Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information encryption and decryption method and apparatus in short message

A technology for encryption, decryption and text messages, which is applied in the field of communication, can solve problems such as lack of practicability, achieve the effects of reducing leakage risks, ensuring user information security, and improving user experience

Active Publication Date: 2018-04-06
ZTE CORP
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, many third-party applications installed on mobile terminals can bypass this encryption mechanism to directly receive or read text messages. Therefore, the second method also has shortcomings in terms of practicability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption and decryption method and apparatus in short message
  • Information encryption and decryption method and apparatus in short message
  • Information encryption and decryption method and apparatus in short message

Examples

Experimental program
Comparison scheme
Effect test

no. 2 example

[0056] In order to better reflect the purpose of the present invention, on the basis of the first embodiment of the present invention, the mobile terminal takes a mobile phone as an example, and the encryption and decryption of digital information in the mobile phone are further described.

[0057] figure 2 It is a flow chart of the second embodiment of the method for encrypting and decrypting information in a short message according to the present invention, and the method includes:

[0058] Step 200: The bottom layer of the mobile phone receives a new text message.

[0059] Step 201: Determine whether the SMS encryption control switch is turned on, if yes, execute step 202; if not, skip to step 204.

[0060] Here, if the SMS encryption control switch is not turned on, the bottom layer of the mobile phone directly sends the received new SMS to the SMS application of the mobile phone.

[0061] Step 202: Determine whether the length of the number in the new short message is ...

no. 3 example

[0081] In order to better reflect the purpose of the present invention, on the basis of the first embodiment of the present invention, the encryption and decryption of the personal mailbox in the mobile phone short message will be further described.

[0082] image 3 It is a flow chart of the third embodiment of the method for encrypting and decrypting information in a short message according to the present invention, and the method includes:

[0083] Step 300: The bottom layer of the mobile phone receives a new text message.

[0084] Step 301: Determine whether the SMS encryption control switch is turned on, if yes, execute step 302; if not, skip to step 304.

[0085] Step 302: Judging whether the new text message contains a character string satisfying the set condition, if yes, execute step 303; if not, skip to step 304.

[0086]In the embodiment of the present invention, the commonly used email address is composed of three parts, the first part is the user account number;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information encryption and decryption method in a short message. The method comprises the following steps: a mobile terminal bottom layer receives at leastone original short message containing privacy information; when the original short message satisfies an encryption condition, the mobile terminal bottom layer encrypts the privacy information in theoriginal short message to generate an encrypted short message, and sends the encrypted short message to a short message application of a mobile terminal; and the short message application of the mobile terminal decrypts the encrypted short message after receiving the encrypted short message. The embodiment of the invention further discloses an information encryption and decryption apparatus in theshort message.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for encrypting and decrypting information in short messages. Background technique [0002] With the increasing popularity of mobile terminals, such as mobile phones, tablet computers, smart watches, etc., mobile terminals have become the most commonly used portable mobile electronic devices in people's lives. As a basic communication service in mobile terminals, the SMS function has long been It has become one of the necessary functions of the mobile terminal. And as various third-party applications emerge in endlessly in mobile terminals, many third-party applications have applied for permission to read short messages. Some malicious third-party applications may obtain the user's personal privacy by stealing the user's short message, threatening the user's information security. In order to avoid leakage of user information, mobile terminal SMS encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W4/18
CPCH04W4/185H04W12/02H04W4/18H04W12/033
Inventor 张勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products