A secure communication method and system for a mobile terminal

A mobile terminal and secure communication technology, applied in the field of information security, can solve the problems of user data security risks, loss, data easy to be monitored, intercepted, stolen or tampered with, and achieve the effect of ensuring safe transmission and security

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, due to the openness and flexibility of the smart terminal itself and the characteristics of the wireless network, the data is easily monitored, intercepted, stolen or tampered with, causing certain security risks and losses to user data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication method and system for a mobile terminal
  • A secure communication method and system for a mobile terminal
  • A secure communication method and system for a mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Next, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the embodiments of the present invention, and it is understood that the described embodiments are merely the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0080] It should be noted that when a component is considered to be a "connection" another component, it can be directly connected to another component or may exist at the same time.

[0081] All technical and scientific terms used herein are commonly understood by those skilled in the art of the present invention, unless otherwise defined. The terminology used in the specification of the present invention is intended to describe the embodiments of the specific embodiments, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a mobile terminal secure communication method and system, the method includes a key negotiation process, a secure instant communication process and a secure call process; the key negotiation process: the first mobile terminal and the service platform perform identity authentication and key The first session key is obtained after negotiation; the second mobile terminal obtains the second session key after identity authentication and key negotiation with the service platform; the secure instant messaging process: the first mobile terminal communicates with the service platform through the service platform The second mobile terminal uses the first session key and the second session key to perform encryption and decryption processing of instant messaging information; the secure call process: the first mobile terminal uses the service platform to The first session key, the second session key and the second mobile terminal distribute the data encryption key; the first mobile terminal and the second mobile terminal use the data encryption key to Encryption and decryption of voice call information.

Description

Technical field [0001] The present invention relates to the field of information security, and more particularly to a secure communication method and system of a mobile terminal. Background technique [0002] With the development of mobile networks and the promotion of intelligent terminal performance, intelligent terminals and wireless communications, mobile applications have increased dramatically, and mobile network-based function services are also increasingly enhanced. In particular, the information interaction function based on wireless mode has a congenital advantage, which has gradually influenced people's living mode, forming a new information interaction, communication mode. [0003] At the same time, due to the openness, flexibility, and wireless networks of the intelligent terminal itself, data is easily listened, intercept, stealing or tampering, resulting in certain security hazards and losses to user data. At present, the security threat caused by the user in the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3247H04L9/3263H04L9/0838H04L9/0861H04L63/0428
Inventor 彭金辉雷宗华孙伟颖孙晓鹏李鑫
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products