CN103067897A - Asymmetrical mobile phone short message encryption method - Google Patents
Asymmetrical mobile phone short message encryption method Download PDFInfo
- Publication number
- CN103067897A CN103067897A CN201310019879XA CN201310019879A CN103067897A CN 103067897 A CN103067897 A CN 103067897A CN 201310019879X A CN201310019879X A CN 201310019879XA CN 201310019879 A CN201310019879 A CN 201310019879A CN 103067897 A CN103067897 A CN 103067897A
- Authority
- CN
- China
- Prior art keywords
- short message
- note
- mobile phone
- spoon
- addressee
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an asymmetrical mobile phone short message encryption method. The asymmetrical mobile phone short message encryption method sequentially comprises the following steps: secret key establishing and storing, addressor encrypting, addresser sending, addressee deciphering, short message content displaying and the like. Mutually independent public key and private key are established in the mobile phone, the public key can be uploaded to the server, when sending short message, the addresser only needs to send the short message content and does not need to send the secret key at the same time. Therefore, even if the secret text content is intercepted, a mobile operator which transmits the secret text content just knows the encrypted character, genuine content of the short message cannot be analyzed, the genuine secretive goal is achieved, privacy degree of the short message is improved, secretive degree is improved, and private and confidential information of users are effectively protected. The asymmetrical mobile phone short message encryption method takes up little mobile phone resource.
Description
[technical field]
The present invention relates to the mobile phone application software method, particularly a kind of asymmetric method for encrypting mobile phone short message.
[background technology]
Mobile phone has become indispensable important communication tool in people's work and the life.Adopt mobile phone to carry out the important communication modes that note sends has become people, but the content that adopts mobile phone to send undue secret or privacy tend to cause trouble.Therefore, in the prior art, also with the Encrypted short message function, the note that sends is encrypted in some high-end mobile phone, but all is the symmetric cryptography mode that adopts in the present Encrypted short message function, ciphertext sends with secret key.After this mode ciphertext was intercepted and captured, content also just disclosed thereupon, and especially the ciphertext secret key will be accepted and transmission through mobile operator certainly, and content is easy to be disclosed, and confidentiality is not strong.
[summary of the invention]
Purpose of the present invention solves the problems of the prior art exactly, proposes a kind of asymmetric method for encrypting mobile phone short message, can't be cracked the ciphertext content even ciphertext intercepts and captures also, can improve privacy degrees, effectively protects user's privacy and confidential information.
For achieving the above object, the present invention proposes a kind of asymmetric method for encrypting mobile phone short message, may further comprise the steps successively:
Set up and preserve the secret key step: note both sides have all set up public spoon and private spoon, and the public affairs spoon is uploaded onto the server, and private spoon is kept at local repository;
Sender's encrypting step: the sender inquires about the public spoon that obtains corresponding addressee from server, utilizes the public spoon of addressee to carry out short message content and encrypts;
Sender's forwarding step: the note after the sender will encrypt sends;
Addressee's decryption step: after the addressee receives the ciphertext note, utilize local private spoon to carry out the short message content deciphering;
The short message content step display: the short message content after the deciphering is read by the addressee by screen display.
As preferably, specifically may further comprise the steps successively:
A) the note both sides set up respectively separately private spoon and public spoon;
B) the note both sides are left private spoon in local repository respectively;
C) the note both sides upload onto the server the public spoon of oneself respectively;
D) sender selects the addressee and inquires about public spoon that obtains the addressee from server;
E) judge whether the note that needs to send is long SMS, if be long SMS, then enters f) step; If not long SMS, then enter i) step;
F) content of long SMS being carried out segmentation disassembles;
G) utilize addressee's public spoon that segmented content is encrypted;
H) assembly unit is carried out in each segmentation after will encrypting;
I) utilize addressee's public spoon that short message content is encrypted;
J) sender sends the ciphertext note;
K) addressee receives the ciphertext note;
L) judge whether the ciphertext note that receives grows the ciphertext note, if for long ciphertext note, then enter m) step; If not long ciphertext note, then enter o) step;
M) utilize private spoon segmentation decrypting ciphertext note;
N) the ciphertext note with the segmentation deciphering is assembled into long SMS;
O) utilize private spoon decrypting ciphertext note;
P) show short message content.
When as preferably, described e) judging whether to be long SMS in the step, if contain Chinese character in the short message content, then more than or equal to X
1The content of individual character is judged as long SMS; If do not contain Chinese character in the short message content, then more than or equal to X
2The content of individual character is judged as long SMS.
As preferably, described X
1=15~19, X
2=50~56.
As preferably, described j) go out outside the short message content in the ciphertext note that the sender sends in the step, also include the note marking head, the note marking head records the version information of Encrypted short message type and encryption key.
As preferably, described j) short message content that shows in the step is stored in the local private data of the addressee storehouse.
As preferably, described j) short message content that shows in the step utilizes the twinkle SM pattern to show, gives up immediately after the reading, does not have draft in the mobile phone.
Beneficial effect of the present invention: the present invention sets up separate public spoon and private spoon at mobile phone; and public affairs spoons uploaded onto the server; the sender is when sending note; only need to send short message content; do not need to send simultaneously secret key; like this; even the character after the mobile operator that send content also only knows encryption is intercepted and captured or transmitted to the ciphertext content; and can not parse the real content of note; reached real purpose of maintaining secrecy; improved the secret degree of note, improved privacy degrees, effectively protect the user privacy and confidential information.It is few that this method takies mobile phone resources.
Feature of the present invention and advantage will be elaborated by reference to the accompanying drawings by embodiment.
[description of drawings]
Fig. 1 is the flow chart of the asymmetric method for encrypting mobile phone short message of the present invention.
[embodiment]
Asymmetric method for encrypting mobile phone short message may further comprise the steps successively:
A) the note both sides set up respectively separately private spoon and public spoon;
B) the note both sides are left private spoon in local repository respectively;
C) the note both sides upload onto the server the public spoon of oneself respectively;
D) sender selects the addressee and inquires about public spoon that obtains the addressee from server;
E) judge whether the note that needs to send is long SMS, if be long SMS, then enters f) step; If not long SMS, then enter i) step; When judging whether to be long SMS, if contain Chinese character in the short message content, then more than or equal to X
1The content of individual character is judged as long SMS; If do not contain Chinese character in the short message content, then more than or equal to X
2The content of individual character is judged as long SMS; X
1=15~19, X
2=50~56;
F) content of long SMS being carried out segmentation disassembles;
G) utilize addressee's public spoon that segmented content is encrypted;
H) assembly unit is carried out in each segmentation after will encrypting;
I) utilize addressee's public spoon that short message content is encrypted;
J) sender sends the ciphertext note; Go out outside the short message content in the ciphertext note that the sender sends, also include the note marking head, the note marking head records the version information of Encrypted short message type and encryption key;
K) addressee receives the ciphertext note;
L) judge whether the ciphertext note that receives grows the ciphertext note, if for long ciphertext note, then enter m) step; If not long ciphertext note, then enter o) step;
M) utilize private spoon segmentation decrypting ciphertext note;
N) the ciphertext note with the segmentation deciphering is assembled into long SMS;
O) utilize private spoon decrypting ciphertext note;
P) show short message content.
Aforesaid asymmetric SMS encryption is: have a pair of PKI (publickey) and private key (privatekey) in the key of asymmetric SMS encryption, note is used both sides to only have with the other side's public-key cryptography data is encrypted, and can only could decipher with own corresponding private cipher key, otherwise can not decipher note data, utilize the note conversation modes of symmetric cryptography to avoid note directly to expose the note privacy in transmission course and in mobile phone terminal.The receiver utilizes own corresponding private key that the ciphertext note is decrypted reading, and the note ciphertext is stored in self private data storehouse, or utilizes the twinkle SM pattern that the ciphertext note after reading is given up to avoid there is draft immediately.
Although the present invention illustrates and describes by the reference preferred embodiment,, those skilled in the art should understand, and in the scope of claims, can do the various variation on form and the details.
Claims (7)
1. asymmetric method for encrypting mobile phone short message is characterized in that: may further comprise the steps successively:
Set up and preserve the secret key step: note both sides have all set up public spoon and private spoon, and the public affairs spoon is uploaded onto the server, and private spoon is kept at local repository;
Sender's encrypting step: the sender inquires about the public spoon that obtains corresponding addressee from server, utilizes the public spoon of addressee to carry out short message content and encrypts;
Sender's forwarding step: the note after the sender will encrypt sends;
Addressee's decryption step: after the addressee receives the ciphertext note, utilize local private spoon to carry out the short message content deciphering;
The short message content step display: the short message content after the deciphering is read by the addressee by screen display.
2. asymmetric method for encrypting mobile phone short message as claimed in claim 1 is characterized in that: specifically may further comprise the steps successively:
A) the note both sides set up respectively separately private spoon and public spoon;
B) the note both sides are left private spoon in local repository respectively;
C) the note both sides upload onto the server the public spoon of oneself respectively;
D) sender selects the addressee and inquires about public spoon that obtains the addressee from server;
E) judge whether the note that needs to send is long SMS, if be long SMS, then enters f) step; If not long SMS, then enter i) step;
F) content of long SMS being carried out segmentation disassembles;
G) utilize addressee's public spoon that segmented content is encrypted;
H) assembly unit is carried out in each segmentation after will encrypting;
I) utilize addressee's public spoon that short message content is encrypted;
J) sender sends the ciphertext note;
K) addressee receives the ciphertext note;
L) judge whether the ciphertext note that receives grows the ciphertext note, if for long ciphertext note, then enter m) step; If not long ciphertext note, then enter o) step;
M) utilize private spoon segmentation decrypting ciphertext note;
N) the ciphertext note with the segmentation deciphering is assembled into long SMS;
O) utilize private spoon decrypting ciphertext note;
P) show short message content.
3. asymmetric method for encrypting mobile phone short message as claimed in claim 2 is characterized in that: when described e) judging whether to be long SMS in the step, if contain Chinese character in the short message content, then more than or equal to X
1The content of individual character is judged as long SMS; If do not contain Chinese character in the short message content, then more than or equal to X
2The content of individual character is judged as long SMS.
4. asymmetric method for encrypting mobile phone short message as claimed in claim 3 is characterized in that: described X
1=15~19, X
2=50~56.
5. asymmetric method for encrypting mobile phone short message as claimed in claim 2, it is characterized in that: go out outside the short message content in the ciphertext note that described j) sender sends in the step, also include the note marking head, the note marking head records the version information of Encrypted short message type and encryption key.
6. such as each described asymmetric method for encrypting mobile phone short message in the claim 2 to 5, it is characterized in that: the short message content that described j) shows in the step is stored in the local private data of the addressee storehouse.
7. such as each described asymmetric method for encrypting mobile phone short message in the claim 2 to 5, it is characterized in that: the short message content that described j) shows in the step utilizes the twinkle SM pattern to show, gives up immediately after the reading, does not have draft in the mobile phone.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310019879XA CN103067897A (en) | 2013-01-18 | 2013-01-18 | Asymmetrical mobile phone short message encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310019879XA CN103067897A (en) | 2013-01-18 | 2013-01-18 | Asymmetrical mobile phone short message encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103067897A true CN103067897A (en) | 2013-04-24 |
Family
ID=48110325
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310019879XA Pending CN103067897A (en) | 2013-01-18 | 2013-01-18 | Asymmetrical mobile phone short message encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103067897A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103402185A (en) * | 2013-07-30 | 2013-11-20 | 东北石油大学 | Private information transfer method |
CN103945348A (en) * | 2014-04-25 | 2014-07-23 | 长沙市梦马软件有限公司 | Asymmetrical secret key short message encryption method and system |
CN104661201A (en) * | 2013-11-19 | 2015-05-27 | 中国科学院深圳先进技术研究院 | Method, device and system for short message backup, and mobile terminal |
CN105450395A (en) * | 2015-12-30 | 2016-03-30 | 中科创达软件股份有限公司 | Information encryption and decryption processing method and system |
CN108270917A (en) * | 2017-12-01 | 2018-07-10 | 南京嘉谷初成通信科技有限公司 | A kind of encryption smart mobile phone |
CN108513272A (en) * | 2018-07-04 | 2018-09-07 | 北京奇安信科技有限公司 | Method for processing short messages and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1500289A2 (en) * | 2002-01-16 | 2005-01-26 | Sure On Sight Ltd | Secure messaging via a mobile communications network |
CN101202965A (en) * | 2007-12-10 | 2008-06-18 | 中兴通讯股份有限公司 | Method for transmitting safe point-to-point short message facing to connectionless |
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN102104844A (en) * | 2009-12-16 | 2011-06-22 | 北京邮电大学 | Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same |
-
2013
- 2013-01-18 CN CN201310019879XA patent/CN103067897A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1500289A2 (en) * | 2002-01-16 | 2005-01-26 | Sure On Sight Ltd | Secure messaging via a mobile communications network |
CN101202965A (en) * | 2007-12-10 | 2008-06-18 | 中兴通讯股份有限公司 | Method for transmitting safe point-to-point short message facing to connectionless |
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN102104844A (en) * | 2009-12-16 | 2011-06-22 | 北京邮电大学 | Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103402185A (en) * | 2013-07-30 | 2013-11-20 | 东北石油大学 | Private information transfer method |
CN103402185B (en) * | 2013-07-30 | 2016-02-10 | 东北石油大学 | A kind of private information transfer method |
CN104661201A (en) * | 2013-11-19 | 2015-05-27 | 中国科学院深圳先进技术研究院 | Method, device and system for short message backup, and mobile terminal |
CN103945348A (en) * | 2014-04-25 | 2014-07-23 | 长沙市梦马软件有限公司 | Asymmetrical secret key short message encryption method and system |
CN105450395A (en) * | 2015-12-30 | 2016-03-30 | 中科创达软件股份有限公司 | Information encryption and decryption processing method and system |
CN108270917A (en) * | 2017-12-01 | 2018-07-10 | 南京嘉谷初成通信科技有限公司 | A kind of encryption smart mobile phone |
CN108270917B (en) * | 2017-12-01 | 2021-01-15 | 南京嘉谷初成通信科技有限公司 | Encrypted smart phone |
CN108513272A (en) * | 2018-07-04 | 2018-09-07 | 北京奇安信科技有限公司 | Method for processing short messages and device |
CN108513272B (en) * | 2018-07-04 | 2021-10-01 | 奇安信科技集团股份有限公司 | Short message processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10237247B2 (en) | User interface systems and methods for secure message oriented communications | |
Rayarikar et al. | SMS encryption using AES algorithm on android | |
CN106850195B (en) | Group key negotiation and communication method in instant communication | |
CN103338437B (en) | The encryption method of a kind of mobile instant message and system | |
CN107682141A (en) | Data ciphering method and system for data transfer | |
US20150134959A1 (en) | Instant Communication Method and System | |
CN103067897A (en) | Asymmetrical mobile phone short message encryption method | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN109600374A (en) | Secure user data sending method and its system based on block chain | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN105281897A (en) | File encryption method and device and file decryption method and device | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN101917712A (en) | Data encryption/decryption method and system for mobile communication network | |
CN104219300B (en) | The sharing method and system of coordinate transformation parameter | |
CN102523563B (en) | Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology | |
KR101541165B1 (en) | Mobile message encryption method, computer readable recording medium recording program performing the method and download server storing the method | |
CN104618397A (en) | Encryption method and system for instant messaging software | |
CN101369887B (en) | E-mail enciphered transmission method | |
CN103634292A (en) | Method and system for communication information transmission | |
CN101262340A (en) | MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS | |
CN103634313B (en) | Address list processing method and device, as well as mobile terminal | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content | |
CN201623859U (en) | System for encrypting short messages through mobile phone terminal | |
CN108881300A (en) | A kind of file encryption that supporting mobile phone terminal security cooperation and sharing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130424 |