CN102665201A - Mobile terminal and user information encryption method for same - Google Patents
Mobile terminal and user information encryption method for same Download PDFInfo
- Publication number
- CN102665201A CN102665201A CN2011104094593A CN201110409459A CN102665201A CN 102665201 A CN102665201 A CN 102665201A CN 2011104094593 A CN2011104094593 A CN 2011104094593A CN 201110409459 A CN201110409459 A CN 201110409459A CN 102665201 A CN102665201 A CN 102665201A
- Authority
- CN
- China
- Prior art keywords
- encryption chip
- encryption
- portable terminal
- sim
- order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a mobile terminal and a user information encryption method for the same. The user information encryption method includes: using an encryption chip to monitor a data port of the mobile terminal in real time, wherein if an interactive command of the mobile terminal is a command unrelated to user information, the encryption chip is in the on state so that the command can be directly communicated with an SIM (subscriber identity module) card through the encryption chip; and if the command is a command written to the user information, the encryption chip is used for encryption preprocessing of data stream and storing the encrypted user information on the SIM card. Compared with the prior art, the mobile terminal and the user information encryption method for the same according to the technical scheme have the advantages that crack cannot be realized by a software reinstalling method while encryption algorithm operation is completed by hardware; the speed, the performance and reliability of the user information encryption method are superior to those of the software method; a password does not need to be remembered by means of introduction of biometric identification; personal information of a user cannot be divulged by means of encryption processing of the user information in the SIM card; and as the user information exists without depending on a mobile phone, the user information in the SIM card can be read out only in the presence of the encryption chip.
Description
Technical field
The present invention relates to communication technical field, more specifically, relate to a kind of portable terminal and user profile encryption method thereof.
Background technology
Present most of portable terminal; For example address list on the mobile phone and short message were not all carried out encryption; If it is mobile phone is lost, light then can cause machine master's personal information to be revealed, heavy then fall in offender's hand; Make a phone call or send short messages through kith and kin, fabricate lies to carry out economic fraud to the machine master.
Some mobile phones are also arranged through password of software setting, whether verified users can visit built-in address list.This method is easy to walk around proof procedure through some software approach, still can cause address list information to be revealed.
The present invention is intended to address the above problem and provides a kind of reliable, the lower-cost portable terminal that has the address list encryption function.Even the loss portable terminal can not revealed any personal information of closing with the machine principal phase yet.This function does not rely on portable terminal and exists, make things convenient for the user change behind the portable terminal also can easily address book importing etc. personal information.
Summary of the invention
The objective of the invention is to propose a kind of portable terminal and user profile encryption method thereof.
For realizing above-mentioned purpose; The present invention proposes a kind of mobile terminal subscriber information encryption method; Encryption chip is monitored the mobile terminal data port in real time; If with the interactive command of portable terminal be and instruction that user profile is irrelevant, then encryption chip is in channel status, make said order can through encryption chip directly and SIM communicate; If said order is the order that writes user profile, then data stream is encrypted preliminary treatment, and the user profile after will encrypting is stored on the SIM by encryption chip.
Further,, then read user profile, decipher, decrypted result is sent to portable terminal through encryption chip through encryption by SIM if said order is the order of reading user profile.
Further, said user profile is address list and/or short message.
Further, saidly by encryption chip data stream is encrypted preliminary treatment and be meant with user biological information and be key and handle through AES.
Further, said portable terminal is through the key state in the key communication interface inquiry encryption chip, if key state is empty; Need the user to carry out the biological information input; And the related data of biological information identification is saved in encryption chip inside, and the switching encryption chip is a channel status, SIM and portable terminal begin to communicate; Encryption chip is monitored portable terminal and mutual order and the exchanges data of SIM; When occurring reading address list and/or short message imperative structures, address list and/or the short message deciphering of the key that stores before encryption chip calls to receiving, and will be reduced into data expressly and send to portable terminal.
The present invention also proposes a kind of portable terminal, and said portable terminal comprises mobile terminal main body, encryption chip module and biological information identification module;
Said biological information identification module is used to discern the key of user biological information as AES, is stored in the encryption of the inner user profile of SIM that portable terminal installs through this AES;
Said encryption chip is monitored the FPDP of mobile terminal main body in real time; If be and the irrelevant instruction of user profile with the interactive command of portable terminal; Then encryption chip is in channel status, and said order can directly be communicated with the SIM that is installed on portable terminal through encryption chip; If said order is the order that writes user profile, then data stream is encrypted preliminary treatment, and the user profile after will encrypting is stored on the SIM by encryption chip.
Further,, then read user profile, decipher, decrypted result is sent to portable terminal through encryption chip through encryption by SIM if said order is the order of reading user profile.
Further, said user profile is address list and/or short message.
Further, saidly by encryption chip data stream is encrypted preliminary treatment and be meant with user biological information and be key and handle through AES.
Further, said portable terminal is through the key state in the key communication interface inquiry encryption chip, if key state is empty; Need the user to carry out the biological information input; And the related data of biological information identification is saved in encryption chip inside, and the switching encryption chip is a channel status, SIM and portable terminal begin to communicate; Encryption chip is monitored portable terminal and mutual order and the exchanges data of SIM; When occurring reading address list and/or short message imperative structures, address list and/or the short message deciphering of the key that stores before encryption chip calls to receiving, and will be reduced into data expressly and send to portable terminal.
In sum, adopt the present invention to have following beneficial effect:
Compared with prior art, adopt the hardware solution of encryption chip, can not realize cracking, accomplish the AES computing by hardware simultaneously through the method that software is brushed machine; Speed, Performance And Reliability all are superior to software approach; Introduce the bio-identification part, do not needed the user to remember password; Even mobile phone is lost, address list in the SIM and short message can not revealed user's personal information through encryption; User profile does not rely on mobile phone and exists, even change mobile phone, as long as have encryption chip, can read the user profile in the SIM equally.
Description of drawings
Fig. 1 is that embodiment of the invention mobile phone is formed sketch map;
Fig. 2 is the embodiment of the invention mobile module normal boot-strap or the workflow sketch map of reading SIM card address list during from the screen locking recovering state;
Address list write the SIM schematic flow sheet when Fig. 3 was each mobile phone entering screen locking of the embodiment of the invention or off-mode;
When being embodiment of the invention normal boot-strap or release, encrypts Fig. 4 the workflow sketch map that short message writes SIM;
Reading SIM card short message schematic flow sheet when Fig. 5 is each mobile phone entering screen locking of the embodiment of the invention or off-mode.
Embodiment
General mobile communication terminal, for example mobile phone is realized access of radio network through inserting SIM (Subscriber Identity Module is the mobile phone card that we say usually).SIM itself is to store a certain amount of address list and short message according to amount of capacity.But generally all with the plaintext stores.In the following embodiment of the present invention, said portable terminal is that example describes with the mobile phone, and certainly, in other embodiments, said portable terminal can be other forms such as panel computer.Said end message is address list and/or short message.The said end message of following embodiment is that example describes with address list and short message.
Technical scheme of the present invention comprises encryption chip, biological information identification module, mobile terminal main body and SIM.The electric interfaces of SIM and portable terminal is followed the IEC7816-3 standard, and the protocol command interface is followed IEC7816-4 standard and 3GPP (Three Generation Partnership Project) related protocol.
Encryption chip realizes through FPGA that at present encryption chip can also pass through a kind of of chips such as single-chip microcomputer, digital signal processor, ARM, CPU or combination realizes, the embodiment of the invention is that example describes with FPGA just.AES can be DES (Data Encryption Algorithm), and it is that example describes with AES that 3DES, AES (Advanced Encryption Standard) wait any disclosed AES, the embodiment of the invention.Encryption chip comprises two parts: protocol command processing section and AES AES part.The key of AES AES is that biological information Recognition module is extracted, and constitutes one section condition code of unique identification with user identity.The biological information recognition method that the biological information identification module adopts can be a kind of of several different methods such as fingerprint identification, iris recognition, face recognition, vein identification, the identification of ear line, vein or combination, and the embodiment of the invention is that example describes with the fingerprint recognition.
The protocol command processing section mainly is that the IEC7816-4 order that mobile module sends is resolved.Encryption chip is monitored the data port in real time, if order be and the irrelevant instruction of address list and short message, then encryption chip is a channel status, i.e. order can be through encryption chip direct and SIM communicate.If write the order of address list or short message, then carry out an encryption preprocessing process, and the information stores after will encrypting is on SIM to data flow by encryption chip.If read the order of address list and short message, the address list and the short message through encryption of then being read by SIM need be carried out decryption work through encryption chip, send to mobile module then.
Through fingerprint identification module, cognitron master's biological information is as the key of AES AES.All are stored in the inner address list of SIM and short message all is to pass through encryption, if through encryption chip and secret key decryption, address list of reading and short message are the mess codes that has no meaning.
The working method of mobile module and regular handset also have certain difference; When each mobile module powers on; Send the order of duplicating the SIM address list, address list that stores in the SIM and short message are copied in the mobile phone, specifically carry out address list and short message is searched; Dialing, operations such as read-write are carried out on mobile phone.
Below in conjunction with accompanying drawing and specific embodiment technical scheme of the present invention is done detailed description.
As shown in Figure 1, be that embodiment of the invention mobile phone is formed sketch map, it comprises mobile module, SIM module, encryption chip module and biological information identification module.SIM is connected signal with encryption chip and comprises: reset signal RST, clock signal clk, bi-directional data signal DATA and power supply VCC.Encryption chip comprises with the signal that is connected of mobile module: reset signal RST, clock signal clk, bi-directional data signal DATA and power supply VCC, above total interface signal electrical characteristic all satisfies the requirement of IEC7816-3 standard.Respectively with GSM (Global System for Mobile communications), WCDMA (Wideband Code Division Multiple Access) agreement describes for example below.
Address list information is stored in the specific file of SIM, and under the GSM pattern, address list is arranged in 6F3A file under the 3F00/7F10, and the order of specifically reading address list is following:
A0A4000002?6F3A
9F0F
A0C000000F
00000AF06F3A040011FF440102011C?9000
A0B201041C
80aabbccddFFFFFFFFFFFFFFFFFF07812143658709F1FFFFFFFFFFFF
Article three, order is respectively to choose the 6F3A file, obtains the file response, reads the content of file.Article three, the result that returns of order reads an address list information exactly, and name is " Zhang San ", telephone number 12345678901; Length is 1C; Because aes algorithm is the block encryption algorithm, each ciphered data all is 128bit, so selection needs the ciphered data zone according to return data length (1C); Because the telephone number in the address list generally is positioned at the information end, so select last 16 bytes as the plaintext part of encrypting input.
Mobile module can be through the state of key in the key communication interface inquiry encryption chip.Different with the gsm protocol of 2G, the identifier of the address list file under the WCDMA agreement changes, need be through reading EF in advance
PBCThe content of file is discerned the position and the identifier of address list file in the concrete SIM, and 00 beginning is also adopted in the order of the communications protocol of SIM in addition, substitutes the A0 in the gsm protocol.One is read EF
PBCThe file example is following:
10:00A4000C02
80:A4
10:4F30
80:9000
10:00B201044C
80:B2A81EC0034F3901C4034F5A03C6034F5105C5034F4109C9034F6107C1034F3111A905CA034F710FAA14C2034F4A0CC7034F4B0DC8034F4C0BCB034F4F0EFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF9000
Can find out that from replying of final stage order the address list file identifier is 4F39.So for the content of address list is operated, FPGA need keep watch on above-mentioned order when mobile phone reads or write this document, so that adapt to the variation of address list file name identifier.
As shown in Figure 2 is the embodiment of the invention mobile module normal boot-strap or the workflow sketch map of reading SIM card address list during from the screen locking recovering state, and it comprises the steps:
S201: normal boot-strap or from the screen locking recovering state;
S202: judge key state,, then change step S203 over to,, then change step S204 over to if key state is not empty if key state is empty;
S203: require the user to import KEY, and change step S202 over to;
S204: encryption chip is a channel status, with the SIM proper communication;
S205: judge whether to occur reading the order of address list, if, then change step S206 over to, do not occur if, then return step S205 and continue to judge;
S206: the address book information to reading is deciphered;
S207: with the address list stored in clear at mobile phone.
At first mobile module can if key state is empty, needs the user to carry out the fingerprint input, and the related data of fingerprint recognition is saved in encryption chip inside through the key state in the key communication interface inquiry encryption chip, and the switching encryption chip is a channel status.SIM module and mobile module begin to communicate, and encryption chip at this moment is equivalent to path, do not carry out any operation, but monitor mobile module and mutual order and the exchanges data of SIM module always.When occurring reading the address list imperative structures, encryption chip thinks that mobile phone needs the address list of reading SIM card, the address list information deciphering of key that store before using of encryption chip at this moment to receiving, and will be reduced into data expressly and send to mobile module.In the mobile module part, all can programme in advance, each normal boot-strap or during from the screen locking recovering state all needs again the whole address list informations in the reading SIM card.
Please refer to shown in Figure 3, be the each mobile phone of the embodiment of the invention when getting into screen locking or off-mode address list write the SIM schematic flow sheet, it comprises the steps:
S301: shutdown perhaps gets into the screen locking state;
S302: whether judge address list through revising, if, then change step S303 over to, if, then change step S304 over to not through revising through revising;
S303: confirm the address list identifier according to the EFpec file, SIM is encrypted and be saved in to the address list information of revising with key;
S304: deletion is stored in the address list information in the mobile phone;
S305: notice encryption chip deletion key;
S306: accomplish shutdown or screen locking.
At first be whether need carry out address list renewal work in the mobile module inside confirmation; If address list information was changed; Need mobile module to send and write the order of SIM address list accordingly; When encryption chip listened to the imperative structures of writing SIM, utilization should be carried out encryption to follow-up address list information through the key that stores, with the information stores after encrypting in SIM.After renewal work was accomplished, mobile module began to delete the address list information of own internal reservoir, notified encryption chip deletion key simultaneously, accomplished the screen locking flow process or got into off-mode.The record command format of reporting is basic identical when reading, and distinguishes and is that final order 00B201041C form becomes 00DC201041C.
Through keeping watch on the communication process of SIM, can discern the identifier of address list storage store files in the corresponding SIM card, be arranged in 4F39 file under the 3F00/7F10 with the above-mentioned address list that illustrates, the order of specifically reading address list is following:
10:A0A4000002
80:A4
10:4F39
80:9F0F
10:A0C000000F
80:C000001B586F3A040011FF222102011C9000
10:00B201041C
80:80aabbccddFFFFFFFFFFFFFFFFFF07812143658709F1FFFFFFFFFFFF
Article three, order is respectively to choose the 4F39 file, obtains the file response, reads the content of file.Article three, the result that returns of order reads an address list information exactly, and name is " Zhang San ", telephone number 12345678901; Length is 1C; Because aes algorithm is the block encryption algorithm, each ciphered data all is 128bit, so selection needs the ciphered data zone according to return data length (1C); Because the telephone number in the address list generally is positioned at the information end, so select last 16 bytes as the plaintext part of encrypting input.
According to the USIM related protocol of WCDMA, every address list information possibly comprise many telephone numbers, another name, e-mail address etc.So also must carry out encryption to these key messages.This just needs encryption chip to file EF
PBCContent resolve.According to its content corresponding file is carried out and top similar AES ciphering process:
B2A81E
C0034F3901
C4034F5A03
C6034F5105
C5034F4109
C9034F6107
C1034F3111
A905CA034F710F
AA14C2034F4A0C
C7034F4B0D
C8034F4C0B
CB034F4F0EFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF9000
Be assumed to be the result who reads EFPBC4F30, can parse C0, C4, C6, C5, C9, C1, CA, C2, C7, C8, CB identifier, C0 are represented main address list information, and back files listed identifier is 4F39, and list the encryption method front; The address list information of C4 for replenishing, file identifier is 4F5A, length is 17 fixing bytes, needs to encrypt with the AES AES 16 bytes of front; CA is an e-mail address information, and file identifier 4F71 should be noted that needing to occur enciphered data to be less than the situation of 16 bytes, at this moment need fill data, need filter the data of filling during deciphering.C2 is that file identifier is 4F4A to the replenishing of main address list information; This file is seldom used and can not handled; C1, C6, C7, C8, C9 is the key message that other information do not belong to the user, need not carry out encryption.
Please refer to shown in Figure 4ly, encrypt the workflow sketch map that short message writes SIM when being embodiment of the invention normal boot-strap or release, it comprises the steps:
S401: mobile phone prompting user imports fingerprint recognition information as key;
S402: encryption chip is a channel status, and monitors the order and the exchanges data of mobile phone and SIM;
S403: judge whether to occur the order of create message breath, if, then change step S404 over to, continue to judge if do not occur then change step S403 over to;
S404: encryption chip is encrypted corresponding short message data flow, and is written in the SIM;
S405: judge whether that all short messages have write completion,,, then change step S403 over to and continue to judge if not if then flow process finishes.
At first mobile module can be through the key state in the communication interface inquiry encryption chip, if key state is empty, the prompting user carries out the fingerprint recognition input, and the related data of fingerprint recognition is saved in encryption chip inside.At this moment encryption chip is equivalent to path, does not carry out any operation, but monitors mobile module and mutual order and the exchanges data of SIM module always.When create message breath imperative structures occurring, encryption chip thinks that mobile phone need write short message in SIM, the traffic encryption of key to receiving that stores before at this moment utilizing; Short message after encrypting is stored in the specific file of SIM; The protocol specification relevant according to 3GPP, short message is stored in the specific file of SIM, is usually located in the 6F3C file under the 3F00/7F10; 6F3C is the log file of a regular length, and each record is exactly a short message.Concrete length is 176 bytes, and after choosing the 6F3C file, the order of specifically writing the bar short message is following: the mobile phone master chip sends " A0DC0104B0 " order, and expression writes short message to article one record.SIM provides " DC " and replys, and allows to write short message information.The mobile phone master chip sends the data flow of 176 bytes and representes writing information; Encryption chip need be tackled the data flow of these 176 bytes and utilize the biometric information that stores before as key, these 176 byte datas is carried out encryption, because AES is the block encryption algorithm; Can encrypt 16 bytes at every turn; So 176 bytes just in time can be decomposed into 11 pieces, need not fill.Then the data after the encryption are written among the SIM, SIM sends 9000 expressions and writes the work completion.Through top step, the encryption short message of 176 bytes just is written in the SIM.Key in the encryption chip is that this information can not be kept at encryption chip inside through the fingerprint recognition information of user's input, all can lose after each chip power down.Need the user to import once more behind the mobile phone power-on, can guarantee the safety of validated user key like this, be not stolen.Should be noted that above-mentioned example is that SIM is operated under the situation of GSM standard; When being operated in the WCDMA standard, the command header of mentioned order becomes 00 by A0, for example: A0DC0104B0; Become 00DC0104B0, the present invention adapts to above two kinds of working forms automatically.
Please refer to shown in Figure 5ly, is the each mobile phone of embodiment of the invention reading SIM card short message schematic flow sheet when getting into screen locking or off-mode, and it comprises the steps:
S501: mobile phone prompting user imports fingerprint recognition information as key;
S502: encryption chip is a channel status, and monitors the order and the exchanges data of mobile phone and SIM;
S503: judge whether to occur the reading short message order,,, then change step S503 over to and continue to judge if not if then change step S504 over to;
S504: encryption chip is to corresponding short message data flow, and sends to mobile phone;
S505: judge whether that all short messages all read, if then finish, if otherwise change step S503 over to and continue to judge.
At first be whether need carry out short message renewal work in the mobile module inside confirmation; If short message was changed; Need mobile module to send and write the order of SIM short message accordingly; When encryption chip listens to the imperative structures of writing SIM, utilize the key that has stored that follow-up short message data flow is carried out encryption, the short message after encrypting is stored in the SIM.After renewal work is accomplished; Mobile module begins to delete the short message of internal reservoir; And notify the encryption chip short message to write work through communication interface and accomplish, mobile phone gets into screen locking flow process or off-mode, and encryption chip also is in power-down state simultaneously; When encryption chip was in power-down state, its inner key of preserving can be cleared.
Mobile module can be through the key state in the communication interface inquiry encryption chip, if key state is empty, the prompting user carries out the fingerprint recognition input, and the related data of fingerprint recognition is saved in encryption chip inside, and the switching encryption chip is a channel status.And monitor mobile module and mutual order and the exchanges data of SIM module always.When reading short message breath imperative structures " A0B2XX04B0 " occurring; Encryption chip thinks that mobile phone needs the short message of reading SIM card; At this moment the short message data flow deciphering of key that receive before using of encryption chip to receiving, and will be reduced into data expressly and send to mobile module.After all short messages were read, mobile phone was through communication interface notice encryption chip.In the mobile module part, all can programme in advance, each normal boot-strap or during from the screen locking recovering state all needs again the whole short messages in the reading SIM card.
The present invention has comprehensively used bio-identification, and usim card protocal analysis technology utilizes the AES AES that very high safety standard is provided, and has guaranteed to have only validated user just can read and uses relevant address list and short message.Compared with prior art, the present invention has following advantage:
Adopt the hardware solution of encryption chip, can not realize cracking, accomplish the AES computing by hardware simultaneously through the method that software is brushed machine; Speed, Performance And Reliability all are superior to software approach;
Introduce the bio-identification part, do not needed the user to remember password;
Even mobile phone is lost, address list in the SIM and short message can not revealed user's personal information through encryption;
Method does not rely on mobile phone and exists, even change mobile phone, as long as have encryption chip, can read the address list information in the SIM equally.
Certainly; The present invention also can have numerous embodiments; In the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art be when can making various corresponding changes or variation according to the present invention, any modification of within spirit of the present invention and principle, being done in every case, are equal to replacement, improvement, all should be included within protection scope of the present invention.
Claims (10)
1. mobile terminal subscriber information encryption method; It is characterized in that; Encryption chip is monitored the mobile terminal data port in real time; If with the interactive command of portable terminal be and instruction that user profile is irrelevant, then encryption chip is in channel status, make said order can through encryption chip directly and SIM communicate; If said order is the order that writes user profile, then data stream is encrypted preliminary treatment, and the user profile after will encrypting is stored on the SIM by encryption chip.
2. the method for claim 1 is characterized in that, if said order is the order of reading user profile, then reads the user profile through encryption by SIM, deciphers through encryption chip, and decrypted result is sent to portable terminal.
3. the method for claim 1 is characterized in that, said user profile is address list and/or short message.
4. the method for claim 1 is characterized in that, saidly by encryption chip data stream is encrypted preliminary treatment and is meant with user biological information and is key and handles through AES.
5. the method for claim 1; It is characterized in that said portable terminal is through the key state in the key communication interface inquiry encryption chip, if key state is empty; Need the user to carry out the biological information input; And the related data of biological information identification is saved in encryption chip inside, and the switching encryption chip is a channel status, SIM and portable terminal begin to communicate; Encryption chip is monitored portable terminal and mutual order and the exchanges data of SIM; When occurring reading address list and/or short message imperative structures, address list and/or the short message deciphering of the key that stores before encryption chip calls to receiving, and will be reduced into data expressly and send to portable terminal.
6. a portable terminal is characterized in that, said portable terminal comprises mobile terminal main body, encryption chip module and biological information identification module;
Said biological information identification module is used to discern the key of user biological information as AES, is stored in the encryption of the inner user profile of SIM that portable terminal installs through this AES;
Said encryption chip is monitored the FPDP of mobile terminal main body in real time; If be and the irrelevant instruction of user profile with the interactive command of portable terminal; Then encryption chip is in channel status, and said order can directly be communicated with the SIM that is installed on portable terminal through encryption chip; If said order is the order that writes user profile, then data stream is encrypted preliminary treatment, and the user profile after will encrypting is stored on the SIM by encryption chip.
7. portable terminal as claimed in claim 6 is characterized in that, if said order is the order of reading user profile, then reads the user profile through encryption by SIM, deciphers through encryption chip, and decrypted result is sent to portable terminal.
8. portable terminal as claimed in claim 6 is characterized in that, said user profile is address list and/or short message.
9. portable terminal as claimed in claim 6 is characterized in that, saidly by encryption chip data stream is encrypted preliminary treatment and is meant with user biological information and is key and handles through AES.
10. portable terminal as claimed in claim 6; It is characterized in that said portable terminal is through the key state in the key communication interface inquiry encryption chip, if key state is empty; Need the user to carry out the biological information input; And the related data of biological information identification is saved in encryption chip inside, and the switching encryption chip is a channel status, SIM and portable terminal begin to communicate; Encryption chip is monitored portable terminal and mutual order and the exchanges data of SIM; When occurring reading address list and/or short message imperative structures, address list and/or the short message deciphering of the key that stores before encryption chip calls to receiving, and will be reduced into data expressly and send to portable terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104094593A CN102665201A (en) | 2011-12-09 | 2011-12-09 | Mobile terminal and user information encryption method for same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011104094593A CN102665201A (en) | 2011-12-09 | 2011-12-09 | Mobile terminal and user information encryption method for same |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102665201A true CN102665201A (en) | 2012-09-12 |
Family
ID=46774591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011104094593A Pending CN102665201A (en) | 2011-12-09 | 2011-12-09 | Mobile terminal and user information encryption method for same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102665201A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN104239809A (en) * | 2013-06-17 | 2014-12-24 | 中兴通讯股份有限公司 | File protecting method, file protecting device, file decryption method, file decryption device and terminal |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010026540A1 (en) * | 2008-09-03 | 2010-03-11 | Nokia Corporation | Message storage and retrieval |
CN101795450A (en) * | 2009-02-03 | 2010-08-04 | 沈阳晨讯希姆通科技有限公司 | Method and device for carrying out security protection on mobile phone data |
-
2011
- 2011-12-09 CN CN2011104094593A patent/CN102665201A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010026540A1 (en) * | 2008-09-03 | 2010-03-11 | Nokia Corporation | Message storage and retrieval |
CN101795450A (en) * | 2009-02-03 | 2010-08-04 | 沈阳晨讯希姆通科技有限公司 | Method and device for carrying out security protection on mobile phone data |
Non-Patent Citations (1)
Title |
---|
陈明: "《网络安全教程》", 30 April 2004 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458382A (en) * | 2013-05-22 | 2013-12-18 | 深圳市中易通网络技术有限公司 | Hardware encryption transmission and storage method and system of mobile phone private short messages |
CN103458382B (en) * | 2013-05-22 | 2020-04-21 | 深圳市中易通安全芯科技有限公司 | Hardware encryption transmission and storage method and system for mobile phone private short message |
CN104239809A (en) * | 2013-06-17 | 2014-12-24 | 中兴通讯股份有限公司 | File protecting method, file protecting device, file decryption method, file decryption device and terminal |
CN104683978A (en) * | 2015-03-27 | 2015-06-03 | 襄阳泰凯电子有限公司 | Mobile phone stored information encryption device and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103106372B (en) | For lightweight privacy data encryption method and the system of android system | |
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
JP4734595B2 (en) | Data transfer between two chip cards | |
CN101196855B (en) | Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method | |
CN102781001A (en) | Method for encrypting built-in file of mobile terminal and mobile terminal | |
CN102819702B (en) | File encryption operation method and file encryption operational system | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
CN102867157B (en) | Mobile terminal and data guard method | |
CN105933886B (en) | ESIM number writing method, security system, ESIM number server and terminal | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
CN102542449A (en) | Wireless communication device and payment authentication method | |
CN101727558B (en) | Method for clearing password of computer, computer and server | |
CN104318286A (en) | NFC label data management method and system and terminal | |
WO2011130970A1 (en) | Device and method for protecting data of mobile terminal | |
US20170091483A1 (en) | Method and Device for Protecting Address Book, and Communication System | |
CN102665201A (en) | Mobile terminal and user information encryption method for same | |
CN101754209A (en) | Method for protecting contents of mobile phone | |
CN202014304U (en) | Mobile phone privacy protection system based on code authentication | |
CN102883039A (en) | Method for encrypting multimedia private diary of mobile phone | |
CN111628864A (en) | Method for carrying out secret key safety recovery by using SIM card | |
CN105208017B (en) | A kind of memorizer information acquisition methods | |
CN104732166A (en) | Data storing and reading method and device and equipment | |
CN102761559A (en) | Private data-based network security sharing method and communication terminal | |
CN106209381B (en) | A kind of photo encipher-decipher method and its system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20120912 |
|
RJ01 | Rejection of invention patent application after publication |