Communication system and method for protecting messages between two mobile phones
First Claim
1. A communication system for protecting messages between two mobile phones, the communication system comprising:
- a first mobile phone and a second mobile phone, the first mobile phone comprising;
a storage device that stores messages received by the first mobile phone; and
at least one processor that executes a message decryption unit, the message decryption unit comprising;
a setting module that sets a plurality of protective parameters in the storage device, the protective parameters comprising a message security level of a short message that identifies an importance of the short message;
a calculation module that generates an encryption key and a decryption key according to the plurality of protective parameters, and stores the decryption key into the storage device;
a registry module that registers the encryption key to the second mobile phone through a wireless network; and
a decryption module that determines whether a short message received from the second mobile phone is an encrypted message according to an encryption tag of the short message, obtains the decryption key from the storage device according to the message security level of the short message if the short message is the encrypted message, decrypts the encrypted message to a readable message according to the decryption key, and displays the readable message on a display screen of the first mobile phone.
1 Assignment
0 Petitions
Accused Products
Abstract
A communication system and method for protecting messages between two mobile phones are provided. The method sets protective parameters in a first mobile phone, generates an encryption key and a decryption key according to the protective parameters, stores the decryption key into a storage device of the first mobile phone, and registers the encryption key to a second mobile phone through a wireless network. The method further encrypts a short message into an encrypted message in the second mobile phone according to the encryption key, and sends the encrypted message to the first mobile phone through the wireless network. In addition, the method decrypts the encrypted message to a readable message when the first mobile phone receives the encrypted message, and displays the readable message on a display screen of the first mobile phone.
9 Citations
15 Claims
-
1. A communication system for protecting messages between two mobile phones, the communication system comprising:
-
a first mobile phone and a second mobile phone, the first mobile phone comprising; a storage device that stores messages received by the first mobile phone; and at least one processor that executes a message decryption unit, the message decryption unit comprising; a setting module that sets a plurality of protective parameters in the storage device, the protective parameters comprising a message security level of a short message that identifies an importance of the short message; a calculation module that generates an encryption key and a decryption key according to the plurality of protective parameters, and stores the decryption key into the storage device; a registry module that registers the encryption key to the second mobile phone through a wireless network; and a decryption module that determines whether a short message received from the second mobile phone is an encrypted message according to an encryption tag of the short message, obtains the decryption key from the storage device according to the message security level of the short message if the short message is the encrypted message, decrypts the encrypted message to a readable message according to the decryption key, and displays the readable message on a display screen of the first mobile phone. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A communication method for protecting messages between a first mobile phone and a second mobile phone, the communication method comprising:
-
(a) setting a plurality of protective parameters in the first mobile phone, the protective parameters comprising a message security level of a short message that identifies an importance of the short message; (b) generating an encryption key and a decryption key according to the protective parameters, and storing the decryption key into a storage device of the first mobile phone; (c) registering the encryption key to the second mobile phone through a wireless network; (d) encrypting a short message into an encrypted message in the second mobile phone according to the encryption key; (e) sending the encrypted message to the first mobile phone through the wireless network; (f) determining whether a short message received by the first mobile phone is the encrypted message according to an encryption tag of the short message, obtaining the decryption key from the storage device according to the message security level of the short message if the short message is the encrypted message, and decrypting the encrypted message to a readable message; and (g) displaying the readable message on a display screen of the first mobile phone. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium having stored thereon instructions that, when executed by a first mobile phone and a second mobile phone, cause the two mobile phones to perform a method for protecting messages between the two mobile phones, wherein the method comprises:
-
(a) setting a plurality of protective parameters in the first mobile phone, the protective parameters comprising a message security level of a short message that identifies an importance of the short message; (b) generating an encryption key and a decryption key according to the protective parameters, and storing the decryption key into a storage device of the first mobile phone; (c) registering the encryption key to the second mobile phone through a wireless network; (d) encrypting a short message into an encrypted message in the second mobile phone according to the encryption key; (e) sending the encrypted message to the first mobile phone through the wireless network; (f) determining whether a short message received by the first mobile phone is the encrypted message according to an encryption tag of the short message, obtaining the decryption key from the storage device according to the message security level of the short message if the short message is the encrypted message, and decrypting the encrypted message to a readable message; and (g) displaying the readable message on a display screen of the first mobile phone. - View Dependent Claims (12, 13, 14, 15)
-
Specification