A method and system for hardware encrypted transmission and storage of mobile phone private text messages

A technology for hardware encryption and private contacts, applied in the field of hardware encrypted transmission and storage of mobile phone private short messages, can solve the problems of poor security, inability to unlock, and low security, and achieve high reliability, high security, and simple operation. Effect

Active Publication Date: 2020-04-21
深圳市中易通安全芯科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are at least the following deficiencies in this scheme or technology: (1) Usability is not strong
The current application basically only implements a part, without comprehensive consideration from the perspective of the system. For example, it either only realizes the encryption of the transmission part, or only realizes the encryption of the local SMS, and does not consider under what circumstances it will be encrypted and under what circumstances it will not be used. Encryption, the security of SMS has not been considered as a whole, from the key generation of SMS, to encrypted transmission, and then to local storage.
Therefore, if you want to build a complete SMS security system by yourself, you need the cooperation of multiple software, and it is difficult to cooperate with the current application software.
(2) Poor usability
If each text message is negotiated once, although the password can be obtained, the communication cost will increase. For example, one text message is originally sent, but at least three text messages will be generated under the condition of ensuring safety, and the communication cost has increased by 2 times.
And each text message can only be saved in plain text, otherwise the corresponding password cannot be unlocked if it is lost
For applications that store encrypted text messages, they often see ciphertext, which is very painful for people who want to view the content of text messages. They cannot tell which text message it is at a glance, and they need to decrypt each text message to be sure.
(3) Low security
Security considerations have not been taken at every stage from SMS key generation, to encrypted transmission, to local storage, but only a part of it has been implemented. In addition, the key settings of existing applications are basically weak, and the security very poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for hardware encrypted transmission and storage of mobile phone private text messages
  • A method and system for hardware encrypted transmission and storage of mobile phone private text messages
  • A method and system for hardware encrypted transmission and storage of mobile phone private text messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to better understand the technical solutions of the present invention, the embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0033] Such as figure 1 As shown, a hardware encrypted storage system for mobile phone private contacts is proposed, including mobile phone equipment, encryption chip, key generation module, encryption and decryption module, private contact management module, login authentication module, SMS storage read-write module, SMS processing module, SMS browsing module;

[0034] The encryption chip has an independent core processor and does not occupy the CPU resources of the system, so the performance is more efficient than the encryption and decryption process of pure software;

[0035] The key generation module is used to read the information of the sender and receiver of the mobile phone and generate the key used for encryption and decryption;

[0036] The encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware encryption transmission and storage method of mobile phone private short messages. The hardware encryption transmission method comprises the following steps of passing a safety certificate process, using a receiving end and sending end mobile phone number as a parameter to generate a secret key for encryption and decryption, writing plaintext short message content, using an encryption and decryption module to encrypt the short messages, and using a short message processing module to send the ciphertext short messages. The invention further provides a receiving decryption method corresponding to the hardware encryption transmission method and a hardware encryption transmission and storage system of the mobile phone private short messages, wherein the system is used for being matched with the methods to work. According to the hardware encryption transmission and storage technology of the mobile phone private short messages, system resources are not occupied, high performance, high safety and high reliability are achieved, and the demand for encryption protecting of private communications or contact of people can be effectively met.

Description

technical field [0001] The invention is applied in the fields of mobile communication, information security and the like, and in particular relates to a high-performance, high-security hardware encrypted transmission and storage technology for mobile phone private short messages. Background technique [0002] Through investigation, at present, there is no mobile phone on the market that directly encrypts the transmission and storage of text messages, and no mobile phone product uses a hardware encryption chip for data protection. At present, there are some software applications in the software market that can encrypt transmission or storage of some text messages. . The usual method of transmission is: set a security password on the local machine, and tell the receiver the password at the same time; when sending a text message, use this password as a key to encrypt the text message; decrypt. The usual storage method is to fix a certain key, specify a certain text message to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/14H04L9/00
Inventor 刘美云
Owner 深圳市中易通安全芯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products