Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key storage method and telephone card authentication method of wireless fixed telephone

A key storage and authentication method technology, which is applied in the field of wireless fixed-line key storage method and machine card authentication, can solve the problem of high cost, achieve the effects of ensuring key security, reducing costs, and facilitating the expansion of applications

Inactive Publication Date: 2013-04-24
SHANGHAI SIMCOM LTD
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the defect that the wireless fixed-line phone in the prior art uses an encryption card, but for the safe storage of the key, a write-only chip must be used and the cost is relatively high, and to provide a method that does not require a write-only chip. Key storage method and machine-card authentication method of wireless fixed-line phone that can ensure key security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key storage method and telephone card authentication method of wireless fixed telephone
  • Secret key storage method and telephone card authentication method of wireless fixed telephone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The preferred embodiments of the present invention are given below in conjunction with the accompanying drawings to describe the technical solution of the present invention in detail.

[0026] refer to figure 1 , introduces a key storage method of a wireless fixed phone of the present invention.

[0027] Step 101, selecting a first key for machine-card authentication and a first encryption algorithm for machine-card authentication, wherein the machine-card authentication is authentication between a wireless fixed phone phone and a SIM card. Wherein, the first encryption algorithm is a 3DES algorithm.

[0028] Step 102, encrypt the code of the first encryption algorithm and the first key by using a second encryption algorithm and a second key. Wherein, the second key is selected through the GPIO interface of an application processor of the wireless fixed phone. There are 4 groups of the second key, and the group is selected according to the configuration of the two GPI...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secret key storage method of a wireless fixed telephone. The secret key storage method of the wireless fixed telephone includes the following steps: (1) selecting a first secret key which is used for telephone card authentication and a first encryption algorithm which is used for the telephone card authentication, wherein the telephone card authentication is authentication between a telephone of the wireless telephone and a subscriber identity module (SIM) card, (2) encrypting and writing a code of the first encryption algorithm and the first secret key in a flash by adopting a second encryption algorithm and a second secret key. The invention further discloses a telephone card authentication method of the wireless fixed telephone. Due to the fact that the secret key storage method and the telephone card authentication method of the wireless fixed telephone does not need to be provided with a write-only chip, the secret key storage method and the telephone card authentication method of the wireless fixed telephone solves the problem that the existing wireless fixed telephone needs to be provided with the write-only chip, wherein the write-only chip supports a 3 data encryption standard (DES) algorithm and all operations relative to the secret keys are finished in the chip. The secret key storage method and the telephone card authentication method of the wireless fixed telephone has the advantages of being capable of guaranteeing safety of the secret keys and simultaneously reducing cost of the wireless fixed telephone, and beneficial for development and application of the wireless telephone.

Description

technical field [0001] The invention relates to a key storage method and a machine-card authentication method of a wireless fixed phone, in particular to a key storage method and a machine-card authentication method of a wireless fixed phone without a write-only chip. Background technique [0002] Wireless fixed line, commonly known as "Wireless Communication", has the appearance of an ordinary telephone and is a communication terminal product based on the GSM / CDMA wireless network. Its core technology adopts GSM / CDMA mobile communication system, and the number opened is also a mobile phone number, and the charges are charged according to ordinary local calls. Because the "wireless fixed line" does not need to be rewired, it can save a lot of expenses for the operator; more importantly, it can "move", which greatly expands the scope of use of the "fixed line"; With the further deepening of informatization, "wireless fixed line" as an extension and expansion of the original ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
Inventor 李乐宁
Owner SHANGHAI SIMCOM LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products