CN102740241A - Method and system for secure transmission of media information - Google Patents
Method and system for secure transmission of media information Download PDFInfo
- Publication number
- CN102740241A CN102740241A CN2011100808683A CN201110080868A CN102740241A CN 102740241 A CN102740241 A CN 102740241A CN 2011100808683 A CN2011100808683 A CN 2011100808683A CN 201110080868 A CN201110080868 A CN 201110080868A CN 102740241 A CN102740241 A CN 102740241A
- Authority
- CN
- China
- Prior art keywords
- message
- intermediate equipment
- enciphered message
- key
- enciphered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a method and a system for secure transmission of media information. The method comprises the following steps: encrypting media information using a key by a sender to obtain a first encrypted message, encrypting the key to obtain a second encrypted message, sending the first and the second encrypted messages; generating information corresponding to the media information by an intermediate device, decrypting the second encrypted message using a private key of the intermediate device to obtain the key, encrypting the information using the key to obtain a third encrypted message, encrypting the key to obtain the fourth encrypted message, and sending the third and the fourth encrypted messages; and decrypting the fourth encrypted message by a receiver using a private key of the receiver to obtain the second key, decrypting the third encrypted message using the second key to obtain the information, accessing the intermediate device according to the information to obtain the first encrypted message and the second encrypted message, decrypting the second encrypted message using the private key to obtain the first key, and decrypting the first encrypted message using the first key to obtain the media information. The method and the system can prevent information leakage of the sender.
Description
Technical field
The present invention relates to the communications field, relate in particular to a kind of method and system of media information safe transmission.
Background technology
Nowadays, multimedia messaging service, MMS has obtained original application more widely like multimedia message, (moving) Email, instant messaging at present.Some operation system; Such as multimedia message, voice mail, instant message etc., server is issuing media information to the recipient, usually can be earlier through other avenues of communication; Like the PUSH approach; Send the notification message of this Multimedia Message and give the recipient, after the recipient receives notification message, this message sink is got off to server according to self signal intelligence again.
Fig. 1 illustrates transmit leg and sends the flow process that media information is given the recipient:
1) transmit leg sends media information M to server;
2) server stores media information M, and produce message S, like notification message, send to the recipient through operation system 2;
3) recipient's access server and obtain media content M.
When above scheme brings convenience efficiently user experience to the user, brought the problem of a series of safe transmission thereupon.In above-mentioned communication process, if shape takes place to oestrus by mistake, notification message and media information may be read by illegal recipient, thereby cause the information leakage of transmit leg.
Summary of the invention
The technical problem that the present invention will solve provides a kind of method and system of media information safe transmission, to solve the problem of transmit leg information leakage under the shape of oestrusing by mistake.
For solving above technical problem, the invention provides a kind of method of media information safe transmission, said method comprises:
Transmit leg utilizes key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message, and sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize the private key of said intermediate equipment to decipher said second enciphered message and obtain said key; Utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message, and send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message, deciphers said the 4th enciphered message with its private key and obtains said key, and utilize said the 3rd enciphered message of said secret key decryption to obtain said message; Visit said intermediate equipment according to said message, obtain said first enciphered message, utilize said first enciphered message of said secret key decryption to obtain said media information.
Further, said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
Further, said message is the notification message of said intermediate equipment according to transport layer information and/or media information generation.
Further, the part or all of content of said message produces according to said media information, and the production process of this message comprises:
The said key that utilizes deciphering to obtain is deciphered said first enciphered message and is obtained said media information;
Produce the part or all of content of message according to said media information content;
Utilize said key that said media information is encrypted and obtain said first enciphered message again.
Further; The symmetric encipherment algorithm that said transmit leg and intermediate equipment are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
For solving above technical problem, the present invention also provides a kind of system of media information safe transmission, and said system comprises:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
The inventive method and system use two pairs of public and private keys and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last; If mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
Description of drawings
Fig. 1 sends the sketch map that media information is given the recipient for transmit leg;
Fig. 2 is the sketch map of the method embodiment of media information safe transmission of the present invention;
The schematic flow sheet that Fig. 3 carries out for transmit leg among the present invention;
The schematic flow sheet that Fig. 4 carries out for intermediate equipment among the present invention;
The schematic flow sheet that Fig. 5 carries out for recipient among the present invention;
Fig. 6 is the modular structure sketch map of the system of media information safe transmission of the present invention.
Embodiment
The present invention proposes a kind of method of secure communication; Use two pairs of public and private keys and an encryption key; Through content to be transmitted (like media information, key or notification message) is encrypted; Notification message or media information send legal recipient safely to the most at last, if mistake is sent out or intercepted and captured by the third party, media information or notification message can not revealed.
As shown in Figure 2, the method for embodiment of the invention media information safe transmission comprises:
Step 201: transmit leg utilizes key K that media information M is encrypted and obtains the first enciphered message C, utilizes the PKI of intermediate equipment that said key K encryption is obtained the second enciphered message K1, and sends the said first enciphered message C and the second enciphered message K1;
Step 202: intermediate equipment receives said first and second enciphered messages; Produce the notification message S corresponding with said media information; Utilize the private key of said intermediate equipment to decipher the said second enciphered message K1 and obtain said key K; Utilize said key K that said message S is encrypted and obtain the 3rd enciphered message S ', utilize recipient's PKI that said key K encryption is obtained the 4th enciphered message K2 again, and send said the 3rd enciphered message S ', the 4th enciphered message K2;
Understandably, produce message S and deciphering and obtain K order in no particular order.
Step 203: the recipient receives said the 3rd, the 4th enciphered message; Decipher said the 4th enciphered message K2 with its private key and obtain said key K; And utilize said key K to decipher said the 3rd enciphered message S ' to obtain said message; Visit said intermediate equipment according to said message, obtain the said first enciphered message C, utilize said key K to decipher the said first enciphered message C and obtain said media information M.
The prerequisite of using the inventive method is:
1) must be authentication between transmit leg, intermediate equipment and the recipient;
2) intermediate equipment and recipient respectively have a pair of public and private key;
3) transmit leg is through the PKI of secure way (such as third party's certificate management authority) acquisition intermediate equipment, and intermediate equipment obtains recipient's PKI through secure way.
Hereinafter will combine accompanying drawing that embodiments of the invention are elaborated.Need to prove that under the situation of not conflicting, embodiment and the characteristic among the embodiment among the application can make up each other.
Fig. 3 illustrates transmit leg execution following steps among the present invention:
Step 301: create media information M;
This media information includes but not limited to the message message of multimedia message, Email, voice mail etc.
Step 302: produce a key K at random;
Step 303: encryption obtains ciphertext C, i.e. C=EK (M) to M with K with symmetric encipherment algorithm (using AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm such as agreement);
Step 304: use the rivest, shamir, adelman (using RSA (a kind of public key encryption algorithm) such as agreement) and the PKI of intermediate equipment that K is encrypted, the result is made as K1;
Step 305: send C and K1.
Fig. 4 illustrates the step that intermediate equipment is carried out among the present invention:
Step 401: receive C and K1;
Step 402: produce the message S (such as SMS notification) corresponding with media information M;
Said notification message is the notification message of said intermediate equipment according to the transport layer information generation, carries caller information and recipient's information such as this notification message.
Alternative, this message can also be the notification message that intermediate equipment produces according to media information, the partial key of this notification message portability media information content etc., and the production process of this notification message comprises:
The K that utilizes deciphering to obtain deciphers C and obtains M;
Produce notification message according to the M content;
In addition; Notification message can also produce according to transport layer information and media information; The partial content that is notification message is a transport layer information, and partial content is to produce according to media information, understandably; The notification message part that produces according to media information also needs earlier to the C deciphering, the content that obtains according to M at last and be combined into notification message S according to the content that transport layer information obtains.
Obtain safe media information M for the ease of follow-up recipient, behind the generation notification message, intermediate equipment is utilized K that M is encrypted and is obtained C again.
Step 403: use the private cipher key deciphering K1 of rivest, shamir, adelman identical and intermediate equipment to obtain K with transmit leg;
Step 404: encrypt S with symmetric encipherment algorithm and K and obtain S ';
Step 405: the public key encryption K with rivest, shamir, adelman and recipient obtains K2;
Step 406: S ' and K2 are transmitted to the recipient through operation system.
Fig. 5 illustrates the step that the recipient carries out among the present invention:
Step 501: receive S ' and K2;
Step 502: use rivest, shamir, adelman identical and recipient's private cipher key deciphering K2 to obtain K with said intermediate equipment;
Step 503: use symmetric encipherment algorithm identical and K deciphering S ' to obtain S with intermediate equipment;
Step 504: according to S visit intermediate equipment, data download C;
Step 505: use symmetric encipherment algorithm identical and K deciphering C to obtain media content M with transmit leg.
The symmetric encipherment algorithm of more than deciphering S ' and deciphering C can be the same or different.
Above transmit leg and intermediate equipment are used for said transmit leg of symmetric encipherment algorithm (AES) and intermediate equipment that M or C encrypt or decipher are consulted in advance, replacedly, also can be by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that intermediate equipment and recipient are used for S or S ' are encrypted or decipher is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for K or K1 are encrypted or decipher is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said K or K2 are encrypted or decipher is that said intermediate equipment and recipient consult in advance.
Certainly, transmit leg, intermediate equipment and recipient can consult to use identical symmetric encipherment algorithm and/or identical rivest, shamir, adelman, and this present invention is not done qualification.
In the middle of practical application; Can be applied to voice mail system, mobile phone terminal A and mobile phone terminal B, terminal A sends speech message; Voice mail server (being intermediate equipment) can produce a notifying messages in this message of delivery before the recipient, be sent to mobile phone terminal B through note system.Mobile phone terminal B access voice mailbox server obtains message message then.With the voice mail is example, and notification message can also be " in the band " notification message mode except above-mentioned short message mode, and promptly transmission path is identical with media information.The present invention is suitable for this situation equally; In addition, the present invention also is applicable to the media information transmission of trans-sectoral affair type, i.e. the media information type of service of transmit leg transmission is different with the media information type of service that the recipient receives; In this case; Intermediate equipment can be the service server of transmit leg, also can be recipient's service server, can also realize the gateway device of two kinds of type of service conversions.The present invention does not do qualification to the concrete realization entity of middle equipment.
For realizing above method, the present invention also provides a kind of system of media information safe transmission, with the present invention especially relatively, as shown in Figure 6, said system includes but not limited to:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
Further,
The encrypting module of said transmit leg before said secret key encryption, obtains the PKI of said intermediate equipment through secure way, with said intermediate equipment PKI said secret key encryption is obtained said second enciphered message again;
The encrypting module of said intermediate equipment before said secret key encryption, obtains said recipient's PKI through secure way, with said recipient's PKI said secret key encryption is obtained said the 4th enciphered message again.
Further; The symmetric encipherment algorithm that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
One of ordinary skill in the art will appreciate that all or part of step in the said method can instruct related hardware to accomplish through program, said program can be stored in the computer-readable recording medium, like read-only memory, disk or CD etc.Alternatively, all or part of step of the foregoing description also can use one or more integrated circuits to realize.Correspondingly, each module in the foregoing description can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Claims (8)
1. the method for a media information safe transmission is characterized in that, said method comprises:
Transmit leg utilizes key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message, and sends said first and second enciphered messages;
Intermediate equipment receives said first and second enciphered messages; Produce the message corresponding with said media information; Utilize the private key of said intermediate equipment to decipher said second enciphered message and obtain said key; Utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message, and send said the 3rd, the 4th enciphered message;
Said recipient receives said the 3rd, the 4th enciphered message, deciphers said the 4th enciphered message with its private key and obtains said key, and utilize said the 3rd enciphered message of said secret key decryption to obtain said message; Visit said intermediate equipment according to said message, obtain said first enciphered message, utilize said first enciphered message of said secret key decryption to obtain said media information.
2. the method for claim 1 is characterized in that:
Said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
Said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
3. the method for claim 1 is characterized in that: the said message notification message that to be said intermediate equipment produce according to transport layer information and/or media information.
4. method as claimed in claim 3 is characterized in that: the part or all of content of said message produces according to said media information, and the production process of this message comprises:
The said key that utilizes deciphering to obtain is deciphered said first enciphered message and is obtained said media information;
Produce the part or all of content of message according to said media information content;
Utilize said key that said media information is encrypted and obtain said first enciphered message again.
5. like each described method in the claim 1,3,4, it is characterized in that:
The symmetric encipherment algorithm that said transmit leg and intermediate equipment are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance, or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance, or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that said transmit leg and intermediate equipment are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
6. the system of a media information safe transmission is characterized in that, said system comprises:
The encrypting module of transmit leg is used to utilize key that media information is encrypted and obtains first enciphered message and said secret key encryption is obtained second enciphered message;
The sending module of said transmit leg is used to send said first and second enciphered messages;
The receiver module of intermediate equipment is used to receive said first and second enciphered messages;
The message generation module of intermediate equipment is used to produce the message corresponding with said media information;
The deciphering module of said intermediate equipment is used to utilize the private key of said intermediate equipment to decipher said second enciphered message and obtains said key;
The encrypting module of said intermediate equipment is used to utilize said key that said message encryption is obtained the 3rd enciphered message, and said secret key encryption is obtained the 4th enciphered message;
The sending module of said intermediate equipment is used to send said third and fourth enciphered message;
Said recipient's receiver module is used to receive said third and fourth enciphered message;
Said recipient's deciphering module is used for deciphering said the 4th enciphered message with its private key and obtains said key, and utilizes said the 3rd enciphered message of said secret key decryption to obtain said message; And first enciphered message of utilizing said secret key decryption to obtain obtains said media information;
Said recipient's access modules is used for visiting said intermediate equipment according to said message, obtains said first enciphered message.
7. system as claimed in claim 6 is characterized in that:
The encrypting module of said transmit leg obtains said second enciphered message with said intermediate equipment PKI to said secret key encryption;
The encrypting module of said intermediate equipment obtains said the 4th enciphered message with said recipient's PKI to said secret key encryption.
8. system as claimed in claim 6 is characterized in that:
The symmetric encipherment algorithm that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said media information or first enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance; Or, by said transmit leg or intermediate equipment short notice the other side;
The symmetric encipherment algorithm that said intermediate equipment and recipient's encrypting module or deciphering module are used for said message or the 3rd enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance; Or, by said intermediate equipment or recipient's short notice the other side;
The rivest, shamir, adelman that the encrypting module of said transmit leg and intermediate equipment or deciphering module are used for said key or second enciphered message are encrypted or deciphered is that said transmit leg and intermediate equipment are consulted in advance;
The rivest, shamir, adelman that said intermediate equipment and recipient's encrypting module or deciphering module are used for said key or the 4th enciphered message are encrypted or deciphered is that said intermediate equipment and recipient consult in advance.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100808683A CN102740241A (en) | 2011-03-31 | 2011-03-31 | Method and system for secure transmission of media information |
PCT/CN2011/084556 WO2012129945A1 (en) | 2011-03-31 | 2011-12-23 | Method and system for secure transmission of media messages |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100808683A CN102740241A (en) | 2011-03-31 | 2011-03-31 | Method and system for secure transmission of media information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102740241A true CN102740241A (en) | 2012-10-17 |
Family
ID=46929395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100808683A Pending CN102740241A (en) | 2011-03-31 | 2011-03-31 | Method and system for secure transmission of media information |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102740241A (en) |
WO (1) | WO2012129945A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141635A (en) * | 2015-09-21 | 2015-12-09 | 北京元心科技有限公司 | Method and system for safe communication of group sending messages |
CN105515768A (en) * | 2016-01-08 | 2016-04-20 | 腾讯科技(深圳)有限公司 | Method, device and system for updating secret key |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101242264A (en) * | 2008-02-01 | 2008-08-13 | 深圳华为通信技术有限公司 | Data transmission method, device and system and mobile terminal |
CN101455061A (en) * | 2006-06-30 | 2009-06-10 | 英特尔公司 | Handheld device for elderly people |
CN101466079A (en) * | 2009-01-12 | 2009-06-24 | 中兴通讯股份有限公司 | Method, system and WAPI terminal for transmitting e-mail |
US20090257593A1 (en) * | 2008-04-10 | 2009-10-15 | Comverse Ltd. | Method and apparatus for secure messaging |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0411560D0 (en) * | 2004-05-24 | 2004-06-23 | Protx Group Ltd | A method of encrypting and transferring data between a sender and a receiver using a network |
CN1874323A (en) * | 2006-06-20 | 2006-12-06 | 四川长虹电器股份有限公司 | Method for transmitting message in multimedia |
CN101197674B (en) * | 2007-12-10 | 2010-10-27 | 华为技术有限公司 | Encrypted communication method, server and encrypted communication system |
-
2011
- 2011-03-31 CN CN2011100808683A patent/CN102740241A/en active Pending
- 2011-12-23 WO PCT/CN2011/084556 patent/WO2012129945A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101455061A (en) * | 2006-06-30 | 2009-06-10 | 英特尔公司 | Handheld device for elderly people |
CN101242264A (en) * | 2008-02-01 | 2008-08-13 | 深圳华为通信技术有限公司 | Data transmission method, device and system and mobile terminal |
US20090257593A1 (en) * | 2008-04-10 | 2009-10-15 | Comverse Ltd. | Method and apparatus for secure messaging |
CN101466079A (en) * | 2009-01-12 | 2009-06-24 | 中兴通讯股份有限公司 | Method, system and WAPI terminal for transmitting e-mail |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105141635A (en) * | 2015-09-21 | 2015-12-09 | 北京元心科技有限公司 | Method and system for safe communication of group sending messages |
CN105515768A (en) * | 2016-01-08 | 2016-04-20 | 腾讯科技(深圳)有限公司 | Method, device and system for updating secret key |
CN105515768B (en) * | 2016-01-08 | 2017-07-21 | 腾讯科技(深圳)有限公司 | A kind of methods, devices and systems of more new key |
US11088836B2 (en) | 2016-01-08 | 2021-08-10 | Tencent Technology (Shenzhen) Company Limited | Key updating method, apparatus, and system |
Also Published As
Publication number | Publication date |
---|---|
WO2012129945A1 (en) | 2012-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102740239B (en) | The method and system of secure transmission of media information | |
CN101197674B (en) | Encrypted communication method, server and encrypted communication system | |
CN101340443B (en) | Session key negotiating method, system and server in communication network | |
US8499156B2 (en) | Method for implementing encryption and transmission of information and system thereof | |
CN101203025B (en) | Method for transmitting and receiving safe mobile message | |
CN101188496B (en) | A SMS encryption transport method | |
CN101420303B (en) | Communication method for audio data and apparatus thereof | |
JPH07245605A (en) | Ciphering information repeater, subscriber terminal equipment connecting thereto and ciphering communication method | |
CN101964786A (en) | Set-top box-based secure information transmission system and method | |
CN101720071A (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
Lee et al. | Security flaw of authentication scheme with anonymity for wireless communications | |
CN103179514A (en) | Cell phone safe group-sending method and device for sensitive message | |
CN1316405C (en) | Method for obtaining digital siguature and realizing data safety | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN103167494A (en) | Information sending method and information sending system | |
CN101765066A (en) | Secret information transmission method based on multimedia message on intelligent mobile communication terminal | |
CN111049738A (en) | E-mail data security protection method based on hybrid encryption | |
CN102523563B (en) | Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology | |
CN103945348A (en) | Asymmetrical secret key short message encryption method and system | |
CN102006570A (en) | Device and method for encrypting short messages | |
CN102740246A (en) | Method, system, and device for processing media message | |
CN108270917B (en) | Encrypted smart phone | |
CN102740241A (en) | Method and system for secure transmission of media information | |
CN201623859U (en) | System for encrypting short messages through mobile phone terminal | |
CN102739604B (en) | The method and system of secure transmission of media information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20121017 |
|
RJ01 | Rejection of invention patent application after publication |