Supercharge Your Innovation With Domain-Expert AI Agents!

Data encryption/decryption method and system for mobile communication network

A communication network, encryption and decryption technology, applied in the field of data encryption and decryption methods and systems, can solve the problems of easy cracking, encryption parameters cannot be dynamically changed, and easy to be monitored, etc., and achieve the effect of improving security and confidentiality.

Inactive Publication Date: 2010-12-15
ZTE CORP
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The encryption method defined in 3GPP only encrypts the wireless environment, and encrypts / decrypts the transmitted data between the mobile terminal and the Node B. The data is transmitted in clear text in the network, and it is easy to be monitored. The existing network monitoring technology Mostly implemented on the network side
[0005] At present, the relevant patents or solutions are all end-to-end encryption. Such encryption parameters cannot be changed dynamically and are easy to be cracked.
It is difficult to coordinate the data output mode between users who support encryption and users who do not support encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption/decryption method and system for mobile communication network
  • Data encryption/decryption method and system for mobile communication network
  • Data encryption/decryption method and system for mobile communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Since the end-to-end encryption in the current technology does not involve the transmission network, such encryption parameters cannot be changed dynamically and are easily cracked. The inventive concept of the present invention is:

[0036] Before packet data transmission, the sender (user terminal or GGSN) sends the original packet data message to the encryption module, and the encryption module uses the encryption key (CK) as the encryption operation factor to encrypt the original packet data message to obtain encrypted After the packet data message is encrypted, the encrypted packet data message is sent to the receiving end after protocol encapsulation;

[0037] The receiving end (when the sending end is a user terminal, the receiving end is GGSN; when the sending end is GGSN, the receiving end is a user terminal) after receiving the encrypted packet data message, it sends it to the decryption module, which uses and sends it The same CK as the terminal encryption m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption / decryption method and a data encryption / decryption system for a mobile communication network, which ensure that user information is not transmitted in a clear text form so as to prevent the user information from being illegally monitored and improve the security and confidentiality of data transmission. The method comprises the following steps of: before packet data transmission, transmitting original packet data message to an encryption module through a transmitting end, encrypting the original packet data message through the encryption module by adopting a cipher key (CK), performing protocol encapsulation on the encrypted packet data message, and transmitting the encrypted packet data message to a receiving end; and transmitting the encrypted packet data message to a decryption module through the receiving end after receiving the encrypted packet data message, decrypting the packet data message through the decryption module by using the same CK as the encryption module of the transmitting end, and transmitting the decrypted packet data message to the next destination.

Description

technical field [0001] The invention belongs to the field of mobile communication, and relates to a data encryption and decryption method and system in a mobile communication network. Background technique [0002] Data service is the focus of the development of third-generation mobile communication technology, and it is also the most concerned by users and operators. Many traditional services (such as voice calls) have also been implemented through packet interaction (VOIP), so the confidentiality and security of data services Sex is also getting more and more attention. [0003] The mobile network itself has its own communication encryption method. In the 3GPP (including UMTS and GSM) system, the user's SIM card and the home network's HLR / AuC (home location memory / authentication center, general representation, means integrated AUC HLR) share a security key Ki (128bit), based on this key, two-way authentication can be performed between the core network and the user, and at ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02
CPCH04W12/02H04L63/0435H04L63/0471H04W12/033
Inventor 张蓬勃曹耀斌薛宝林薛涛于松邓方民孙君生杨玉林
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More