CN106304044B - Method and device for enhancing conversation security and communication terminal - Google Patents

Method and device for enhancing conversation security and communication terminal Download PDF

Info

Publication number
CN106304044B
CN106304044B CN201510280631.8A CN201510280631A CN106304044B CN 106304044 B CN106304044 B CN 106304044B CN 201510280631 A CN201510280631 A CN 201510280631A CN 106304044 B CN106304044 B CN 106304044B
Authority
CN
China
Prior art keywords
call
telephone number
encrypted
real telephone
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510280631.8A
Other languages
Chinese (zh)
Other versions
CN106304044A (en
Inventor
邵寿平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510280631.8A priority Critical patent/CN106304044B/en
Publication of CN106304044A publication Critical patent/CN106304044A/en
Application granted granted Critical
Publication of CN106304044B publication Critical patent/CN106304044B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a method, a device and a communication terminal for enhancing conversation safety, wherein the method comprises the following steps: when the call is sent, the call service module encrypts a real telephone number to be sent to obtain a first encrypted number, and then sends a call to a user for broadcasting based on the first encrypted number; and the call service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module. The invention encrypts the call number in the application layer, well protects the real contact information of the user call, can improve the call security, and makes up the potential security loophole of the existing smart phone operating system.

Description

Method and device for enhancing conversation security and communication terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a communication terminal for enhancing call security.
Background
With the development of the mobile phone industry, the number of applications installed on the mobile phone is increased rapidly, and some malicious applications can monitor call information and steal the privacy of users. The existing smart phone adopts a safe operating system to protect user information, specifically, call information is hidden in a private mode, the safe operating system is utilized to shield communication between the smart phone and the outside, and communication information is protected to the maximum extent, so that a certain effect can be achieved, but some hidden dangers still exist. For example: android4.4 and the safe operating system of the previous version have a process of processing and broadcasting numbers at the beginning in the dialing process, and if a high-authority broadcast receiver is set by malicious software, the numbers are monitored or tampered, and the protection measures of the safe operating system can be disabled.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method, a device and a communication terminal for enhancing conversation security, so that malicious software is prevented from acquiring real contact information of a communication counterpart.
The invention adopts the technical scheme that the method for enhancing the conversation safety comprises the following steps:
when the call is sent, the call service module encrypts a real telephone number to be sent to obtain a first encrypted number, and then sends a call to a user for broadcasting based on the first encrypted number;
and the call service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module.
Further, the encrypting the real telephone number to be called by the call service module to obtain a first encrypted number includes:
and encrypting the real telephone number by a processing intention function in the class which is contacted with the real telephone number firstly in the call service module to obtain a first encrypted number.
Further, the step of sending the decrypted first encrypted number to the modulation and demodulation module by the call service module includes:
and a receiving processing function in a calling receiving class in the class in which the first contact is made with the real telephone number in the call service module decrypts the first encrypted number to obtain the real telephone number, and then sends the real telephone number to a modulation and demodulation module.
Further, the method further comprises:
when a call comes, the frame module encrypts a real telephone number of the incoming call to obtain a second encrypted number, and then the incoming call is notified based on the second encrypted number.
Further, the frame module encrypts the real telephone number of the incoming call to obtain a second encrypted number, including:
encrypting the real telephone number of the incoming call by the class of the real telephone number of the first contact incoming call in the frame module to obtain a second encrypted number, and creating a call connection object based on the second encrypted number; alternatively, the first and second electrodes may be,
when a call connection object constructing function of a class of a first contact real telephone number of an incoming call in a frame module creates a call connection object, encrypting the corresponding real telephone number of the incoming call.
Further, the encrypting the real telephone number of the incoming call by the class of the real telephone number of the first contact incoming call in the frame module to obtain a second encrypted number includes:
and if the call connection object is empty and the socket information of the incoming real telephone number is not empty, extracting the incoming real telephone number from the socket information of the incoming real telephone number and encrypting.
Further, the encryption process includes:
encrypting the characteristic character string and the information to be encrypted by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm to obtain encrypted information;
the decryption process comprises the following steps:
and based on the characteristic character string, decrypting the encrypted information by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm.
Further, the determination process of the characteristic character string includes:
processing at least one of the following by using MD5(Message-Digest Algorithm 5), SHA (Secure Hash Algorithm) Algorithm or HMAC (hash Message Authentication Code) Algorithm to obtain a characteristic character string: IMSI (International Mobile Subscriber Identity), IMEI (International Mobile Equipment Identity), and a randomly constructed key.
The invention also provides a device for enhancing the conversation safety, which comprises:
the call service module is used for encrypting a real telephone number to be called to obtain a first encrypted number when the call is going, and then carrying out calling broadcasting based on the first encrypted number;
and the first encrypted number is decrypted and then sent to a modulation and demodulation module.
The invention also provides a communication terminal which comprises the device for enhancing the conversation safety.
By adopting the technical scheme, the invention at least has the following advantages:
according to the method, the device and the communication terminal for enhancing the conversation safety, the conversation number is encrypted at the application layer, the real contact information of the conversation of the user is well protected, the conversation safety can be improved, and the potential security loophole of the existing android operating system is made up.
Drawings
FIG. 1 is a flowchart illustrating a method for enhancing security of a call according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for enhancing security of a call according to a second embodiment of the present invention;
FIG. 3 is a schematic diagram of a complete power-off process according to a sixth embodiment of the present invention;
FIG. 4 is a diagram illustrating a complete incoming call flow according to a sixth embodiment of the present invention;
FIG. 5 is a schematic diagram of an encryption process according to a sixth embodiment of the present invention;
FIG. 6 is a schematic diagram illustrating a decryption process according to a sixth embodiment of the present invention;
fig. 7 is a schematic diagram illustrating a display effect of screenshot on an incoming call encryption result according to a sixth embodiment of the present invention.
Detailed Description
To further explain the technical means and effects of the present invention adopted to achieve the intended purpose, the present invention will be described in detail with reference to the accompanying drawings and preferred embodiments.
A first embodiment of the present invention, a method for enhancing call security, as shown in fig. 1, includes the following specific steps:
step S101, when the mobile phone is called, the call service module encrypts a real telephone number to be called to obtain a first encrypted number, and then the mobile phone carries out calling broadcasting based on the first encrypted number.
Specifically, the method for encrypting the real telephone number to be called by the call service module to obtain the first encrypted number includes:
and encrypting the real telephone number by a processing intention function in the class which is contacted with the real telephone number firstly in the call service module to obtain a first encrypted number. If the technical scheme of the invention is applied to an android operating system, the call service module is TeleService.apk which is composed of a plurality of classes, wherein the class which is the first class contacting the real telephone number is the OutgingBroadcast class. When the call is going, the real telephone number to be called is firstly received by the dial plate module Dial.apk and is sent to the OutgingBroadcast class in the TeleService.apk through the intention information, and the processing intention function ProcessIntent in the OutgingBroadcast class acquires the real telephone number to be called from the intention information, and then the real telephone number is encrypted.
And step S102, the call service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module.
Specifically, step S102 includes:
and a receiving processing function in a calling receiving class in the class in which the first contact is made with the real telephone number in the call service module decrypts the first encrypted number to obtain the real telephone number, and then sends the real telephone number to a modulation and demodulation module. If the technical scheme of the invention is applied to an android operating system, the first class in the call service module contacting the real phone number is an outpingbroadcast class, and the outpingbroadcast class further comprises some internal classes, such as: the call receiving class is an outlying call receiver class, and the doReceiver function in the outlying call receiver class can be used for decrypting the first encrypted number.
In the embodiment of the present invention, before sending to the Modem module, that is, the Modem module, the first encrypted number needs to be decrypted, so that the first encrypted number is actually sent to the Modem module or the real phone number, and the Modem module can make a phone call according to the real phone number to be called, so that the normal call of the communication terminal is not affected.
In this embodiment, the encryption process includes:
encrypting the characteristic character string and the information to be encrypted by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm to obtain encrypted information; the information to be encrypted refers to: the aforementioned real telephone number to be called. The BASE64 algorithm is one of the encoding methods for transmitting 8-Bit byte codes for encryption and decryption.
The decryption process comprises the following steps:
and based on the characteristic character string, decrypting the encrypted information by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm.
Further, the determination process of the characteristic character string includes:
and processing at least one of the following by adopting MD5, SHA algorithm or HMAC algorithm to obtain a characteristic character string: IMSI, IMEI, randomly constructed key.
A second embodiment of the present invention is a method for enhancing call security, which is substantially the same as the first embodiment, except that, as shown in fig. 2, the method of this embodiment includes the following incoming call processing steps in addition to steps S101 to S102 of the first embodiment:
step S103, when a call comes, the frame module encrypts the real telephone number of the incoming call to obtain a second encrypted number, and then the incoming call is notified based on the second encrypted number.
Specifically, the frame module encrypts the real telephone number of the incoming call to obtain a second encrypted number, and the method includes the following two ways:
the first mode is as follows: encrypting the real telephone number of the incoming call by the class of the real telephone number of the first contact incoming call in the frame module to obtain a second encrypted number, and creating a call connection object based on the second encrypted number;
the second mode is as follows: when a call connection object constructing function of a class of a first contact real telephone number of an incoming call in a frame module creates a call connection object, encrypting the corresponding real telephone number of the incoming call.
Based on the two modes, if the technical scheme of the invention is applied to an android operating system, the framework module is a frame, the class of the real telephone number of the first contact incoming call in the frame is a CallTracker class,
when an incoming call comes, the real telephone number of the incoming call is firstly received by the Modem module and is sent to the CallTracker class in the frame in the form of socket information. Next, in a first manner, the CallTracker class encrypts the real telephone number of the incoming call first, and creates a call connection object based on a second encrypted number obtained after encryption;
the method for encrypting the real telephone number of the incoming call by the CallTracker class to obtain a second encrypted number comprises the following steps:
the CallTracker class judges whether the call connection object conn is empty and the socket information dc of the incoming real phone number is not empty, and extracts and encrypts the incoming real phone number from the socket information dc of the incoming real phone number if the call connection object conn is empty and the socket information dc of the incoming real phone number is not empty.
In the second method, when a call Connection object is created by a call Connection object construction function Connection function in the CallTracker class, the corresponding real telephone number of the incoming call is encrypted.
In this embodiment, the encryption process includes:
encrypting the characteristic character string and the information to be encrypted by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm to obtain encrypted information; the information to be encrypted refers to: the aforementioned real telephone number to be called out, or the real telephone number to be called in.
The decryption process comprises the following steps:
and based on the characteristic character string, decrypting the encrypted information by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm.
Further, the determination process of the characteristic character string includes:
and processing at least one of the following by adopting MD5, SHA algorithm or HMAC algorithm to obtain a characteristic character string: IMSI, IMEI, randomly constructed key.
A third embodiment of the present invention, which is corresponding to the first embodiment, introduces a device for enhancing communication security, including the following components:
the call service module is used for encrypting a real telephone number to be called to obtain a first encrypted number when the call is going, and then carrying out calling broadcasting based on the first encrypted number;
and the first encrypted number is decrypted and then sent to a modulation and demodulation module.
A fourth embodiment of the present invention is a device corresponding to the second embodiment, in which the call service module of this embodiment includes, in addition to the functions of the call service module of the third embodiment:
and the frame module is used for encrypting the real telephone number of the incoming call to obtain a second encrypted number when the incoming call comes, and then notifying the incoming call based on the second encrypted number.
A fifth embodiment of the present invention is a terminal based on the third and fourth embodiments, and includes the device for enhancing the security of the call in the third and fourth embodiments. The communication terminal of the present embodiment can be understood as a physical device.
A sixth embodiment of the present invention is based on the above embodiments, and an application example of the present invention is described with reference to fig. 3 to 7, by taking a Communication terminal in a GSM (Global system for Mobile Communication) network as an example for making a call.
The embodiment of the invention provides a mechanism for safe conversation, which can carry out encryption and decryption protection on a dialed or incoming telephone number and process the broadcast related to the telephone number, so that the real telephone number still cannot be identified even if the telephone is monitored, and the privacy of a user is protected.
The complete outgoing call flow of the embodiment of the present invention is shown in fig. 3, and the complete incoming call flow is shown in fig. 4. The whole framework of the scheme is realized in TeleService.
As shown in fig. 3, when a call is going, dial dial.apk sends a real phone number to start an outlingbroadcast class in teleservice.apk, which is the first class to contact the real phone number, in the prior art, the class sends a broadcast to its own internal receiver after processing Intent information, and at this time, a bug is generated, and if a malicious application registers a high-authority broadcast receiver, it is possible to preferentially obtain broadcast information, thereby obtaining a real number. Therefore, when the Intent information is processed in the type, the real telephone number is encrypted after being extracted, the encrypted number is used for replacing the real telephone number, and then the broadcast is sent, so that even if the third-party application obtains the broadcast, the real telephone number information cannot be known. And certainly, the OutgingBroadcast class in the TeleService. apk needs to decrypt and restore the encrypted number and then sends the encrypted number to the Modem, so that the bottom layer can normally carry out dial-up connection.
As shown in fig. 4, when an incoming call comes, the bottom-layer Modem reports the incoming call information to the frame layer, and in the prior art, the gsm call tracker class will first obtain the call connection information and perform a series of notifications and broadcasts. If a malicious third party application obtains the broadcast information as before, the actual incoming call number of the user will also be obtained. The real number needs to be encrypted during the grabbing of the number in the gsm calilbacker class, and then some notification is performed, which may include broadcasting. Apk, the number on the incalui will not be decrypted, and only other information such as a real name is displayed in order to prevent malicious applications from acquiring the number information displayed on the incalui.
It should be noted that the encryption access point is different between the incoming call and the outgoing call.
When calling, in order to prevent the broadcast of the real number information, the number can only be encrypted before the broadcast is sent, and the encryption is most reasonable only in the ProcessIntent function by analyzing the OutginBroadcast class. When the dialing information is sent to the bottom layer, the real telephone number needs to be restored, the process spans from TeleService to frame, and if the decryption process is in the frame, some functions for performing preliminary processing judgment on the number cannot be operated. Therefore, the decryption process needs to be advanced, and through the above analysis, it is obtained that the decryption cut-in point should be arranged in the doReceiver function of the internal class outpingcallreceiver of the outpingbroadcast class.
When a call comes, in order to prevent a third party application from acquiring call information from a call interface, a decryption step is not set in the call process, in order to encrypt the number before the GSMCallTracker class sends a call broadcast, two access points can be selected, and the GSMCallTracker class judges that call connection object information conn is empty and socket information dc of a real telephone number is not empty respectively, and immediately encrypts the real telephone number in the socket information dc of the real telephone number;
another is to encrypt the real telephone number in constructing a call connection object. It is preferable to perform the number encryption process in the constructor when constructing the call connection object, considering that the socket information dc of the real phone number will be reused in other branches or cases, preventing an accident from occurring.
The encryption and decryption algorithm designed by the embodiment of the invention consists of two parts, wherein the first part uses MD5 to encrypt and construct an MD5 hash value (namely a characteristic character string in the previous embodiment); the second part uses the Base64 encryption and decryption algorithm to encrypt and decrypt the original number and the MD5 hash value. The specific encryption flow and decryption flow are shown in fig. 5 and fig. 6, respectively.
The key in fig. 5 is a randomly constructed key, and the MD5 hash value is generated using the IMEI, IMSI and the constructed key. In the encryption process, the original number, namely the real telephone number of the opposite party of the call, is encrypted by adopting a Base64 algorithm on the basis of the MD5 hash value and the original number to obtain an encrypted number; the decryption process in fig. 6 is exactly the reverse process of encryption, and corresponding IMSI, IMEI and key are required to be synchronized in the process, so that it is ensured that the encryption results for the same phone number of the other party of the call are different when different communication terminals are used; meanwhile, the non-crackability of the MD5 is utilized, and the security of the encrypted number is enhanced; finally, the bidirectional property of Base64 is utilized to realize the encryption and decryption of numbers.
The encryption and decryption process of the outgoing call process is short, and only the log can be used for observation, and the incoming call encryption result is captured in the embodiment, and the display effect is shown in fig. 7.
According to the method, the device and the communication terminal for enhancing the conversation safety, the conversation number is encrypted at the application layer, the real contact information of the user conversation is well protected, the conversation safety can be improved, and the potential security loophole of the existing android operating system is made up.
While the invention has been described in connection with specific embodiments thereof, it is to be understood that it is intended by the appended drawings and description that the invention may be embodied in other specific forms without departing from the spirit or scope of the invention.

Claims (8)

1. A method for enhancing call security, comprising:
when the call is sent, the call service module encrypts a real telephone number to be sent to obtain a first encrypted number, and then sends a call to a user for broadcasting based on the first encrypted number;
the call service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module;
the communication service module encrypts a real telephone number to be called to obtain a first encrypted number, and the method comprises the following steps:
encrypting the real telephone number by a processing intention function in a class which is first contacted with the real telephone number in a call service module to obtain a first encrypted number;
the communication service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module, and the method comprises the following steps:
and a receiving processing function in a calling receiving class in the class in which the first contact is made with the real telephone number in the call service module decrypts the first encrypted number to obtain the real telephone number, and then sends the real telephone number to a modulation and demodulation module.
2. The method of enhancing call security as recited in claim 1, further comprising:
when a call comes, the frame module encrypts a real telephone number of the incoming call to obtain a second encrypted number, and then the incoming call is notified based on the second encrypted number.
3. The method for enhancing call security according to claim 2, wherein the framework module encrypts the real telephone number of the incoming call to obtain a second encrypted number, and comprises:
encrypting the real telephone number of the incoming call by the class of the real telephone number of the first contact incoming call in the frame module to obtain a second encrypted number, and creating a call connection object based on the second encrypted number; alternatively, the first and second electrodes may be,
when a call connection object constructing function of a class of a first contact real telephone number of an incoming call in a frame module creates a call connection object, encrypting the corresponding real telephone number of the incoming call.
4. The method for enhancing call security according to claim 3, wherein the step of encrypting the real telephone number of the incoming call by the class of the real telephone number of the first contact incoming call in the frame module to obtain the second encrypted number comprises:
and if the call connection object is empty and the socket information of the incoming real telephone number is not empty, extracting the incoming real telephone number from the socket information of the incoming real telephone number and encrypting.
5. The method for enhancing the security of the call according to any one of claims 1 to 4, wherein the encryption process comprises:
encrypting the characteristic character string and the information to be encrypted by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm to obtain encrypted information;
the decryption process comprises the following steps:
and based on the characteristic character string, decrypting the encrypted information by adopting a Cryptographic algorithm, a CRC32 algorithm or a Base64 algorithm.
6. The method for enhancing call security as claimed in claim 5, wherein the determining procedure of the characteristic character string comprises:
processing at least one of the following by using an information-digest algorithm MD5, a secure hash algorithm SHA or a hash message authentication code algorithm HMAC to obtain a characteristic character string: international mobile subscriber identity IMSI, mobile equipment international identity IMEI, a randomly constructed key.
7. An apparatus for enhancing security of a call, comprising:
the call service module is used for encrypting a real telephone number to be called to obtain a first encrypted number when the call is going, and then carrying out calling broadcasting based on the first encrypted number;
the first encrypted number is decrypted and then sent to a modulation and demodulation module;
the communication service module encrypts a real telephone number to be called to obtain a first encrypted number, and the method comprises the following steps:
encrypting the real telephone number by a processing intention function in a class which is first contacted with the real telephone number in a call service module to obtain a first encrypted number;
the communication service module decrypts the first encrypted number and then sends the decrypted first encrypted number to the modulation and demodulation module, and the method comprises the following steps:
and a receiving processing function in a calling receiving class in the class in which the first contact is made with the real telephone number in the call service module decrypts the first encrypted number to obtain the real telephone number, and then sends the real telephone number to a modulation and demodulation module.
8. A communication terminal characterized in that it comprises the means for enhancing the security of a call according to claim 7.
CN201510280631.8A 2015-05-28 2015-05-28 Method and device for enhancing conversation security and communication terminal Active CN106304044B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510280631.8A CN106304044B (en) 2015-05-28 2015-05-28 Method and device for enhancing conversation security and communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510280631.8A CN106304044B (en) 2015-05-28 2015-05-28 Method and device for enhancing conversation security and communication terminal

Publications (2)

Publication Number Publication Date
CN106304044A CN106304044A (en) 2017-01-04
CN106304044B true CN106304044B (en) 2020-02-21

Family

ID=57635684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510280631.8A Active CN106304044B (en) 2015-05-28 2015-05-28 Method and device for enhancing conversation security and communication terminal

Country Status (1)

Country Link
CN (1) CN106304044B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110881040B (en) * 2019-11-27 2022-05-27 成都铂锡金融信息技术有限公司 Calling method and device
CN111404929A (en) * 2020-03-13 2020-07-10 浙江华坤道威数据科技有限公司 System and method applied to enterprise information security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101784046A (en) * 2010-01-28 2010-07-21 东莞宇龙通信科技有限公司 Encryption method, system and mobile terminal of telephone numbers
US8578351B2 (en) * 2002-09-17 2013-11-05 International Business Machines Corporation Hybrid mechanism for more efficient emulation and method therefor
CN103595547A (en) * 2013-11-15 2014-02-19 北京奇虎科技有限公司 Broadcast intercept method and device of intelligent equipment
CN104253899A (en) * 2013-06-27 2014-12-31 腾讯科技(深圳)有限公司 Method and device for controlling communication terminals

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103249036B (en) * 2012-02-10 2017-11-17 宇龙计算机通信科技(深圳)有限公司 The safety call method and mobile terminal of mobile terminal
CN104639770A (en) * 2014-12-25 2015-05-20 北京奇虎科技有限公司 Telephone reporting method, device and system based on mobile terminal
CN104506731B (en) * 2014-12-26 2016-04-20 北京奇虎科技有限公司 The reminding method of Stranger Calls and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578351B2 (en) * 2002-09-17 2013-11-05 International Business Machines Corporation Hybrid mechanism for more efficient emulation and method therefor
CN101784046A (en) * 2010-01-28 2010-07-21 东莞宇龙通信科技有限公司 Encryption method, system and mobile terminal of telephone numbers
CN104253899A (en) * 2013-06-27 2014-12-31 腾讯科技(深圳)有限公司 Method and device for controlling communication terminals
CN103595547A (en) * 2013-11-15 2014-02-19 北京奇虎科技有限公司 Broadcast intercept method and device of intelligent equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
移动普适服务共享中间件及应用;李耀春;《中国优秀硕士学位论文全文数据库》;20140215;第3.2.4节,附图3.14 *

Also Published As

Publication number Publication date
CN106304044A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN103812871B (en) Development method and system based on mobile terminal application program security application
CN105634737B (en) Data transmission method, terminal and system
CN103647784B (en) A kind of method and apparatus of public and private isolation
CN104333455A (en) Secrete communication system and method for smart phone
CN109618344B (en) Safe connection method and device of wireless monitoring equipment
CN101635924B (en) CDMA port-to-port encryption communication system and key distribution method thereof
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN107566413B (en) Smart card security authentication method and system based on data short message technology
CN110234102B (en) Communication method and apparatus
Paik Stragglers of the herd get eaten: Security concerns for GSM mobile banking applications
US20170091483A1 (en) Method and Device for Protecting Address Book, and Communication System
CN107465504A (en) A kind of method and device for improving key safety
CN105657702A (en) Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
CN115499844B (en) Mobile terminal information safety protection system and method
CN108141353B (en) Method and equipment for upgrading cryptographic algorithm
Nie et al. Measuring the deployment of 5g security enhancement
CN105704711A (en) Method for ensuring call communication security, device and user terminal
KR101358375B1 (en) Prevention security system and method for smishing
CN106304044B (en) Method and device for enhancing conversation security and communication terminal
CN101854594A (en) Method and device for transmitting information and method and device for receiving information
CN105812338B (en) Data access control method and network management equipment
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN107995616B (en) User behavior data processing method and device
CN102088692B (en) Method and equipment for locking subscriber identity module (SIM)
CN108270917B (en) Encrypted smart phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant