Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information

A technology for authentication information and handheld communication, applied in the field of PHS mobile phones, that is, personal handheld communication system mobile phones, can solve the problems of loss of PHS network operators, undiscovered technical solutions, and undiscovered problems, so as to prevent illegal parallel phenomena and prevent illegal The effect of obtaining and securing benefits

Inactive Publication Date: 2004-11-24
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If someone rewrites the obtained information on other PHS terminals, so that multiple users use the same user number, this will form an illegal parallel phenomenon, which will cause serious harm to real consumers and PHS network operators. great loss
This technical defect is inherent in the design of PHS mobile phones. In the current application, no effective technical solution that can properly solve this problem has been found, and no open technical literature for this specific technical problem has been found.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
  • Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information
  • Encrypting and de-encrypting method for personal hand-held communication system cell phone identification information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0024] figure 1 It is a schematic diagram of the hardware structure of the existing PHS mobile phone. Such as figure 1 As shown, the hardware structure of PHS mobile phone is divided into baseband part and radio frequency part. The baseband circuit is composed of the baseband chip BBIC as the core. The PHS mobile phone program is generally stored in the external memory, that is, stored on FLASH or ROM. The adjustable parameters of the PHS mobile phone are generally stored on the EEPROM. In the prior art, the PHS mobile phone program is in the During the manufacturing process, it is directly stored in ROM (read-only memory) or Flash (flash memory). When the mobile phone is used, the mobile phone program is loaded into SRAM and DRAM to run. The very important authentication information on the PHS mobile phone exists in the EEPROM in the form ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In the present invention, enciphering is referred to number writing method of mobile phone and deciphering is referred to right discrimination of mobile phone. The number writing method includes 1) right discrimination is obtained by mobile phone internal program; 2) cipher key is obtained by mobile phone internal program from specific storage region as cipher key is unique identification corresponding to certain hardware chip of mobile phone, 3) ciphertext of right discrimination information is obtained by using cipher key to carry on enciphering operation to information plain code, and 4) ciphertext is stored in storage of mobile phone.

Description

technical field [0001] The invention relates to a PHS mobile phone, that is, a personal hand-held communication system mobile phone, in particular to a method for processing authentication information of the PHS mobile phone. Background technique [0002] Currently commercial mobile communication systems mainly include CDMA system, GSM system and PHS system. Correspondingly, there are three kinds of mobile terminals: CDMA mobile phone, GSM mobile phone and PHS mobile phone. Parallel usually refers to the situation where more than one mobile phone uses the same mobile phone number. Both CDMA mobile phones and GSM mobile phones use the machine-card separation technology to realize the confidential processing of mobile phone authentication information, which can effectively prevent the occurrence of parallel machines. [0003] However, the currently used PHS mobile phones (commonly known as wireless access handsets, wireless local telephones or PHS) do not use machine-card sep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/28H04L9/32H04W12/03H04W12/06
Inventor 林强陈虎
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products