CN102740239A - Method and system for secure transmission of media information - Google Patents

Method and system for secure transmission of media information Download PDF

Info

Publication number
CN102740239A
CN102740239A CN201110080720XA CN201110080720A CN102740239A CN 102740239 A CN102740239 A CN 102740239A CN 201110080720X A CN201110080720X A CN 201110080720XA CN 201110080720 A CN201110080720 A CN 201110080720A CN 102740239 A CN102740239 A CN 102740239A
Authority
CN
China
Prior art keywords
recipient
message
enciphered message
key
intermediate equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110080720XA
Other languages
Chinese (zh)
Other versions
CN102740239B (en
Inventor
卢艳
丁欣
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201110080720.XA priority Critical patent/CN102740239B/en
Priority to PCT/CN2011/083613 priority patent/WO2012129929A1/en
Publication of CN102740239A publication Critical patent/CN102740239A/en
Application granted granted Critical
Publication of CN102740239B publication Critical patent/CN102740239B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Abstract

The invention relates to a method and a system for secure transmission of media information. The method comprises the following steps: encrypting media information using a first key by a sender to obtain a first encrypted message, encrypting the first key to obtain a second encrypted message, sending the first and the second encrypted messages; generating information corresponding to the media information by an intermediate device, encrypting the information using a second key to obtain a third encrypted message, encrypting the second key to obtain a fourth encrypted message, sending the third and the fourth encrypted messages; and decrypting the fourth encrypted message using a private key by a receiver to obtain the second key, decrypting the third encrypted message using the second key to obtain the information, accessing the intermediate device according to the information to obtain the first encrypted message and the second encrypted message, decrypting the second encrypted message using the private key to obtain the first key, and decrypting the first encrypted message using the first key to obtain the media information. The method and the system can ensure information security of the sender.

Description

The method and system of media information safe transmission
Technical field
The present invention relates to the communications field, relate in particular to a kind of method and system of media information safe transmission.
Background technology
Nowadays, multimedia messaging service, MMS has obtained application more and more widely like multimedia message, (moving) Email, instant messaging at present.Some operation system; Such as multimedia message, voice mail, instant message etc., server is issuing media information to the recipient, usually can be earlier through other avenues of communication; Like the PUSH approach; Send the notification message of this Multimedia Message and give the recipient, after the recipient receives notification message, this media information is received to server according to self signal intelligence again.
Fig. 1 illustrates transmit leg and sends the flow process that media information is given the recipient:
1) transmit leg sends media information M to server;
2) server stores media information M, and produce message S, like notification message, send message S through operation system 2 and give the recipient;
3) recipient is according to message S access server and obtain media content M.
When above scheme brings convenience efficiently user experience to the user, brought the problem of a series of safe transmission thereupon.In above-mentioned communication process, if shape takes place to oestrus by mistake, notification message and media information may be read by illegal recipient, thereby cause the information leakage of transmit leg.
Summary of the invention
The technical problem that the present invention will solve provides a kind of method and system of media information safe transmission, to solve the problem of transmit leg information leakage under the shape of oestrusing by mistake.
For solving above technical problem, the invention provides a kind of method of media information safe transmission, said method comprises:
Transmit leg utilizes first key that media information is encrypted and obtains first enciphered message and said first secret key encryption is obtained second enciphered message, sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize said second key that said message encryption is obtained the 3rd enciphered message, and said second secret key encryption is obtained the 4th enciphered message, send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message; Decipher said the 4th enciphered message with its private key and obtain said second key; And utilize said the 3rd enciphered message of said second secret key decryption to obtain said message, and visit said intermediate equipment according to said message, obtain said first enciphered message and second enciphered message; Utilize its private key to decipher said second enciphered message and obtain said first key, utilize said first enciphered message of said first secret key decryption to obtain said media information.
Further, said transmit leg obtains said second enciphered message with said recipient's PKI to said first secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said second secret key encryption.
Further, said message is the notification message that said intermediate equipment produces according to transport layer information.
Further, the symmetric encipherment algorithm that said transmit leg and recipient are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance, or, by transmit leg or recipient's short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and recipient are used for said first key or second enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said second key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
For solving above technical problem, the present invention also provides a kind of system of media information safe transmission, and said system comprises:
The encrypting module of transmit leg is used to utilize first key that media information is encrypted and obtains first enciphered message and said first secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The encrypting module of said intermediate equipment is used to utilize second key that said message encryption is obtained the 3rd enciphered message, and said second secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said second key, and utilizes said the 3rd enciphered message of said second secret key decryption to obtain said message; Also be used to utilize its private key to decipher said second enciphered message and obtain said first key, utilize said first enciphered message of said first secret key decryption to obtain said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message and second enciphered message.
The inventive method and system use a pair of public and private key and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last; If mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
Description of drawings
Fig. 1 sends the sketch map that media information is given the recipient for transmit leg;
Fig. 2 is the sketch map of the method embodiment of media information safe transmission of the present invention;
The schematic flow sheet that Fig. 3 carries out for transmit leg among the present invention;
The schematic flow sheet that Fig. 4 carries out for intermediate equipment among the present invention;
The schematic flow sheet that Fig. 5 carries out for recipient among the present invention;
Fig. 6 is the modular structure sketch map of the system of media information safe transmission of the present invention.
Embodiment
The present invention proposes a kind of media information safe transmission method and system; Its main thought is to use a pair of public and private key and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last, if mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
Hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
As shown in Figure 2, the method for media information safe transmission of the present invention comprises:
Step 201: transmit leg utilizes 1 couple of media information M of first key K to encrypt and obtains the first enciphered message C; The PKI that utilizes the recipient is encrypted said first key K 1 and is obtained the second enciphered message K1 ', sends the said first enciphered message C and the second enciphered message K1 ';
Step 202: intermediate equipment receives said first and second enciphered messages; Produce and the corresponding message S of said media information M; Utilize 2 pairs of said message encryptions of said second key K to obtain the 3rd enciphered message S '; And with recipient's PKI said second key K 2 is encrypted and to obtain the 4th enciphered message K2 ', send said the 3rd enciphered message S ' and the 4th enciphered message K2 ';
Step 203: said recipient receives said the 3rd, the 4th enciphered message; Decipher said the 4th enciphered message K2 ' with its private key and obtain said second key K 2; And utilize said the 3rd enciphered message S ' of said second key K, 2 deciphering to obtain said message S; Visit said intermediate equipment according to said message; Obtain the said first enciphered message C and the second enciphered message K1 ', utilize its private key to decipher the said second enciphered message K1 ' and obtain said first key K 1, utilize the said first enciphered message C of said first key K, 1 deciphering to obtain said media information M.
The present invention needs following prerequisite:
1) must be authentication between transmit leg, intermediate equipment and the recipient;
2) recipient has a pair of public and private key;
3) transmit leg is through secure way (such as third party's certificate management authority) acquisition recipient's PKI, and intermediate equipment obtains recipient's PKI through secure way.
Below in conjunction with accompanying drawing and specific embodiment technical scheme of the present invention is done further to set forth in detail
Fig. 3 illustrates transmit leg execution following steps among the present invention:
Step 301: create media content M;
The present invention does not do qualification to the form and the type of media information, can be the data of MIME form such as its form, concrete multimedia message, Email, the voice mail etc. of including but not limited to.
Step 302: produce a key K 1 at random;
Step 303: encryption obtains ciphertext C, i.e. C=EK1 (M) to M with K1 with symmetric encipherment algorithm (using AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm such as agreement);
Step 304: use rivest, shamir, adelman (using RSA (a kind of public key encryption algorithm) such as agreement) and recipient's PKI that K1 is encrypted, the result is made as K1 ';
Step 303 and step 304 be order in no particular order.
Step 305:A sends to intermediate equipment with C and K1 '.
Fig. 4 illustrates the step that intermediate equipment is carried out among the present invention:
Step 401: intermediate equipment receives C and K1 ';
Step 402: produce the message S (such as SMS notification) corresponding, and produce key K 2 at random with media information M;
Said message is the notification message of said intermediate equipment according to the transport layer information generation, carries caller information and recipient's information such as this notification message.
Step 403: encrypt S with symmetric encipherment algorithm (using AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm) and K2 and obtain S ' such as agreement;
Step 404: the public key encryption K2 with the recipient obtains K2 ';
Step 405: S ' and K2 ' are transmitted to the recipient through operation system (such as, short message service center).
Fig. 5 illustrates the step that the recipient carries out among the present invention:
Step 501: receive S ' and K2 ';
Step 502: the private cipher key deciphering K2 ' with the recipient obtains K2;
Step 503: decipher S ' with K2 and obtain S;
Step 504:, obtain data C and K1 ' according to S visit intermediate equipment;
Step 505: use rivest, shamir, adelman identical and recipient's private cipher key deciphering K1 ' to obtain K1 with transmit leg;
Step 506: use symmetric encipherment algorithm identical and K1 deciphering C to obtain media content M with transmit leg.
The symmetric encipherment algorithm that said transmit leg and recipient are used for M or C are encrypted or decipher is that said transmit leg and recipient consult in advance, or, by transmit leg or recipient's short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said S or S ' are encrypted or decipher is that said intermediate equipment and recipient consult in advance, or, by intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and recipient are used for said K1 or K1 ' are encrypted or decipher is that said transmit leg and recipient consult in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said K2 or K2 ' are encrypted or decipher is that said intermediate equipment and recipient consult in advance.
In the middle of practical application; Can be applied to voice mail system, mobile phone terminal A and mobile phone terminal B, terminal A sends speech message; Voice mail server (being intermediate equipment) can produce a notifying messages in this message of delivery before the recipient, be sent to mobile phone terminal B through note system.Mobile phone terminal B access voice mailbox server obtains message message then.With the voice mail is example, and notification message can also be " in the band " notification message mode except above-mentioned short message mode, and promptly transmission path is identical with media information, and the present invention is suitable for this situation equally.In addition; The present invention also is applicable to the media information transmission of trans-sectoral affair type; The media information type of service that is the transmit leg transmission is different with the media information type of service that the recipient receives, and in this case, intermediate equipment can be the service server of transmit leg; Also can be recipient's service server, can also realize the gateway device of two kinds of type of service conversions.The present invention does not do qualification to the concrete realization entity of middle equipment.
For realizing above method, the present invention also provides a kind of system of media information safe transmission, with the present invention especially relatively, as shown in Figure 6, said system includes but not limited to:
The encrypting module of transmit leg is used to utilize first key that media information is encrypted and obtains first enciphered message and said first secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The encrypting module of said intermediate equipment is used to utilize second key that said message encryption is obtained the 3rd enciphered message, and said second secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said second key, and utilizes said the 3rd enciphered message of said second secret key decryption to obtain said message; Also be used to utilize its private key to decipher said second enciphered message and obtain said first key, utilize said first enciphered message of said first secret key decryption to obtain said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message and second enciphered message.
Further, the encrypting module of said transmit leg before said first secret key encryption, obtains said recipient's PKI through secure way, with said recipient's PKI said first secret key encryption is obtained said second enciphered message again;
The encrypting module of said intermediate equipment before said second secret key encryption, obtains said recipient's PKI through secure way, with said recipient's PKI said second secret key encryption is obtained said the 4th enciphered message again.
Further; The symmetric encipherment algorithm that said transmit leg and recipient's encrypting module or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance; Or, by transmit leg or recipient's short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and recipient's encrypting module or deciphering module are used for said first key or second enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said second key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
Among the present invention program, because intermediate equipment can't know K1, so media content is opaque to middle equipment, increased fail safe; When intermediate equipment is transmitted to B with S ' and K2 ' through operation system, consider the content-length problem, can send respectively at twice.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said program can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize.Correspondingly, each module in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.

Claims (7)

1. the method for a media information safe transmission is characterized in that, said method comprises:
Transmit leg utilizes first key that media information is encrypted and obtains first enciphered message and said first secret key encryption is obtained second enciphered message, sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize said second key that said message encryption is obtained the 3rd enciphered message, and said second secret key encryption is obtained the 4th enciphered message, send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message; Decipher said the 4th enciphered message with its private key and obtain said second key; And utilize said the 3rd enciphered message of said second secret key decryption to obtain said message, and visit said intermediate equipment according to said message, obtain said first enciphered message and second enciphered message; Utilize its private key to decipher said second enciphered message and obtain said first key, utilize said first enciphered message of said first secret key decryption to obtain said media information.
2. the method for claim 1 is characterized in that:
Said transmit leg obtains said second enciphered message with said recipient's PKI to said first secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said second secret key encryption.
3. the method for claim 1 is characterized in that: said message is the notification message that said intermediate equipment produces according to transport layer information.
4. the method for claim 1 is characterized in that:
The symmetric encipherment algorithm that said transmit leg and recipient are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance, or, by transmit leg or recipient's short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and recipient are used for said first key or second enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said second key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
5. the system of a media information safe transmission is characterized in that, said system comprises:
The encrypting module of transmit leg is used to utilize first key that media information is encrypted and obtains first enciphered message and said first secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The encrypting module of said intermediate equipment is used to utilize second key that said message encryption is obtained the 3rd enciphered message, and said second secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said second key, and utilizes said the 3rd enciphered message of said second secret key decryption to obtain said message; Also be used to utilize its private key to decipher said second enciphered message and obtain said first key, utilize said first enciphered message of said first secret key decryption to obtain said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message and second enciphered message.
6. system as claimed in claim 5 is characterized in that:
The encrypting module of said transmit leg obtains said second enciphered message with said recipient's PKI to said first secret key encryption;
The encrypting module of said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said second secret key encryption.
7. system as claimed in claim 5 is characterized in that:
The symmetric encipherment algorithm that said transmit leg and recipient's encrypting module or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance; Or, by transmit leg or recipient's short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and recipient's encrypting module or deciphering module are used for said first key or second enciphered message are encrypted or deciphered is that said transmit leg and recipient consult in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said second key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
CN201110080720.XA 2011-03-31 2011-03-31 The method and system of secure transmission of media information Expired - Fee Related CN102740239B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110080720.XA CN102740239B (en) 2011-03-31 2011-03-31 The method and system of secure transmission of media information
PCT/CN2011/083613 WO2012129929A1 (en) 2011-03-31 2011-12-07 Method, system and appararus for secure transmission of media message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110080720.XA CN102740239B (en) 2011-03-31 2011-03-31 The method and system of secure transmission of media information

Publications (2)

Publication Number Publication Date
CN102740239A true CN102740239A (en) 2012-10-17
CN102740239B CN102740239B (en) 2016-06-22

Family

ID=46929389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110080720.XA Expired - Fee Related CN102740239B (en) 2011-03-31 2011-03-31 The method and system of secure transmission of media information

Country Status (2)

Country Link
CN (1) CN102740239B (en)
WO (1) WO2012129929A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058523A1 (en) * 2014-10-13 2016-04-21 Huawei Technologies Co., Ltd. Data distributing over network to user devices
CN105959279A (en) * 2016-04-29 2016-09-21 大连理工大学 Computer information transmission system and method based on encryption processing
CN108199851A (en) * 2018-02-01 2018-06-22 北京华大智宝电子系统有限公司 A kind of data safe transmission method, apparatus and system
CN108259428A (en) * 2016-12-29 2018-07-06 大唐半导体设计有限公司 A kind of system and method for realizing data transmission
WO2019091238A1 (en) * 2017-11-10 2019-05-16 中兴通讯股份有限公司 Information anti-interception method, server and computer readable storage medium
CN111245777A (en) * 2019-11-14 2020-06-05 北京京航计算通讯研究所 Military field message transmission method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241322A (en) * 2017-05-27 2017-10-10 郑州云海信息技术有限公司 A kind of service end communication management method and system
CN110830366A (en) * 2019-11-14 2020-02-21 北京京航计算通讯研究所 Military field message pushing system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633062A (en) * 2004-12-31 2005-06-29 北京中星微电子有限公司 A secure transmission method for media content
CN101262340A (en) * 2008-04-22 2008-09-10 中兴通讯股份有限公司 MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
US20090061912A1 (en) * 2007-09-04 2009-03-05 Research In Motion Limited System and method for processing attachments to messages sent to a mobile device
WO2011031439A1 (en) * 2009-08-28 2011-03-17 Alcatel-Lucent Usa Inc. Secure key management in multimedia communication system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2034687B1 (en) * 2007-09-04 2012-06-13 Research In Motion Limited System and method for processing attachments to messages sent to a mobile device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633062A (en) * 2004-12-31 2005-06-29 北京中星微电子有限公司 A secure transmission method for media content
US20090061912A1 (en) * 2007-09-04 2009-03-05 Research In Motion Limited System and method for processing attachments to messages sent to a mobile device
CN101262340A (en) * 2008-04-22 2008-09-10 中兴通讯股份有限公司 MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS
WO2011031439A1 (en) * 2009-08-28 2011-03-17 Alcatel-Lucent Usa Inc. Secure key management in multimedia communication system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016058523A1 (en) * 2014-10-13 2016-04-21 Huawei Technologies Co., Ltd. Data distributing over network to user devices
US10181949B2 (en) 2014-10-13 2019-01-15 Futurewei Technologies, Inc. Data distributing over network to user devices
CN105959279A (en) * 2016-04-29 2016-09-21 大连理工大学 Computer information transmission system and method based on encryption processing
CN108259428A (en) * 2016-12-29 2018-07-06 大唐半导体设计有限公司 A kind of system and method for realizing data transmission
CN108259428B (en) * 2016-12-29 2020-10-09 大唐半导体设计有限公司 System and method for realizing data transmission
WO2019091238A1 (en) * 2017-11-10 2019-05-16 中兴通讯股份有限公司 Information anti-interception method, server and computer readable storage medium
CN108199851A (en) * 2018-02-01 2018-06-22 北京华大智宝电子系统有限公司 A kind of data safe transmission method, apparatus and system
CN111245777A (en) * 2019-11-14 2020-06-05 北京京航计算通讯研究所 Military field message transmission method

Also Published As

Publication number Publication date
WO2012129929A1 (en) 2012-10-04
CN102740239B (en) 2016-06-22

Similar Documents

Publication Publication Date Title
CN102740239B (en) The method and system of secure transmission of media information
CN101340443B (en) Session key negotiating method, system and server in communication network
CN101420303B (en) Communication method for audio data and apparatus thereof
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN101188496B (en) A SMS encryption transport method
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
JPH07245605A (en) Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method
CN101466079A (en) Method, system and WAPI terminal for transmitting e-mail
CN104821944A (en) Hybrid encrypted network data security method and system
CN101964786A (en) Set-top box-based secure information transmission system and method
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN105323070A (en) Method for realizing security electronic mail based on digital envelope
Lee et al. Security flaw of authentication scheme with anonymity for wireless communications
CN103167494B (en) Method for sending information and system
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN102045669A (en) Implementation method and system for encrypting short message services
CN103973713A (en) Transfer method, extraction method and processing system for electronic mail information
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN102857889A (en) Method and device for encrypting short messages
CN101765066A (en) Secret information transmission method based on multimedia message on intelligent mobile communication terminal
CN111049738A (en) E-mail data security protection method based on hybrid encryption
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN102006570A (en) Device and method for encrypting short messages
CN102740246A (en) Method, system, and device for processing media message

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160622

Termination date: 20210331