Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud platform-based mobile phone contact list information disguising method

A technology of information camouflage and address book, applied in telephone communication, digital data protection, electrical components, etc., can solve data security risks, easy to be cracked and other problems, achieve high security level, improve data security, and effectively control customer resources Effect

Inactive Publication Date: 2014-01-22
SICHUAN FROMAI ELECTRONICS INFORMATION TECH
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Chinese patent application number 200810211442.5 discloses a method and system for disguising information, which can realize the disguising of information. However, the patent server switches according to the request of the client. Correspondence list, that is to say, the real information must be pre-stored in the server of the system, and the false information can be obtained by looking up the table according to the true-false information correspondence list. This information camouflage method based on the database true-false information correspondence list is very easy It is cracked, which brings huge hidden dangers to data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud platform-based mobile phone contact list information disguising method
  • Cloud platform-based mobile phone contact list information disguising method
  • Cloud platform-based mobile phone contact list information disguising method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings, but the protection scope of the present invention is not limited to the following description.

[0058] The mobile phone address book information camouflage method based on the cloud platform includes a step of sending the address book information by a cloud server and a step of uploading the address book information by a mobile phone client:

[0059] Such as figure 1 As shown, the step of the cloud server sending address book information includes the following sub-steps:

[0060] S101: The mobile client downloads the address book management APP, installs and runs the APP;

[0061] S102: Establish communication between the mobile phone client and the cloud server;

[0062] S103: The user's mobile phone number is registered on the cloud server, and the user's mobile phone number is retained in the database of the cloud server;

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud platform-based mobile phone contact list information disguising method. Phone numbers in a contact list uploaded and issued between a cloud server and a mobile phone are all pseudo numbers. The pseudo numbers are decoded into real numbers by a number calculator according to an APP (Application) built-in key. The APP built-in key is combined by SIM (Subscriber Identity Module) card information, mobile phone numbers, mobile phone information, cloud specified codes and cloud random codes through an asymmetric algorithm. The encryption mode and algorithm of the cloud server can be changed at any time; after the encryption mode and algorithm are changed, the mobile phone terminal can synchronously and automatically update and download a new number calculator. The phone numbers stored or displayed by the server and the mobile phone are all pseudo numbers, so that only pseudo numbers can be seen by thieves even though the mobile phone is stolen, and the contact list information cannot be stolen easily; no high-grade encryption and authentication mode is required, so that low cost is realized; a number is dialed by a third party, so that the safety level is high and the customer resources can be effectively controlled; both the number calculator and the acquisition of the number calculation key are required to be authenticated for many times, so that the data safety is high.

Description

technical field [0001] The invention relates to a method for disguising information in a mobile phone address book based on a cloud platform. Background technique [0002] The enterprise address book has huge data value, so the encryption of the address book contact list is the ultimate basis for success or failure. The current mainstream corporate address books in the market are mainly encrypted in the way of confusion and diffusion. The methods adopted by different companies are basically the same. Most of the differences lie in the level of encryption. Some are encrypted with MD5, some are encrypted with a private algorithm, and some are encrypted with Military 128 or even 256 bit encrypted. [0003] At present, there is also a processing mechanism in the form of cloud plus end, that is: the mobile phone adopts high-strength encryption, and in the case of the loss of the mobile phone, through network detection (for example: the mobile phone has changed the card for some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04M1/275G06F21/62
Inventor 王恒
Owner SICHUAN FROMAI ELECTRONICS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products