CN1282383C - Cryptographic method for mobile phone communication - Google Patents

Cryptographic method for mobile phone communication Download PDF

Info

Publication number
CN1282383C
CN1282383C CN 200310104668 CN200310104668A CN1282383C CN 1282383 C CN1282383 C CN 1282383C CN 200310104668 CN200310104668 CN 200310104668 CN 200310104668 A CN200310104668 A CN 200310104668A CN 1282383 C CN1282383 C CN 1282383C
Authority
CN
China
Prior art keywords
message
telephone number
telephone
user
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200310104668
Other languages
Chinese (zh)
Other versions
CN1612628A (en
Inventor
赖振兴
梅家圣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhigu Tech Co Ltd
Original Assignee
Inventec Appliances Nanjing Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Appliances Nanjing Corp filed Critical Inventec Appliances Nanjing Corp
Priority to CN 200310104668 priority Critical patent/CN1282383C/en
Publication of CN1612628A publication Critical patent/CN1612628A/en
Application granted granted Critical
Publication of CN1282383C publication Critical patent/CN1282383C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a secure method for mobile telephone communication, which comprises: after a user carries out encryption setting to a specific telephone number, any received message or any incoming call related to the telephone number can not be immediately displayed, or can not be allowed to be instantaneously answered by the user, and only after the user passes password authentication, the user can watch or listen to the message or incoming call.

Description

The time slot scrambling of mobile phone communication
Technical field
The present invention is relevant for a kind of time slot scrambling, and is particularly relevant with a kind of time slot scrambling of mobile phone.
Background technology
The mobile phone development from the media of script voice transmission, develops the function that has the information transmission to today concurrently so far.Just it seems with the type of transfer of data that the load mode of first generation mobile phone is analog specification, the content of transmission is based on voice, and confidentiality is with to penetrate effect all not satisfactory.The load mode of second generation mobile phone is that digital form transmits, and, transmits confidentiality thereby significantly improve with after the voice digitization coding in the mode of package.
But in the arriving of cybertimes now, the demand of digital networking, Wireless Networking increases gradually, and in the middle of the notion of information household appliances, IA product, mobile phone handsets are planned as important integration, the control between each stand-alone product and link up the unit, so far the transfer of data demand of mobile phone significantly increases, therefore, and how in these information handover epoch fast, in a large amount of mobile communication, keep privacy, promptly become a very important problem.
Traditionally; when using mobile phone to carry out the reception of data or transmitting; its method of encrypting; usually can only encrypt at individual data, for example when a user used mobile phone to send and receive e-mail, it usually can require Email that is received or the Email content that is sent not to be known by the people; that is; even this mobile phone is held by other people, other people still can not see the content of these mails, and traditional guard method this moment is that individual other mail is encrypted.Therefore the user is if will encrypt the mail that specific people sent, and carry out the encryption of single Email again after must watching the sender earlier this moment, so not only loses time, and more may forget encryption to certain data because of neglecting for the moment.
Summary of the invention
Therefore, main purpose of the present invention promptly is that a kind of time slot scrambling of mobile phone communication is being provided, by the mode that telephone number out of the ordinary is encrypted, with all therewith the relevant information of telephone number protect.
Another object of the present invention is the time slot scrambling that a kind of mobile phone communication is provided, can protect a plurality of information simultaneously by the mode that utilization is encrypted telephone number out of the ordinary.
Still a further object of the present invention can reduce the complicated process that information is encrypted for a kind of time slot scrambling of mobile phone communication is provided.
According to above-mentioned purpose, the present invention proposes a kind of time slot scrambling of mobile phone communication, be after at first a particular telephone number being encrypted setting by the user, then relevant any reception message or any incoming call of telephone number therewith, all can not show at once or allow the user to answer immediately, need person to be used by behind the cipher authentication, just can watch or listen to.Therefore, when the user receives a message or an incoming call, meeting of the present invention is filtered earlier, judge therewith whether the message or the relevant telephone number of sending a telegram here are that the user sets encryption, if can require the user to input a password, and judge the correctness of password, whether demonstrate this with decision and receive message, or receive calls by the user.
Description of drawings
For above-mentioned and other purposes, feature and advantage of the present invention can be become apparent, a preferred embodiment cited below particularly, and conjunction with figs. are described in detail below:
Figure 1 shows that and in mobile phone, be used for the relevant module schematic diagram of encrypting;
Figure 2 shows that the handling process that telephone directory editor module is encrypted or deciphered a particular telephone number;
Figure 3 shows that other communications module judge whether to show the correlation step of corresponding message to the user; And
Figure 4 shows that the telephone receiving module judges that whether this telephone number is that the user sets the telephone number of encryption and gives the correlation step of alignment processing program.
Embodiment
Do not limiting under spirit of the present invention and the range of application, below promptly with an embodiment, introduce enforcement of the present invention; Be familiar with present technique field person, after understanding spirit of the present invention, when using encryption method of the present invention in various mobile phone.According to encryption method of the present invention not needs encrypt at each data; but can the data that main body is relevant therewith be carried out encipherment protection simultaneously at special body, not only can increase efficient; and can avoid because artificial carelessness is encrypted, and the data that leak.Encryption method of the present invention can be used the preferred embodiment that is not limited only to the following stated in multiple mobile communications tool.
At first in mobile phone, be used for the relevant module schematic diagram of encrypting, comprised telephone directory editor module 100, telephone receiving module 102 and other communications module at least with reference to Figure 1 shows that.Wherein telephone directory editor module 100 is to be used for particular telephone number is encrypted or decrypted program, whether shows the relevant various information of particular telephone number therewith in order to decision.Whether and telephone receiving module 102 is that a communication process module mainly is in order to handle when the user receives a phone, be the telephone number that the user sets encryption in order to judge this telephone number, gives corresponding handling procedure simultaneously.104 of other communications module be in order to handle whether show the multimedia news in brief that received (Multimedia Message Service, MMS), short message (Short Message Service, SMS), Email (EMAIL) or fax etc.
In the time will encrypting or decipher a particular telephone number, the handling process of telephone directory editor module 100 sees also shown in Figure 2 at this moment.Enter the edit routine that telephone number is encrypted or deciphered in step 200; At first in step 202, in the telephone number record book of mobile phone, select to desire the particular telephone number of encrypting or deciphering; At this moment, telephone directory editor module 100 of the present invention can require the user to input password in step 204, the password of setting when this password can be the mobile phone start, or the user complies with the password that certain password setting program sets separately; Then, telephone directory editor module 100 can judge in step 206 whether the password of user's input is correct; If the password mistake of user input then can directly enter step 204 and finish this program, it should be noted that this flow process also can set acceptable errors number, for example can when reach more than 3 times, input error enter step 204 and finish this program.
Otherwise if the correct password of user's input then can enter in the phone editor book of this particular telephone number, the user can select this particular telephone number is encrypted or deciphered in step 208; When selecting that this particular telephone number is encrypted, then can enter step 212, the communication record that telephone number therewith is relevant is all hidden, that is when watching the relevant every record of telephone number therewith, all can require the user to import one group of specific cryptosystem, then in step 214 termination routine; When selecting that this particular telephone number is decrypted, then can enter step 210, relevant data of telephone number are therewith removed hidden, that is anyly can consult the relevant every record of telephone number therewith per capita, then at step 214 termination routine.
After a certain particular number is set encryption, if there is a user to desire to watch the relevant every communication record of particular number therewith, for example, multimedia news in brief, short message, Email or fax etc.This moment, other communications module 104 promptly can judge whether to show corresponding message to this user, and it judges flow process as shown in Figure 3.Enter this in step 300 and judge flow process: at first, other communications module 104 can be judged the communications records that the user desires to watch earlier, and whether its corresponding telephone number is encrypted, use judging whether to show this record or hiding this record; If judge these communications records is to be in the state that the user encrypts, and then enters step 306, finishes this program; Otherwise enter step 304, show this record.
After a certain particular number is set encryption, if during the work that has a user to desire to answer with this mobile phone, telephone receiving module 102 can judge whether this telephone number is the telephone number that the user sets encryption at this moment, give corresponding handling procedure simultaneously, following Fig. 4 is described for its handling procedure.When a user receives a corresponding communication of sending from particular telephone number, for example be to dial in phone, message or Email etc., promptly enter determining program of the present invention in step 400; At first in step 402, this program can judge whether this telephone number is the telephone number that the user sets encryption earlier, judges whether and will protect this communication to use; If the non-user of this communication requires the communication protected, then can enter step 410, follow general handling procedure, that is anyly can be answered per capita or watch and interrogate; After having answered or having watched, then enter step 418, finish this program.
Otherwise, if in step 402, after judging this telephone number and setting the telephone number of encryption for the user; Can then enter step 404, be judged that again this communication breath is an incoming call or only is message transmission; If during the transmission of a message, then enter step 408, this moment, this program can point out the user to receive that one transmits message, but because this transmits message is the message that belongs to the protection of user's desire, therefore can't directly demonstrate the content of this message, only inform that the user has this message, if the user desires to watch this message, also need input the password that one group of user sets, just can watch; After having pointed out, promptly enter step 418, finish this program.
On the other hand, be when incoming call if judge this communication in step 404, then enter step 406, this moment, this program can require the user to input the password that a user sets; And, judge whether this input password is correct, and wherein this password can be identical with user's startup password, or be the password of setting separately in step 412; If the password that this user inputed is wrong, this program can't allow the user answer this logical incoming call in step 416; And promptly enter step 418, finish this program.Otherwise if the user inputs correct password, the user can normally answer in step 416.
Comprehensive above-mentioned institute says, the present invention is after by the user one particular telephone number being encrypted setting, after this any reception message or any incoming call that every telephone number therewith is relevant, all can not show at once or allow the user to answer immediately, need person to be used by behind the cipher authentication, just can watch or listen to.In other words, when receiving a message or an incoming call, meeting of the present invention is filtered earlier, judge therewith whether the message or the relevant telephone number of sending a telegram here are that the user sets encryption, if need carry out another program, require the user to input a password, and the correctness of judgement password, whether demonstrate this with decision and receive message, or receive calls by the user.
Therefore, the present invention has following advantage at least: the first, and therefore the present invention is filtered by telephone number, does not need to each message, inspect encryption by the user, so efficient can promote significantly as the tradition.The second, traditional mobile phone, for incoming call and unprotect setting, that is each can be answered per capita, but the present invention additionally provides a calling protection, only allows and answers particular telephone by the cipher authentication person, has improved the protection of individual privacy virtually.
Though the present invention discloses as above with a preferred embodiment; right its is not in order to limit the present invention; anyly be familiar with present technique field person; without departing from the spirit and scope of the present invention; when can being used for a variety of modifications and variations, so protection scope of the present invention defines and is as the criterion when looking accompanying claim.

Claims (7)

1, a kind of time slot scrambling of mobile phone communication is characterized in that, part phone number stored in this mobile phone is protected, and this method comprises the following step at least:
(a) receive message or the incoming call that sends by a particular number;
(b) judge that whether this telephone number is the telephone number of protection, if then enter step (c), otherwise can watch this message or answer this incoming call;
(c) require input one password;
(d) judge whether this password is correct,, otherwise enter step (f) if correctly then enter step (e);
(e) show this message or incoming call answering; And
(f) do not show this message or forbid answering.
2, the method for claim 1 is characterized in that, above-mentioned message is a multimedia news in brief.
3, the method for claim 1 is characterized in that, above-mentioned message is a short message.
4, roll over method according to claim 1, it is characterized in that, above-mentioned message is an Email.
5, the method for claim 1 is characterized in that, above-mentioned message is fax.
6, a kind of privacy device of mobile phone communication, this device comprises at least:
One telephone directory editor module, the telephone number of desiring to protect in order to setting;
One telephone receiving module connects this telephone directory editor module, when this telephone receiving module receives the message that is transmitted by a telephone number or sends a telegram here, can judge whether this telephone number is that this telephone directory editor module sets the telephone number of desiring to protect; And
One other communication module group connect this telephone receiving module, judge whether the received message of this telephone receiving module need be shown.
7, device as claimed in claim 6 is characterized in that, the message that other above-mentioned communication module group are differentiated comprises multimedia news in brief, short message, Email or fax.
CN 200310104668 2003-10-30 2003-10-30 Cryptographic method for mobile phone communication Expired - Lifetime CN1282383C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200310104668 CN1282383C (en) 2003-10-30 2003-10-30 Cryptographic method for mobile phone communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200310104668 CN1282383C (en) 2003-10-30 2003-10-30 Cryptographic method for mobile phone communication

Publications (2)

Publication Number Publication Date
CN1612628A CN1612628A (en) 2005-05-04
CN1282383C true CN1282383C (en) 2006-10-25

Family

ID=34757041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200310104668 Expired - Lifetime CN1282383C (en) 2003-10-30 2003-10-30 Cryptographic method for mobile phone communication

Country Status (1)

Country Link
CN (1) CN1282383C (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1294779C (en) * 2004-03-09 2007-01-10 惠州Tcl移动通信有限公司 Mobile phone message security method
CN101909114A (en) * 2010-07-13 2010-12-08 中兴通讯股份有限公司 Method, device and mobile terminal for hiding information
CN102202304B (en) * 2011-05-24 2016-03-02 中兴通讯股份有限公司 Calling protection method, MSC and terminal
CN102546951A (en) * 2012-02-02 2012-07-04 中兴通讯股份有限公司 Method for processing incoming call and terminal
CN103064585B (en) * 2012-12-24 2017-10-17 东莞宇龙通信科技有限公司 Terminal unlocking method and terminal
CN105657678A (en) * 2015-07-22 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Short message reading method, short message reading device, short message storage method and short message storage device
CN105956443B (en) * 2016-05-03 2019-04-26 深圳市金立通信设备有限公司 A kind of method and terminal of incoming call handling

Also Published As

Publication number Publication date
CN1612628A (en) 2005-05-04

Similar Documents

Publication Publication Date Title
US7441120B2 (en) Telecommunications device and method
CN101203025B (en) Method for transmitting and receiving safe mobile message
US20030061496A1 (en) Method and apparatus for performing secure communications
CN101626567A (en) Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN103401949B (en) A kind of system and method shared for the personal data safety of mobile phone
KR20010086061A (en) Selective telephone caller identification service
CN100450208C (en) Short message encryption protection realizing method and system
CA2347806A1 (en) Encryption and authentication methods and apparatus for securing telephone communications
US20040147246A1 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
CN103179557A (en) Real-time encryption and decryption method and system for communication data and mobile terminal
US20100177899A1 (en) Encrypted communication system
CN106604268A (en) Voice encryption method and system and terminal
US20070036296A1 (en) Methods and systems for securely providing and retaining phone numbers
CN1282383C (en) Cryptographic method for mobile phone communication
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
JPH10242956A (en) Privacy telephone set
US7743247B1 (en) Method and apparatus for secure communications
CN101754209A (en) Method for protecting contents of mobile phone
CN101951554A (en) Method and system for realizing pre-access of encrypted conference call
CN201623859U (en) System for encrypting short messages through mobile phone terminal
WO1991012680A1 (en) Apparatus and method for data communication
JP4882110B2 (en) Telephone system, telephone apparatus, telephone communication method, and program thereof
US20050228997A1 (en) Methods and devices for providing secure communication sessions
JPH07303104A (en) Storage type communication system with ciphering function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: BEIJING Z-GOOD TECHNOLOGY SERVICE CO., LTD.

Free format text: FORMER OWNER: INVENTEC (NANJING) TECHNOLOGY CO., LTD.

Effective date: 20150716

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150716

Address after: 100085 Beijing city Haidian District No. 33 Xiaoying Road 1 1F06 room

Patentee after: BEIJING ZHIGU TECH Co.,Ltd.

Address before: 210006 Jiangning economic and Technological Development Zone, Jiangsu Province, Zhuang Pai Road, Nanjing

Patentee before: IAC (Nanjing) Technology Co.,Ltd.

CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20061025