | Secret information transmission method based on multimedia message on intelligent mobile communication terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101765066A true CN101765066A (en) | 2010-06-30 |
Family
ID=42496026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810220244A Pending CN101765066A (en) | 2008-12-24 | 2008-12-24 | Secret information transmission method based on multimedia message on intelligent mobile communication terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101765066A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103262117A (en) * | 2010-12-20 | 2013-08-21 | 国际商业机器公司 | Paired carrier and pivot steganographic objects for stateful data layering |
CN103442156A (en) * | 2013-08-20 | 2013-12-11 | 宁波大学 | Image steganography and secret information extraction method based on intelligent mobile terminal |
CN105657028A (en) * | 2016-01-28 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | System virtualization technology implementation method and terminal |
CN106301790A (en) * | 2016-08-18 | 2017-01-04 | 中国联合网络通信集团有限公司 | Security information exchange method, mobile terminal |
CN106454778A (en) * | 2016-10-18 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Short message processing method, short message center and communication system |
CN107040921A (en) * | 2017-06-22 | 2017-08-11 | 东华大学 | One kind is based on point-to-point SMS encryption system |
CN108243095A (en) * | 2016-12-27 | 2018-07-03 | 可可株式会社 | For the instant message method of servicing and user terminal of classified information |
-
2008
- 2008-12-24 CN CN200810220244A patent/CN101765066A/en active Pending
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103262117A (en) * | 2010-12-20 | 2013-08-21 | 国际商业机器公司 | Paired carrier and pivot steganographic objects for stateful data layering |
CN103442156A (en) * | 2013-08-20 | 2013-12-11 | 宁波大学 | Image steganography and secret information extraction method based on intelligent mobile terminal |
CN105657028A (en) * | 2016-01-28 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | System virtualization technology implementation method and terminal |
CN106301790A (en) * | 2016-08-18 | 2017-01-04 | 中国联合网络通信集团有限公司 | Security information exchange method, mobile terminal |
CN106454778A (en) * | 2016-10-18 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Short message processing method, short message center and communication system |
CN108243095A (en) * | 2016-12-27 | 2018-07-03 | 可可株式会社 | For the instant message method of servicing and user terminal of classified information |
CN108243095B (en) * | 2016-12-27 | 2022-01-25 | 可可株式会社 | Instant message service method for secret message and user terminal |
CN107040921A (en) * | 2017-06-22 | 2017-08-11 | 东华大学 | One kind is based on point-to-point SMS encryption system |
CN107040921B (en) * | 2017-06-22 | 2020-02-11 | 东华大学 | Short message encryption system based on point-to-point |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101203025B (en) | Method for transmitting and receiving safe mobile message | |
CN101420303B (en) | Communication method for audio data and apparatus thereof | |
CN100425084C (en) | secure peer-to-peer messaging invitation architecture | |
CN102740239B (en) | The method and system of secure transmission of media information | |
CN101765066A (en) | Secret information transmission method based on multimedia message on intelligent mobile communication terminal | |
CN203279187U (en) | Voice encryption bluetooth earphone with fingerprint identification function | |
CN101384042A (en) | Mobile phone ciphering method based on safe digital interface ciphering card | |
CN101909290A (en) | Method, system and mobile terminal for encrypting voice call | |
CN102916869A (en) | Instant messaging method and system | |
CN101951601A (en) | Method and system for encrypting voice calls in mobile communication network, terminal and network side | |
US8693686B2 (en) | Secure telephone devices, systems and methods | |
US20110135093A1 (en) | Secure telephone devices, systems and methods | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN103096304A (en) | Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal | |
CN111787495A (en) | System and method for realizing RCS enhanced short message encryption | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN109951378B (en) | File encryption transmission and sharing method in instant messaging | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN115348579A (en) | Voice encryption method applied to wireless earphone and encryption type wireless earphone | |
CN102523563B (en) | Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology | |
CN100479568C (en) | Implementation scheme for secrecy phone of the smart mobile terminal | |
KR101760376B1 (en) | Terminal and method for providing secure messenger service | |
CN108270917B (en) | Encrypted smart phone | |
CN201623859U (en) | System for encrypting short messages through mobile phone terminal | |
CN112054905B (en) | Secure communication method and system of mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20100630 |