CN103401949A - Personal data safety sharing system and method for mobile phone - Google Patents

Personal data safety sharing system and method for mobile phone Download PDF

Info

Publication number
CN103401949A
CN103401949A CN2013103667898A CN201310366789A CN103401949A CN 103401949 A CN103401949 A CN 103401949A CN 2013103667898 A CN2013103667898 A CN 2013103667898A CN 201310366789 A CN201310366789 A CN 201310366789A CN 103401949 A CN103401949 A CN 103401949A
Authority
CN
China
Prior art keywords
mobile phone
data
module
requesting party
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013103667898A
Other languages
Chinese (zh)
Other versions
CN103401949B (en
Inventor
林荣恒
赵耀
邹华
王添阳
杨放春
华宇
吕文博
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201310366789.8A priority Critical patent/CN103401949B/en
Publication of CN103401949A publication Critical patent/CN103401949A/en
Application granted granted Critical
Publication of CN103401949B publication Critical patent/CN103401949B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a personal data safety sharing system and a method for a mobile phone. The system comprises a mobile phone provided with a request service component and a core network service server provided with authentication switchover component, wherein the request service component of the mobile phone comprises a monitoring module, a server module, a client module and a display module, and the authentication switchover component of the service server comprises a monitoring module, an authentication module, a call transfer module, and a public key database interactive with the monitoring module and the authentication module. A working method of the system is characterized in that the system divides an authority of contact list data of a user into two kinds, namely a sharable authority and a restricted sharing authority, according to the safety authority set by the user, and makes corresponding different operations according to the different authorities. The mobile phone serves as a server to response sharing requests of other contacts on contact list information, the safety authority is set for personal information, and certain personal privacy information is encrypted by a key technology, so that personal privacy cannot be leaked in a transmission process of the personal privacy information.

Description

A kind of system and method for sharing for the personal data safety of mobile phone
Technical field
The present invention relates to a kind of System and method for of sharing for the personal data safety of mobile phone; exactly; relate to a kind of mobile phone that utilizes as server, respond other users and inquire about the address list information request and the System and method for of safeguard protection is provided the access of personal data by cipher key technique.Belong to the mobile communication technology field.
Background technology
Along with modern society exchange day by day frequent, mobile phone has become the main tool that people communicate interchange.In many personal mobile phones, all store I and contact person's thereof personal information, in the social interactions process, often run into situation about these person-to-person communication data need to be shared with other people, to facilitate more communication exchanges.
At present; between the cellphone subscriber, usually adopt mutual transmission of form of short message or mail and share the person-to-person communication data; this information interaction mode is open and uncontrollable; cause the security performance of these personal information uncontrollable and ensure; make the privacy of some personal data, especially individual contact method can't be protected in sharing process; thereby inevitably be leaked out, affect people's life and work.For example, in party A-subscriber's mobile phone, store the information of friend B, when another friend C of party A-subscriber inquired the personal information of B to A, conventional method is: the party A-subscriber can only pass to C with note or mail form by the personal information of B.The defect of this way is: can't protect the personal information security of B, i.e. the personal information of uncontrollable C to external leakage B.So just make everyone personal information that participates in communication likely in communication process, be had a mind to or by mistake let out, cause potential safety hazard.
Through patent retrieval, find following Chinese patent application " a kind of method that sends electronic business card information by mobile phone short message " (publication number: CN101742443A), it discloses a kind of method that sends electronic business card by mobile phone short message, the method arranges related software and realizes in mobile phone: the first data in electronic business card are set to identifying information, and other content of electronic business card is classified according to title, address, phone.When sending short message by mobile phone ceased, if while selecting to send electronic business card, the electronic business card that just will edit in advance or edit temporarily sent in the short message mode.When mobile phone receives this short message, judge at first whether the first data of this short message are identifying information, if not, by normal short message, receive; If so, respectively electronic business card content correspondence is deposited in telephone directory, form an independently electronic business card.And after completing storage, mobile phone recovers the state before note receives.Use the present invention can replace existing traditional paper Jie business card, and preservation with low cost, favourable, and save consumptive material, environmental.As if but this technology is not yet promoted the use of so far, estimation is operation more complicated, trouble, is difficult for grasping and uses.
Therefore, how to protect with safety and share the personal data privacy in mobile phone, remain so far a focus problem of scientific and technical personnel's concern in the industry.
Summary of the invention
In view of this, the objective of the invention is to be easy to situation about being revealed for personal data data message in sharing process, a kind of System and method for of sharing for the personal data safety of mobile phone is provided, the present invention utilizes mobile phone to respond the share request of other contact persons to address list information as server, and security permission is set and utilizes cipher key technique to be encrypted for some individual privacy information personal information, it can not leaked out individual privacy in transmitting procedure.
In order to achieve the above object, the invention provides a kind of system of sharing for the personal data safety of mobile phone, it is characterized in that: described system is comprised of the mobile phone that is provided with the request service parts and the service server that is provided with the core net of authentication switching part, and wherein the request service parts on mobile phone comprise: monitoring modular, server module, client modules and display module; The authentication switching part of the service server of core net comprises: monitoring module, the authentication module that is linked in sequence and turn and exhale module, and with the database of public keys of monitoring module and authentication module interaction data; Modules function in above-mentioned two parts is as follows:
Monitoring modular, for monitoring from other users, be the request that the requesting party obtains this contact book of mobile phone information, and to the response of this request, and the information that monitors is judged to processing: if inquiry request is transmitted to server module by this request; If Query Result, send to client modules by this result;
Server module, inquire about this mobile phone be used to responding other users, be the request of Requested Party address book information, and, after Query Result is processed, send to the requesting party; Simultaneously, to service server two PKIs of the side of sending request and Requested Party respectively, for service server, the data with the mobile phone encrypted private key are decrypted; This module is provided with: query unit, ciphering unit, granted unit, key transmitting element and address book database be totally five component units:
Client modules, for by the requesting party, be that the inquiry request of this mobile phone sends to Requested Party, namely sets mobile phone, and receive the other side's response message, recycle this response message the user mobile phone of inquiry called out; Be provided with: request unit, response message processing unit and calling unit be totally three component units;
Display module, as the display interface of this system man-machine interaction, provide the interface of inquiry, calling and the Authorized operation of this mobile phone, and show the Query Result information of returning;
Monitor module, be used to monitoring the information that mobile phone sends and carrying out dissection process: if this information is two PKIs of requesting party and Requested Party, these two PKIs are stored in to database of public keys; If this information is enciphered data, this enciphered data is transmitted to authentication module and carries out authentication;
Authentication module, for the enciphered data to from monitoring module, be decrypted authentication: first from database of public keys, according to index, find two PKIs of specific requesting party and Requested Party, and, after using these two PKIs to be decrypted this enciphered data, data decryption is sent to turn and exhale module;
Turn and exhale module, for the contact method of the contact person according to data decryption, this inquiring user mobile phone is turned and exhales, to connect requesting party and this inquiring user, complete traffic operation;
Database of public keys, for the memory mobile phone PKI, be decrypted authentication for the data to the mobile phone encrypted private key; Every data of storing in this database of public keys comprise: index, requesting party's PKI and three data item of Requested Party PKI.
In order to achieve the above object, the present invention also provides a kind of method of work of the system of sharing for the personal data safety of mobile phone, it is characterized in that: the security permission that described system is set address list according to the user, the authority of telex network being recorded to data is divided into two kinds: can share with limited and share, and make corresponding operating according to different rights; The method comprises following operating procedure:
(1) when Requested Party receives the requesting party and wishes to inquire about the request of certain telex network record, Requested Party is searched this user's address list data from its address book database, and these address list data are carried out to authentication process: if this data authority is to share, order performs step (2); When this data authority is limited sharing, redirect performs step (3);
(2) Requested Party sends to the requesting party by these telex network record data with plaintext; Finish the method flow process;
(3) Requested Party utilizes this mobile phone private key to be encrypted this telex network record, and this telex network record information after using the network communicating function of this mobile phone to encrypt sends to the requesting party; Simultaneously, also utilize network communicating function to send this mobile phone, be two PKIs of Requested Party and requesting party to service server;
(4) when certain user mobile phone that need to dial its inquiry as the requesting party was conversed, after just utilizing this telex network record information after the encryption that its private key obtains from Requested Party it to carry out superencipher, the recycling network communicating function sent to service server;
(5) service server utilizes two PKIs of Requested Party and requesting party to be decrypted these both data of mobile phone encrypted private key of its employing that receives, and obtains certain telex network record of requesting party's inquiry; Then utilize this telex network record to send call request to it, connect requesting party and this inquiring user, achieve conversation.
Compared with prior art; the invention provides share system and the method for cellphone subscriber's address list of a safety; with original mode that address book information is arbitrarily sent, compare; system and method of the present invention is in the process of sharing the user communication record; can better protect user's private data, and adopt the mobile phone address book information is divided to different rights, efficiently solve the problem that leaks that prevents the privacy of user data; thereby improve the efficiency of user's obtaining information and communication, and improve the user and experience.Therefore, the present invention is expected to be widely applied.
The accompanying drawing explanation
The application scenarios schematic diagram of Fig. 1 system that to be the present invention share for the personal data safety of mobile phone.
The structure of Fig. 2 system that to be the present invention share for the personal data safety of mobile phone forms schematic diagram.
Fig. 3 is the system works method operating procedure flow chart that the present invention shares for the personal data safety of mobile phone.
Fig. 4 is mutual sequential chart between all modules in system of the present invention.
Fig. 5 is that system of the present invention is carried out the expressly sequential chart of communication interaction mode.
Fig. 6 is the sequential chart that system of the present invention is carried out ciphertext communication interaction mode.
Fig. 7 is the mutual sequential chart of authentication switching part in system of the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with drawings and Examples.
The system and method that the present invention shares for the personal data safety of mobile phone is to utilize mobile phone that the sharing function of personal data is provided as server; and use the address book data that cipher key technique is shared the user that the function of protection is provided, thereby solved telex network record information, with other people, sharing the problem of being revealed in process.
First referring to Fig. 1, introduce the application scenarios of the system that the present invention shares for the personal data safety of mobile phone: this system, according to the address book information security permission that the user sets, is divided into two class authorities by the address book information in user mobile phone: can share with limited and share.When Requested Party 1 is received the request of requesting party's 2 certain telex network record of requirement inquiry (step 1.), just search the address book database information of its storage, and this telex network record information that finds is carried out to authentication process: if when the authority of this telex network record information be can share the time, just this address book information is passed to requesting party's (step is 2.) with plaintext; When if the authority of this address list information is limited sharing, utilize private key to be encrypted this address book information, and the address list information after encrypting issues requesting party's (step 2.), also to service server 3, sends simultaneously two PKIs (step 3.) of these mobile phones and requesting party.When the requesting party need to dial address list information, the address list information after the encryption that just will obtain was again with sending to service server (step 4.) after its private key superencipher, and service server, after enciphered data is confirmed, is decrypted address list information.Then, utilize the address book information obtain to turn and exhales (step 5.), connect requesting party and inquiring user, be called 4, make both sides realize conversing.
Referring to Fig. 2, introduce the system configuration composition that the present invention shares for the personal data safety of mobile phone: comprise two parts: the mobile phone and the service server that is provided with the authentication switching part that are provided with the request service parts; Wherein the request service parts on mobile phone comprise: monitoring modular, server module, client modules and display module; These functions of modules are as follows:
Monitoring modular: for monitoring from other users, be the request that the requesting party obtains this contact book of mobile phone information, and to the response of this request, and the information that monitors is judged to processing: if inquiry request is transmitted to server module by this request; If Query Result, send to client modules by this result.
Server module: inquire about this mobile phone be used to responding other users, be the request of Requested Party address book information, and, after Query Result is processed, send to the requesting party; Simultaneously, to service server two PKIs of the side of sending request and Requested Party respectively, for service server, the data with the mobile phone encrypted private key are decrypted; This module is provided with: query unit, ciphering unit, granted unit, key transmitting element and address book database be totally five component units.The function declaration of these component units is as follows:
Query unit: be responsible for the requesting party's user name that sends according to monitoring modular, inquire about in address book database, and will comprise that the Query Result of this user basic information and data permission thereof sends to ciphering unit.
Ciphering unit: be responsible for according to user data authority, select whether this user data is encrypted to operation: if this data permission, for sharing, sends these data to requesting party with plaintext; If this data permission is limited sharing, by these data with after this mobile phone encrypted private key, sending to the requesting party; Notify simultaneously the key transmitting element, allow its two PKIs by the requesting party of this request and Requested Party send to together service server.
Granted unit: be responsible for authorizing one of following two kinds of authorities to every data in the telex network record: can share or limited sharing.For the data that can share, when receiving inquiry request, with plaintext, send these data to requesting party; For the limited data of sharing, must will after this data encryption, send to the requesting party.The authority of every data is that the form with Boolean variable is stored in address book database.
Key transmitting element: be responsible for receiving requesting party's PKI that monitoring modular sends, receive the signal of ciphering unit when this unit after, two PKIs of requesting party and Requested Party sent to service server together.
Address book database: be used to storing user data (being the authority of address list and every address list), every address list data record comprises four information: user name, this user's basic document, contact method and data permission thereof.
Client modules, for by this mobile phone, be that requesting party's inquiry request sends to Requested Party, namely sets mobile phone, and receive the other side's response message, recycle this response message the user mobile phone of inquiry called out; Be provided with: request unit, response message processing unit and calling unit be totally three component units, and the function declaration of these component units is as follows:
Request unit: be responsible for arranging via monitoring modular to Requested Party, being that another mobile phone sends the request of obtaining its address list according to the user, this request comprises this mobile phone, is the user name of requesting party's PKI and inquiry.
Response message processing unit: be responsible for the response message that receives is judged to processing: if cleartext information directly sends to display module to show; If enciphered message, after using this mobile phone private key superencipher, send to calling unit.
Calling unit: the information after be responsible for to utilize encrypting makes a call, and this enciphered message is sent to service server, by its authentication switching part, carries out the call forwarding operation, so that after connecting, this mobile phone, is that requesting party and this inquiring user carry out normal talking.
Display module: as the display interface of this system man-machine interaction, provide the interface of inquiry, calling and the Authorized operation of this mobile phone, and show the Query Result information of returning.
The authentication switching part of service server comprises: monitoring module, the authentication module that is linked in sequence and turn and exhale module, and with the database of public keys of monitoring module and authentication module interaction data.Modules function in this authentication switching part is as follows:
Monitor module: be used to monitoring the information that mobile phone sends and carrying out dissection process: if this information is two PKIs of requesting party and Requested Party, these two PKIs are stored in to database of public keys; If this information is enciphered data, this enciphered data is transmitted to authentication module and carries out authentication.
Authentication module: be decrypted authentication for the enciphered data to from monitoring module: first find two PKIs of specific requesting party and Requested Party according to index from database of public keys, and, after using these two PKIs to be decrypted this enciphered data, data decryption is sent to turn and exhale module.
Turn and exhale module: for the contact method of the contact person according to data decryption, this inquiring user mobile phone is turned and exhales, to connect requesting party and this inquiring user, complete traffic operation.
Database of public keys: for the memory mobile phone PKI, be decrypted authentication for the data to the mobile phone encrypted private key; Every data of storing in this database of public keys comprise: index, requesting party's PKI and three data item of Requested Party PKI.
The method of work of the system that the present invention shares for the personal data safety of mobile phone, its key problem in technology is the security permission of according to the user, address list being set by system of the present invention, the authority of telex network being recorded to data is divided into two kinds: can share with limited and share, then, according to different rights, make corresponding different operating.
Referring to Fig. 3, introduce the following concrete operation step of the inventive method:
Step 1, when Requested Party receives the requesting party and wishes to inquire about the request of certain telex network record, Requested Party is searched this user's address list data from its address book database, and these address list data are carried out to authentication process: if this data authority is to share, order performs step 2; When this data authority is limited sharing, the redirect execution step 3.
Step 2, Requested Party sends to the requesting party by these telex network record data with plaintext; Finish the method flow process.This step comprises following content of operation:
(21) Requested Party is searched according to the user name in inquiry request in this contact book of mobile phone, and this telex network record information that will find formats processing;
(22) Requested Party utilizes the network communicating function of this mobile phone that formatted data is sent to the requesting party;
(23) after the requesting party receives these data, to the user, present.
Step 3, Requested Party utilize this mobile phone private key to be encrypted this telex network record, and this telex network record information after using the network communicating function of this mobile phone to encrypt sends to the requesting party; Simultaneously, also utilize network communicating function to send this mobile phone, be two PKIs (disclosed key in asymmetric key system) of Requested Party and requesting party to service server.
Step 4, when certain user mobile phone that need to dial its inquiry as the requesting party is conversed, after just utilizing its private key (key that only has user oneself to know in asymmetric key system) from this telex network record information after the encryption of Requested Party acquisition, to carry out superencipher to it, the recycling network communicating function sends to service server.
Step 5, two PKIs that service server utilizes Requested Party and requesting party are decrypted (because PKI and private key are to occur in pairs: with the data of public key encryption, can only use the private key of correspondence to decipher the data of these both mobile phone encrypted private key of its employing that receives, with the data of encrypted private key, only have and use corresponding PKI to decipher), obtain certain telex network record of requesting party's inquiry; Then utilize this telex network record to send call request to it, connect requesting party and this inquiring user, achieve conversation.
Referring to Fig. 4, introduce sequential chart mutual between the modules in system of the present invention:
Client modules in mobile phone A sends the request of inquiring contactor to the monitoring modular of mobile phone B.
The monitoring modular of mobile phone B transfers this inquiry request to the server module of this mobile phone B.
The server module of mobile phone B inquiry local data base, to confirm the access rights of associated person information: because of it as limited accass, therefore to this information encryption, and send enciphered data to mobile phone A, to service server transmission PKI pair.
Monitoring module in service server receives PKI to rear, and it is stored in database of public keys.
Mobile phone A sends the request of call contact to the monitoring module of service server.
The monitoring module of service server is forwarded to this call request its authentication module.
The authentication module of service server is inquired about deciphering by database of public keys to associated person information.
Associated person information after industry service business device will be deciphered is sent to turning of its and exhales module.
Turning of service server exhales module to turn and exhale the contact person, connects caller (mobile phone A) and called (inquiring user mobile phone).
Referring to Fig. 5 and Fig. 6, introduce mutual sequential chart between the modules in system works method of the present invention:
Fig. 5 is scene one: plaintext communication interaction sequential chart, the telex network record data permission that is requesting party's mobile phone requesting query is ostensible, the server module of Requested Party mobile phone just directly sends to the requesting party by this telex network record information, does not need to transfer by the authentication interconnecting module.This plaintext communication interaction process is:
Request unit in mobile phone A sends the inquiring contactor request to the monitoring modular of mobile phone B.
The monitoring modular of mobile phone B transfers this inquiry request to its query unit.
The query unit query communication record database of mobile phone B, confirm that the access rights of associated person information, for open authority, send associated person information to query unit.
The query unit of mobile phone B replies to associated person information the monitoring modular of mobile phone A.
The monitoring modular of mobile phone A sends to its response message processing unit by associated person information.
The response message processing unit is issued display module by cleartext information, for giving the mobile phone A user, to the other side, makes a call.
Fig. 6 is scene two: ciphertext communication interaction sequential chart, i.e. and the user data authority of requestor requests inquiry is not ostensible, the server module of Requested Party mobile phone will send to client after this information encryption.If need, call out need by the authentication interconnecting module.This ciphertext communication interaction process is:
Request unit in mobile phone A sends the inquiring contactor request to the monitoring modular of mobile phone B.
The monitoring modular of mobile phone B transfers this inquiry request to query unit.
Query unit query communication record database, the access rights of confirming this associated person information are non-public authority (or limited sharing), this associated person information are sent to ciphering unit.
After the ciphering unit of mobile phone B is encrypted this associated person information, send to the monitoring modular of mobile phone A, simultaneously also to key transmitting element transmitted signal, notice key transmitting element sends key pair to the authentication interconnecting module of service server.
The monitoring modular of mobile phone A is issued the response message processing unit by this associated person information.
The response message processing unit is issued calling module by this enciphered message, for calling module, calls.
Referring to Fig. 7, introduce the reciprocal process of the authentication switching part modules of service server:
Monitor module and receive the PKI pair that mobile phone B is sent, by this PKI to and index be stored in database of public keys.
Monitor module and receive the call request that mobile phone A is sent, this call request is transmitted to authentication module.
PKI pair in the authentication module Query Database, utilize the PKI that obtains to be decrypted the enciphered data in call request.
Authentication module sends to interconnecting module by data decryption, and interconnecting module is communicated with mobile phone A and inquiring user mobile phone.
The foregoing is only preferred embodiment of the present invention, in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of making, be equal to replacement, improvement etc., within all should being included in the scope of protection of the invention.

Claims (6)

1. system of sharing for the personal data safety of mobile phone, it is characterized in that: described system is comprised of the mobile phone that is provided with the request service parts and the service server that is provided with the core net of authentication switching part, and wherein the request service parts on mobile phone comprise: monitoring modular, server module, client modules and display module; The authentication switching part of the service server of core net comprises: monitoring module, the authentication module that is linked in sequence and turn and exhale module, and with the database of public keys of monitoring module and authentication module interaction data; Modules function in above-mentioned two parts is as follows:
Monitoring modular, for monitoring from other users, be the request that the requesting party obtains this contact book of mobile phone information, and to the response of this request, and the information that monitors is judged to processing: if inquiry request is transmitted to server module by this request; If Query Result, send to client modules by this result;
Server module, inquire about this mobile phone be used to responding other users, be the request of Requested Party address book information, and, after Query Result is processed, send to the requesting party; Simultaneously, to service server two PKIs of the side of sending request and Requested Party respectively, for industry service business device, the data with the mobile phone encrypted private key are decrypted; This module is provided with: query unit, ciphering unit, granted unit, key transmitting element and address book database be totally five component units:
Client modules, for by this mobile phone, be that requesting party's inquiry request sends to Requested Party, namely sets mobile phone, and receive the other side's response message, recycle this response message the user mobile phone of inquiry called out; Be provided with: request unit, response message processing unit and calling unit be totally three component units;
Display module, as the display interface of this system man-machine interaction, provide the interface of inquiry, calling and the Authorized operation of this mobile phone, and show the Query Result information of returning;
Monitor module, be used to monitoring the information that mobile phone sends and carrying out dissection process: if this information is two PKIs of requesting party and Requested Party, these two PKIs are stored in to database of public keys; If this information is enciphered data, this enciphered data is transmitted to authentication module and carries out authentication;
Authentication module, for the enciphered data to from monitoring module, be decrypted authentication: first from database of public keys, according to index, find two PKIs of specific requesting party and Requested Party, and, after using these two PKIs to be decrypted this enciphered data, data decryption is sent to turn and exhale module;
Turn and exhale module, for the contact method of the contact person according to data decryption, this inquiring user mobile phone is turned and exhales, with connect the requesting party and and this inquiring user, complete traffic operation;
Database of public keys, for the memory mobile phone PKI, be decrypted authentication for the data to the mobile phone encrypted private key; Every data of storing in this database of public keys comprise: index, requesting party's PKI and three data item of Requested Party PKI.
2. system according to claim 1 is characterized in that: the function of each component units of server module in the described mobile phone that is provided with the request service parts is as follows:
Query unit, be responsible for the requesting party's user name that sends according to monitoring modular, in address book database, inquires about, and will comprise that the Query Result of this user basic information and data permission thereof sends to ciphering unit;
Ciphering unit, be responsible for according to user data authority, selects whether this user data is encrypted to operation: if this data permission, for sharing, sends these data to requesting party with plaintext; If this data permission is limited sharing, by these data with after this mobile phone encrypted private key, sending to the requesting party; Notify simultaneously the key transmitting element, allow its two PKIs by the requesting party of this request and Requested Party send to together service server;
Granted unit, be responsible for authorizing one of following two kinds of authorities to every data in the telex network record: can share or limited sharing; For the data that can share, when receiving inquiry request, with plaintext, send these data to requesting party; For the limited data of sharing, must will after this data encryption, send to the requesting party; The authority of every data is that the form with Boolean variable is stored in address book database;
The key transmitting element, be responsible for receiving requesting party's PKI that monitoring modular sends, and after when this unit, receiving the signal of ciphering unit, two PKIs of requesting party and Requested Party sent to service server together;
Address book database, be used to storing user data, i.e. the authority of address list and every address list, every record comprises four information: user name, this user's basic document, contact method and data permission thereof.
3. system according to claim 1, is characterized in that, the function of each building block of client modules in the described mobile phone that is provided with the request service parts is as follows:
Request unit is responsible for arranging via monitoring modular to Requested Party, being that another mobile phone sends the request of obtaining its address list according to the user that this request comprises this mobile phone, is the user name of requesting party's PKI and inquiry;
The response message processing unit, be responsible for the response message that receives is judged to processing: if cleartext information directly sends to display module to show; If enciphered message, after using this mobile phone private key superencipher, send to calling unit;
Calling unit, be responsible for utilizing the information after encrypting to make a call, and this enciphered message sent to service server, by its authentication switching part, carries out the call forwarding operation, so that after connecting, with the called normal talking that carries out.
4. the method for work of a system of sharing for the personal data safety of mobile phone, it is characterized in that: the security permission that described system is set address list according to the user, the authority of telex network being recorded to data is divided into two kinds: can share with limited and share, and make corresponding operating according to different rights; The method comprises following operating procedure:
(1) when Requested Party receives the requesting party and wishes to inquire about the request of certain telex network record, Requested Party is searched this user's address list data from its address book database, and these address list data are carried out to authentication process: if this data authority is to share, order performs step (2); When this data authority is limited sharing, redirect performs step (3);
(2) Requested Party sends to the requesting party by these telex network record data with plaintext; Finish the method flow process;
(3) Requested Party utilizes this mobile phone private key to be encrypted this telex network record, and this telex network record information after using the network communicating function of this mobile phone to encrypt sends to the requesting party; Simultaneously, also utilize network communicating function to send this mobile phone, be two PKIs of Requested Party and requesting party to the service server of core net;
(4) when certain user mobile phone that need to dial its inquiry as the requesting party was conversed, after just utilizing this telex network record information after the encryption that its private key obtains from Requested Party it to carry out superencipher, the recycling network communicating function sent to service server;
(5) service server utilizes two PKIs of Requested Party and requesting party to be decrypted these both data of mobile phone encrypted private key of its employing that receives, and obtains certain telex network record of requesting party's inquiry; Then utilize this telex network record to send call request to it, connect requesting party and this inquiring user, achieve conversation.
5. method according to claim 4, is characterized in that, described step (2) comprises following content of operation:
(21) Requested Party is searched according to the user name in inquiry request in this contact book of mobile phone, and this telex network record information that will find formats processing;
(22) Requested Party utilizes the network communicating function of this mobile phone that formatted data is sent to the requesting party;
(23) after the requesting party receives these data, to the user, present.
6. method according to claim 1, is characterized in that, described private key is the key that only has user oneself to know in asymmetric key system, and described PKI is disclosed key in asymmetric key system; PKI and private key are to occur in pairs: with the data of public key encryption, can only use corresponding private key to decipher, with the data of encrypted private key, only have and use corresponding PKI to decipher.
CN201310366789.8A 2013-08-21 2013-08-21 A kind of system and method shared for the personal data safety of mobile phone Active CN103401949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310366789.8A CN103401949B (en) 2013-08-21 2013-08-21 A kind of system and method shared for the personal data safety of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310366789.8A CN103401949B (en) 2013-08-21 2013-08-21 A kind of system and method shared for the personal data safety of mobile phone

Publications (2)

Publication Number Publication Date
CN103401949A true CN103401949A (en) 2013-11-20
CN103401949B CN103401949B (en) 2016-12-28

Family

ID=49565472

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310366789.8A Active CN103401949B (en) 2013-08-21 2013-08-21 A kind of system and method shared for the personal data safety of mobile phone

Country Status (1)

Country Link
CN (1) CN103401949B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125228A (en) * 2014-07-30 2014-10-29 北京智谷睿拓技术服务有限公司 Interaction method and interaction device
CN104302013A (en) * 2014-09-05 2015-01-21 北京奇虎科技有限公司 Data acquisition method, device and system
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
CN106804034A (en) * 2017-01-06 2017-06-06 车广为 A kind of electronic business card system
CN106856534A (en) * 2017-01-06 2017-06-16 车广为 A kind of electronic business card and implementation method
CN107222608A (en) * 2017-07-11 2017-09-29 深圳传音通讯有限公司 Contact person's sharing method and user terminal
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
CN110311937A (en) * 2018-03-20 2019-10-08 广达电脑股份有限公司 Data forwarding system
CN110475034A (en) * 2019-07-23 2019-11-19 深圳市六度人和科技有限公司 Improve method, user end apparatus, server unit and the system of phone safety
CN111541810A (en) * 2020-04-17 2020-08-14 微位(深圳)网络科技有限公司 Online address book information protection method
CN110717163B (en) * 2019-10-15 2022-02-01 维沃移动通信有限公司 Interaction method and terminal equipment
CN114594922A (en) * 2022-03-14 2022-06-07 阿波罗智能技术(北京)有限公司 Display control method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080102793A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Automated Secure Pairing for Wireless Devices
US20080209055A1 (en) * 2007-02-22 2008-08-28 Kabushiki Kaisha Toshiba Data communication system
CN102316197A (en) * 2011-09-07 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Method for acquiring contact information and device
CN103024061A (en) * 2012-12-24 2013-04-03 青岛英特沃克网络科技有限公司 Network address book sharing system and network address book sharing method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080102793A1 (en) * 2006-10-31 2008-05-01 Microsoft Corporation Automated Secure Pairing for Wireless Devices
US20080209055A1 (en) * 2007-02-22 2008-08-28 Kabushiki Kaisha Toshiba Data communication system
CN102316197A (en) * 2011-09-07 2012-01-11 宇龙计算机通信科技(深圳)有限公司 Method for acquiring contact information and device
CN103024061A (en) * 2012-12-24 2013-04-03 青岛英特沃克网络科技有限公司 Network address book sharing system and network address book sharing method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125228B (en) * 2014-07-30 2018-09-04 北京智谷睿拓技术服务有限公司 Exchange method and device
CN104125228A (en) * 2014-07-30 2014-10-29 北京智谷睿拓技术服务有限公司 Interaction method and interaction device
CN104302013A (en) * 2014-09-05 2015-01-21 北京奇虎科技有限公司 Data acquisition method, device and system
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
CN106804034A (en) * 2017-01-06 2017-06-06 车广为 A kind of electronic business card system
CN106856534A (en) * 2017-01-06 2017-06-16 车广为 A kind of electronic business card and implementation method
CN106804034B (en) * 2017-01-06 2022-04-26 武汉威克睿特科技有限公司 Electronic business card system
CN107222608A (en) * 2017-07-11 2017-09-29 深圳传音通讯有限公司 Contact person's sharing method and user terminal
CN110311937A (en) * 2018-03-20 2019-10-08 广达电脑股份有限公司 Data forwarding system
CN108846293A (en) * 2018-06-12 2018-11-20 北京阿尔山金融科技有限公司 Resume information generation method and device
CN110475034A (en) * 2019-07-23 2019-11-19 深圳市六度人和科技有限公司 Improve method, user end apparatus, server unit and the system of phone safety
CN110717163B (en) * 2019-10-15 2022-02-01 维沃移动通信有限公司 Interaction method and terminal equipment
CN111541810A (en) * 2020-04-17 2020-08-14 微位(深圳)网络科技有限公司 Online address book information protection method
CN111541810B (en) * 2020-04-17 2021-04-02 微位(深圳)网络科技有限公司 Online address book information protection method
CN114594922A (en) * 2022-03-14 2022-06-07 阿波罗智能技术(北京)有限公司 Display control method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN103401949B (en) 2016-12-28

Similar Documents

Publication Publication Date Title
CN103401949A (en) Personal data safety sharing system and method for mobile phone
US7769176B2 (en) Systems and methods for a secure recording environment
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
US7848524B2 (en) Systems and methods for a secure recording environment
US7853800B2 (en) Systems and methods for a secure recording environment
CN105229985A (en) Identity tokens
CN101252596A (en) Method and system for protecting number information privacy
CN101917711A (en) Mobile communication system and voice call encryption method thereof
CN102143487A (en) Negotiation method and negotiation system for end-to-end session key
WO2017063438A1 (en) Voice encryption method, system and apparatus
US20100177899A1 (en) Encrypted communication system
CN103179557A (en) Real-time encryption and decryption method and system for communication data and mobile terminal
CN108650674A (en) A kind of information security enciphering hiding coding system
CN105516943A (en) Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof
CN100514999C (en) Method, terminal device and communication system for realizing virtual terminal communication
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN100512103C (en) Secret key distributing method of end-to-end encrypted telecommunication
CN103595855B (en) Business card system for mobile phone
CN105471711A (en) Mail encryption system based on intelligent mobile phone and realization method thereof
CN109274690A (en) Group's data ciphering method
CN110324374A (en) A kind of mobile device and its working method for information security backup
AU2017272289A1 (en) System and method for machine-to-machine privacy and security brokered transactions
CN113132090B (en) System for sharing quantum key and secret communication method based on system
CN103634313A (en) Address list processing method and device, as well as mobile terminal
JP2019029723A (en) Telephone controller

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant