Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for realizing remote cipher key destruction for secret mobile phone

A mobile phone and remote technology, which is applied in the field of remote key destruction, can solve the problem of illegal users eavesdropping on secret calls, and achieve the effect of reducing harm

Inactive Publication Date: 2006-06-28
中电科网络安全科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when the confidential mobile phones at home and abroad are out of control, illegal users may have the opportunity to eavesdrop on the encrypted calls of legal users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] An administrator's confidential mobile phone initiates a remote kill command, and sends a short message with the remote kill command through the signaling channel of the GSM system. The remotely disabled secure mobile phone receives the remote kill command as soon as it is turned on. After receiving the key data, a short message with confirmation signaling will be returned through the signaling channel of the GSM system. At this time, all the confidential data of the user's confidential mobile phone will be cleared, and the confidential mobile phone that has been remotely killed will lose the confidential call function. It is carried out without the knowledge of illegal users who own the mobile phone that has been remotely blocked and kept secret.

Embodiment 2

[0021] The security phone of a certain financial company consists of an administrator security phone and several user security phones. Only the administrator security phone has the authority to initiate a remote kill command. The distinction between the administrator security phone and the user security phone is determined by the smartphone in the security phone. The identification code on the IC card is determined. The administrator's confidential mobile phone inputs the number of the user's confidential mobile phone that is remote-killed, and sends a remote-killing command, that is, sends a short message with the remote-killing command through the signaling channel of the GSM system. After the user's confidential mobile phone receives a short message with a remote kill command, after successfully destroying the key data in the confidential mobile phone, it returns a short message with confirmation signaling through the signaling channel of the GSM system. The short message o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method for realizing far distance cipher key destroy provided by GSM signalling channel. A user group secrete handheld call is divided into two parts: one for the manager and several others for users, the manager one inputs a kill order and sends a short message with the kill order to the out of control user secrete handheld calls via GSM which gets it once switched on to destroy related cryptographic key data at once and sends back code short message about the successive destroy to the manger one via GSM. The whole process is undergone by the unlegal owners of the killed calls which loses secrete session function, finishing the function of automatically destroying cryptographic key data.

Description

Technical field: [0001] The present invention relates to a security technology for a confidential mobile phone, in particular to a method for realizing remote key destruction through a signaling channel provided by the Global System for Mobile Communications (GSM), which can make an out-of-control secure mobile phone lose the function of a confidential call, ensuring security The security of the mobile phone avoids the loss of technical secrets and various commercial secrets. Background technique: [0002] The GSM system is a time-division multiple access digital public cellular mobile communication system. It has successfully designed many methods to protect user rights, including authentication, equipment identification and encryption, etc., to prevent leakage of user identification codes and location information on the air interface. The technical links that provide security management functions mainly include: (1) access networkauthentication; (2) mobile device—device i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/32H04L9/00H04K1/00H04W12/02H04M1/72436H04M1/72463
Inventor 梁鸿斌余海
Owner 中电科网络安全科技股份有限公司