Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for ciphering wireless mobile terminal communication

A mobile terminal and communication encryption technology, which is applied in the field of information security and communication, can solve the problems of security loopholes, no key update and management mechanism, no cryptographic identity authentication and key management mechanism, etc.

Active Publication Date: 2008-10-01
北京合众思壮时空物联科技有限公司
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the use of SIP signaling control can reduce the reliance on CDMA signaling control, so some data necessary for encryption operations can be transmitted without modifying the existing CDMA network signaling system, but the shortcomings of this method are also obvious
First of all, relying on SIP signaling greatly limits the scope of application. At present, most mobile terminal devices do not support the SIP protocol. Second, this method does not provide a mechanism for identity authentication and key management in the sense of cryptography, let alone prevent active attacks. , the security cannot be guaranteed
[0006] The invention patent "Portable Device with Voice Encryption / Decryption and Its Encryption and Decryption Method" (ZL03153185.7) authorized on July 20, 2005 uses asymmetric encryption algorithms such as DSA and RSA and symmetric encryption algorithms such as DES, but It does not provide a key update and management mechanism, nor can it prevent man-in-the-middle active attacks, and there are serious security vulnerabilities
However, due to the complexity of use, deployment, operation, maintenance and operation, the PKI system is not suitable for the general needs of most mobile communication users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ciphering wireless mobile terminal communication
  • Method for ciphering wireless mobile terminal communication
  • Method for ciphering wireless mobile terminal communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] A specific embodiment of the method is given here, and the specific embodiment is as follows.

[0067] 1. KGC generates public parameters, and announces the service number and public parameters: KGC selects two prime numbers p and q with at least 5 12 bits, and calculates n=pq, where n is 1024 bits, and KGC generates its own private key d and public key e, satisfying e=d -1 mod(p-1)(q-1), then KGC selects g and the hash function Hash, etc., and g and n are mutually prime.

[0068] KGC publishes public parameters through the website: e, n, g and hash function Hash, etc.

[0069] 2. Mobile user registration and private key acquisition: such as figure 1 As shown, the process of user registration and private key acquisition is as follows, in which the interaction between KGC and mobile users is carried out through SMS:

[0070] (1) The mobile user sends a registration application to KGC through a short message, and the application includes a user identity ID. In this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method of communication encryption for a wireless mobile terminal. In the invention, the wireless mobile communication user realizes security information exchange of terminal to terminal based on the guarantee reliability identity authentication without bearing deployment, maintenance and complex operation of public key infrastructure, without the participation of telecom operator, without replacing or impacting telecom signaling exchange protocol. The mobile communication user uses mobile terminal identity mark as identity, introducing a credible thirst party, named for key generation center, the main function is to help user to generate key according to the identity of user. The user acquires a key corresponding to the identity from the credible third party by mobile phone message or data service. The key guarantees the encryption key exchange and safety parameter between users to negotiate and resist active attack, session key between mobile users is independent to the KGC random generation, realizing the safety communication of terminal to terminal.

Description

technical field [0001] The invention relates to the technical fields of information security and communication, in particular to a communication encryption method for a wireless mobile terminal. Background technique [0002] With the development of communication technology and the popularization of its applications, mobile communication has become a major means of communication. However, the inherent flaws in the infrastructure of telecommunication networks have caused people to pay more and more attention to the security of mobile communications. Although the air interface part of the wireless mobile network (GSM, CDMA) also provides certain encryption capabilities, the air interface encryption technology of GSM has been proven to have serious defects, and monitoring and cracking equipment have already been sold in the market. The so-called secure CDMA air interface encryption technology has also been proved to be insecure in theory, and Israeli security analysts have also...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04L9/32H04Q7/32
Inventor 陈辉焱吴倩林伯瀚林源赵晨啸
Owner 北京合众思壮时空物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products