Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for end encryption of mobile station end adapted for 3G system

A station-side, ciphertext technology, applied in the field of mobile station-end encryption, can solve the problem of information cannot be decrypted, and achieve the effect of improving security and reliability

Inactive Publication Date: 2004-06-16
HUAWEI TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cryptographic algorithm of end-to-end encryption usually adopts the stream cipher algorithm. The advantage of the stream cipher algorithm is that the implementation speed is very fast, and if a certain bit is decrypted incorrectly, it will not affect other bits, that is, error diffusion will not occur, but its disadvantage is that it requires With precise synchronization, once a position is misaligned, subsequent information cannot be decrypted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for end encryption of mobile station end adapted for 3G system
  • Method for end encryption of mobile station end adapted for 3G system
  • Method for end encryption of mobile station end adapted for 3G system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] See image 3 In the third-generation mobile communication system, in the process of information security transmission achieved according to the method provided by the present invention, the information flow process is: the sender sends plaintext information 1 and key stream 2 to generate ciphertext through stream encryption Information 3, the ciphertext information 3 is processed by the synchronization control unit, and the synchronization control header 4a is generated and added before the ciphertext information 3 to form the transmission information 4. The transmission information 4 is transmitted to the receiver through the transparent channel, and the receiver receives the original transmission Information 4', after the correct synchronization header is detected by the synchronization detection unit, the original synchronization header 4a' is removed to extract the original ciphertext information 3', which is then decrypted with the original key stream 2'to restore the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invented method includes following steps. (1) With the plain text information sent by the sender and based on the pre-stored input information group and the synchronous control information, the algorithm generate for plain text generates the key stream and cipher text information by logic operation. (2) Based on the input synchronous ocntrol information, the synchronous control unit generates the relevant synchronous information, which is added to the cipher text information so as to form the information sent. (3) The sending information through the transparent channel is sent to the receiving party. (4) If the synchronous detection unit at the receiving party has detected the correct synchronous information, then the synchronous information is removed. The cipher text information is picked up, and the synchronous detection information is generated.

Description

Technical field [0001] The present invention relates to a mobile station end encryption method in a mobile communication system, in particular to a mobile station end encryption method suitable for the existing third generation mobile communication (3G) system. Background technique [0002] In the third-generation mobile communication system terminal security application field, the encryption method of the mobile terminal is usually to protect the information transmitted wirelessly from the air, which is the end-to-end encryption from the mobile station (User Equipment) to the base station. See figure 1 Under the existing technical conditions, the information security transmission process of the mobile communication system is as follows: when the calling party makes a call, the transmitted information is first encrypted at the mobile station, and then decrypted at the base station. When transmitted through the core network, the security measures of the core network It is guarant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04L9/18H04W12/041
Inventor 郑志彬谢秀鹏
Owner HUAWEI TECH CO LTD