Method and system in a digital wireless data communication network for arranging data encryption and corresponding server
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A data encryption and server technology, applied in the field of [0006], can solve problems such as implementation trouble, and achieve the effects of reduced data transmission, high security level, and simple implementation
Inactive Publication Date: 2010-08-11
NOKIA CORP
View PDF5 Cites 3 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
That's why the encryption method given in this publication is suitable only in communication between two parties, or at least in communication between multiple parties, whose implementation is very laborious in terms of business, e.g. due to the constant query of the encryption key
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0038] Figure 1 is a schematic diagram of an example of an embodiment of a system according to the invention. The system and method according to the present invention involves arranging data encryption in a digital wireless data communication network 10, 11 according to a one-time pad encryption model. The data communication network 10, 11 may be a wired network, such as an IP network (eg Internet, Intranet, Local Area Network), or wireless (eg WLAN, CDMA, TDMA, FDMA, Bluetooth).
[0039] The data communication network 10, 11, wireless in the case shown as an example, comprises at least two terminal devices A-D communicating with each other, wherein one terminal device A is used at least as a transmitter and the other terminal device B is used at least as a receiver machine. The communication between the terminal devices A, B may eg be directly in a data format, such as SMS messages, or e-mail, or indirectly in a data format, such as encoded speech.
[0040] Furthermore, the...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention relates to an encrypted method and system of the digital wireless data communication networks (10, 11) for encrypting the data encryption to one-time pad, which is characterized in that: the data communication networks (10, 11) comprise at least two terminal devices (A, B), terminal devices (A, B) are used for managing the index encrypted key (S_N) set, wherein, the first terminal equipment (A) is at least an engine, and the second terminal equipment (B) is at least a receiver. The data encryption is suitable for grading processing in the first terminal equipment, wherein, the encrypted key index (N) (302-306, 702) is selected, the encryption key defined by the selected encrypted key index (N) is utilized to encrypt (308, 704) for the data wait for sending, and is used to send the encrypted data (RM) to the second terminal equipment (B) (309, 705), wherein, the encrypted data (RM) (401, 706) is received on the second terminal equipment (B), and the key (S_N) indicated bythe selected encrypted key index (N) is utilized to decrypt (404, 709) the encrypted data (RM). The encrypted key index (N) except the encrypted data (RM) is sent to the terminal equipment (B). The data communication networks (10, 11) also comprise a particular server terminal equipment (13.1) which is planned into a management index encrypted key (S_N) set and is distributed to the terminal devices (A, B). The invention also relates to a piece of corresponding server terminal equipment (13.1).
Description
technical field [0001] The present invention relates to a method for arranging data encryption as a one-time pad garbled encryption method in a digital wireless data communication network, wherein the data communication network includes at least two terminal devices, the terminal devices are used to control the index encryption key set, and the first in the terminal device A terminal device is at least a transmitter, a second terminal device is at least a receiver, and data encryption is suitably performed in stages in the first terminal device, wherein [0002] - select the encryption key index, [0003] - encrypt the data to be sent by encrypting the data to be sent with the encryption key defined with the selected encryption key index, and [0004] - Send encrypted data to the second terminal device [0005] and correspondingly in the second terminal device [0006] - receive encrypted data, and [0007] - Decrypt the encrypted data by using the selected key indicated b...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.