CN104394530A - Wechat content encryption system based on smartphone and implementation method of wechat content encryption system - Google Patents
Wechat content encryption system based on smartphone and implementation method of wechat content encryption system Download PDFInfo
- Publication number
- CN104394530A CN104394530A CN201410749578.7A CN201410749578A CN104394530A CN 104394530 A CN104394530 A CN 104394530A CN 201410749578 A CN201410749578 A CN 201410749578A CN 104394530 A CN104394530 A CN 104394530A
- Authority
- CN
- China
- Prior art keywords
- micro
- letter
- encryption
- module
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000007726 management method Methods 0.000 claims description 20
- 230000005540 biological transmission Effects 0.000 claims description 19
- 238000004891 communication Methods 0.000 claims description 12
- 230000006870 function Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/605—Copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a wechat content encryption system based on a smartphone and an implementation method of the wechat content encryption system, and relates to the field of plug-ins of instant messaging applications. The wechat content encryption system comprises a system control module, a user data input module, a data sending module, a wechat application interface module, a message display module, a key management module and a data encryption and decryption module. According to the system, data information transmitted through chats and files of wechat is encrypted, so that problems of possible data loss and privacy disclosure are solved; texts, voices, pictures and other kinds of files can be transmitted, and the limitation that wechat cannot transmit other kinds of files is broken through; users can definite encryption key values, so that the security of user data is further improved; decrypted plaintexts are protected, the user data are prevented from being stolen, and actual application requirements of the users who have higher requirements for individual privacies are met.
Description
Technical field
The invention belongs to the plug-in unit field of instant messaging application, be specifically related to a kind of micro-letter content encryption system based on smart mobile phone and its implementation.
Background technology
Micro-letter is the social software developed by company of Tengxun, and user can use this software to send voice, video, picture and word.The system usage platform of micro-letter comprises mobile phone, flat board, PC etc.The micro-letter of redaction adds the functions such as public platform, circle of friends and message push, and as a popular social software, micro-letter has had 600,000,000 users now, and average daily any active ues is more than 100,000,000.Present stage, micro-letter became the social software of the most main flow of Chinese network, and level security of its communication is also always by everybody is paid close attention to.
As current domestic well-known instant messaging application, micro-letter is almost the indispensability application of all smart mobile phones.User carries out word and multimedia transmission by this application and the household of oneself, friend and colleague, realizes the function of Communication.But this transmission means is faced with high security risk usually, illegal cracker even directly obtains the chat record such as picture, sound by opening micro-letter cache file folder, thus wantonly invades privacy of user.Although user can delete private file by the method for the micro-letter buffer memory of periodic cleaning, this also means the loss of data simultaneously, and this also cannot eradicate the problem of privacy leakage, and having no safety can say.
In view of this; seek a kind of micro-letter safety insert that can complete micro-letter content-encrypt and become the target that these those skilled in the art pursue; realize the protection of privacy of user data, for micro-letter chat safety of user escorts, fundamentally ensure the safety of user's chat and data file information.
Summary of the invention
The invention provides a kind of micro-letter content encryption system based on smart mobile phone and its implementation, present invention, avoiding disabled user and open the danger that micro-letter cache file folder directly can obtain the chat record such as picture, sound, eliminate loss of data and privacy leakage potential safety hazard that the chat of micro-letter and file transfers may exist, described below:
A kind of micro-letter content encryption system based on smart mobile phone, described micro-letter content encryption system comprises: system control module, user data input module, data transmission blocks, micro-letter AIM and message display module, and described micro-letter content encryption system also comprises: key management module, data encrypting and deciphering module.
Described system control module and described key management module realize data communication; Described system control module and described data encrypting and deciphering module realize data communication; Described system control module calls the key that described key management module obtains encryption, and described system control module calls described data encrypting and deciphering module and uses multiple commercial cipher algorithm to complete the encryption and decryption of micro-letter content-message.
Described commercial cipher algorithm is SM1 and SM4 algorithm.
Described implementation method comprises the following steps: the process of transmitting of the micro-letter content-message of encryption of described micro-letter content encryption system; The receiving course of the micro-letter content-message of encryption of described micro-letter content encryption system.
The process of transmitting of encryption micro-letter content-message of described micro-letter content encryption system is: described system control module realizes by described user data input module the input sending content, described system control module calls the key that described key management module obtains encryption, described system control module will need content and the cipher key delivery extremely described data encrypting and deciphering module of transmission, described data encrypting and deciphering module completes the encryption of micro-letter content-message, described system control module calls described data transmission blocks and adds specific host-host protocol process to encrypt data, described system control module by cipher-text message by transferring to described micro-letter AIM, applied by micro-letter and the micro-letter of encryption is sent to the object of specifying.
The receiving course of encryption micro-letter content-message of described micro-letter content encryption system is: described system control module obtains the micro-letter message content encrypted by described micro-letter AIM, described system control module calls the key that described key management module obtains encryption, described system control module will need message content and the cipher key delivery extremely described data encrypting and deciphering module of deciphering, described data encrypting and deciphering module completes the deciphering of micro-letter content-message of encryption, under clear data is saved to temp directory by described system control module, notify that described message display module shows, described message display module empties temp directory.
The beneficial effect of technical scheme provided by the invention is: the present invention, by adopting the mode be encrypted the chat of micro-letter and the data message of file transfers, solves the problem of loss of data and the privacy leakage that may exist.The present invention can carry out high safety encipher to user data, has high safety grade, the data after network on Transmission Encryption, thus the fail safe that ensure that user data; To transmission text, voice, picture and other various types of files, the restriction that micro-letter cannot transmit other types file can be broken, make the use of user more free and convenient; User can self-defining encryption key value, and carries out key when deciphering and check, and promotes the fail safe of user data further; Secondary computing is carried out to the key that user is arranged, uses this operation result to be encrypted, effectively stop the risk that final encryption key is revealed; Namely burn after readding, the plaintext of deciphering is protected, prevents user data to be stolen, meet user's practical application request that individual privacy is had higher requirements.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of micro-letter content encryption system based on smart mobile phone of the present invention;
Fig. 2 is the flow chart sending the micro-letter content-message of encryption in implementation method of the present invention;
Fig. 3 is the flow chart receiving the micro-letter content-message of encryption in implementation method of the present invention.
In accompanying drawing, the list of parts representated by each label is as follows:
1: system control module; 2: user data input module;
3: key management module; 4: data encrypting and deciphering module;
5: data transmission blocks; 6: micro-letter AIM;
7: message display module.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below embodiment of the present invention is described further in detail.
Embodiment 1
Embodiments provide a kind of micro-letter content encryption system based on smart mobile phone, see Fig. 1, this micro-letter content encryption system comprises: system control module 1, user data input module 2, key management module 3, data encrypting and deciphering module 4, data transmission blocks 5, micro-letter AIM 6 and message display module 7.
System control module 1 and user data input module 2 realize data communication; System control module 1 and key management module 3 realize data communication; System control module 1 and data encrypting and deciphering module 4 realize data communication; System control module 1 and data transmission blocks 5 realize data communication; System control module 1 and micro-letter AIM 6 realize data communication; System control module 1 and message display module 7 realize data communication.
When sending micro-letter content-encrypt message, system control module 1 realizes by user data input module 2 input sending content, system control module 1 calls the key that key management module 3 obtains encryption, the content needing to send and cipher key delivery are completed the encryption of message content to data encrypting and deciphering module 4 by system control module 1, after having encrypted, system control module 1 calling data sending module 5 completes and adds specific host-host protocol process to encrypt data, after completing process, system control module 1 by ciphertext by transferring to micro-letter AIM 6, applied by micro-letter and the micro-letter of encryption is sent to the object of specifying.
When receiving micro-letter content-encrypt message, after as user, in micro-letter application, the micro-letter message request of encryption is checked in request, system control module 1 obtains the micro-letter message content encrypted by micro-letter AIM 6, system control module 1 calls key management module 3 obtains encryption key according to the current selected encryption key name of user, the message content and cipher key delivery that need deciphering are completed the deciphering of message content to data encrypting and deciphering module 4 by system control module 1, are presented in message display module 7 by message content after deciphering is correct.
System control module 1 realizes calling modules realizing micro-transmission of letter content-encrypt message and the function of reception.
User data input module 2 is mainly used in user when carrying out sending micro-letter, the message content data (comprising word, picture, voice and other types file) of user is recombinated, and realizes the function of Edition Contains input.
The key that the encryption and decryption that key management module 3 is data provides encryption and decryption to apply.Meanwhile, user, by this module, can add voluntarily, changes, deletes key value, can be applied to particular group of users or unique user object, thus realize the uniqueness of key, improves the fail safe of encryption.
Data encrypting and deciphering module 4 is cores of micro-letter content-encrypt, realizes carrying out encryption and decryption operation to micro-letter content information.
Data transmission blocks 5 realizes the process that the data after by encryption add specific host-host protocol.
Micro-letter AIM 6 realizes sending micro-for encryption letter message to micro-letter application and sends, and the message joint received by the micro-letter of encryption receives.Micro-letter AIM 6 provides message content carrier (when message is pure words, directly to transmit ciphertext content; Other types message then transmits ciphertext place catalogue).
Message display module 7 provides the function of the micro-letter content-message of display encryption.After user initiates the instruction checked in micro-letter application, the plaintext after deciphering is deposited in another interim catalogue.Check operation when user completes, when switching to Another Application interface or retrieval system desktop, message display module 7 can empty temp directory, reaches the effect of namely burning after readding.
Embodiment 2
Embodiments provide a kind of implementation method of the micro-letter content encryption system based on smart mobile phone, described below:
See Fig. 1 and Fig. 2, in the present invention, the transmission of micro-letter content encryption system is encrypted the process of micro-letter content-message and is:
System control module 1 realizes by user data input module 2 input sending content, wherein user data input module 2 determines the legitimacy of user data, system control module 1 calls key management module 3 obtains encryption key according to the current selected encryption key name of user, the content that needs send by system control module 1 and cipher key delivery are to data encrypting and deciphering module 4, this key is carried out computing by hash algorithm (such as: SHA-1 algorithm) by data encrypting and deciphering module 4, and use commercial cipher algorithm (such as: SM1 the value obtained after computing and micro-letter content-message, SM4 algorithm) be encrypted, obtain the encrypt data of encrypting messages content, after having encrypted, system control module 1 calling data sending module 5 pairs of encrypt datas add specific host-host protocol process, after completing process, system control module 1 by ciphertext by transferring to micro-letter AIM 6, applied by micro-letter and the micro-letter of encryption is sent to the object of specifying.
The method that the realization of micro-letter content-message is encrypted in this transmission specifically comprises the following steps:
(1) system control module 1 realizes by user data input module 2 input sending content, completes micro-letter content-message that request sends;
(2) user data input module 2 judges that whether the micro-letter content-message inputted is legal, if be not empty, message is legal, performs next step, otherwise, continue to perform step (1);
(3) system control module 1 calls key management module 3 obtains encryption key according to the current selected encryption key name of user;
(4) system control module 1 by need send content and cipher key delivery to data encrypting and deciphering module 4;
(5) this key is carried out computing by hash algorithm by data encrypting and deciphering module 4, obtains the new key values after computing;
(6) data encrypting and deciphering module 4 generates corresponding Encryption Transmission Protocol according to micro-letter content-message;
(7) data encrypting and deciphering module 4 uses new key values to use commercial cipher algorithm to be encrypted to Encryption Transmission Protocol and micro-letter content-message, obtains the micro-letter message of encryption of encrypting messages content;
(8) system control module 1 is by micro-for encryption letter message by transferring to micro-letter AIM 6, is applied the micro-letter of encryption is sent to the object of specifying by micro-letter.
(9) process of transmitting encrypting micro-letter content-message terminates.
See Fig. 1 and Fig. 3, in the present invention, the reception of micro-letter content encryption system is encrypted the process of micro-letter content-message and is:
After as user, in micro-letter application, the micro-letter message request of encryption is checked in request, system control module 1 obtains the micro-letter message content encrypted by micro-letter AIM 6, system control module 1 calls key management module 3 obtains encryption key according to the current selected encryption key name of user, the message content that needs are deciphered by system control module 1 and cipher key delivery are to data encrypting and deciphering module 4, this key is carried out computing by hash algorithm by data encrypting and deciphering module 4, and use commercial cipher algorithm to be decrypted micro-letter content-message of the value obtained after computing and encryption, after having deciphered, system control module 1 can judge the data correctness of deciphering according to decrypting process, if decrypting process makes a mistake, mean that the key that user uses and the encryption key used before are unmatched, system control module 1 can guide user to carry out cipher key configuration, if decrypting process is accurate, then, under clear data being saved to temp directory (except plaintext message), notification message display module 7 shows subsequently.Check operation when user completes, when switching to Another Application interface or retrieval system desktop, message display module 7 can empty temp directory, reaches the effect of namely burning after readding.
The method that the realization of micro-letter content-message is encrypted in this reception specifically comprises the following steps:
(1) system control module 1 obtains micro-letter message content of encryption by micro-letter AIM 6;
(2) system control module 1 calls key management module 3 obtains encryption key according to the current selected encryption key name of user;
(3) system control module 1 by need deciphering message content and cipher key delivery to data encrypting and deciphering module 4;
(4) this key is carried out computing by hash algorithm by data encrypting and deciphering module 4, obtains the new key values after computing;
(5) data encrypting and deciphering module 4 uses the micro-letter content-message of new key values to encryption to use commercial cipher algorithm to be decrypted, and obtains the Encryption Transmission Protocol after deciphering and micro-letter content-message;
(6) system control module 1 judges decrypted result, if successful decryption, notification message display module 7 shows, otherwise guides user to be configured to cipher key configuration interface, re-executes step (2) and is decrypted;
(7) message display module 7 shows micro-letter content, simultaneously monitoring users operation, when user's switch application, quit a program or get back to system desktop time, delete the plaintext deciphered, empty temp directory;
(8) receiving course encrypting micro-letter content-message terminates.
The embodiment of the present invention is to the model of each device except doing specified otherwise, and the model of other devices does not limit, as long as can complete the device of above-mentioned functions.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (3)
1. the micro-letter content encryption system based on smart mobile phone, described micro-letter content encryption system comprises: system control module, user data input module, data transmission blocks, micro-letter AIM and message display module, it is characterized in that, described micro-letter content encryption system also comprises: key management module, data encrypting and deciphering module;
Described system control module and described key management module realize data communication; Described system control module and described data encrypting and deciphering module realize data communication;
Described system control module calls the key that described key management module obtains encryption, and described system control module calls described data encrypting and deciphering module and uses multiple commercial cipher algorithm to complete the encryption and decryption of micro-letter content-message.
2. a kind of micro-letter content encryption system based on smart mobile phone according to claim 1, it is characterized in that, described commercial cipher algorithm is SM1 and SM4 algorithm.
3. the implementation method of the micro-letter content encryption system based on smart mobile phone according to claim arbitrary in claim 1-2, it is characterized in that, described implementation method comprises the following steps:
The process of transmitting of the micro-letter content-message of encryption of described micro-letter content encryption system; The receiving course of the micro-letter content-message of encryption of described micro-letter content encryption system;
Wherein, the process of transmitting of the micro-letter content-message of encryption of described micro-letter content encryption system is:
Described system control module realizes by described user data input module the input sending content, described system control module calls the key that described key management module obtains encryption, described system control module will need content and the cipher key delivery extremely described data encrypting and deciphering module of transmission, described data encrypting and deciphering module completes the encryption of micro-letter content-message, described system control module calls described data transmission blocks and adds that specific host-host protocol generates the micro-letter message of encryption sent to encrypt data, described system control module by micro-for encryption letter message by transferring to described micro-letter AIM, applied by micro-letter and the micro-letter of encryption is sent to the object of specifying,
Wherein, the receiving course of the micro-letter content-message of encryption of described micro-letter content encryption system is:
Described system control module obtains the micro-letter message content encrypted by described micro-letter AIM, described system control module calls the key that described key management module obtains encryption, described system control module will need message content and the cipher key delivery extremely described data encrypting and deciphering module of deciphering, described data encrypting and deciphering module completes the deciphering of micro-letter content-message of encryption, under clear data is saved to temp directory by described system control module, notify that described message display module shows, described message display module empties temp directory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410749578.7A CN104394530A (en) | 2014-12-09 | 2014-12-09 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410749578.7A CN104394530A (en) | 2014-12-09 | 2014-12-09 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104394530A true CN104394530A (en) | 2015-03-04 |
Family
ID=52612354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410749578.7A Pending CN104394530A (en) | 2014-12-09 | 2014-12-09 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104394530A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184183A (en) * | 2015-07-30 | 2015-12-23 | 努比亚技术有限公司 | Chatting record encryption method and mobile terminal |
CN105323254A (en) * | 2015-11-23 | 2016-02-10 | 天津光电安辰信息技术有限公司 | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof |
CN105471711A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Mail encryption system based on intelligent mobile phone and realization method thereof |
CN105472584A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Short message encryption system based on intelligent mobile phone and realization method thereof |
CN105516943A (en) * | 2015-11-23 | 2016-04-20 | 天津光电安辰信息技术有限公司 | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof |
CN105812251A (en) * | 2016-05-25 | 2016-07-27 | 天津光电安辰信息技术有限公司 | Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms |
CN106027530A (en) * | 2016-05-25 | 2016-10-12 | 天津光电安辰信息技术有限公司 | Instant message encryption system based on smartphone and implementation method thereof |
CN106604272A (en) * | 2016-12-12 | 2017-04-26 | 深圳天珑无线科技有限公司 | Method and system for secret data transmission |
CN106612376A (en) * | 2016-12-27 | 2017-05-03 | 努比亚技术有限公司 | Mobile terminal and file processing method thereof |
CN106788999A (en) * | 2016-12-09 | 2017-05-31 | 武汉中软通证信息技术有限公司 | A kind of wechat evidence collecting method and system based on data collision |
CN107579903A (en) * | 2017-07-11 | 2018-01-12 | 深圳市中易通安全芯科技有限公司 | A kind of image information safe transmission method and system based on mobile device |
WO2018018726A1 (en) * | 2016-07-28 | 2018-02-01 | 中兴通讯股份有限公司 | Group file management method, user terminal, and group chat system |
CN107819671A (en) * | 2017-11-16 | 2018-03-20 | 武汉滴滴网络科技有限公司 | A kind of network social intercourse system |
CN107911368A (en) * | 2017-11-19 | 2018-04-13 | 天津光电安辰信息技术股份有限公司 | A kind of Transmission system and its implementation destroyed by fire automatically based on encryption message |
CN108574567A (en) * | 2018-03-19 | 2018-09-25 | 西安邮电大学 | Privacy file protection and encryption key management system and method, information processing terminal |
CN110417819A (en) * | 2019-09-05 | 2019-11-05 | 胡祥义 | A Realization Method of Efficiently Encrypted Instant Messaging |
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138353A1 (en) * | 2003-12-22 | 2005-06-23 | Terence Spies | Identity-based-encryption message management system |
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
CN101262340A (en) * | 2008-04-22 | 2008-09-10 | 中兴通讯股份有限公司 | MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS |
CN102006303A (en) * | 2010-12-06 | 2011-04-06 | 河海大学 | Method and terminal for increasing data transmission safety by using multi-encryption method |
US20110087920A1 (en) * | 2009-10-13 | 2011-04-14 | Google Inc. | Computing device with recovery mode |
CN102098307A (en) * | 2011-02-11 | 2011-06-15 | 重庆梦彩科技发展有限公司 | Password type instant message (IM) encryption method and system in self-service bank |
CN102271043A (en) * | 2011-08-26 | 2011-12-07 | 四川长虹电器股份有限公司 | data transmission protection method |
CN102438240A (en) * | 2011-12-13 | 2012-05-02 | 西安交通大学 | Intelligent power grid wireless communication encryption method based on dynamic secret key |
CN102799819A (en) * | 2012-07-04 | 2012-11-28 | 北京京航计算通讯研究所 | Embedded software safety protection system |
-
2014
- 2014-12-09 CN CN201410749578.7A patent/CN104394530A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138353A1 (en) * | 2003-12-22 | 2005-06-23 | Terence Spies | Identity-based-encryption message management system |
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
CN101262340A (en) * | 2008-04-22 | 2008-09-10 | 中兴通讯股份有限公司 | MMS encryption method and mobile terminal for transmitting and receiving encrypted MMS |
US20110087920A1 (en) * | 2009-10-13 | 2011-04-14 | Google Inc. | Computing device with recovery mode |
CN102006303A (en) * | 2010-12-06 | 2011-04-06 | 河海大学 | Method and terminal for increasing data transmission safety by using multi-encryption method |
CN102098307A (en) * | 2011-02-11 | 2011-06-15 | 重庆梦彩科技发展有限公司 | Password type instant message (IM) encryption method and system in self-service bank |
CN102271043A (en) * | 2011-08-26 | 2011-12-07 | 四川长虹电器股份有限公司 | data transmission protection method |
CN102438240A (en) * | 2011-12-13 | 2012-05-02 | 西安交通大学 | Intelligent power grid wireless communication encryption method based on dynamic secret key |
CN102799819A (en) * | 2012-07-04 | 2012-11-28 | 北京京航计算通讯研究所 | Embedded software safety protection system |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105184183A (en) * | 2015-07-30 | 2015-12-23 | 努比亚技术有限公司 | Chatting record encryption method and mobile terminal |
CN105323254A (en) * | 2015-11-23 | 2016-02-10 | 天津光电安辰信息技术有限公司 | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof |
CN105471711A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Mail encryption system based on intelligent mobile phone and realization method thereof |
CN105472584A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Short message encryption system based on intelligent mobile phone and realization method thereof |
CN105516943A (en) * | 2015-11-23 | 2016-04-20 | 天津光电安辰信息技术有限公司 | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof |
CN105812251A (en) * | 2016-05-25 | 2016-07-27 | 天津光电安辰信息技术有限公司 | Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms |
CN106027530A (en) * | 2016-05-25 | 2016-10-12 | 天津光电安辰信息技术有限公司 | Instant message encryption system based on smartphone and implementation method thereof |
WO2018018726A1 (en) * | 2016-07-28 | 2018-02-01 | 中兴通讯股份有限公司 | Group file management method, user terminal, and group chat system |
CN106788999A (en) * | 2016-12-09 | 2017-05-31 | 武汉中软通证信息技术有限公司 | A kind of wechat evidence collecting method and system based on data collision |
CN106788999B (en) * | 2016-12-09 | 2020-05-19 | 武汉中软通证信息技术有限公司 | WeChat evidence obtaining method and system based on data collision |
CN106604272A (en) * | 2016-12-12 | 2017-04-26 | 深圳天珑无线科技有限公司 | Method and system for secret data transmission |
CN106612376A (en) * | 2016-12-27 | 2017-05-03 | 努比亚技术有限公司 | Mobile terminal and file processing method thereof |
CN107579903A (en) * | 2017-07-11 | 2018-01-12 | 深圳市中易通安全芯科技有限公司 | A kind of image information safe transmission method and system based on mobile device |
CN107819671A (en) * | 2017-11-16 | 2018-03-20 | 武汉滴滴网络科技有限公司 | A kind of network social intercourse system |
CN107911368A (en) * | 2017-11-19 | 2018-04-13 | 天津光电安辰信息技术股份有限公司 | A kind of Transmission system and its implementation destroyed by fire automatically based on encryption message |
CN108574567A (en) * | 2018-03-19 | 2018-09-25 | 西安邮电大学 | Privacy file protection and encryption key management system and method, information processing terminal |
CN110417819A (en) * | 2019-09-05 | 2019-11-05 | 胡祥义 | A Realization Method of Efficiently Encrypted Instant Messaging |
CN110417819B (en) * | 2019-09-05 | 2024-12-27 | 胡祥义 | A method for implementing efficient encrypted instant messaging |
CN113285870A (en) * | 2021-06-09 | 2021-08-20 | 成都安恒信息技术有限公司 | Method and system for protecting internet chat privacy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104394530A (en) | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system | |
Sutikno et al. | WhatsApp, viber and telegram: Which is the best for instant messaging? | |
US9426126B2 (en) | Method and system for automatic generation of context-aware cover message | |
CN102594721B (en) | Anonymous making-friends method, system and network server | |
CN103020504B (en) | Based on picture management system and the picture management method of finger print identifying | |
CN108989848A (en) | A kind of acquisition methods and management system of video resource file | |
CN105516943A (en) | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof | |
TW200841682A (en) | Key exchange verification | |
CN105391676A (en) | Instant communication message processing method, device and system | |
CN108200093A (en) | Transmit the encryption and decryption approaches and encryption and decryption devices of file | |
EP3282670A1 (en) | Maintaining data security in a network device | |
CN102571321A (en) | Data encryption transmission method and device | |
CN103178961A (en) | A security information interaction method and related device | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN102857889A (en) | Method and device for encrypting short messages | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN102891860A (en) | Method for securely establishing relationships among contacts | |
US20250080322A1 (en) | Key sharing system, method, program, server device, and terminal device | |
Johansen et al. | The snowden phone: a comparative survey of secure instant messaging mobile applications | |
CN110881019A (en) | Secure communication terminal, secure communication system and communication method thereof | |
CN105323254A (en) | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof | |
CN103634292A (en) | Method and system for communication information transmission | |
CN105471711A (en) | Mail encryption system based on intelligent mobile phone and realization method thereof | |
CN105812251A (en) | Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150304 |