Radio terminal security network and card locking method based on the ellipse curve public key cipher

An elliptic curve, public key cryptography technology, applied in radio/induction link selection arrangement, secure communication device, public key for secure communication, etc.

Inactive Publication Date: 2007-08-15
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 68 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mathematical theory of the ECC algorithm is very profound and complex, and it is diff...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio terminal security network and card locking method based on the ellipse curve public key cipher
  • Radio terminal security network and card locking method based on the ellipse curve public key cipher
  • Radio terminal security network and card locking method based on the ellipse curve public key cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] First, the key of the present invention is explained: (1) starting from the discrete logarithm of the elliptic curve, supplemented by an anti-collision hash function, utilizing the digital signature method of the elliptic curve public key certificate, realizing the method of locking the network and locking the card of the mobile phone, including the network locking of the mobile phone Lock card software authorized use confirmation, software integrity check, encrypted storage of relevant security parameters of lock network lock card, and methods of security realization of lock network lock card and safe unlocking of lock network lock card.

[0037](2) The security basis of the present invention is based on the discrete logarithm problem of elliptic curves. Given an elliptic curve E defined on a finite field GF(p), a point P∈E of order n and a point Q=kP, where 0≤k≤n-1, determine k. The elliptic curve discrete logarithm problem has provable security. Compared with the cur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The related wireless terminal (1) security locking method based on elliptic curve public key cipher comprises: using elliptic curve public key certificate to form digital signature and private key to validate software during startup; deciding by software to provide network service according to current register and pre-set information or reading the IMSI number in user USIM/SIM card to compare with stored one and decide whether provide service. This invention synthesizes lots business, and special fit to terminal with common processing capacity.

Description

technical field [0001] The invention relates to a mobile communication terminal, in particular to a method for safely locking a network and locking a card of a wireless terminal based on an elliptic curve public key cryptography. Background technique [0002] With the large-scale commercialization of WCDMA networks around the world and the increase in the number of WCDMA users, in order to expand and consolidate the number of users, various operators adopt the method of subsidizing telephone charges or attaching mobile phones in the sales mode of wireless terminals or mobile phones to attract users. In some countries and regions, in order to ensure that mobile phone users will not be lost, operators require that the purchased mobile phones can only be used on their own network, and use the SIM / USIM card issued by the operator itself, so the network lock card lock is proposed for mobile phones. Require. Through network locking and card locking technology, some 3G operators c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32H04Q7/32H04W12/106
CPCH04L9/3263H04L9/3066H04L9/3252H04L63/0823H04L63/12
Inventor 卢忱王云峰胡焰龙张瑞娟于宏全郭艳玲
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products