CDMA port-to-port encryption communication system and key distribution method thereof
An encrypted communication system and key distribution technology, which is applied in the key distribution field of CDMA end-to-end encrypted communication, can solve the problems of key management and identity authentication limitations, to ensure security, reduce security risks, and improve communication safety effect
Inactive Publication Date: 2010-01-27
成都卫士通信息产业股份有限公司
1 Cites 21 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses a CDMA port-to-port encryption communication system and a key distribution method thereof, the CDMA port-to-port encryption communication system comprises a CDMA network and a terminal mobile telephone thereof, a public switched telephone network and a terminal fixed-line telephone thereof, a short message service center as well as the following three cipher processing units including a cipher chip of a mobile telephone terminal, a key distribution management center (KDMC) and a Firmware cipher module of a gateway mobile switching center. The key distribution management center is used for key distribution management of the communication system. The key distribution is realized by a layered distribution method, i.e. a first layer is an equipment key which is distributed in the process of initialization; a second layer is a key-encryption key and a short message service key which are distributed in startup of an enciphered mobile telephone; and a third layer is a session key which is distributed every time a session is launched between the enciphered mobile telephones. At the same time, by adopting a bidirectional certification technology for key distribution and combination of a key update and remote destroying method, the safety risk in key exposure is reduced, and the communication safety is improved.
Application Domain
Technology Topic
Cdma networksKey distribution +10
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Automatic collision preventing control method of USV
InactiveCN105867383AEnsure safetyImprove intelligenceMeasurement devicesPosition/course control in two dimensionsGenetic algorithmUnmanned surface vehicle
Owner:HARBIN ENG UNIV
Washing machine and washing control method of the same
InactiveUS20080201867A1Ensure safetyUniform washing efficiencyOther washing machinesControl devices for washing apparatusEngineeringEnvironmental engineering
Owner:SAMSUNG ELECTRONICS CO LTD
Application information push method, system and network element
ActiveCN102388632ATwo-way information exchangeEnsure safetyInformation formatContent conversionApplication serverService provider
Owner:HUAWEI TECH CO LTD
Blockchain-based identity authentication method, device, node and system
ActiveUS20190288854A1Avoid influenceEnsure safetyEncryption apparatus with shift registers/memoriesPublic key for secure communicationBlockchainDigital signature
Owner:CLOUDMINDS SHANGHAI ROBOTICS CO LTD
Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis
InactiveCN103067155AEnsure safetyEncryption apparatus with shift registers/memoriesPower attackComputer hardware
Owner:SOUTHEAST UNIV
Classification and recommendation of technical efficacy words
- Reduce security risks
- Ensure safety
Automatic driving system
InactiveCN101823486ARelieve fatigueReduce security risksRoad vehicles traffic controlDriving safetyEnvironmental sensor
Owner:CHERY AUTOMOBILE CO LTD
Automobile failure detection system based on cloud calculation
ActiveCN102752360ALow manufacturing costReduce security risksTelephonic communicationTransmissionCloud computingCommunication interface
Owner:ZHEJIANG GEELY AUTOMOBILE RES INST CO LTD +1
Block chain consensus method and system
ActiveCN108737375AGuaranteed randomnessReduce security risksFinanceEncryption apparatus with shift registers/memoriesConsensus methodBlockchain
Owner:SUN YAT SEN UNIV
Power safety socket device
ActiveCN106848698AReduce security risksImprove power supply stabilityLive contact access preventionMechanical engineeringElectric power
Owner:东莞科奔电器有限公司
Video monitoring method and system with auxiliary objective monitoring function
InactiveCN101320427AReduce security risksSave manpowerCharacter and pattern recognitionAlarmsTraffic volumeHuman power
Owner:VIMICRO CORP