Mobile phone ciphering method based on safe digital interface ciphering card

A secure digital and mobile phone encryption technology, applied in the direction of radio/inductive link selection and arrangement, electrical components, transmission systems, etc., can solve problems such as insufficient encryption strength, single function, and unreliable guarantee of data security, etc., to achieve control The effects of malicious security attacks, simple and convenient system, high encryption strength and reliability

Inactive Publication Date: 2009-03-11
SOUTHEAST UNIV
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two main types of end-to-end encryption methods proposed for mobile communications: one is to modify the hardware device of the mobile phone and add hardware modules for encryption. Although this scheme has high encryption strength, it requires a special mobile phone and is difficult to implement. , the application area is narrow, and the function is single; the other is to implement encryption through software. Although this solution has strong versatility and rich expandable functions, software encryption is easy to be cracked, the encryption strength is not enough, and data security cannot be reliably guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone ciphering method based on safe digital interface ciphering card
  • Mobile phone ciphering method based on safe digital interface ciphering card
  • Mobile phone ciphering method based on safe digital interface ciphering card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 Described is the overall block diagram of the mobile phone encryption method based on the secure digital interface encryption card, which is mainly implemented based on the three security subjects of the secure digital interface encryption card 1, the mobile phone 2 and the authentication server 3. Voice, data and short message data on a mobile phone 2 are encrypted by the secure digital interface encryption card 1, and then transmitted to another mobile phone 2 through the mobile communication network, and the data decryption is also completed by the secure digital interface encryption card 1. The communication between the secure digital interface encryption card 1 and the mobile phone 2 complies with the mechanical characteristics, electrical characteristics and communication protocols of the secure digital interface 4 .

[0030] Before encrypted data transmission, the calling party of mobile phone 2 and the receiving party of mobile phone 2 must complete mut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a handset encryption method based on a safety digital interface encryption card, which can realize end-to-end encryption data transmission on the basis of unchanging the prior handset hardware facilities through inserting the safety digital interface encryption card in a handset with a safety digital interface slot. The invention is mainly based on three safety main bodies including the safety digital interface encryption card, the handset (2) and a certificate server (3). The connection and communication of the safety digital interface encryption card and the handset are finished in accordance with the mechanical feature, the electrical character and the communication protocol of a safety digital interface (4). After the encryption process of the safety digital interface encryption card, voice, data and the data of messages on one handset are transmitted to the other handset through a mobile communication network, and the encryption of the data is finished by another safety digital interface encryption card. Before the encryption data is transmitted, the certificate server, a handset calling party and a handset called party which are set up need to finish the mutual certificate and secret negotiation together.

Description

technical field [0001] The invention relates to a mobile phone encryption method based on a security digital interface encryption card. By inserting a security digital interface encryption card into a slot of the security digital interface of the mobile phone, user data such as voice, data, short message, etc. can be encrypted by calling the encryption function on the encryption card and The authentication function completes end-to-end secure transmission. The mobile phone encryption method can be applied to mobile phones of the global mobile communication system and the third generation mobile communication system. Background technique [0002] With the rapid development of mobile networks, a large amount of sensitive business and personal information needs to be transmitted through mobile phones. For the open electronic communication system of mobile phone communication, the information between the mobile phone and the base station is transmitted through wireless air, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04L29/06
Inventor 陈立全胡爱群张橙
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products