Secure data transmission links

A technology of secure communication and prime numbers, applied in the field of data communication links of secure links, can solve the problem of not providing non-rejection or anonymous software downloads, etc.

Inactive Publication Date: 2004-06-23
KK TOSHIBA
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the symmetric method requires storage of keys within the termi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure data transmission links
  • Secure data transmission links
  • Secure data transmission links

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] FIG. 1 shows at 10 the general structure of the third generation digital mobile telephone system. In FIG. 1 , a radio mast 12 is connected to a base station 14 , which in turn is controlled by a base station controller 16 . The mobile communication device 18 shown communicates bidirectionally with the base station 14 via a radio or air interface 20, which is the Um interface in GSM (Global System for Mobile Communications) networks and GPRS (General Packet Radio Service) networks, and in CDMA2000 and W -Un interface in CDMA network. Generally, at any one time multiple mobile devices 18 are associated with a given base station that includes multiple radio transceivers to serve these devices.

[0027] Base station controller 16 is coupled to a mobile switching center (MSC) 22 along with a number of other base station controllers (not shown). A plurality of such MSCs are coupled to a gateway MSC (GMSC) 24 which connects the mobile telephone network with a public switched...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of establishing a secure communications link between a mobile terminal and a server, the method comprising retrieving from storage, in the mobile terminal a prime number, p, and generator, g, for a Diffie-Hellman key exchange protocol, generating a positive integer b at the terminal, sending a message including the value of (g<=[b] mod p) from the terminal to the server, determining a shared secret number for the terminal and the server by calculating the value of g<=[ab] mod p, where a is a positive integer, using b and a public value for the server y=g<=[a] mod p at the terminal, and using a, b, g and p at the server, and using the shared secret number to establish the secure communications between the terminal and the server. The method facilitates download of software to a mobile communications system terminal.

Description

technical field [0001] The present invention relates generally to secure communication links for data transmission and, more particularly, to data communication links using asymmetric cryptography to establish a secure link using symmetric cryptography. Background technique [0002] In mobile telephony networks, data transmission is becoming more and more important, especially with regard to standards and technical specifications as devised by the Third Generation Partnership Project (3GPP, 3GPP2) (available at www. This becomes especially important for the so-called 2.5G and 3G (third generation) networks described in .3gpp.org and incorporated herein by reference). [0003] Secure data transmission is important for m-commerce, but in addition, for multimedia entertainment, telemedicine (telle-medicine), upgrade of programmable mobile terminals, upgrade of different wireless standards, etc. It is also important to download and install on the mobile terminal. Reconfigurabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04W12/00
CPCH04L2209/80H04W12/04H04L9/0844H04L9/3297H04L63/12H04W12/10H04W12/35H04W12/61
Inventor 蒂莫西·法恩哈姆尹灿晔
Owner KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products