Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Short message encryption method based on iOS system mobile terminal

A mobile terminal and short message technology, applied in the field of information security, can solve the problems of complex secret key negotiation process, simple encryption algorithm, easy to be cracked, etc., achieve friendly user interface, ensure encrypted transmission, and be difficult to crack

Inactive Publication Date: 2016-05-18
东南大学常州研究院 +1
View PDF10 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method realizes one-time encryption, it has the following defects: 1. The introduction of the private key center increases the complexity of the system; 2. When the private key center sends the secret key to the sending terminal, it is sent in plain text, which is easy to be obtained by an attacker ; 3. The security of the private key center is not high
Although this method has realized the encrypted transmission of short message, there are following defects: 1) the third-party secret key management server is introduced, the encryption speed is slow, and the secret key negotiation process is complicated; 2) the encryption algorithm mentioned in this method is simple and easily to crack
However, using a fixed secret key is easy to be cracked, and there is no authentication of the sender and receiver, which is easy to cause a man-in-the-middle attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message encryption method based on iOS system mobile terminal
  • Short message encryption method based on iOS system mobile terminal
  • Short message encryption method based on iOS system mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The present invention includes a short message editing / display module 1, a secret key management module 2, an authentication code module 3, an encryption and decryption processing module 4, an encrypted short message sending and receiving module 5 and a database for encrypting and protecting mobile terminals sending and receiving short messages based on the iOS system. Module 6; the short message editing / display module 1 and the encryption and decryption processing module 4 two-way communication, the output terminal of the short message editing / display module 1 is connected to the input terminal of the authentication code module 3; the output terminal of the secret key management module 2 is connected to the The input terminal of the decryption processing module 4; the authentication code module 3 and the encryption and decryption processing module 4 two-way communication; the encryption and decryption processing module 4 and the encrypted short message transceiver module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a short message encryption method based on an iOS mobile operating system, suitable for a GSM / 3G / 4G network, and comprises a short message editing / displaying module, a secret key management module, an authentication code module, an encryption and decryption processing module, an encrypted short message transmit-receive module and a database module. The short message editing / displaying module is used for editing an original short message and displaying a decrypted short message; the secret key management module generates the conversation secret key of current communication; the authentication code module verifies the identity of an addresser / addressee; the encryption and decryption processing module is used for performing encryption / decryption processing on a short message; the encrypted short message transmit-receive module is used for sending an encrypted short message to the GSM / 3G / 4G network, or receiving the encrypted short message from the GSM / 3G / 4G network; the database module preserves the encrypted short message and contacts. The short message encryption method employs a one-time pad short message encryption method, adds the identity information authentication code of an addresser / addressee, and guarantees end-to-end short message communication security.

Description

technical field [0001] The invention relates to the fields of information security, encryption algorithm, mobile operating system software development and the like, and particularly proposes a short message encryption method based on an iOS system mobile terminal. Background technique [0002] With the rapid development of modern communication technology, especially the advent of the mobile Internet era, people's work and life have become increasingly inseparable from smartphones. SMS is highly relied on as an efficient and convenient communication method, and its application fields are constantly expanding. For example, the SMS verification code is the main verification method for online banking, mobile banking and various mobile applications, which involves the user's property and information security. So we should strengthen the emphasis on the safe transmission of SMS. The iOS mobile operating system is currently one of the most popular mobile operating systems, with a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/02H04L29/06
CPCH04L63/0428H04L63/083H04W4/14H04W12/02
Inventor 蒋睿钱泽虹裴蓓孔华锋尹杰
Owner 东南大学常州研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products