Communication key distribution method based on Android smart mobile terminal

A technology of an intelligent mobile terminal and a distribution method, which is applied to key distribution and can solve the problems of fragile and unreliable security.

Active Publication Date: 2014-12-24
QUANTUMCTEK +1
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The method of encrypting information with application layer software is still somewhat unreliable, because they are application software installed in the Android operating system. Since they

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication key distribution method based on Android smart mobile terminal
  • Communication key distribution method based on Android smart mobile terminal
  • Communication key distribution method based on Android smart mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0055] The present invention aims to provide a communication key distribution method based on an Android intelligent mobile terminal, the method is composed of the following steps and parts:

[0056] (1) Establish a general secure communication platform at the bottom layer of the Android operating system, and call the general secure communication platform API in the source code of the application layer communication software program, compile the modified Android operating system source code into an image file, and burn it to the smart mobile terminal middle.

[0057] The specific implementation of the general secure communication platform at the bottom of the Android operating system is to add a secure communication basic function library in the C / C++framework layer of the Android source code, which can be added in bionic (also can be added in other pos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication key distribution method based on an Android smart mobile terminal. By building a common secret communication platform on the bottom layer of an Android operating system, the smart mobile terminal can have interaction with a secret communication supporting network, a two-stage key is received, the received service key is in use after being decrypted, and therefore common bottom layer supporting can be provided for VoIP secret calls, secret messages, secret video calls, file encryption transmission, safety mobile payment and other communication services needing secrecy supporting. The secret communication supporting network provides various service keys needed by communication services for the improved smart mobile terminal, and the service keys are used for secret communication after the smart mobile terminal obtains the service keys.

Description

technical field [0001] The invention relates to a secure communication technology of a mobile terminal, and relates to a communication key distribution method based on an Android intelligent mobile terminal. Background technique [0002] At present, mobile communication technology has been widely used in daily life, but most of the communication process has not been encrypted, and it is easy to be illegally eavesdropped by a third party. Although some operators have encrypted the wireless transmission part, for some situations with higher confidentiality requirements, it is necessary to keep the data stream in an encrypted state during the entire transmission process to prevent it from being monitored in the middle process, which requires In the process of mobile communication, end-to-end encryption processing is required, that is to say, the encryption and decryption links are respectively located in the calling terminal and the called terminal, so that no matter what netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04M1/725H04L29/06
CPCH04L9/16H04L9/0822G06F21/62H04L9/083H04L2209/80H04L63/0428H04W12/03H04W12/0433H04W12/0431H04W12/041H04L9/0891
Inventor 赵勇黄勇刘春华
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products