Method and device for realizing safety communication between terminal devices

A technology of secure communication and terminal equipment, applied in the field of secure communication, can solve problems such as the inability to guarantee secure communication between ME/UICC and PE

Active Publication Date: 2007-07-25
HUAWEI TECH CO LTD
View PDF0 Cites 120 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a solution to effectively guarantee the transmission of secret information between ME/UICC and PE

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing safety communication between terminal devices
  • Method and device for realizing safety communication between terminal devices
  • Method and device for realizing safety communication between terminal devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The core idea of ​​the present invention is: the communication peer sends the requester information received from the requester to the key management center, and the key management center verifies the identity of the requester according to the requester information, and after verifying that the requester is legal , generating the shared key between the communication peer and the requesting end according to the information of the requesting end and the security information preset by the key management center for obtaining the shared key between the communication peer and the requesting end; the shared key generated by the key management center The key is sent to the communication peer as key information, and the requesting end and the communication peer use the shared key for secure communication.

[0076] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: communication opposite terminal (COT) sends the request end information received from the request end to the key management center (KMC); based on the request end information, KMC validates ID of the request end; after validating validity of the request end, KMC creates shared cipher key for COT and the request end based on the request end information, and self prearranged security information; KMC down sends the created shared cipher key as information of cipher key to COT; using the said shared cipher key, the request end and COT carry out security communication. The invention also discloses device for security communication between terminal devices. Guaranteeing security communication between terminal devices, the invention especially guarantees security communication between ME/UICC/PE and PE.

Description

technical field [0001] The invention relates to secure communication technology, in particular to a method and device for realizing secure communication between terminal devices. Background technique [0002] With the development of network technology and the promotion of market demand, network convergence has become the focus of attention. For users, in the convergence of various networks, any terminal equipment such as mobile station, personal digital assistant (PDA), personal computer (PC) can be used to access the network through any means such as wireless local area network (WLAN), DSL, General Packet Radio Service (GPRS), etc., and different terminal devices can use unique numbers and unique bills. In other words, a user can have multiple user terminal equipment (UE), and these UEs share the user information in a universal integrated circuit card (UICC) of the user. In this case, it is not only necessary to ensure that the UICC or The mobile equipment (ME) can safely...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 曹淑华杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products