Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure address book adding method and system, secure information communication method and system, and secure call method and system

A technology for security information and communication methods, applied in the field of communication and mobile communication, can solve the problems of complex, simple, and cannot protect the leakage of short message content, and achieve the effect of protecting information security and ensuring security.

Active Publication Date: 2016-12-07
LIANTONG NETWORK COMM TECH INC
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Disadvantages: Can not protect newly received SMS content leakage; can not guarantee the leakage of SMS content in transmission
[0011] Disadvantage: keys must be negotiated in advance
[0021] Disadvantages: too complicated, TF card must be configured, in terms of price and operation complexity, it is not suitable for ordinary users;
[0027] Disadvantages: information must be transmitted multiple times; voice encryption cannot be performed; S->B transmission cannot be guaranteed not to be leaked
[0028] To sum up, the secure short message and telephone communication methods in the prior art are either too complicated or too simple, and cannot meet the security needs of the majority of ordinary mobile phone users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure address book adding method and system, secure information communication method and system, and secure call method and system
  • Secure address book adding method and system, secure information communication method and system, and secure call method and system
  • Secure address book adding method and system, secure information communication method and system, and secure call method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0114] The user population targeted by the technical solution of the present invention: ordinary users, who only need to protect the content of short messages from being peeped or intercepted, and the phone from being answered and eavesdropped at will; (such as the communication content of so-and-so and her confidante);

[0115] There is no need for strong encryption or confidentiality performance, if it is layered according to the security level: top secret, confidential, secret; only need to ensure that the secret is below. The content that usually needs to be kept secret is usually not related to state secret information, but involves life information, such as personal ID card information, personal bank card number, private voice, etc. It is not expected to be leaked, but the security level is not very hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure address book adding method and system, a secure information communication method and system, and a secure call method and system. The secure address book adding method comprises the following steps that a terminal of a user B collects fingerprint information of a user A; the terminal of the user B obtains user basic information of the user A from an information management server according to the fingerprint information of the user A, wherein the user basic information comprises public key information of the user; and the terminal of the user B stores the user basic information of the user A into an address book. Through adoption of the secure address book adding method and system, the secure information communication method and system, and the secure call method and system, the technical scheme can ensure that contents of either short messages and multimedia messages or voice calls cannot be easily leaked in a transmission process; an eavesdropper obtains a plaintext of the information through a complicated cracking process; all operations to send either short messages and multimedia messages or voice calls are completed internally, the user does not need the additional operation, and the operations are very simple and fast, and furthermore, the methods and the systems are suitable for large-scale popularization and application.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the technical field of mobile phone communication, and specifically refers to a method for adding a secure address book, an information communication method, a calling method and a system. Background technique [0002] Calls and text messages have always been the mainstay of mobile communication services. However, in the current smart phone applications, the security of calls and text messages has not been fully paid attention to and improved. Some confidential or sensitive information (such as important information such as bank card information, personal identity information, intellectual property rights, finance, etc.), often dare not use mobile phone text messages to transmit. And some confidential calls may also be wiretapped and identity forged. [0003] The following list several common communication security control methods in the prior art: [0004] (1) Security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/03
CPCH04W12/02H04W12/04H04W12/06
Inventor 沈日胜
Owner LIANTONG NETWORK COMM TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products