Integration IP message security reinforcement method and system

A security and message technology, applied in messages/mailboxes/notifications, electrical components, wireless communications, etc., can solve problems such as inability to effectively protect personal sensitive information, personal communication content being disseminated without consent, and improve user experience Effect

Inactive Publication Date: 2010-07-28
ZTE CORP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is to overcome the shortcomings in the prior art that personal sensitive information cannot be effectively protected and personal communication content is transmitted without consent, and provide a method and system for enhancing the security of CMP messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integration IP message security reinforcement method and system
  • Integration IP message security reinforcement method and system
  • Integration IP message security reinforcement method and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0088] figure 2 It is a flow chart of the method for enhancing the security of converged IP messages in the first embodiment of the present invention. This embodiment describes that the sender CPM terminal sets sensitive attribute information in the CPM message sent by it, and the CPM system and the receiver CPM terminal set sensitive attribute information according to the sensitive attribute information. The information processes the CPM message accordingly.

[0089] In this embodiment, user A uses the CPM address Addr-A as the sender address to send a CPM message, the CPM client currently used by user A is CPM client A (referred to as CPM-A), and the CPM Participating Function to which Addr-A belongs It is CPM Participating Function-A; the recipient of the above CPM message is user B, the recipient's CPM address is Addr-B, the CPM client currently used by user B is CPM client B (denoted as CPM-B), Addr-B The attributable CPMParticipating Function is CPM Participating Funct...

no. 2 example

[0123] image 3 It is a flow chart of the method for enhancing the security of converged IP messages in the second embodiment of the present invention. This embodiment describes the process in which the CPM system performs corresponding processing according to the sensitive attribute information of the CPM message after receiving the forwarding request of the CPM message.

[0124] In this embodiment, user A uses the CPM address Addr-A as the sender address to send a CPM message, the CPM client currently used by user A is CPM client A (referred to as CPM-A), and the CPM Participating Function to which Addr-A belongs It is CPM Participating Function-A; the recipient of the above CPM message is user B, the recipient's CPM address is Addr-B, the CPM client currently used by user B is CPM client B (denoted as CPM-B), Addr-B The attributable CPMParticipating Function is CPM Participating Function-B; after user B receives the CPM message, the method includes the following steps:

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an integration IP message security reinforcement method and a system; the method includes that: an integration IP message CPM client adds sensitive attribute information to the CPM message for transmission and transmits the CPM message to a receiver terminal through a CPM system; the CPM system and / or the receiver terminal receive(s) the CPM message and then performs follow-up processing on the CPM message according to the sensitive attribute information in the message. Compared with the prior art, as the CPM message carries with the sensitive attribute information, when the CPM message is received by the receiver, the receiver can perform follow-up processing according to the sensitive attribute information so that the information security effect is realized and the user experience is improved.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and system for enhancing the security of Converged IP Messaging (CPM) messages. Background technique [0002] With the development of communication technology, there are more and more ways for people to exchange information, but what follows is the problem that the content of personal communication may be disseminated at will. People long for a communication method that can communicate at will and effectively ensure that the communication content is not distributed at will. [0003] In order to protect the intellectual property rights of digital products, OMA (Open Mobile Alliance, Open Mobile Alliance) released the DRM (Digital Rights Management, digital rights protection) specification. DRM is based on License Management (License Management), and its deployment and use process are It is relatively complicated, and it is not an effective protection method for the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/12H04W80/08
Inventor 卢艳邵伟姚立哲
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products