Short message safety communication method, system and device based on STK (SIM Tool Kit) business
A technology of secure communication and SMS, applied in security devices, wireless communication, messages/mailboxes/notifications, etc., can solve the problems of low security and reliability, and achieve the effect of improving reliability and security
Inactive Publication Date: 2010-09-22
BEIJING INTELLIGENT FRUIT TECH CO LTD
0 Cites 8 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention provides short message safety communication method, system and device based on STK (SIM Tool Kit) business. The method comprises the steps of: receiving a plaintext short message sent by a first mobile terminal; encrypting the plaintext short message according to a preset encryption key to obtain the encrypted short message; returning the encrypted short message to the first mobile terminal so that the first mobile terminal can send the encrypted short message to a second mobile terminal with a corresponding number; and decrypting the encrypted short message by an STK card of the second mobile terminal according to the encrypted short message sent by the second mobile terminal and a preset decryption key to obtain the plaintext short message, and returning the plaintext short message to the second mobile terminal, therefore, the reliability and the safety of the short message are efficiently improved.
Application Domain
Messaging/mailboxes/announcementsSecurity arrangement
Technology Topic
Text messagingComputer hardware +3
Image
Examples
- Experimental program(6)
Example Embodiment
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Access control method and system based on security tag
Owner:INST OF INFORMATION ENG CAS
Method and system for automatically generating anti-sabotage, anti-blocking, water irrigation, breathing, fire burning logic rules of substation
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
All functional glass sheet stacking and dismantling machine and glass sheet stacking and dismantling method
Owner:深圳市天圣实业有限公司
Intelligent layered mining system applicable to offshore oilfield sand control well completion
Owner:CHINA NAT OFFSHORE OIL CORP +1
Classification and recommendation of technical efficacy words
- Improve safety and reliability
Consortium chain-based digital bill trading system construction method
Owner:HANGZHOU YUNXIANG NETWORK TECH
Method, apparatus and system for protecting biological attribute data
Owner:HUAWEI TECH CO LTD
Method and apparatus for resetting valve lift for use in engine brake
Owner:SHANGHAI UNIVERSOON AUTOPARTS CO LTD