Method for realizing secure migration of user data based on voice channel

A technology of user data and voice channel, which is applied in the direction of public key for secure communication, secure communication device, user identity/authority verification, etc., can solve the problems of long-distance transmission, unusable security, and extremely high security requirements, and achieve Occupies less resources, improves security, and reduces the effect of deciphering

Active Publication Date: 2021-04-30
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of telephone communication that requires high security, the user data of fixed-line terminals is relatively small, but there is a need for long-distance transmissi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing secure migration of user data based on voice channel
  • Method for realizing secure migration of user data based on voice channel
  • Method for realizing secure migration of user data based on voice channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to express the present invention more clearly, the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0042] see Figure 1 to Figure 3 A method for implementing secure migration of user data based on a voice channel is applied to data transfer between two device terminals, including a request terminal, a transfer terminal and a broadband voice server, and includes the following steps:

[0043] Establish a connection: the requesting terminal and the transfer terminal use the signaling channel with the broadband voice server to establish a call connection;

[0044]Identity authentication request and verification: the requesting terminal uses the media channel in the call connection to send an identity authentication request to the transfer terminal, and the transfer terminal verifies the identity authentication request to realize the identity authentication and authentication of both parties;

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing safe migration of user data based on a voice channel, which comprises the following steps of: deploying a cryptosystem combining a symmetric password and an asymmetric password on a trusted terminal of a secret telephone communication network; confidentiality protection of the user information being completed by utilizing the characteristics of high encryption and decryption speed, high calculation efficiency and less resource occupation of the symmetric password; identity authentication of two communication parties being realized by utilizing calculation difficulty of discrete logarithms of asymmetric passwords in a finite field, and meanwhile, sharing factors of the two communication parties being obtained through point multiplication of temporary public and private keys by means of composite characteristics of an elliptic curve algorithm, so that a one-time pad service data protection key being generated, and forward security of user data is ensured; and finally, respectively utilizing the calculation determinacy of the hash algorithm and the uncertainty of the random sequence to solve the problems of integrity protection of the user data in the transmission process and the anti-replay performance of the cryptographic protocol.

Description

technical field [0001] The invention relates to the technical field of data migration, in particular to a method for realizing safe migration of user data based on a voice channel. Background technique [0002] In recent years, with the development of mobile communication technology, the dominance of fixed telephone in the traditional market has been continuously impacted. However, the broadband voice communication platform with the voice exchange server as the core breaks through the restrictions of the network firewall on VoIP technology. It is more in line with the development trend of the new generation network represented by IMS, and plays an irreplaceable role in the field of fixed telephone communication. [0003] In order to meet the diverse needs of users, more and more services are integrated on broadband telephone terminals, such as short messages, memos, private calls, voice assistants, meeting schedules, etc. As an important carrier for storing user informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08H04L9/32H04L29/06
CPCH04L9/3066H04L9/3236H04L9/0869H04L63/045H04L65/80H04L65/65
Inventor 张鹤鸣李庚欣杨龙剑李铎许志强李鉴杨宏康敏
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products