CN102740241A - Method and system for secure transmission of media information - Google Patents

Method and system for secure transmission of media information Download PDF

Info

Publication number
CN102740241A
CN102740241A CN2011100808683A CN201110080868A CN102740241A CN 102740241 A CN102740241 A CN 102740241A CN 2011100808683 A CN2011100808683 A CN 2011100808683A CN 201110080868 A CN201110080868 A CN 201110080868A CN 102740241 A CN102740241 A CN 102740241A
Authority
CN
China
Prior art keywords
message
intermediate equipment
enciphered message
key
enciphered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100808683A
Other languages
Chinese (zh)
Inventor
卢艳
丁欣
陈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2011100808683A priority Critical patent/CN102740241A/en
Priority to PCT/CN2011/084556 priority patent/WO2012129945A1/en
Publication of CN102740241A publication Critical patent/CN102740241A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method and a system for secure transmission of media information. The method comprises the following steps: encrypting media information using a key by a sender to obtain a first encrypted message, encrypting the key to obtain a second encrypted message, sending the first and the second encrypted messages; generating information corresponding to the media information by an intermediate device, decrypting the second encrypted message using a private key of the intermediate device to obtain the key, encrypting the information using the key to obtain a third encrypted message, encrypting the key to obtain the fourth encrypted message, and sending the third and the fourth encrypted messages; and decrypting the fourth encrypted message by a receiver using a private key of the receiver to obtain the second key, decrypting the third encrypted message using the second key to obtain the information, accessing the intermediate device according to the information to obtain the first encrypted message and the second encrypted message, decrypting the second encrypted message using the private key to obtain the first key, and decrypting the first encrypted message using the first key to obtain the media information. The method and the system can prevent information leakage of the sender.

Description

The method and system of media information safe transmission
Technical field
The present invention relates to the communications field, relate in particular to a kind of method and system of media information safe transmission.
Background technology
Nowadays, multimedia messaging service, MMS has obtained original application more widely like multimedia message, (moving) Email, instant messaging at present.Some operation system; Such as multimedia message, voice mail, instant message etc., server is issuing media information to the recipient, usually can be earlier through other avenues of communication; Like the PUSH approach; Send the notification message of this Multimedia Message and give the recipient, after the recipient receives notification message, this message sink is got off to server according to self signal intelligence again.
Fig. 1 illustrates transmit leg and sends the flow process that media information is given the recipient:
1) transmit leg sends media information M to server;
2) server stores media information M, and produce message S, like notification message, send to the recipient through operation system 2;
3) recipient's access server and obtain media content M.
When above scheme brings convenience efficiently user experience to the user, brought the problem of a series of safe transmission thereupon.In above-mentioned communication process, if shape takes place to oestrus by mistake, notification message and media information may be read by illegal recipient, thereby cause the information leakage of transmit leg.
Summary of the invention
The technical problem that the present invention will solve provides a kind of method and system of media information safe transmission, to solve the problem of transmit leg information leakage under the shape of oestrusing by mistake.
For solving above technical problem, the invention provides a kind of method of media information safe transmission, said method comprises:
Transmit leg utilizes key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message, and sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize the private key of said intermediate equipment to decipher said second enciphered message and obtain said key; Utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message, and send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message, deciphers said the 4th enciphered message with its private key and obtains said key, and utilize said the 3rd enciphered message of said secret key decryption to obtain said message; Visit said intermediate equipment according to said message, obtain said first enciphered message, utilize said first enciphered message of said secret key decryption to obtain said media information.
Further, said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
Further, said message is the notification message of said intermediate equipment according to transport layer information and/or media information generation.
Further, the part or all of content of said message produces according to said media information, and the production process of this message comprises:
The said key that utilizes deciphering to obtain is deciphered said first enciphered message and is obtained said media information;
Produce the part or all of content of message according to said media information content;
Utilize said key that said media information is encrypted and obtain said first enciphered message again.
Further; The symmetric encipherment algorithm that said transmit leg and intermediate equipment are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
For solving above technical problem, the present invention also provides a kind of system of media information safe transmission, and said system comprises:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
The inventive method and system use two pairs of public and private keys and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last; If mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
Description of drawings
Fig. 1 sends the sketch map that media information is given the recipient for transmit leg;
Fig. 2 is the sketch map of the method embodiment of media information safe transmission of the present invention;
The schematic flow sheet that Fig. 3 carries out for transmit leg among the present invention;
The schematic flow sheet that Fig. 4 carries out for intermediate equipment among the present invention;
The schematic flow sheet that Fig. 5 carries out for recipient among the present invention;
Fig. 6 is the modular structure sketch map of the system of media information safe transmission of the present invention.
Embodiment
The present invention proposes a kind of method of secure communication; Use two pairs of public and private keys and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last, if mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
As shown in Figure 2, the method for embodiment of the invention media information safe transmission comprises:
Step 201: transmit leg utilizes key K that media information M is encrypted and obtains the first enciphered message C, utilizes the PKI of intermediate equipment that said key K encryption is obtained the second enciphered message K1, and sends the said first enciphered message C and the second enciphered message K1;
Step 202: intermediate equipment receives said first and second enciphered messages; Produce the notification message S corresponding with said media information; Utilize the private key of said intermediate equipment to decipher the said second enciphered message K1 and obtain said key K; Utilize said key K that said message S is encrypted and obtain the 3rd enciphered message S ', utilize recipient's PKI that said key K encryption is obtained the 4th enciphered message K2 again, and send said the 3rd enciphered message S ', the 4th enciphered message K2;
Understandably, produce message S and deciphering and obtain K order in no particular order.
Step 203: the recipient receives said the 3rd, the 4th enciphered message; Decipher said the 4th enciphered message K2 with its private key and obtain said key K; And utilize said key K to decipher said the 3rd enciphered message S ' to obtain said message; Visit said intermediate equipment according to said message, obtain the said first enciphered message C, utilize said key K to decipher the said first enciphered message C and obtain said media information M.
The prerequisite of using the inventive method is:
1) must be authentication between transmit leg, intermediate equipment and the recipient;
2) intermediate equipment and recipient respectively have a pair of public and private key;
3) transmit leg is through the PKI of secure way (such as third party's certificate management authority) acquisition intermediate equipment, and intermediate equipment obtains recipient's PKI through secure way.
Hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
Fig. 3 illustrates transmit leg execution following steps among the present invention:
Step 301: create media information M;
This media information includes but not limited to the message message of multimedia message, Email, voice mail etc.
Step 302: produce a key K at random;
Step 303: encryption obtains ciphertext C, i.e. C=EK (M) to M with K with symmetric encipherment algorithm (using AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm such as agreement);
Step 304: use the rivest, shamir, adelman (using RSA (a kind of public key encryption algorithm) such as agreement) and the PKI of intermediate equipment that K is encrypted, the result is made as K1;
Step 303 and step 304 be order in no particular order.
Step 305: send C and K1.
Fig. 4 illustrates the step that intermediate equipment is carried out among the present invention:
Step 401: receive C and K1;
Step 402: produce the message S (such as SMS notification) corresponding with media information M;
Said notification message is the notification message of said intermediate equipment according to the transport layer information generation, carries caller information and recipient's information such as this notification message.
Alternative, this message can also be the notification message that intermediate equipment produces according to media information, the partial key of this notification message portability media information content etc., and the production process of this notification message comprises:
The K that utilizes deciphering to obtain deciphers C and obtains M;
Produce notification message according to the M content;
In addition; Notification message can also produce according to transport layer information and media information; The partial content that is notification message is a transport layer information, and partial content is to produce according to media information, understandably; The notification message part that produces according to media information also needs earlier to the C deciphering, the content that obtains according to M at last and be combined into notification message S according to the content that transport layer information obtains.
Obtain safe media information M for the ease of follow-up recipient, behind the generation notification message, intermediate equipment is utilized K that M is encrypted and is obtained C again.
Step 403: use the private cipher key deciphering K1 of rivest, shamir, adelman identical and intermediate equipment to obtain K with transmit leg;
Step 404: encrypt S with symmetric encipherment algorithm and K and obtain S ';
Step 405: the public key encryption K with rivest, shamir, adelman and recipient obtains K2;
Step 406: S ' and K2 are transmitted to the recipient through operation system.
Fig. 5 illustrates the step that the recipient carries out among the present invention:
Step 501: receive S ' and K2;
Step 502: use rivest, shamir, adelman identical and recipient's private cipher key deciphering K2 to obtain K with said intermediate equipment;
Step 503: use symmetric encipherment algorithm identical and K deciphering S ' to obtain S with intermediate equipment;
Step 504: according to S visit intermediate equipment, data download C;
Step 505: use symmetric encipherment algorithm identical and K deciphering C to obtain media content M with transmit leg.
The symmetric encipherment algorithm of more than deciphering S ' and deciphering C can be the same or different.
Above transmit leg and intermediate equipment are used for said transmit leg of symmetric encipherment algorithm (AES) and intermediate equipment that M or C encrypt or decipher are consulted in advance, replacedly, also can be by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that intermediate equipment and recipient are used for S or S ' are encrypted or decipher is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for K or K1 are encrypted or decipher is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said K or K2 are encrypted or decipher is that said intermediate equipment and recipient consult in advance.
Certainly, transmit leg, intermediate equipment and recipient can consult to use identical symmetric encipherment algorithm and/or identical rivest, shamir, adelman, and this present invention is not done qualification.
In the middle of practical application; Can be applied to voice mail system, mobile phone terminal A and mobile phone terminal B, terminal A sends speech message; Voice mail server (being intermediate equipment) can produce a notifying messages in this message of delivery before the recipient, be sent to mobile phone terminal B through note system.Mobile phone terminal B access voice mailbox server obtains message message then.With the voice mail is example, and notification message can also be " in the band " notification message mode except above-mentioned short message mode, and promptly transmission path is identical with media information.The present invention is suitable for this situation equally; In addition, the present invention also is applicable to the media information transmission of trans-sectoral affair type, i.e. the media information type of service of transmit leg transmission is different with the media information type of service that the recipient receives; In this case; Intermediate equipment can be the service server of transmit leg, also can be recipient's service server, can also realize the gateway device of two kinds of type of service conversions.The present invention does not do qualification to the concrete realization entity of middle equipment.
For realizing above method, the present invention also provides a kind of system of media information safe transmission, with the present invention especially relatively, as shown in Figure 6, said system includes but not limited to:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
Further,
The encrypting module of said transmit leg before said secret key encryption, obtains the PKI of said intermediate equipment through secure way, with said intermediate equipment PKI said secret key encryption is obtained said second enciphered message again;
The encrypting module of said intermediate equipment before said secret key encryption, obtains said recipient's PKI through secure way, with said recipient's PKI said secret key encryption is obtained said the 4th enciphered message again.
Further; The symmetric encipherment algorithm that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said program can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize.Correspondingly, each module in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.

Claims (8)

1. the method for a media information safe transmission is characterized in that, said method comprises:
Transmit leg utilizes key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message, and sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize the private key of said intermediate equipment to decipher said second enciphered message and obtain said key; Utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message, and send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message, deciphers said the 4th enciphered message with its private key and obtains said key, and utilize said the 3rd enciphered message of said secret key decryption to obtain said message; Visit said intermediate equipment according to said message, obtain said first enciphered message, utilize said first enciphered message of said secret key decryption to obtain said media information.
2. the method for claim 1 is characterized in that:
Said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
3. the method for claim 1 is characterized in that: the said message notification message that to be said intermediate equipment produce according to transport layer information and/or media information.
4. method as claimed in claim 3 is characterized in that: the part or all of content of said message produces according to said media information, and the production process of this message comprises:
The said key that utilizes deciphering to obtain is deciphered said first enciphered message and is obtained said media information;
Produce the part or all of content of message according to said media information content;
Utilize said key that said media information is encrypted and obtain said first enciphered message again.
5. like each described method in the claim 1,3,4, it is characterized in that:
The symmetric encipherment algorithm that said transmit leg and intermediate equipment are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance, or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
6. the system of a media information safe transmission is characterized in that, said system comprises:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
7. system as claimed in claim 6 is characterized in that:
The encrypting module of said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
The encrypting module of said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
8. system as claimed in claim 6 is characterized in that:
The symmetric encipherment algorithm that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
CN2011100808683A 2011-03-31 2011-03-31 Method and system for secure transmission of media information Pending CN102740241A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011100808683A CN102740241A (en) 2011-03-31 2011-03-31 Method and system for secure transmission of media information
PCT/CN2011/084556 WO2012129945A1 (en) 2011-03-31 2011-12-23 Method and system for secure transmission of media messages

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100808683A CN102740241A (en) 2011-03-31 2011-03-31 Method and system for secure transmission of media information

Publications (1)

Publication Number Publication Date
CN102740241A true CN102740241A (en) 2012-10-17

Family

ID=46929395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100808683A Pending CN102740241A (en) 2011-03-31 2011-03-31 Method and system for secure transmission of media information

Country Status (2)

Country Link
CN (1) CN102740241A (en)
WO (1) WO2012129945A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141635A (en) * 2015-09-21 2015-12-09 北京元心科技有限公司 Method and system for safe communication of group sending messages
CN105515768A (en) * 2016-01-08 2016-04-20 腾讯科技(深圳)有限公司 Method, device and system for updating secret key

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242264A (en) * 2008-02-01 2008-08-13 深圳华为通信技术有限公司 Data transmission method, device and system and mobile terminal
CN101455061A (en) * 2006-06-30 2009-06-10 英特尔公司 Handheld device for elderly people
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail
US20090257593A1 (en) * 2008-04-10 2009-10-15 Comverse Ltd. Method and apparatus for secure messaging

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0411560D0 (en) * 2004-05-24 2004-06-23 Protx Group Ltd A method of encrypting and transferring data between a sender and a receiver using a network
CN1874323A (en) * 2006-06-20 2006-12-06 四川长虹电器股份有限公司 Method for transmitting message in multimedia
CN101197674B (en) * 2007-12-10 2010-10-27 华为技术有限公司 Encrypted communication method, server and encrypted communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101455061A (en) * 2006-06-30 2009-06-10 英特尔公司 Handheld device for elderly people
CN101242264A (en) * 2008-02-01 2008-08-13 深圳华为通信技术有限公司 Data transmission method, device and system and mobile terminal
US20090257593A1 (en) * 2008-04-10 2009-10-15 Comverse Ltd. Method and apparatus for secure messaging
CN101466079A (en) * 2009-01-12 2009-06-24 中兴通讯股份有限公司 Method, system and WAPI terminal for transmitting e-mail

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141635A (en) * 2015-09-21 2015-12-09 北京元心科技有限公司 Method and system for safe communication of group sending messages
CN105515768A (en) * 2016-01-08 2016-04-20 腾讯科技(深圳)有限公司 Method, device and system for updating secret key
CN105515768B (en) * 2016-01-08 2017-07-21 腾讯科技(深圳)有限公司 A kind of methods, devices and systems of more new key
US11088836B2 (en) 2016-01-08 2021-08-10 Tencent Technology (Shenzhen) Company Limited Key updating method, apparatus, and system

Also Published As

Publication number Publication date
WO2012129945A1 (en) 2012-10-04

Similar Documents

Publication Publication Date Title
CN102740239B (en) The method and system of secure transmission of media information
CN101197674B (en) Encrypted communication method, server and encrypted communication system
CN101340443B (en) Session key negotiating method, system and server in communication network
US8499156B2 (en) Method for implementing encryption and transmission of information and system thereof
CN101203025B (en) Method for transmitting and receiving safe mobile message
CN101188496B (en) A SMS encryption transport method
CN101420303B (en) Communication method for audio data and apparatus thereof
JPH07245605A (en) Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method
CN101964786A (en) Set-top box-based secure information transmission system and method
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
Lee et al. Security flaw of authentication scheme with anonymity for wireless communications
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN1316405C (en) Method for obtaining digital siguature and realizing data safety
CN101795315A (en) System and method for encrypting short messages by using mobile phone terminal
CN103167494A (en) Information sending method and information sending system
CN101765066A (en) Secret information transmission method based on multimedia message on intelligent mobile communication terminal
CN111049738A (en) E-mail data security protection method based on hybrid encryption
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN102006570A (en) Device and method for encrypting short messages
CN102740246A (en) Method, system, and device for processing media message
CN108270917B (en) Encrypted smart phone
CN102740241A (en) Method and system for secure transmission of media information
CN201623859U (en) System for encrypting short messages through mobile phone terminal
CN102739604B (en) The method and system of secure transmission of media information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20121017

RJ01 Rejection of invention patent application after publication