Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and intelligent memory card for realizing mobile communication confidentiality

A technology of smart memory card and mobile communication, which is applied to the method and smart memory card to realize the security field of mobile communication, can solve the problems of inconvenient key management, slow encryption speed, reduced system security, etc., so as to improve security and safety Guarantee, guarantee the effect of safety

Inactive Publication Date: 2012-07-11
POTEVIO INFORMATION TECH CO LTD
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many disadvantages in the encryption software implementation method. For example, the encryption software implementation method implements encryption processing through software, the encryption speed is slow, and the computing performance of the user terminal is high; in addition, the encryption software implementation method is not convenient for key management through software. , which reduces the security of the system; it is vulnerable to hacker software attacks on the user terminal; once the user terminal is lost or stolen, it is difficult to control the risk
[0006] As can be seen from the above content, the system security of the implementation method of installing encryption software on the user terminal and encrypting various information to be sent by the encryption software used in the existing mobile communication is not high, and it is not convenient for encryption. key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and intelligent memory card for realizing mobile communication confidentiality
  • Method and intelligent memory card for realizing mobile communication confidentiality
  • Method and intelligent memory card for realizing mobile communication confidentiality

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below with reference to the accompanying drawings and examples.

[0043] The main idea of ​​the present invention is: the user terminal is connected with an external smart memory card, and the smart memory card realizes the functions of identity authentication, key negotiation, and encryption and decryption of call information during the call between the two parties before the communication, so as to realize the functions completely controlled by the two parties. End-to-end encrypted communication improves system security.

[0044] The encrypted call realized by the technical scheme of the present invention requires both parties to connect to the smart memory card with the same identity authentication, key agreement, encryption, and decryption functions through the common data interface, and before the encrypted call, the two ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing mobile communication confidentiality, which comprises the following steps that: an intelligent memory card is adopted; the intelligent memory card is externally connected to a user terminal through a universal data interface of the user terminal; before two user terminals which are externally connected with the intelligent memory cards with the same identity authentication, password negotiation, encryption and decryption functions communicate, identity authentication is carried out to the intelligent memory cards which are externally connected with both conversion parties, the password of the conversation is negotiated, and the conversation information is encrypted and decrypted by the intelligent memory cards when both conversation parties communicate. The invention also provides the intelligent memory card. After the method is adopted, the identities of both conversation parties are authenticated; because the password is negotiated before each conversation and is stored in hardware, the encryption and decryption of the conversation information of both conversation parties are carried out in the hardware, so that the security of the password is ensured and the management of the password is convenient; and because the security of the password is ensured, the security of the system is improved.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a method for realizing mobile communication security and an intelligent memory card. Background technique [0002] With the rapid development of social economy, mobile phone user terminals have become one of the necessary communication tools for more and more people. However, while wireless communication brings convenience to people, it also inevitably brings communication security issues, and air signals are easily intercepted. [0003] Taking the GSM network as an example, the encryption in the GSM system is not end-to-end, but only encrypted in the wireless channel, and there is no encryption in the ground network, and plain text transmission is used; the authentication in the GSM system is one-way, and only the network authenticates the user. authentication, but no user authentication on the network; the length of the encryption key used in GSM is 64 bits, which...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W88/02H04W12/033H04W12/0431H04W12/0433H04W12/069
Inventor 刘道斌廖剑王晨阳陈庆方
Owner POTEVIO INFORMATION TECH CO LTD