Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)

An encryption and decryption algorithm, short message technology, applied in electrical components, wireless communications, security devices, etc., can solve the problems of terminal theft, increase costs, etc., and achieve the effect of low operation and maintenance costs

Active Publication Date: 2015-05-13
EASTERN COMM
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3) Terminal theft, such as the terminal being implanted with a Trojan horse to steal short messages and other information
[0008] However, the implementation of hardware encryption will undoubtedly increase the cost. With the development of smart phones, the encryption of information at the terminal can be implemented through software, so that your information will not be stolen by people with ulterior motives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)
  • Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)
  • Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] For the convenience of description, the "SMSoverIMS IP short message encryption and decryption system" hereinafter will be collectively referred to as "this system".

[0072] Such as figure 1 As shown, this system has user registration and secret key management server, IP short message service server, database server, operation management server and account opening server, etc. The relationship between each system component is as follows:

[0073] 1) The SIP signaling module, user registration management module, and secret key management module are set in the user registration and secret key management server; the user registration signaling sent by the IMS network is received by the SIP signaling module and analyzed and parameter extracted Afterwards, it is submitted to the user registration management module, and the user registration management returns a response instruction of successful registration to the IMS network through the SIP signaling module after successf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for encrypting / decrypting IP short messages based on SMS over IMS; the method comprises the steps: when LTE (Long Term Evolution) users send and receive IP short messages in the IMS region in an SMS over IMS manner, the short messages are encrypted short messages, the content parts of which are ciphertexts; an IP short message encrypting and decrypting centre of the users finishes the encryption and decryption at the network side and then returns the IMS core network to finish the follow-up route at the end of the encryption and decryption. The corresponding technical solution is provided by analyzing the technical feature of the SMS over IMS and deeply analyzing key problems; the coordination of user registration management and user's secret key in the registration process is realized by the iFC (Initial Filter Criteria) triggering mechanism of the IMS and the encrypting and decryption functions of the short message contents in the IP short messaging service process are realized; the coordination of the terminal side to the encrypted and decrypted secret key is realized and the function of the short message content from encryption / decryption to representation on user's interface is realized by developing new terminal application software; the scheme can be implemented without modifying the present network equipment and the cost of operation and maintenance is lower.

Description

technical field [0001] The invention relates to a method and system for encrypting and decrypting IP short messages based on SMSoverIMS, and belongs to the technical field of communication. Background technique [0002] Since Snowden broke the US "Prism Project" in 2012, network security has attracted unprecedented attention, and the outbreak of Apple's "Privacy Gate" has once again aroused people's attention to information security. [0003] At present, there are three hidden dangers in the security of mobile communications: [0004] 1) Network eavesdropping, signaling messages are intercepted during transmission; [0005] 2), air interface eavesdropping, intercepting wireless signals, PN code capture, knowing the channel scrambling code of the target user, intercepting signaling and voice channels; [0006] 3) Terminal theft, such as the terminal being implanted with a Trojan horse to steal short messages and other information. [0007] So with the development of mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04W12/04
Inventor 薛家颐季立明
Owner EASTERN COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products