CN115580862A - Mobile communication data encryption method and system - Google Patents

Mobile communication data encryption method and system Download PDF

Info

Publication number
CN115580862A
CN115580862A CN202211221266.XA CN202211221266A CN115580862A CN 115580862 A CN115580862 A CN 115580862A CN 202211221266 A CN202211221266 A CN 202211221266A CN 115580862 A CN115580862 A CN 115580862A
Authority
CN
China
Prior art keywords
connection
communication
encryption
instruction
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211221266.XA
Other languages
Chinese (zh)
Inventor
唐万伟
王丽侠
马壮
刘立伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tangshan University
Original Assignee
Tangshan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tangshan University filed Critical Tangshan University
Priority to CN202211221266.XA priority Critical patent/CN115580862A/en
Publication of CN115580862A publication Critical patent/CN115580862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention is suitable for the mobile communication security technology, and provides a mobile communication data encryption method and a system, comprising the following steps: receiving a communication connection instruction sent by a user through a sending end; judging the application type of the communication connection instruction, and sending a connection request to a target terminal according to the application type; determining whether the connection request is responded by a target end; when the connection request is responded, establishing an information transmission channel between a sending end and a target end, and judging the application type of the communication connection instruction again; and when the application type of the connection instruction is an encryption application, carrying out communication encryption processing on the information transmission channel. The opposite side can know the communication purpose before communicating, and choose whether to put through the connection according to the environment of the opposite side, and at the same time, after the encrypted connection is communicated, the content of the communication is encrypted by generating a unique secret key, and the secret key is randomly generated during each communication, so that the safety in the communication process is further ensured.

Description

Mobile communication data encryption method and system
Technical Field
The invention belongs to the technical field of mobile communication safety, and particularly relates to a mobile communication data encryption method and system.
Background
In recent years, with the rapid development of mobile communication services, communication devices such as mobile phones have become an indispensable part of people's lives. However, since voice calls usually contain important information, such as personal information, business information, and even national secrets, the information, if illegally obtained by an eavesdropper, will cause a significant harm to the benefit of individuals or groups.
In the prior art, a mode of a built-in encryption chip is generally adopted for protecting the conversation security of a user, but in an actual conversation environment, even if a communication path is encrypted, in a communication process, a communicator cannot know whether an opposite side is in an environment convenient for communication, so that the communication content can be easily heard by other people, and the opposite side cannot know whether the communication content is a confidential event in advance before answering, so that complete confidentiality in the communication process is difficult to realize.
Disclosure of Invention
An embodiment of the present invention provides a mobile communication data encryption method, which aims to solve the technical problems in the prior art determined in the background art.
The embodiment of the invention is realized in such a way that a mobile communication data encryption method comprises the following steps:
receiving a communication connection instruction sent by a user through a sending end;
judging the application type of the communication connection instruction, and sending a connection request to a target terminal according to the application type;
determining whether the connection request is responded by a target end;
when the connection request is responded, establishing an information transmission channel between the sending end and the target end, and judging the application type of the communication connection instruction again;
and when the application type of the connection instruction is an encryption application, carrying out communication encryption processing on the information transmission channel.
Preferably, the step of sending the connection request to the target end according to the application type specifically includes:
when the communication connection instruction is a common connection instruction, sending a common communication connection application to a target end;
and when the communication connection instruction is an encryption connection instruction, sending an encryption communication connection application to a target end.
Preferably, the step of determining whether the connection request is responded by the target specifically includes:
receiving receipt information of the target end to the connection request;
and judging whether the connection request is responded according to the receipt information.
Preferably, the step of determining again the application type of the communication connection command specifically includes:
when the communication connection instruction is a common connection instruction, establishing common communication connection;
and when the communication connection instruction is an encryption connection instruction, establishing encryption communication connection.
Preferably, the step of performing communication encryption processing on the information transmission channel specifically includes:
establishing a unique connection secret key according to the information transmission channel;
encoding information transmission data sent by a sending end, and encrypting the encoded data through the connection secret key;
and sending the connection secret key to the target end, and decrypting the encoded data through the connection secret key when the encoded data is transmitted to the target end.
Preferably, the mobile communication data encryption system includes:
the information receiving module is used for receiving a communication connection instruction sent by a user through the sending end;
the application judging module is used for judging the application type of the communication connection instruction and sending a connection request to a target end according to the application type;
the connection judging module is used for judging whether the connection request is responded by the target end;
a connection establishing module, configured to establish an information transmission channel between the sending end and the target end when the connection request is responded, and determine the application type of the communication connection instruction again;
and the information encryption module is used for carrying out communication encryption processing on the information transmission channel when the application type of the connection instruction is an encryption application.
Preferably, the application determination module includes:
a common application unit, configured to send a common communication connection application to a target end when the communication connection instruction is a common connection instruction;
and the encryption application unit is used for sending an encryption communication connection application to the target end when the communication connection instruction is an encryption connection instruction.
Preferably, the connection determination module includes:
a receipt receiving unit, configured to receive receipt information of the connection request from the target end;
a receipt determination unit configured to determine whether the connection request is responded according to the receipt information.
Preferably, the connection establishing module includes:
the common connection unit is used for establishing common communication connection when the communication connection instruction is a common connection instruction;
and the encryption connection unit is used for establishing encryption communication connection when the communication connection instruction is an encryption connection instruction.
Preferably, the information encryption module includes:
the key establishing unit is used for establishing a unique connection key according to the information transmission channel;
the coding and encrypting unit is used for coding the information transmission data sent by the sending end and encrypting the coded data through the connection secret key;
and the key transmission unit is used for sending the connection key to the target end and decrypting the encoded data through the connection key when the encoded data is transmitted to the target end.
The embodiment of the invention has the beneficial effects that:
the method has the advantages that the opposite side can know the communication purpose before communication by selecting an encryption communication or common communication mode before connection application, and can select whether to connect according to the environment where the opposite side is located, meanwhile, after the connection is encrypted and communicated, the content of the communication can be encrypted by generating a unique secret key, and the secret key is randomly generated during each communication, so that the safety in the communication process is further ensured.
Drawings
Fig. 1 is a flowchart of a mobile communication data encryption method according to an embodiment of the present invention;
fig. 2 is a flowchart of a step of sending a connection request to a target according to the application type according to the embodiment of the present invention;
fig. 3 is a flowchart of a step of determining whether the connection request is responded by the target according to an embodiment of the present invention;
fig. 4 is a flowchart for determining the application type of the communication connection command again according to the embodiment of the present invention;
fig. 5 is a flowchart of a step of performing communication encryption processing on the information transmission channel according to an embodiment of the present invention;
fig. 6 is an architecture diagram of a mobile communication data encryption system according to an embodiment of the present invention;
FIG. 7 is an architecture diagram of an application determination module according to an embodiment of the present invention;
fig. 8 is an architecture diagram of a connection determining module according to an embodiment of the present invention;
fig. 9 is an architecture diagram of a connection establishment module provided by an embodiment of the present invention;
fig. 10 is an architecture diagram of an information encryption module according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another.
Fig. 1 is a flowchart of a mobile communication data encryption method according to an embodiment of the present invention, and as shown in fig. 1, a mobile communication data encryption method includes the following steps:
s100, receiving a communication connection instruction sent by a user through a sending end;
in this step, the communication connection instruction sent by the user through the sending end may include personal information of the sending end user, a connection application number (such as a mobile phone number), a communication environment of the sending end user, a type (encrypted or unencrypted) of the connection instruction, and the like, so that the target end user can know an object and a communication purpose of the communication in advance.
S200, judging the application type of the communication connection instruction, and sending a connection request to a target terminal according to the application type;
in the step, the communication connection instruction is judged in advance, so that the target end user can know the purpose of the communication in advance, and when the connection instruction is a common connection application, the target end user can select a direct unified connection application to communicate with the sending end user; and when the connection instruction is an encrypted connection application, the target end user can know in time, and can select whether to approve the connection application or not according to whether the environment where the target end user is located is convenient to communicate or not, or select to approve the connection request after the environment where the target end user is located is changed, and encrypted communication is carried out between the target end user and the sending end user.
S300, judging whether the connection request is responded by a target end;
in this step, when the connection instruction is a common connection application, the target user may select a direct unified connection application, and at this time, the feedback connection request is responded; and when the connection instruction is an encrypted connection application, the target end user can know in time, and can select whether to approve the connection application according to whether the environment where the target end user is located is convenient for communication, and if the target end user selects to reject the communication, the feedback connection request is rejected.
S400, when the connection request is responded, an information transmission channel between a sending end and a target end is established, and the application type of the communication connection instruction is judged again;
in this step, after the connection request of the sending end user is responded by the target end user, a connection channel is directly established between the sending end user and the target end user, and then the type of the sent connection instruction is determined again, the purpose of the determination is to know whether the communication needs to be encrypted, if the connection request is determined to be a common connection application, encryption processing is not performed in the communication process, and if the connection request is determined to be an encrypted connection application, the content is encrypted in the communication process.
And S500, when the application type of the connection instruction is an encryption application, carrying out communication encryption processing on the information transmission channel.
In this step, the content of this connection is automatically encrypted or not encrypted by judging the application type of the communication connection command again, and when the connection request is judged to be an encrypted connection application, the content is encrypted in the communication process.
As shown in fig. 2, as a preferred embodiment of the present invention, the step of sending a connection request to a target end according to the application type specifically includes:
s201, when the communication connection instruction is a common connection instruction, sending a common communication connection application to a target end;
in this step, when the connection purpose of the sending end user is not to communicate confidential content, a common connection instruction can be directly initiated, the sending end can directly send the common connection instruction to the target end, and the target end user can select to directly connect the connection;
s202, when the communication connection instruction is an encryption connection instruction, sending an encryption communication connection application to a target end.
In this step, when the connection purpose of the sending end user is to communicate confidential content, the sending end can directly initiate an encrypted connection instruction, and then the sending end can directly send the encrypted connection instruction to the target end, and then the target end user can select whether to approve the connection application according to whether the environment where the target end user is located is convenient to communicate, or select to approve the connection request after replacing the environment where the target end user is located.
As shown in fig. 3, as a preferred embodiment of the present invention, the step of determining whether the connection request is responded by the target specifically includes:
s301, receiving receipt information of the target end to the connection request;
in this step, the target user makes a decision according to the type of the connection request, and if the connection request is a normal connection request, the target user can directly select to approve or reject the connection according to the self requirement, and if the connection request is encrypted, the target user can select to approve the connection application according to whether the self environment is convenient for communication, or the target user can select to approve the connection request after replacing the self environment.
S302, judging whether the connection request is responded according to the receipt information.
In this step, whether the connection request is responded is judged according to the receipt information, when the receipt information is a connection approval instruction, communication connection is established between the sending end and the target end, and communication between a sending end user and a target end user can be achieved through a voice system or a video system;
when the receipt information is a connection rejection instruction, the target client can select to simply indicate the rejection reason in a text or short voice mode when rejecting the instruction, and the text or short voice can be transmitted to the sending end so that the sending end can know the rejection reason in time, and simultaneously feed back a command of 'whether to resend the connection request' and a command of 'whether to switch the connection request type' to the sending end so that the sending end user can perform the next operation.
As shown in fig. 4, as a preferred embodiment of the present invention, the step of determining again the application type of the communication connection command specifically includes:
s401, when the communication connection instruction is a common connection instruction, establishing common communication connection;
in this step, when the connection is a common connection request, the sending end and the target end are directly in signal communication, and the sending end and the target end can communicate with each other in a voice or video mode;
s402, when the communication connection instruction is an encryption connection instruction, establishing encryption communication connection.
In this step, when the determination result is that the connection is an encrypted connection request, the sending end and the target end are in signal communication, the voice or video content transmitted by the sending end is encrypted, and the content is decrypted when the target end receives the voice or video content.
As shown in fig. 5, as a preferred embodiment of the present invention, the step of performing communication encryption processing on the information transmission channel specifically includes:
s501, establishing a unique connection secret key according to the information transmission channel;
in the step, after an information transmission channel is established between a sending end and a target end, a unique decryption secret key of the connection is directly generated, the secret key is generated randomly, secret keys of each connection are different, and the secret keys are transmitted to the sending end and the target end after being generated;
s502, encoding the information transmission data sent by the sending end, and encrypting the encoded data through the connection secret key;
in this step, when the sending end sends out the voice or video information, encode the information in real time, then encrypt the coded information through the secret key, guarantee the situation that will not reveal the secret in the course of this information transmission, because the secret key is random to produce, steal the section of code purposefully in time for others, because can't obtain the secret key, therefore also difficult to decipher and decode the code, further improve the secret effect;
s503, sending the connection key to the target, and decrypting the encoded data by using the connection key when the encoded data is transmitted to the target.
In this step, the generated secret key is sent to the target end, after the encrypted coding information is transmitted to the target end, the target end can decrypt and decode the code through the unique secret key, so that the code is restored to be expressed by the content of voice or video, the randomly generated secret key is directly sent to the target end and the sending end, synchronous transmission along with the coded content is avoided, and the possibility that the secret key is stolen is avoided.
As shown in fig. 6, a mobile communication data encryption system as a preferred embodiment of the present invention comprises:
an information receiving module 100, configured to receive a communication connection instruction sent by a user through a sending end;
in the information receiving module 100, the user may include personal information of the user at the sending end, a connection application number (such as a mobile phone number, etc.), a communication environment of the user at the sending end, a type (encrypted or unencrypted) of the connection instruction, and the like in a communication connection instruction sent by the sending end, so that the user at the target end can know an object of the communication and a communication purpose in advance.
An application determining module 200, configured to determine an application type of the communication connection instruction, and send a connection request to a target end according to the application type;
the application determination module 200 is used for determining the communication connection instruction in advance, so that the target end user can know the purpose of the communication in advance, and when the connection instruction is a common connection application, the target end user can select a direct unified connection application to communicate with the sending end user; and when the connection instruction is an encrypted connection application, the target end user can know in time, and can select whether to approve the connection application or not according to whether the environment where the target end user is located is convenient to communicate or not, or select to approve the connection request after the environment where the target end user is located is changed, and encrypted communication is carried out between the target end user and the sending end user.
A connection determining module 300, configured to determine whether the connection request is responded by the target;
in the connection determining module 300, when the connection instruction is a general connection application, the target user may select a direct unified connection application, and at this time, the feedback connection request is responded; and when the connection instruction is an encrypted connection application, the target end user can know in time, and can select whether to approve the connection application according to whether the environment where the target end user is located is convenient for communication, and if the target end user selects to reject the communication, the feedback connection request is rejected.
A connection establishing module 400, configured to establish an information transmission channel between the sending end and the target end when the connection request is responded, and determine the application type of the communication connection instruction again;
in the connection establishing module 400, after the connection request of the sending end user is responded by the target end user, a connection channel is directly established between the sending end user and the target end user, and then the type of the sent connection instruction is determined again, the purpose of the determination is to know whether the communication needs to be encrypted, if the connection request is determined to be a common connection application, encryption processing is not performed in the communication process, and if the connection request is determined to be an encrypted connection application, the content is encrypted in the communication process.
And the information encryption module 500 is used for carrying out communication encryption processing on the information transmission channel when the application type of the connection instruction is an encryption application.
The information encryption module 500 automatically encrypts or does not encrypt the content of the current connection by determining the application type of the communication connection command again, and encrypts the content in the communication process when determining that the connection request is an encrypted connection application.
As shown in fig. 7, as a preferred embodiment of the present invention, the application determination module includes:
a common application unit 201, configured to send a common communication connection application to a target end when the communication connection instruction is a common connection instruction;
in the general application unit 201, when the connection purpose of the sending end user is not to communicate confidential content, a general connection instruction can be directly initiated, and then the sending end can directly send the general connection instruction to the target end, and then the target end user can select to directly connect the connection;
and an encryption application unit 202, configured to send an encryption communication connection application to the target end when the communication connection instruction is an encryption connection instruction.
In the encryption application unit 202, when the connection destination of the sending end user is to communicate confidential content, an encryption connection instruction can be directly initiated, the sending end can directly send the encryption connection instruction to the target end, and the target end user can select whether to approve the connection application or not according to whether the environment where the user is located is convenient to communicate or not, or select to approve the connection request after replacing the environment where the user is located.
As shown in fig. 8, as a preferred embodiment of the present invention, the connection determining module includes:
a receipt receiving unit 301, configured to receive receipt information of the connection request from the target end;
in the receipt receiving unit 301, the target user determines according to the type of the connection request, and if the connection request is a normal connection request, the user can directly select to approve or reject the connection according to the own requirement, and if the connection request is an encrypted connection request, the user can select to approve the connection application according to whether the environment of the user is convenient for communication, or select to approve the connection request after replacing the environment of the user.
A response piece determining unit 302, configured to determine whether the connection request is responded according to the response piece information.
The receipt determination unit 302 determines whether the connection request is responded according to the receipt information, and when the receipt information is a connection approval instruction, a communication connection is established between the sending end and the target end, and at this time, communication between the sending end user and the target end user can be realized through a voice system or a video system;
as shown in fig. 9, as a preferred embodiment of the present invention, the connection establishing module includes:
a normal connection unit 401, configured to establish a normal communication connection when the communication connection instruction is a normal connection instruction;
in the ordinary connection unit 401, when the determination result is that the connection is an ordinary connection request, the sending end and the target end are directly in signal communication, and at this time, the sending end and the target end can communicate in a voice or video mode;
an encryption connection unit 402, configured to establish an encrypted communication connection when the communication connection instruction is an encryption connection instruction.
In the encrypted connection unit 402, when the determination result is that the connection is an encrypted connection request, the sending end and the target end are in signal communication, and the voice or video content transmitted by the sending end is encrypted, and the content is decrypted when the target end receives the voice or video content.
As shown in fig. 10, as a preferred embodiment of the present invention, the information encryption module includes:
a key establishing unit 501, configured to establish a unique connection key according to the information transmission channel;
after an information transmission channel is established between the sending end and the target end, the key establishing unit 501 directly generates a unique decryption key of the connection, the key is generated randomly, keys of each connection are different, and the generated keys are transmitted to the sending end and the target end;
an encoding and encrypting unit 502, configured to encode information transmission data sent by a sending end, and encrypt the encoded data by using the connection key;
the encoding encryption unit 502 encodes the information in real time when the sending end sends out voice or video information, and then encrypts the encoded information through the secret key, so as to ensure that the secret leakage does not occur in the information transmission process, meanwhile, as the secret key is randomly generated, other people steal the segment of the code in time purposefully, and as the secret key cannot be obtained, the encoding is difficult to decrypt and decode, and the security effect is further improved;
a key transmission unit 503, configured to send the connection key to the target, and decrypt the encoded data through the connection key when the encoded data is transmitted to the target.
The key transmission unit 503 sends the generated key to the target, after the encrypted encoded information is transmitted to the target, the target can decrypt and decode the code by the unique key, so that the encoded information is restored to the content of voice or video for expression, the randomly generated key is directly sent to the target and the sending end, and cannot be synchronously transmitted along with the encoded content, thereby avoiding the possibility that the key is stolen.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
All possible combinations of the technical features of the above embodiments may not be described for the sake of brevity, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
The above description is intended to be illustrative of the preferred embodiment of the present invention and should not be taken as limiting the invention, but rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (10)

1. A method for encrypting data in mobile communication, the method comprising the steps of:
receiving a communication connection instruction sent by a user through a sending end;
judging the application type of the communication connection instruction, and sending a connection request to a target terminal according to the application type;
determining whether the connection request is responded by a target end;
when the connection request is responded, establishing an information transmission channel between the sending end and the target end, and judging the application type of the communication connection instruction again;
and when the application type of the connection instruction is an encryption application, carrying out communication encryption processing on the information transmission channel.
2. The method for encrypting mobile communication data according to claim 1, wherein the step of sending a connection request to the target end according to the application type specifically includes:
when the communication connection instruction is a common connection instruction, sending a common communication connection application to a target end;
and when the communication connection instruction is an encryption connection instruction, sending an encryption communication connection application to the target end.
3. The method according to claim 1, wherein the step of determining whether the connection request is responded by the target specifically comprises:
receiving receipt information of the target end to the connection request;
and judging whether the connection request is responded according to the receipt information.
4. The method for encrypting mobile communication data according to claim 1, wherein the step of determining again the application type of the communication connection command comprises:
when the communication connection instruction is a common connection instruction, establishing common communication connection;
and when the communication connection instruction is an encryption connection instruction, establishing encryption communication connection.
5. The method according to claim 1, wherein the step of performing communication encryption processing on the information transmission channel specifically comprises:
establishing a unique connection secret key according to the information transmission channel;
encoding information transmission data sent by a sending end, and encrypting the encoded data through the connection secret key;
and sending the connection secret key to the target end, and decrypting the encoded data through the connection secret key when the encoded data is transmitted to the target end.
6. A mobile communication data encryption system, characterized in that the mobile communication data encryption system comprises:
the information receiving module is used for receiving a communication connection instruction sent by a user through the sending end;
the application judging module is used for judging the application type of the communication connection instruction and sending a connection request to a target end according to the application type;
the connection judging module is used for judging whether the connection request is responded by the target end;
a connection establishing module, configured to establish an information transmission channel between the sending end and the target end when the connection request is responded, and determine the application type of the communication connection instruction again;
and the information encryption module is used for carrying out communication encryption processing on the information transmission channel when the application type of the connection instruction is an encryption application.
7. The mobile communication data encryption system according to claim 6, wherein the application determination module comprises:
a common application unit, configured to send a common communication connection application to a target end when the communication connection instruction is a common connection instruction;
and the encryption application unit is used for sending an encryption communication connection application to the target end when the communication connection instruction is an encryption connection instruction.
8. The mobile communication data encryption system according to claim 6, wherein the connection decision module comprises:
a receipt receiving unit, configured to receive receipt information of the connection request from the target end;
a receipt determination unit configured to determine whether the connection request is responded according to the receipt information.
9. The mobile communication data encryption system according to claim 6, wherein the connection establishment module comprises:
the common connection unit is used for establishing common communication connection when the communication connection instruction is a common connection instruction;
and the encryption connection unit is used for establishing encryption communication connection when the communication connection instruction is an encryption connection instruction.
10. The mobile communication data encryption system according to claim 6, wherein the information encryption module comprises:
the key establishing unit is used for establishing a unique connection key according to the information transmission channel;
the coding and encrypting unit is used for coding the information transmission data sent by the sending end and encrypting the coded data through the connection secret key;
and the key transmission unit is used for sending the connection key to the target end and decrypting the encoded data through the connection key when the encoded data is transmitted to the target end.
CN202211221266.XA 2022-10-08 2022-10-08 Mobile communication data encryption method and system Pending CN115580862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211221266.XA CN115580862A (en) 2022-10-08 2022-10-08 Mobile communication data encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211221266.XA CN115580862A (en) 2022-10-08 2022-10-08 Mobile communication data encryption method and system

Publications (1)

Publication Number Publication Date
CN115580862A true CN115580862A (en) 2023-01-06

Family

ID=84583940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211221266.XA Pending CN115580862A (en) 2022-10-08 2022-10-08 Mobile communication data encryption method and system

Country Status (1)

Country Link
CN (1) CN115580862A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116175595A (en) * 2023-04-28 2023-05-30 深圳市玛塔创想科技有限公司 Remote control system of programming robot based on artificial intelligence

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116175595A (en) * 2023-04-28 2023-05-30 深圳市玛塔创想科技有限公司 Remote control system of programming robot based on artificial intelligence
CN116175595B (en) * 2023-04-28 2023-06-23 深圳市玛塔创想科技有限公司 Remote control system of programming robot based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN110336662B (en) Digital information encryption method and device, computer equipment and storage medium
CN1926802B (en) Safety data transmission
CN108471404B (en) File sharing method and device, computer equipment and storage medium
JP4536934B2 (en) Authentication method for cellular communication system
KR100766313B1 (en) Apparatus and method for encrypting of preservation key in mobile communication terminal
CN101325485A (en) A method for processing information in an electronic device, a system, an electronic device and a processing block
WO2004002054A1 (en) Secure data transfer in mobile terminals and methods therefor
CN101626567A (en) Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN115580862A (en) Mobile communication data encryption method and system
JP2009500974A (en) Method for implementing SIM functionality in a maintenance module at a later date
KR101067146B1 (en) Method for processing encrypted message in portable terminal and portable terminal
CN114697008B (en) Communication system and method based on quantum security SIM card, quantum security SIM card and key service platform
US20040255121A1 (en) Method and communication terminal device for secure establishment of a communication connection
CN101754209A (en) Method for protecting contents of mobile phone
CN105262759A (en) Method and system for encrypted communication
KR20160121828A (en) Separate Anti-eavesdropping function apparatus and method for voice and data communication between terminals
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
CN102244860A (en) Method, system and server for preventing communication information of mobile terminal from being monitored
CN111770494A (en) Beidou RDSS user identity authentication and live wire registration method and device based on mobile phone number
JPH04247737A (en) Enciphering device
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
US7933597B2 (en) Method of registering a network, and mobile station and communication system using the same
CN105451201A (en) Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
TW201608864A (en) Communication security system and method
KR100827185B1 (en) Method for transmitting/receiving security message and mobile communication terminal therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination