Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cryptographic method for mobile phone communication

A technology of mobile phone and security method, which is applied in the direction of electrical components, wireless communication, security communication devices, etc., and can solve the problems of forgetting to encrypt data and wasting time

Active Publication Date: 2005-05-04
BEIJING ZHIGU TECH SERVICE
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if a user wants to encrypt an email sent by a specific person, he must check the sender first, and then encrypt a single email. This is not only a waste of time, but also may cause a piece of data to be encrypted due to a momentary negligence. forgot to encrypt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic method for mobile phone communication
  • Cryptographic method for mobile phone communication
  • Cryptographic method for mobile phone communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Without limiting the spirit and scope of application of the present invention, the implementation of the present invention is described below with an embodiment; those who are familiar with the technical field, after understanding the spirit of the present invention, can apply the encryption method of the present invention to each different mobile phones. The encryption method according to the present invention does not need to encrypt each piece of data, but can encrypt and protect the data related to this subject at the same time for a specific subject, which can not only increase efficiency, but also avoid failure to perform due to human negligence. Encryption, while leaking data. The encryption method of the present invention can be used in various mobile communication tools and is not limited to the preferred embodiments described below.

[0015] first reference figure 1 Shown is a schematic diagram of related modules used for encryption in the mobile phone, incl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the disclosed secret method, after user sets up secret setting for a specific telephone number, then any received message and any incoming call relevant to the said telephone number is not able to be displayed or listened instantly by user. User can watch or listen the content only authentication of cipher is passed.

Description

technical field [0001] The invention relates to a security method, in particular to a security method for a mobile phone. Background technique [0002] Since the development of mobile phones, it has evolved from the original medium of voice transmission to today's function of information transmission. As far as the type of data transmission is concerned, the transmission method of the first generation of mobile phones is an analog specification, and the transmission content is mainly voice, and the confidentiality and penetration effect are not ideal. The transmission method of the second-generation mobile phone is digital transmission. After the voice is digitized and encoded, it is transmitted in the form of packets, which greatly improves the confidentiality. [0003] However, with the advent of the Internet era, the demand for digital networking and wireless networking is gradually increasing. In the concept of information appliances and IA products, mobile phones are p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/00H04L9/28H04L9/32
Inventor 赖振兴梅家圣
Owner BEIJING ZHIGU TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products