Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data transmission method, device and system and mobile terminal

A data transmission method and technology of a data transmission device, which are applied to selection devices and key distribution, can solve the problems of inconvenient data reading and complicated key transmission methods, and achieve the effect of high security.

Inactive Publication Date: 2008-08-13
HUAWEI DEVICE (SHENZHEN) CO LTD
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The problems of the prior art are: (1) The mobile terminal of the sender needs to send the key to the mobile terminal of the receiver in a specific way, and the data transmission between the mobile terminals also needs to transmit the key once, and the transmission key The key method is usually more complicated; (2) After receiving the key and ciphertext, the user needs to enter the key to read the data information, which brings inconvenience to the mobile terminal user to read the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data transmission method, device and system and mobile terminal
  • Data transmission method, device and system and mobile terminal
  • Data transmission method, device and system and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The data described in the first embodiment can be short message data, video data, picture data, etc., and how to carry out data transmission is described below as an example by sending short messages between mobile terminals in the Code Division Multiple Access (CDMA) 2000 network .

[0038] In the embodiment of the present invention, the Cellular Authentication Voice Encryption (CAVE) algorithm is used as the algorithm for encrypting data. The process of generating a key through the CAVE algorithm is first introduced below. The CAVE algorithm is a basic algorithm in the security of the second-generation mobile communication system. The CAVE algorithm is used in the update and verification process of the shared secret data (SSD for short), and in the authentication process. According to different input parameters, CAVE algorithm parameter initialization and output results are different, so it can be applied to all aspects of CDMA2000 security. The input parameters of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention relates to a data transmitting method, a device, a system and a mobile terminal, wherein the data transmitting method comprises: receiving a encrypted data, and decrypting the data by creating a key based on the information of the data sender; and re-encrypting and sending the data after decrypted based on an information of the data receiver. The data transmitting method and the system provided by the embodiment of the invention encrypt the data by the mobile terminal of the receiver, the data transmitting device decrypts and re-encrypts the data, and the mobile terminal of the receiver re-decrypts the date after receiving the data to obtain the data. The invention avoids singly sending a once key, the method is simple and the security is high.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a data transmission method, device and system and a mobile terminal. Background technique [0002] In the mobile communication system, data such as short messages, videos, and pictures can be transmitted between mobile terminals. If some important data is intercepted during data transmission, important information will be leaked, which will cause serious losses to mobile terminal users. . To solve this problem, the solution in the prior art is: the mobile terminal of the sender generates a ciphertext through a certain encryption algorithm for the data to be sent, and then transmits the ciphertext to the mobile terminal of the receiver, and the mobile terminal of the sender passes through a specific The key used to decrypt the ciphertext is sent to the mobile terminal of the receiving party by means of the method. After receiving the key and the ciphertext, the mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04Q7/22H04Q7/32
Inventor 李颖
Owner HUAWEI DEVICE (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products