Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication encryption application method and communication system

An application method and communication key technology, which are applied in the field of communication encryption application methods and communication systems, can solve problems such as inconsistency of displayed information between the sending end and the receiving end, and achieve the effect of improving security

Active Publication Date: 2013-01-09
DONGGUAN YULONG COMM TECH +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a communication encryption application method and a communication system to solve the problem of inconsistency between the actual user at the sending end and the displayed information at the receiving end in the prior art, wherein:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption application method and communication system
  • Communication encryption application method and communication system
  • Communication encryption application method and communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The main idea of ​​the present invention is that the first mobile terminal sends the preset encryption key to the second mobile terminal during communication; the second mobile terminal judges whether the received encryption key is correct, and if so, the second mobile terminal The preset decryption key and the encryption key are used to match, and if the match is successful, the communication is performed with the first mobile terminal and the screen prompts the information that the sender himself operates.

[0023] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0024] Terminal devices according to embodiments of the present invention include, but are not limited to, terminal devices such as mobile phones, smart phones, tablet computers (PADs), and personal digital assistants (PDAs)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication encryption application method and a communication system. The communication encryption application method comprises the steps that a first mobile terminal sends a preset encryption key to a second mobile terminal during communication; the second mobile terminal judges whether the received encryption key is correct; if the received encryption key is correct, the second mobile terminal matches a preset decryption key with the encryption key; if the preset decryption key is successfully matched with the encryption key, the second mobile terminal communicates with the first mobile terminal and indicates information operated by a sender through a screen. By the method, a receiver can only communicate with the sender during operation; and therefore, the communication security is improved.

Description

technical field [0001] The invention relates to the field of communications, in particular to a communication encryption application method and a communication system. Background technique [0002] In terms of encrypting the contact information of the mobile terminal, a more common method is the private mode, that is, hiding the contact information or creating false information. According to the prior art solution, when a communication connection related to a contact occurs, authority verification must be passed, and only through authority verification can a communication connection be made, which ensures the privacy of user information, and solves the problem that the private mode only encrypts from the sender without Disadvantages of encrypting from the receiving end. However, the above-mentioned private mode only encrypts from the sender, not from the receiver. [0003] In practical applications, other people will also use the user's mobile phone in many cases. At this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W88/02H04W12/30
Inventor 董明华王旭
Owner DONGGUAN YULONG COMM TECH