End-to-end encryption method and control device for the mobile phone SMS

A technology for mobile phones and messages, applied in the fields of control devices, mobile communications and information security, can solve problems such as damage, severe damage to user interests, and no security guarantee, and achieve the effects of low cost, simple method and process safety.

Inactive Publication Date: 2007-10-17
BEIJING NETQIN TECH
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these messages are currently sent in clear text, without security guarantees
Once these sensitive privacy and financial information are learned by criminals with ulterior motives, the interests of users will be severely damaged or damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end encryption method and control device for the mobile phone SMS
  • End-to-end encryption method and control device for the mobile phone SMS
  • End-to-end encryption method and control device for the mobile phone SMS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0055] The present invention is an end-to-end encryption method for messages transmitted by mobile phones. Before communication, two mobile phone users use the Diffie-Hellman key exchange algorithm to negotiate with each other and calculate separately to establish a key shared by both parties. ; Then use the negotiated shared key to encrypt the mobile message and send it to the other party; after receiving the encrypted message, another user decrypts the encrypted message according to the shared key, and presents the original information to Receiver; in this way, end-to-end encrypted communication can be realized on the insecure wireless communication channel. In addition, when viewing a received common message, the user can press a specific key or select a specif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for the end-end encryption of message sent by mobile, before communication, two mobile users may mutually negotiate through the Diffie-Hellman key switching algorithm and calculate respectively to establish a shared key for both parties; then after encrypted the mobile message with the shared key, sent to the other party; after another user received this encrypted message, decrypts the encrypted message with the shared key, presents the original information to the receiver. The control device for the invention is a control component equipped in the mobile for mutual communicating with the message transmitting and receiving module, consists of decryption module, interface presenting module, encryption message storage module, key management module and key negotiation module. The invention method is easier to realize, high feasibility, the structure of control device is simple, the operating of user is almost identical with the receiving and transmitting of ordinary mobile messages, but the method has higher safety, meets with the high safety demand for mobile messages.

Description

technical field [0001] The present invention relates to a new technology of mobile communication, more precisely, relates to a method and a control device for end-to-end encryption of messages transmitted by mobile phones, and belongs to the technical field of mobile communication and information security. Background technique [0002] Key exchange is the process of establishing a session key between communicating parties. Diffie and Hellman invented a key exchange algorithm for key transmission and distribution. This algorithm cannot be used directly for encryption or decryption, but is used as a key exchange technology by many commercial products. The purpose is to enable two users to A secret key is securely exchanged on the ordinary transmission line, so as to be used for encryption and decryption of communication messages in the future. [0003] The theoretical basis of the Diffie-Hellman key exchange algorithm is that computing discrete logarithms is very difficult. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04Q7/22H04Q7/32
Inventor 邹仕洪林宇史文勇
Owner BEIJING NETQIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products