Andriod system-oriented implement method of mobile secure terminal

An implementation method and terminal technology, applied in the field of information security, can solve problems such as no key negotiation and no patent formation, and achieve the effects of friendly user interface, low cost, and easy implementation

Inactive Publication Date: 2015-11-04
东南大学常州研究院
View PDF13 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method does not address key agreement and is not patented

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Andriod system-oriented implement method of mobile secure terminal
  • Andriod system-oriented implement method of mobile secure terminal
  • Andriod system-oriented implement method of mobile secure terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as figure 1 Shown, the structural diagram of the present invention, a kind of implementation method of mobile security terminal facing Android system mainly includes Android user registration module 1, Android user management module 2, Android calling module 3, SIP signaling processing module 4, key Negotiation module 5 , voice bridging module 6 , encrypted call module 7 , SIP relay module 8 , server key negotiation module 9 and server encrypted call module 10 . The security terminal can support two encrypted communication modes: first, when both parties in the call are Android security terminals, it can realize end-to-end encrypted voice communication for Android operating system mobile terminals, that is, end-to-end encrypted communication mode ; Second, when only one of the two parties in the call is a confidential terminal, it can realize the encrypted voice communication between the Android operating system mobile terminal and the server, that is, the half-way...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Andriod system-oriented implement method of a mobile secure terminal. The mobile secure terminal comprises an Andriod user registration module, an Andriod user management module, an Andriod calling module, an SIP signaling processing module, a key negotiation module, a server key negotiation module, a voice bridging module, an encrypted conversation module, a server encrypted conversation module and an SIP relay module. The implement method supports two encrypted communication modes: the first one is that one-time pad end-to-end encrypted voice communication for mobile terminals with Andriod operating systems is achieved while the two parties who communicate with each other are both secure terminals, namely the first mode is an end-to-end encrypted communication mode; the second one is that one-time pad encrypted voice communication from the mobile terminal with the Andriod operating system to a server is achieved while only one of the two parties who communicate with each other is the secure terminal, namely the second mode is a halfway encryption communication mode from the secure terminal to the server. The implement method of the invention does not need extra hardware to support, and is friendly in user interface and easy to operate.

Description

technical field [0001] The invention relates to a method for realizing an Android system-oriented mobile security terminal, and belongs to the technical field of information security. Utilize the SIP (Session Initiation Protocol) protocol in conjunction with the server database to identify the call mode, use the UDP socket to negotiate the session key, and at the same time based on the server's management and encryption and decryption processing, implement security encryption on the mobile terminal that uses the Android system and loads the method of the present invention communication without changing the entire mobile communication system. Background technique [0002] As more and more domestic and foreign mobile phone manufacturers enter the camp of the Android operating system, the market share of mobile terminals oriented to the Android system has exceeded the sum of mobile terminals oriented to other systems. However, with the spread of mobile phone viruses, the rampa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W88/02H04W12/033H04W12/0431
CPCH04W12/02H04W12/06H04W88/02
Inventor 蒋睿周磊蒋泽民钱泽虹尹杰
Owner 东南大学常州研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products