Secrete communication system and method for smart phone

A technology of confidential communication and smart phones, applied in the field of information security, can solve the problems of illegal wiretapping of countries and related units, loss, denial, forgery, tampering and impersonation

Active Publication Date: 2015-02-04
BEIJING CHERILEAD TECH
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the wireless channel is an open channel. While giving wireless users the freedom to communicate, it also brings some unsafe factors to the wireless communication network, such as wireless eavesdropping, identity counterfeiting, tampering with data, and post-service denial.
In current mobile phone applications, in addition to ordinary communication, many confidential and sensitive information are not allowed or dare not be communicated by mobile phone communication, such as public security, business secrets, intellectual property rights, finance, and even government, diplomatic and military intelligence and other information, the leakage or illegal wiretapping of such information may bring significant or even catastrophic losses to the country and relevant units
[0003] In order to enhance the security of the mobile communication network, the 2G GSM / GPRS mobile network provides encrypted protection for the wireless communication between the mobile phone and the base station (air interface) on the communication link, but the communication content in the core (wired) network is still encrypted. It is transmitted in plain text, which makes the communication between mobile users vulnerable to illegal eavesdropping on the core network; although 3G has realized two-way authentication between the mobile communication network and mobile users, there is no digital signature at the user end, which still cannot solve the problem. Denial, forgery, tampering, and impersonation, etc., have the possibility of network attacks; and 4G is an IP-based network that integrates radio and television networks, wireless cellular networks, satellite networks, wireless local area networks, and inherent wired networks. The new generation of mobile communication networks is facing greater security threats
[0004] Therefore, although mobile phones and mobile communication networks provide people with convenient and fast communication methods, in some occasions with high security requirements, the scope of application of mobile phones is greatly limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secrete communication system and method for smart phone
  • Secrete communication system and method for smart phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] Example 1: see figure 1 , a smart phone security communication system, comprising: a communication management platform 1, a main control service system 2 and a plurality of security mobile phones 3; the communication management platform 1 is accessed through the Internet by means of a terminal PC browser, and is used for mobile phone users , the life cycle of the confidential mobile phone 3, virtual mobile phone number, SIM card number, and user digital certificate is managed; the terminal PC is connected with the confidential mobile phone 3 through a USB interface, and imports a digital certificate for the confidential mobile phone 3;

[0088] The main control service system 2 and the secure mobile phone 3 perform SSL two-way authentication and establish encrypted long connections through the Internet and 2G / 3G / 4G mobile communication network; control and transmit the entire communication process of the secure mobile phone 3 communication parties key, user digital cert...

Embodiment 2

[0090] Example 2: see figure 2 , in a kind of smart phone secure communication system described in embodiment 1, it is characterized in that:

[0091] The communication management platform 1 includes: a user management module 1.1, an address book management module 1.2, a certificate management module 1.3, and a mobile phone management module 1.4; wherein:

[0092] Described user management module 1.1 carries out real-name information registration, information change, user cancellation management for the user, and creates a unique virtual mobile phone number for each user;

[0093] The address book management module 1.2 performs user addition, deletion, change, and cancellation of SIM card number operations, and binds or unbinds the virtual mobile phone number of the user with the SIM card number, so that one virtual mobile phone number Corresponding to t SIM card numbers of the user;

[0094] The certificate management module 1.3 manages the life cycle of the user's encrypt...

Embodiment 3

[0107] Embodiment 3: a kind of intelligent mobile phone secure communication system as described in embodiment 1 or 2, it is characterized in that:

[0108] Described SSL two-way authentication refers to adopting the SSL3.0 agreement that Netscape Company-Netscape proposes, realizes identity verification to client and server both sides by digital signature and digital certificate;

[0109] Described local PIN code authentication refers to verifying the user PIN code of the described custom SDkey built into the secure mobile phone 3;

[0110] The session key includes an encryption algorithm key and a broken algorithm key;

[0111] The encryption is broken, which means that the APP of the sender will obtain the voice data unit or short message of each frame through the microphone of the confidential mobile phone, the analog-to-digital converter and the voice data frame sampling, and first use the encryption algorithm key and the corresponding The encryption algorithm is encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information safety, in particular to secrete communication of a smart phone. According to the technical scheme, a secrete communication system for the smart phone comprises a communication management platform (1), a main control service system (3) and a plurality of secrete mobile phones (3). Compared with the technology and method for the other secrete mobile phones, the secrete communication system and method use an encryption crushing technology and a recombination decryption technology to transmit complete communication information through x mobile communication signal channels, and each mobile communication signal path transmits one part of cipher-text fragments of a voice data unit or a short message; people cannot restore the complete cipher-text not to mention the plain text of the voice or the plain text of the short message through eavesdropping any one of the mobile communication signal channels, and therefore, the illegal eavesdropping on the mobile communication network is effectively avoided; the voice data or short message encryption, decryption and crushing recombination are performed in a customized SD key in the secrete mobile phone, and the rogue program eavesdropping to the secrete mobile phone terminal can be effectively avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to secure communication of smart phones. Background technique [0002] Because it is not limited by regions and communication cables, mobile communication networks are widely used. However, the wireless channel is an open channel. While giving wireless users the freedom to communicate, it also brings some unsafe factors to the wireless communication network, such as wireless eavesdropping, identity forgery, data tampering, and post-denial of service. In current mobile phone applications, in addition to ordinary communication, many confidential and sensitive information are not allowed or dare not be communicated by mobile phone communication, such as public security, business secrets, intellectual property rights, finance, and even government, diplomatic and military intelligence The disclosure or illegal wiretapping of such information may bring major or e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/02
Inventor 肖龙旭张凯刘婷丁凯
Owner BEIJING CHERILEAD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products