Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Short message security method and SIM card for implementing short message security

A security method and short message technology, applied in the field of short message security and SIM card, can solve the problems of low reliability, can not effectively prevent personal privacy leakage, etc., achieve the effect of good use flexibility and improve the reliability of encryption

Inactive Publication Date: 2006-11-15
DATANG MICROELECTRONICS TECH CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the reliability of this confidentiality method is not high, and others can easily understand the content of the short message, which cannot effectively prevent the disclosure of personal privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message security method and SIM card for implementing short message security
  • Short message security method and SIM card for implementing short message security
  • Short message security method and SIM card for implementing short message security

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0060] The receiver of this embodiment can choose to set the method of adopting all confidentiality or agreement confidentiality for the received short message. Such as figure 2 As shown, the short message security method of this embodiment includes the following steps:

[0061] Step 100: User A chooses to send a confidential short message through the STK menu, the SIM card adds protocol information to the content of the short message, and then sends it to the short message center through the mobile terminal;

[0062] Step 110: The short message center forwards the short message to the mobile phone terminal of user B, and the mobile phone terminal of user B initiates an update short message instruction to the SIM card;

[0063] The above is the sending process.

[0064] Step 120, the SIM card of user B monitors the update short message instruction;

[0065] Step 130: Determine whether the current setting is full encryption?

[0066] If yes, read the short message data and determi...

no. 2 example

[0099] This embodiment adopts a full encryption method, and the process is as follows Figure 5 As shown, the contents of steps 100-2~200-2 are the same as figure 2 The corresponding steps are the same.

[0100] When sending, the sending method of the first embodiment is adopted, but it can also be sent directly through a mobile phone;

[0101] During the receiving process, there is no need to determine whether there is agreement information in the current security mode setting and the short message, that is, it is cancelled. figure 2 In steps 130 and 140, after the update short message instruction is monitored, all the received short messages are encrypted and stored in 6F3C in the form of ciphertext;

[0102] During the reading process, there is no need to judge whether the read short message is a cipher text short message, that is, cancel figure 2 In step 170, the other steps of selecting read, identity verification and decryption display are the same, and the transfer opera...

no. 3 example

[0108] This embodiment adopts a fixed protocol encryption method, and the process is as follows Figure 7 As shown, the contents of steps 100-3~200-3 are figure 2 The corresponding steps are the same.

[0109] The sending process is the same as that of the first embodiment;

[0110] During the receiving process, the judgment of the selection setting is not performed, that is, cancel figure 2 In step 130, after receiving the short message, the steps for judging and encrypting and storing the short message with the protocol information are the same as the first embodiment;

[0111] The reading process is the same as that of the first embodiment, which consists of the steps of selecting to read, judging whether a short message in ciphertext form, identity verification and decryption display, etc., and subsequent dump operations can also be performed.

[0112] The following describes the structure of the SIM card used to implement the short message security method of this embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a short message security method, which comprises the following steps: the sender sends the short message; the SIM of the receiver encrypts the received short message and stores it; after the user enters the STK menu and inputs the correct key, the SIM card It can decrypt the short message in text form and display its plain text content to the user. The method of the invention stores the secret short message in the form of cipher text, thus improving the reliability of encryption and better satisfying the user's requirement for keeping the short message secret. The present invention also proposes a protocol encryption method, the sender sends a confidential short message with protocol information, the receiver only encrypts the short message with the protocol information, and the receiver can choose to set it as protocol encryption or all encryption , so that users have better flexibility.

Description

Technical field [0001] The present invention relates to an information confidentiality method in the field of mobile communication, and particularly relates to a short message confidentiality method and a SIM card for implementing the method. Background technique [0002] The short message platform is a business model provided by the wireless mobile network. Using the short message platform, mobile users can send and receive point-to-point short messages. Since short messages have the advantages of convenient sending and receiving, high prices and low prices, with the rapid growth of mobile users, short message services have flourished, with the total number of short messages reaching tens of billions. Mobile users have also obtained good services, and short messages have become a common way for people to communicate. [0003] When users use short messages to transfer information, they sometimes want the content of short messages to be private, that is, they hope that some short ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/20H04M3/42H04M1/675H04L9/00H04W4/12H04W12/02
Inventor 穆肇骊王长年王志红
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products