End-to-end encryption method and system based on mobile network and communication client side

A technology of mobile network and encryption method, which is applied in the field of end-to-end encryption system, which can solve the problems of technical risk in user data security, opacity of encrypted storage users, and moral hazard, so as to reduce security risk and improve safety and security Level, the effect of increasing the security level

Inactive Publication Date: 2015-01-07
叶涛
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since all data is processed by the server of the communication software provider, whether the data is encrypted and stored and how to process it is quite opaque to the user. The security of user data not only has technical risks, but also moral risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end encryption method and system based on mobile network and communication client side
  • End-to-end encryption method and system based on mobile network and communication client side
  • End-to-end encryption method and system based on mobile network and communication client side

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Below in conjunction with accompanying drawing, the present invention will be further described:

[0014] The terms involved in the description of the present invention are explained as follows:

[0015] UAC, that is, User Account, user account, is used to classify different users in the account management center.

[0016] UEK, namely User Encryption Key, is the key used to encrypt user data.

[0017] GEK, the General Encryption Key, master key, is used to encrypt / decrypt the UEK.

[0018] EUEK, the Encrypt User Encryption Key, encrypts the user key and exists in the process of transmission and storage.

[0019] DATA refers to user plaintext data.

[0020] EDATA, Encrypt Data, encrypted user data.

[0021] IMEI, the identification code of GSM mobile equipment, here generally refers to the identification code of mobile communication equipment of various standards, which is globally unique.

[0022] The invention provides an end-to-end encryption method based on a mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an end-to-end encryption method based on a mobile network and a communication client side, and further relates to an end-to-end encryption system based on the mobile network and the communication client side. According to the encryption method, the symmetric encryption algorithm is adopted to carry out data encryption, an account number managing center is used for managing the identity and a secret key of an authorized user, a secret key processing module is used for carrying out secret key encryption and decryption on a secrecy system, a terminal processing module is used for carrying out encryption or decryption on the plaintext or ciphertext data information through the symmetric encryption algorithm, and a communication software client side is used for transmitting enciphered data, and accordingly the end-to-end enciphered data interaction is achieved. The encryption system comprises the account number managing center, the secret key processing module and the terminal processing module, the account number management center and the secret key processing module interact through the mobile communication network, the terminal processing module interacts with the enciphered data through the communication software client side, and encryption or decryption on the terminal processing module is achieved. The end-to-end encryption method and the end-to-end encryption system are good in encryption safety and capable of being used for various mobile communication platforms.

Description

technical field [0001] The invention relates to an end-to-end encryption method based on a mobile network and a communication client, and also relates to an end-to-end encryption system based on a mobile network and a communication client. Background technique [0002] In the existing mobile communication system, whether it is a mobile communication network or a communication software used as a data transmission platform, encryption technology exists. [0003] In the mobile communication network, whether it is a public or a professional system, security functions such as authentication and interface encryption are defined to ensure the safe exchange of data. However, in the core nodes of the communication system, these encryption technologies still have information in the form of plain text, which has a low degree of security and cannot meet the high security requirements of the military, government and security departments, and some special users to ensure the confidentiali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04W12/02H04W12/04
Inventor 叶涛
Owner 叶涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products