Communication method of terminal equipment equipped with encryption system and third-party application installing method

An encryption system and terminal equipment technology, which is applied in the field of secure communication, can solve problems such as failure of encryption methods, easy transplantation of encryption libraries, and inability to carry out encrypted communication.

Active Publication Date: 2018-10-02
POWER IDEA TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a communication method for the terminal equipment of the encryption system. The communication method can solve the problem that the encryption method of the encryption card in the prior art is simple, and only relies on the connection between the encryption card and the mobile terminal for identity verification and encryption. Communication, so there are problems that the encryption card is easy to be copied and the encryption library is easy to be transplanted, which leads to the failure of the encryption method and the inability to carry out encrypted communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method of terminal equipment equipped with encryption system and third-party application installing method
  • Communication method of terminal equipment equipped with encryption system and third-party application installing method
  • Communication method of terminal equipment equipped with encryption system and third-party application installing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] This embodiment will take a mobile phone as an example. The mobile phone has a common system and an encryption card that can be plugged and connected with the mobile phone. An encryption system is built in the encryption card. In the method, it is also necessary to provide an encryption system server; please refer to figure 1 , what is described is a communication method of a terminal device with an encryption system, and the communication method includes the following steps:

[0055] S1 user sends a communication request;

[0056] S2 user confirms whether encrypted communication is required,

[0057] If so, enter S3, if not, enter S100;

[0058]Whether the S3 terminal device can normally enable the encryption system,

[0059] If yes, enter S4; if not, enter S10;

[0060] S4 enters the encryption system;

[0061] The S5 terminal device sends an encrypted communication request to the encryption system server;

[0062] Whether the S6 encryption system server accepts...

Embodiment 2

[0103] Before proceeding to the description of Embodiment 2, it should be reminded that since Embodiment 2 and Embodiment 1 have the same or similar parts in the authentication of encrypted card users, in the description of Embodiment 2, this part is Without going into details, please refer to the content of Embodiment 1 for understanding.

[0104] According to the second embodiment of the present invention, a third-party application installation method for a terminal device with an encryption system is also provided, please refer to Figure 5 , the installation method includes the following steps:

[0105] S01 Issue a third-party application installation request;

[0106] S02 The user confirms whether encryption is required for installation,

[0107] If so, enter S03, if not, enter S200;

[0108] S03 Whether the terminal equipment can normally open the encryption system,

[0109] If yes, enter S04; if not, enter S08;

[0110] S04 Enter the encryption system;

[0111] S0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication method of terminal equipment equipped with an encryption system. A set of terminal equipment equipped with a common system, an encryption card equipped with theencryption system and an encryption system server are provided. The encryption card is connected with the terminal equipment in a pluggable way. The user can transmit an encrypted communication demandor a common communication demand according to the actual requirement. When the encrypted communication demand is transmitted, identity determination and attribution identification require to be performed on both sides of encrypted communication through the encryption system server, only the encryption card users in the encryption system server can realize encrypted communication, or the encryptedcommunication demand is interrupted; as for the encryption method, the mode of a new key generated by the encryption card ID and the terminal equipment serial number together is used so as to have the advantage of high degree of encryption and high security.

Description

technical field [0001] The present invention relates to the field of secure communication of a terminal device, in particular to a communication method for a terminal device with an encryption system, and an encrypted installation method for a third-party application on the terminal device with an encryption system. Background technique [0002] With the advancement of science and technology, various electronic devices continue to introduce new functions and new applications, but at the same time it also brings us a lot of security risks and concerns, especially when it comes to certain areas, communication security is especially important . [0003] In the existing various communication terminal equipment, the use of encryption APP, or the way of inserting encryption card to improve the security of operation already exists. For example, an encryption card is disclosed in the existing invention patent [An encryption card and its application method in a mobile terminal autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/06H04L63/062H04L63/083H04L63/10
Inventor 闫淼
Owner POWER IDEA TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products