Device and its method for end-to-end enciphering and deenciphering in clony system
A trunking system, end-to-end technology, applied in transmission systems, selection devices, digital transmission systems, etc., can solve the problems of call delay and low security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] Example 1, such as Figure 5 As shown, the encryption module is connected with the cluster mobile terminal through UART bus communication; the processor in the encryption module ED adopts a special chip, and the communication mode between the encryption module and the core processor CPU in the mobile terminal device adopts the form of UART serial bus, and the interface The definitions are represented in the diagram, where signal and power lines are defined as follows:
[0050] TX: the signal line for the encryption module to send data,
[0051] RX: the signal line for the encryption module to receive data,
[0052] Vcc: power line,
[0053] Gnd: ground wire.
[0054] The transmission of encrypted data between the mobile station and the hardware encryption module ED will be realized by serial port, which will include detection verification and a series of signaling control transmission. data transfer rate.
Embodiment 2
[0055] Embodiment 2, as shown in FIG. 6 , is that the encryption module is connected to the trunking mobile terminal through a SIM card. The feature of SIM card encryption is that it is convenient for users to change the encryption algorithm, and the space occupied by the SIM card in the mobile phone is relatively small. The interface of the SIM card adopts the ISO7816 standard, so the hardware interface of the encryption module using this method is defined in Shown in Figure 6. The various signal lines and power lines defined therein are as follows:
[0056] Vcc: power line,
[0057] Gnd: ground wire,
[0058] Rst: reset signal line,
[0059] I / O: bidirectional transmission data line,
[0060] Clk: clock signal line.
[0061] The SIM card chip itself is also very characteristic in terms of security. It has hardware protection and software protection measures. In terms of hardware, it can prevent illegal users from using physical friction to obtain the logical information...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com