CN105657693A - Encryption method, device and system for short message and/or real time short data - Google Patents

Encryption method, device and system for short message and/or real time short data Download PDF

Info

Publication number
CN105657693A
CN105657693A CN201410640159.XA CN201410640159A CN105657693A CN 105657693 A CN105657693 A CN 105657693A CN 201410640159 A CN201410640159 A CN 201410640159A CN 105657693 A CN105657693 A CN 105657693A
Authority
CN
China
Prior art keywords
key
short data
note
time short
basis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201410640159.XA
Other languages
Chinese (zh)
Inventor
赵春平
许瑞锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xin Wei Yongsheng Telecom Technology Co Ltd
Beijing Xinwei Telecom Technology Inc
Original Assignee
Beijing Xin Wei Yongsheng Telecom Technology Co Ltd
Beijing Xinwei Telecom Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xin Wei Yongsheng Telecom Technology Co Ltd, Beijing Xinwei Telecom Technology Inc filed Critical Beijing Xin Wei Yongsheng Telecom Technology Co Ltd
Priority to CN201410640159.XA priority Critical patent/CN105657693A/en
Publication of CN105657693A publication Critical patent/CN105657693A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an encryption method for short message and/or real time short data. The encryption method comprises the following steps: establishing a short message and/or real time short data base key by a user, wherein the base key is conserved at a user terminal and a safety management entity; using a local base key to encrypt the short message and/or the real time short data by a sender and then transmitting the short message and/or the real time short data; using the base key of the sender to decrypt and recover the clear-text short message and/or the real time short data by the safety management entity, and then using a base key of a receiver to encrypt the short message and/or the real time short data and then transmitting the short message and/or the real time short data to the receiver; and using the local base key to decrypt the clear-text short message and/or the real time short data by the receiver. The invention further provides a corresponding device and system. The encryption method, device and system for the short message and/or the real time short data provided by the invention can realize secure transmission of the short message and/or the real time short data in case of not increasing extra key transmission overhead, can also realize one-time pad, and satisfy the security requirement of a command and dispatch cluster private network terminal.

Description

The encryption method of note and/or in real time short data, device and system
Technical field
The present invention relates to the communications field, particularly relate to note and/or the in real time encryption method of short data, device and system.
Background technology
Note, shortmessageservice, is called for short SMS, it it is a kind of telecommunication traffic produced with digital mobile communication system, by the signaling passage of mobile communication system and signalling network, store and forward word or numerical information, belong to the data communication service of a kind of non real-time, non-voice.
Real-time short data is a kind of data services that wideband multimedia digital cluster system proposes, between wireless terminals or between wireless terminal and dispatcher station, by the signaling passage of broadband multimedia cluster system, transmit word or numerical information, network side does not need to store, return response message after requiring take over party to receive immediately to transmission side, belong to a kind of in real time, the data communication service of non-voice. Real-time short data can be mode one to one, it is also possible to be one to many modes in a cluster group.
Note and real-time short data have a lot of general character, and unique difference is exactly whether network side is store to forward.
Along with the development of broadband multimedia cluster system, all note and real-time short data are proposed secret requirement, but owing to note and real-time short data do not need service conversation process of establishing, so to be met the secret requirement of note and real-time short data, topmost problem solves cipher key management considerations. Generally, when number of users is little, it is possible to adopt the mode of preset key, it is desired to each terminal to be preserved the note Protective Key of the other-end communicated with. But when number of users is many, preset key requires very high maintenance cost, and the storage requirement and performance requriements to terminal all can improve.
Summary of the invention
For solving the problem, the present invention proposes a kind of note and/or the encryption method of real-time short data, comprising: each user terminal has note and/or real-time short data basis key, and described basis key is kept at user terminal and security management entity;Transmission side sends after using local basis double secret key note and/or real-time short data to be encrypted; Described security management entity uses the basic secret key decryption of transmission side to recover note expressly and/or real-time short data, is sent to take over party after then using the basic key of take over party to encrypt; Take over party uses local basis secret key decryption to go out note expressly and/or real-time short data.
Preferably, also comprise: described transmission side send a note and/or in real time short data time also generate a session key, transmissions side uses and is encrypted by note and/or real-time short data content described in the work double secret key of session key and basic secret generating; Transmission side sends described session key, and ciphertext note and/or real-time short data; Security management entity use transmission side's basis key and the session secret generating transmission side work secret key decryption received go out note expressly and/or real-time short data, re-use described session key and take over party basis secret generating take over party work described in double secret key note expressly and/or in real time short data be encrypted, send is to take over party; Take over party uses the session key received and local basis secret generating work secret key decryption to go out note expressly and/or real-time short data.
Further, described transmission side sends after using session key described in local basic double secret key to be encrypted again; After described security management entity uses the basic secret key decryption of transmissions side to go out plaintext session key, re-use plaintext session key described in the basic double secret key of take over party and it is sent to take over party after being encrypted; Described take over party uses local basis secret key decryption to go out expressly session key.
Preferably, described session key is sequence number, time stamp or randomized number.
Preferably, described basis key adopts static preset or derivative by authentication mechanism.
Preferably, the basic key of each user is identical or different; Note and/or real-time short data basis key are identical or different to many notes and/or real-time short data basis key with one one to one.
Based on identical design, the present invention also proposes a kind of sending method, device realizing aforesaid method, comprises key management module, encryption module and sending module, and described key management module is for preserving note and/or real-time short data basis key; Described encryption module for use described basis key to sent note and/or in real time short data be encrypted and pass to described sending module; Described sending module is for sending the note through encryption/decryption module encryption and/or real-time short data.
Preferably, described key management module is also for the note of each transmission and/or the session key of short data generation in real time, it may also be useful to described session key and basis secret generating work key; Described encryption module for use described work key to sent note and/or in real time short data be encrypted and pass to described sending module; Described sending module is also for sending the session key that described key management module generates.
Preferably, described key management module is also for using session key described in the double secret key of described basis to be encrypted and pass to described sending module, and described sending module sends encrypted session key.
Based on identical design, the present invention also proposes a kind of take over party's device realizing aforesaid method, comprises key management module, receiver module and deciphering module, and described key management module is for preserving note and/or real-time short data basis key;Described receiver module for receive ciphertext note and/or in real time short data and pass to described deciphering module; The ciphertext note that described deciphering module receives for using receiver module described in the double secret key of described basis and/or in real time short data are decrypted.
Preferably, described receiver module is also for receiving session key and pass to described key management module; Described key management module is also for using described session key and basis secret generating work key; The ciphertext note that described deciphering module receives for using receiver module described in described work double secret key and/or in real time short data are decrypted.
Preferably, the session key of described reception is ciphertext session key, then described key management module is also for using ciphertext session secret key decryption described in the double secret key of described basis, it may also be useful to the session key of deciphering and described basis secret generating work key.
Based on identical design, the present invention also proposes a kind of security management entity device realizing aforesaid method, described device is for preserving the basic key of each user, and the basic secret key decryption using transmission side goes out note expressly and/or real-time short data, after re-using the basic key encryption of take over party, it is sent to take over party.
Preferably, described device is also for using the transmission side's work secret key decryption by transmission side's basis key and the session secret generating of reception to go out expressly note and/or in real time short data, the take over party re-using described session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party.
Preferably, when the session key that described device receives is ciphertext session key, described device uses basis, transmission side secret key decryption to go out expressly session key; The transmission side's work secret key decryption by transmission side's basis key and described plaintext session secret generating is used to go out expressly note and/or in real time short data, the take over party re-using described plaintext session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party; Also using take over party basis key to encrypt described plaintext session key, send is to take over party.
Finally, the present invention also proposes a kind of system realizing aforesaid method, comprises sending method, device as above, take over party's device and security management entity device.
The present invention can realize the safe transmission of note/real-time short data when not increasing additional keys transmission expense, it is also possible to realizes one-time pad, meets the requirement of the security of the cluster private network terminal of command scheduling.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, it is briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the system tray composition that McWiLL group system terminal realizes the encryption method that the present invention proposes;
Fig. 2 is SMS encryption processing flow chart;
Fig. 3 is real-time short data encrypt treatment schema.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments;It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
The present invention proposes a kind of note and/or the encryption method of real-time short data, comprising:
Each user sets up note and/or real-time short data basis key, and described basis key is kept at user terminal and security management entity;
Transmission side sends after using local basis double secret key note and/or real-time short data to be encrypted;
Described security management entity uses the basic secret key decryption of transmission side to go out note expressly and/or real-time short data, is sent to take over party after then using the basic key of take over party to encrypt;
Take over party uses local basis secret key decryption to go out note expressly and/or real-time short data.
In aforesaid method, transmission side send a note and/or in real time short data time, it is also possible to generating a session key, transmissions side uses and is encrypted by note and/or real-time short data content described in the work double secret key of session key and basic secret generating; Transmission side sends described session key, and ciphertext note and/or real-time short data; Security management entity use transmission side's basis key and the session secret generating transmission side work secret key decryption received go out note expressly and/or real-time short data, re-use described session key and take over party basis secret generating take over party work described in double secret key note expressly and/or in real time short data be encrypted, send is to take over party; Take over party uses the session key received and local basis secret generating work secret key decryption to go out note expressly and/or real-time short data.
Further, described transmission side sends after using session key described in local basic double secret key to be encrypted again; After described security management entity uses the basic secret key decryption of transmissions side to go out plaintext session key, re-use plaintext session key described in the basic double secret key of take over party and it is sent to take over party after being encrypted; Described take over party uses local basis secret key decryption to go out expressly session key.
Session key in above-mentioned each method can adopt sequence number, time stamp or randomized number; Basis key can adopt static preset, it is also possible to is derived by authentication mechanism. Especially, the basic key of each user can be all identical, naturally it is also possible to different. In addition, to each user, the basic key of many notes and/or real-time short data can be adopted same with one by the basic key of note and/or real-time short data one to one, it is possible to use two different.
For McWiLL group system, the encryption method that the present invention proposes is described in detail below.
Please refer to accompanying drawing 1, the function of each integral part is described as follows:
UT: the termination function module realizing McWiLL broadband multimedia cluster system network.
McBTS:McWiLL base station network element, it is achieved air interface function, comprises air interface physical layer, MAC layer and Network layer function, and user is linked into different business service networks.
SMC: sms center, is responsible for the forwarding of process note/real-time short data.
SeS: security server.
Embodiment 1: SMS encryption processes
Please refer to accompanying drawing 2, encryption note treatment scheme comprises the steps:
Step 101, UT1 send MO short message sending request message to the McBTS at place;
Step 102, McBTS forward MO short message sending request message to SMC;
Step 103, SMC send MO short message sending response message to McBTS;
Step 104, McBTS send MO short message sending response message to UT1;
Step 105, SMC send note decoding request to SeS, carry the identification number of the short message content after encryption and UT1;
Step 106, SeS inquire corresponding key according to the identification number of UT1, are decrypted by the short message content after encryption, then send deciphering response to SMC, carry the short message content after deciphering;
Short message content after deciphering is stored by step 107, SMC, then sends SMS encryption request to SeS, carries the identification number of expressly short message content and UT2;
Step 108, SeS inquire corresponding key according to the identification number of UT2, are encrypted by short message content, then send SMS encryption and reply to SMC, carry the short message content after encryption;
Step 109, SMC send MT short message sending request to McBTS;
Step 110, McBTS forward MT short message sending request to UT2;
Step 111, UT2 perform deciphering, obtain expressly short message content, then send MT short message sending and reply to McBTS;
Step 112, McBTS forward MT short message sending and reply to SMC.
Embodiment 2: short data encrypt treatment in real time (assuming that each user has identical basic key, it may also be useful to the time stabs as session key)
Please refer to accompanying drawing 3, the flow process that encryption short data sends specifically comprises the steps:
Step 201, UT1 obtain local time stamp, and use basis key and time stamp evaluation work key, after using work double secret key short data content to be encrypted, sending MO short data to the McBTS at place and send a request message, wherein time stamp uses basis key to be encrypted;
Step 202, McBTS forward MO short data to SMC and send a request message;
Step 203, SMC send session secret key request message to SeS, carry the identification number of UT1 and UT2, and the stamp of the time through encryption that UT1 sends;
First step 204, SeS inquire the basic key of UT1 and UT2, and the basic key comparing UT1 with UT2 is identical, then SeS directly sends session key response message to SMC, still carries the time stamp of the encryption in session secret key request message in message;
Step 205, SMC send MT short data request message to McBTS, and wherein time stamp extends this as SeS and replys in message the ciphertext time stamp returned at session key;
Step 206, McBTS forward MT short data request message to UT2;
Step 207, UT2 use basis double secret key ciphertext time stamp to be decrypted, recover expressly time stamp, then use basis key and time stamp evaluation work key, then use work double secret key ciphertext note to be decrypted and recover expressly note, finally send MT short data response message to McTBS;
Step 208, McBTS forward MT short data response message to SMC;
Step 209, SMC send MO short data response message to McBTS;
Step 210, McBTS send MO short data response message to UT1.
In the present embodiment, if the basic key of UT1 and UT2 is different, then SeS needs first decrypted session key, calculates transmission side's work key and deciphers real-time short data; And then calculate take over party and work key and encrypt real-time short data, and use take over party basis key encrypted session key, then the two is sent to take over party, concrete process is similar to the encrypt treatment of note to embodiment 1, repeats no more.
Based on identical design, the present invention also proposes a kind of sending method, device realizing aforesaid method, comprises key management module, encryption module and sending module, and described key management module is for preserving note and/or real-time short data basis key; Described encryption module for use described basis key to sent note and/or in real time short data be encrypted and pass to described transceiver module; Described sending module is for sending the note through encryption/decryption module encryption and/or real-time short data.
Preferably, described key management module is also for the note of each transmission and/or the session key of short data generation in real time, it may also be useful to described session key and basis secret generating work key; Described encryption module for use described work key to sent note and/or in real time short data be encrypted and pass to described sending module; Described sending module is also for sending the session key that described key management module generates.
Preferably, described key management module is also for using session key described in the double secret key of described basis to be encrypted and pass to described sending module, and described sending module sends encrypted session key.
Based on identical design, the present invention also proposes a kind of take over party's device realizing aforesaid method, comprises key management module, receiver module and deciphering module, and described key management module is for preserving note and/or real-time short data basis key; Described receiver module for receive ciphertext note and/or in real time short data and pass to described deciphering module; The ciphertext note that described deciphering module receives for using receiver module described in the double secret key of described basis and/or in real time short data are decrypted.
Preferably, described receiver module is also for receiving session key and pass to described key management module; Described key management module is also for using described session key and basis secret generating work key; The ciphertext note that described deciphering module receives for using receiver module described in described work double secret key and/or in real time short data are decrypted.
Preferably, the session key of described reception is ciphertext session key, then described key management module is also for using ciphertext session secret key decryption described in the double secret key of described basis, it may also be useful to the session key of deciphering and described basis secret generating work key.
Based on identical design, the present invention also proposes a kind of security management entity device realizing aforesaid method, described device is for preserving the basic key of each user, and the basic secret key decryption using transmission side goes out note expressly and/or real-time short data, after re-using the basic key encryption of take over party, it is sent to take over party.
Preferably, described device is also for using the transmission side's work secret key decryption by transmission side's basis key and the session secret generating of reception to go out expressly note and/or in real time short data, the take over party re-using described session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party.
Preferably, when the session key that described device receives is ciphertext session key, described device uses basis, transmission side secret key decryption to go out expressly session key; The transmission side's work secret key decryption by transmission side's basis key and described plaintext session secret generating is used to go out expressly note and/or in real time short data, the take over party re-using described plaintext session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party;Also using take over party basis key to encrypt described plaintext session key, send is to take over party.
Finally, the present invention also proposes a kind of system realizing aforesaid method, comprises sending method, device as above, take over party's device and security management entity device.
The present invention can realize the safe transmission of note/real-time short data when not increasing additional keys transmission expense, it is also possible to realizes one-time pad, meets the requirement of the security of the cluster private network terminal of command scheduling.
One of ordinary skill in the art will appreciate that: all or part of step realizing aforesaid method embodiment can be completed by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising aforesaid method embodiment; And aforesaid storage media comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Last it is noted that above embodiment is only in order to illustrate the technical scheme of the present invention, it is not intended to limit; Although with reference to previous embodiment to invention has been detailed description, it will be understood by those within the art that: the technical scheme described in foregoing embodiments still can be modified by it, or wherein part technology feature is carried out equivalent replacement; And these amendments or replacement, do not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution.

Claims (16)

1. the encryption method of a note and/or real-time short data, it is characterised in that, comprising:
User sets up note and/or real-time short data basis key, and described basis key is kept at user terminal and security management entity;
Transmission side sends after using local basis double secret key note and/or real-time short data to be encrypted;
Described security management entity uses the basic secret key decryption of transmission side to recover note expressly and/or real-time short data, is sent to take over party after then using the basic key of take over party to encrypt;
Take over party uses local basis secret key decryption to go out note expressly and/or real-time short data.
2. method according to claim 1, it is characterised in that, also comprise:
Described transmission side send a note and/or in real time short data time, also generate a session key, transmissions side uses and is encrypted by note and/or real-time short data content described in the work double secret key of session key and basic secret generating;
Transmission side sends described session key, and ciphertext note and/or real-time short data;
Security management entity use transmission side's basis key and the session secret generating transmission side work secret key decryption received go out note expressly and/or real-time short data, re-use described session key and take over party basis secret generating take over party work described in double secret key note expressly and/or in real time short data be encrypted, send is to take over party;
Take over party uses the session key received and local basis secret generating work secret key decryption to go out note expressly and/or real-time short data.
3. method according to claim 2, it is characterised in that, also comprise:
Described transmission side sends after using session key described in local basic double secret key to be encrypted again;
After described security management entity uses the basic secret key decryption of transmissions side to go out plaintext session key, re-use plaintext session key described in the basic double secret key of take over party and it is sent to take over party after being encrypted;
Described take over party uses local basis secret key decryption to go out expressly session key.
4. method according to claim 2, it is characterised in that, described session key is sequence number, time stamp or randomized number.
5. method according to Claims 1 to 4 any one, it is characterised in that, described basis key adopts static preset or derived by authentication mechanism.
6. method according to Claims 1 to 4 any one, it is characterised in that,
The basic key of each user is identical or different;
Note and/or real-time short data basis key are identical or different to many notes and/or real-time short data basis key with one one to one.
7. one kind realizes the sending method, device of method as described in claim 1��6, it is characterised in that, described device comprises key management module, encryption module and sending module,
Described key management module is for preserving note and/or real-time short data basis key;
Described encryption module for use described basis key to sent note and/or in real time short data be encrypted and pass to described sending module;
Described sending module is for sending the note through encrypting module encrypt and/or real-time short data.
8. device according to claim 7, it is characterised in that,
Described key management module is also for the note of each transmission and/or the session key of short data generation in real time, it may also be useful to described session key and basis secret generating work key;
Described encryption module for use described work key to sent note and/or in real time short data be encrypted and pass to described sending module;
Described sending module is also for sending the session key that described key management module generates.
9. device according to claim 8, it is characterised in that, described key management module is also for using session key described in the double secret key of described basis to be encrypted and pass to described sending module, and described sending module sends encrypted session key.
10. one kind realizes take over party's device of method as described in claim 1��6, it is characterised in that, described device comprises key management module, receiver module and deciphering module,
Described key management module is for preserving note and/or real-time short data basis key;
Described receiver module for receive ciphertext note and/or in real time short data and pass to described deciphering module;
The ciphertext note that described deciphering module receives for using receiver module described in the double secret key of described basis and/or in real time short data are decrypted.
11. devices according to claim 10, it is characterised in that, also comprise:
Described receiver module is also for receiving session key and pass to described key management module;
Described key management module is also for using described session key and basis secret generating work key;
The ciphertext note that described deciphering module receives for using receiver module described in described work double secret key and/or in real time short data are decrypted.
12. devices according to claim 11, it is characterized in that, the session key of described reception is ciphertext session key, then described key management module is also for using ciphertext session secret key decryption described in the double secret key of described basis, it may also be useful to the session key of deciphering and described basis secret generating work key.
13. 1 kinds realize the security management entity device of method as described in claim 1��6, it is characterized in that, described device is for preserving the basic key of each user, and the basic secret key decryption using transmission side goes out note expressly and/or real-time short data, after re-using the basic key encryption of take over party, it is sent to take over party.
14. devices according to claim 13, it is characterized in that, described device is also for using the transmission side's work secret key decryption by transmission side's basis key and the session secret generating of reception to go out expressly note and/or in real time short data, the take over party re-using described session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party.
15. devices according to claim 14, it is characterised in that, when the session key that described device receives is ciphertext session key,
Basis, transmission side secret key decryption is used to go out expressly session key;
The transmission side's work secret key decryption by transmission side's basis key and described plaintext session secret generating is used to go out expressly note and/or in real time short data, the take over party re-using described plaintext session key and the take over party basis secret generating key that works encrypts described plaintext note and/or real-time short data, and send is to take over party.
Also using take over party basis key to encrypt described plaintext session key, send is to take over party.
16. one kind realizes the system of method as described in claim 1��6, it is characterized in that, described system comprises the sending method, device as described in claim 7��9 any one, the take over party's device as described in claim 10��12 any one and the security management entity device as described in claim 13��15 any one.
CN201410640159.XA 2014-11-13 2014-11-13 Encryption method, device and system for short message and/or real time short data Withdrawn CN105657693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410640159.XA CN105657693A (en) 2014-11-13 2014-11-13 Encryption method, device and system for short message and/or real time short data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410640159.XA CN105657693A (en) 2014-11-13 2014-11-13 Encryption method, device and system for short message and/or real time short data

Publications (1)

Publication Number Publication Date
CN105657693A true CN105657693A (en) 2016-06-08

Family

ID=56479339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410640159.XA Withdrawn CN105657693A (en) 2014-11-13 2014-11-13 Encryption method, device and system for short message and/or real time short data

Country Status (1)

Country Link
CN (1) CN105657693A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN102006570A (en) * 2010-11-12 2011-04-06 中兴通讯股份有限公司 Device and method for encrypting short messages
CN102083019A (en) * 2009-11-30 2011-06-01 徐克林 Method for encrypting mobile phone short message

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340443A (en) * 2008-08-28 2009-01-07 中国电信股份有限公司 Session key negotiating method, system and server in communication network
CN102083019A (en) * 2009-11-30 2011-06-01 徐克林 Method for encrypting mobile phone short message
CN101867898A (en) * 2010-07-02 2010-10-20 中国电信股份有限公司 Short message encrypting communication system, method and secret key center
CN102006570A (en) * 2010-11-12 2011-04-06 中兴通讯股份有限公司 Device and method for encrypting short messages

Similar Documents

Publication Publication Date Title
CN101340443B (en) Session key negotiating method, system and server in communication network
CN101867898B (en) Short message encrypting communication system, method and secret key center
CN108510270B (en) Mobile transfer method with safe quantum
CN103338437B (en) The encryption method of a kind of mobile instant message and system
CN101247356B (en) DHCP message passing method and system
CN102196425A (en) Quantum-key-distribution-network-based mobile encryption system and communication method thereof
CN102740239B (en) The method and system of secure transmission of media information
CN101383698A (en) Session cipher key distributing method and system
CN101188496A (en) A SMS encryption transport method
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN101141680A (en) Short message encrypting transmission and reception method
CN101951601A (en) Method and system for encrypting voice calls in mobile communication network, terminal and network side
CN103167494B (en) Method for sending information and system
CN105208028A (en) Data transmission method and related device and equipment
CN105792190A (en) Data encryption, decryption and transmission method in communication system
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN102123361B (en) Method and device for realizing encrypted message communication
CN104270380A (en) End-to-end encryption method and system based on mobile network and communication client side
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
CN104602208A (en) Short message encrypted communication method based on mobile network
CN101854594A (en) Method and device for transmitting information and method and device for receiving information
CN105262759A (en) Method and system for encrypted communication
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN101841783A (en) Short message safety communication method, system and device based on STK (SIM Tool Kit) business
CN101404574B (en) Method and system for handling service through mobile sale point terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20160608