Device and its method for end-to-end enciphering and deenciphering in clony system

A trunking system, end-to-end technology, applied in transmission systems, selection devices, digital transmission systems, etc., can solve the problems of call delay and low security.

Inactive Publication Date: 2005-08-03
HISENSE +1
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to solve the shortcomings of call delay and low security when encrypting in the current trunking system, and provide a new device and method for end-to-end encryptio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and its method for end-to-end enciphering and deenciphering in clony system
  • Device and its method for end-to-end enciphering and deenciphering in clony system
  • Device and its method for end-to-end enciphering and deenciphering in clony system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Example 1, such as Figure 5 As shown, the encryption module is connected with the cluster mobile terminal through UART bus communication; the processor in the encryption module ED adopts a special chip, and the communication mode between the encryption module and the core processor CPU in the mobile terminal device adopts the form of UART serial bus, and the interface The definitions are represented in the diagram, where signal and power lines are defined as follows:

[0050] TX: the signal line for the encryption module to send data,

[0051] RX: the signal line for the encryption module to receive data,

[0052] Vcc: power line,

[0053] Gnd: ground wire.

[0054] The transmission of encrypted data between the mobile station and the hardware encryption module ED will be realized by serial port, which will include detection verification and a series of signaling control transmission. data transfer rate.

Embodiment 2

[0055] Embodiment 2, as shown in FIG. 6 , is that the encryption module is connected to the trunking mobile terminal through a SIM card. The feature of SIM card encryption is that it is convenient for users to change the encryption algorithm, and the space occupied by the SIM card in the mobile phone is relatively small. The interface of the SIM card adopts the ISO7816 standard, so the hardware interface of the encryption module using this method is defined in Shown in Figure 6. The various signal lines and power lines defined therein are as follows:

[0056] Vcc: power line,

[0057] Gnd: ground wire,

[0058] Rst: reset signal line,

[0059] I / O: bidirectional transmission data line,

[0060] Clk: clock signal line.

[0061] The SIM card chip itself is also very characteristic in terms of security. It has hardware protection and software protection measures. In terms of hardware, it can prevent illegal users from using physical friction to obtain the logical information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method and a device for realizing end-to-end ciphering in a cluster communication system, which adds a cryptographic key management center responsible for generating, distributing and managing cryptographic keys and adds a user ciphered module responsible for ciphering and de-ciphering user phonetic and data contents and applies a symmetric cryptographic key mode to ask the two communication sides use the ciphered modules with the same chips or modules and secures the same cryptographic key and guarantees meeting the requirement of even more safety and secrecy for special users.

Description

technical field [0001] The invention belongs to the technical field of trunking communication, and more specifically relates to a technology for encrypting and decrypting in a trunking communication system. Background technique [0002] Trunking communication is one of the most effective means to realize command and dispatch communication in mobile, and it is also one of the most important communication methods for command and dispatch. It is a multi-purpose, high-efficiency mobile communication system that shares resources, shares costs, and provides users with excellent services. [0003] With the maturity of the technology, the trunking communication system is more and more widely used, and can be applied to the command system of intelligent transportation, rescue operations of various natural disasters, airport civil aviation, and urban subways. Especially in anti-terrorism or military exercises it is even more important. Among the various performances of cluster commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04Q7/28
Inventor 魏崇毓朱路阳蒋安泉周春林邵东志
Owner HISENSE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products