Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for adding secure address book, information communication method and calling method and system

A technology of security information and communication methods, applied in the field of mobile communication and communication, can solve complex, simple, and unsuitable problems for ordinary users, and achieve the effect of ensuring security and protecting information security

Active Publication Date: 2019-08-27
LIANTONG NETWORK COMM TECH INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Disadvantages: Can not protect newly received SMS content leakage; can not guarantee the leakage of SMS content in transmission
[0011] Disadvantage: keys must be negotiated in advance
[0021] Disadvantages: too complicated, TF card must be configured, in terms of price and operation complexity, it is not suitable for ordinary users;
[0027] Disadvantages: information must be transmitted multiple times; voice encryption cannot be performed; S->B transmission cannot be guaranteed not to be leaked
[0028] To sum up, the secure short message and telephone communication methods in the prior art are either too complicated or too simple, and cannot meet the security needs of the majority of ordinary mobile phone users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for adding secure address book, information communication method and calling method and system
  • Method for adding secure address book, information communication method and calling method and system
  • Method for adding secure address book, information communication method and calling method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0114] The user population targeted by the technical solution of the present invention: ordinary users, who only need to protect the content of short messages from being peeped or intercepted, and the phone from being answered and eavesdropped at will; (such as the communication content of so-and-so and her confidante);

[0115] There is no need for strong encryption or confidentiality performance, if it is layered according to the security level: top secret, confidential, secret; only need to ensure that the secret is below. The content that usually needs to be kept secret is usually not related to state secret information, but involves life information, such as personal ID card information, personal bank card number, private voice, etc. It is not expected to be leaked, but the security level is not very hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for adding a secure address book, an information communication method, a calling method and a system, wherein the method for adding a secure address book includes the method for adding an address book including: user B terminal collects fingerprint information of user A; user B terminal collects fingerprint information of user A according to The fingerprint information of user A obtains the basic user information of user A from the information management server, and the basic user information includes the public key information of the user; the terminal of user B stores the basic user information of user A in the address book. Adopting this kind of safe address book adding method, information communication method and call method and system, no matter it is a short message, multimedia message, or voice call, this technical solution can guarantee that the content is not easy to be leaked during the transmission process; the eavesdropper must go through complicated Only through the cracking process can the plaintext of the information be obtained; whether it is sending SMS, MMS, or voice, all operations are completed internally, and users do not need additional operations. It is very simple and fast, and is suitable for large-scale promotion and application.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to the technical field of mobile phone communication, and specifically refers to a method for adding a secure address book, an information communication method, a calling method and a system. Background technique [0002] Calls and text messages have always been the mainstay of mobile communication services. However, in the current smart phone applications, the security of calls and text messages has not been fully paid attention to and improved. Some confidential or sensitive information (such as important information such as bank card information, personal identity information, intellectual property rights, finance, etc.), often dare not use mobile phone text messages to transmit. And some confidential calls may also be wiretapped and identity forged. [0003] The following list several common communication security control methods in the prior art: [0004] (1) Security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/03
CPCH04W12/02H04W12/04H04W12/06
Inventor 沈日胜
Owner LIANTONG NETWORK COMM TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products