Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Short message content interpolation-preventing method

A short message, anti-tampering technology, applied in the direction of messages/mailboxes/notifications, safety devices, electrical components, etc.

Inactive Publication Date: 2007-11-14
FUJIAN XINO COMM TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above two patent applications, the sender sends an encrypted short message, and the receiver decrypts it when receiving the short message. These two methods are terminal-to-terminal short message encryption technologies. Both the sending and receiving parties must preset algorithms to successfully see The original text of the short message, with a high level of security, is suitable for occasions where information leakage is prevented, such as state secrets and military fields, but it is not suitable for government announcements, corporate advertisements, weather forecasts, etc. Senders in these fields hope that professional terminals can identify the authenticity of short messages , originality, but requires ordinary mobile phones to be able to read information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message content interpolation-preventing method
  • Short message content interpolation-preventing method
  • Short message content interpolation-preventing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Please refer to Fig. 1, the present invention is a kind of short message content anti-tampering method, comprises following two steps:

[0047] 1. When the sender sends a short message (SMS-SUBMIT), send a digitally signed short message;

[0048] 2. After receiving the digitally signed short message (SMS-DELIVER), the receiving end checks the correctness of the digital signature.

[0049] Referring to Figure 2, the step 1 specifically includes the following steps:

[0050] 11. The user enters a short message at the sending end;

[0051] 12. Calculate the digital signature;

[0052] 13. The sender places the digital signature at the beginning of the SMS;

[0053] 14. The sending end sends out the short message with the digital signature added (SMS-SUBMIT).

[0054] Referring to Figure 3, the step 2 specifically includes the following steps:

[0055] 21. The recipient receives the short message, and the beginning of the short message contains a digital signature with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following steps: (1) when sending short message, the sending end sends short message with digital signature; (2) after receiving short message with digital signature, the receiving end checks correctness of the digital signature. Length of short message inputted is not limited. Using form of algorithm + secret key, the method possesses high security. Through secret key, the method guarantees security of signature even if algorithm is leaked. Features are: wide acceptable secret keys usable to the algorithm, convenience for remembrance, easy for maintaining secret key, high operating rate, and low requirement on hardware of terminal. The invention is suitable to embedded type terminal such as handset.

Description

【Technical field】 [0001] The invention relates to the technical field of mobile communication, in particular to a tamper-proof method for short message content. 【Background technique】 [0002] In modern society, mobile phones have become an indispensable communication tool, and SMS (shortMessageService: short message service) is widely used due to its advantages of being fast and cheap. [0003] SMS is a store-and-forward non-real-time message service, and its sending and receiving are divided into the following five steps: [0004] 1. The sender sends a message (SMS-SUBMIT) [0005] The message sender sends an SMS-SUBMIT message to SMSC (Short Message Servicecenter: short message service center). [0006] 2. SMSC notification sender (SMS-SUBMIT-REPORT) [0007] The SMSC sends an SMS-SUBMIT-REPORT message to notify the sender of the message. [0008] 3. SMSC sends a message (SMS-DELIVER) [0009] SMSC sends SMS-DELIVER message to message receiver. [0010] 4. The recip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/22H04Q7/38H04Q7/32H04W4/14H04W12/02H04W12/033H04W12/106
Inventor 吴尚栩
Owner FUJIAN XINO COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products