Protection of authentication information of PHS mobile telephone

A technology for authenticating information and mobile phones, applied in wireless communication, secure communication devices, user identity/authority verification, etc., can solve problems such as loss of PHS network operators, undiscovered technical solutions, undiscovered problems, etc., to prevent illegal paralleling phenomenon, preventing illegal acquisition, and the effect of good compatibility

Inactive Publication Date: 2004-12-08
ZTE CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If someone rewrites the obtained information on other PHS terminals, so that multiple users use the same user number, this will form an illegal parallel phenomenon, which will cause serious harm to real consumers and PHS network operators. great loss
This technical defect is inherent in the design of PHS mobile phones. In the current application, no effective technical solution that can properly solve this problem has been found, and no open technical literature for this specific technical problem has been found.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection of authentication information of PHS mobile telephone
  • Protection of authentication information of PHS mobile telephone
  • Protection of authentication information of PHS mobile telephone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] figure 1 It is a schematic diagram of the hardware structure of the existing PHS mobile phone. Such as figure 1 As shown, the hardware structure of PHS mobile phone is divided into baseband part and radio frequency part. The baseband circuit is composed of the baseband chip BBIC as the core. The PHS mobile phone program is generally stored in the external memory, that is, stored on FLASH or ROM. The adjustable parameters of the PHS mobile phone are generally stored on the EEPROM. In the prior art, the PHS mobile phone program is in the During the manufacturing process, it is directly stored in ROM (read-only memory) or Flash (flash memory). When the mobile phone is used, the mobile phone program is loaded into SRAM and DRAM to run. The very important authentication information on the PHS mobile phone exists in the EEPROM in the form ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for protecting authentication information stored in PHS mobile phone includes following steps: 1) the write terminal writes the authentication information into the memory of mobile phone at normal procedure; 2) the PHS mobile phone makes encryption for the plaintext of authentication information as making first authentication, and replaces the information plaintext by cryptograph of authentication information; 3) makes decryption, when the PHS mobile phone starts up, makes decryption operation for the authentication cryptograph. When making encryption and decryption, an encryption key and a decryption key in key pair that is only corresponding to a certain chip in mobile phone are used. The method can be farthest compatible with current write phone number method of PHS mobile phone, and can prevent the authentication information from illegally stealing.

Description

technical field [0001] The invention relates to a PHS mobile phone, in particular to a method for protecting authentication information of a PHS mobile phone. Background technique [0002] Currently commercial mobile communication systems mainly include CDMA system, GSM system and PHS system. Correspondingly, there are three kinds of mobile terminals: CDMA mobile phone, GSM mobile phone and PHS mobile phone. Parallel usually refers to the situation where more than one mobile phone uses the same mobile phone number. Both CDMA mobile phones and GSM mobile phones use the machine-card separation technology to realize the confidential processing of mobile phone authentication information, which can effectively prevent the occurrence of parallel machines. [0003] However, the PHS mobile phones currently in use (commonly known as wireless access handsets, wireless local telephones or PHS) do not use machine-card separation technology, but use number writers to directly write sens...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04L9/00H04L9/32H04W12/03H04W12/06H04W12/30
Inventor 林强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products