End-to-end encrypting method and system based on mobile communication network

A technology of mobile communication network and encryption method, which is applied in the field of end-to-end encryption and encryption system, which can solve the problems of inconvenient use, insecurity, and low security level, and achieve the goals of improving security and safety level, reducing costs, and being convenient to use Effect

Inactive Publication Date: 2007-03-07
BEIJING TAIJI UNITED LAB TECH
View PDF2 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these encryption technologies still have information in clear text at the nodes of the core network of the communication system, and their security is low, which cannot meet the high guarantees proposed by the military, government and security departments, and some special users. Security Requirements for Confidentiality
[0003] In order to improve security and realize end-to-end encryption of mobile communications, China Patent Application No. 98108859.7 discloses an end-to-end encryption method. The main content of this method is: the calling party terminal uses random numbers sent from the network to generate encryption Key, the encryption key is sent to the called party terminal through the call setup message, so that the users at both ends can use the same key to encrypt/decrypt the call information during communication, but this invention still ex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end encrypting method and system based on mobile communication network
  • End-to-end encrypting method and system based on mobile communication network
  • End-to-end encrypting method and system based on mobile communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] Referring to Fig. 1-Fig. 3, the present invention provides a kind of end-to-end encryption method based on mobile communication network, and it adopts stream cipher system to carry out end-to-end encryption; Adopt key management center to carry out key management to the whole security system, wherein Including the authentication of encrypted users (terminals), key generation, distribution, update, and key deletion; an encrypted smart card is used as a security module for terminal end-to-end encryption, and the encrypted smart card stores the key held by the terminal and management, generate encryption key stream and / or decryption key stream according to the key distributed by the key management center, and synchronize the encryption and decryption key stream, and obtain the corresponding key from the encrypted smart card by the processing unit of the terminal stream, and perform encryption / decryption operations of plaintext / ciphertext voice or data information.

[0013]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to end to end coding method and system based on mobile communication network, which comprises the following steps: adopting codes end to end coding and adopting key management center for whole codes system and adopting keys intelligent cards as terminal end to coded safety module; according to center generating codes flow and decodes flow through or formula on messages and codes to realize end to end coding communication; the said system comprises key management center and terminal interact through center to terminal end with intelligent card.

Description

technical field [0001] The invention relates to an end-to-end encryption method based on a mobile communication network, and also relates to an encryption system adopting the method, which belongs to the field of mobile communication. Background technique [0002] In the existing mobile communication system, whether it is a public mobile communication system or a professional mobile communication system, encryption technology exists. For example, security functions such as authentication and air interface encryption are defined in the GSM system and TETRA standards to solve the security problems of the wireless access part of the system. Network domain security is also defined in the 3G standard, so that the core of mobile communication The nodes between the networks can safely exchange signaling data, that is, to ensure the safe exchange of data between entities of the mobile communication core network. However, these encryption technologies still have information in clear...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04L9/32H04W12/02H04W12/041H04W12/0431H04W12/0433
Inventor 张文斌李晖王健
Owner BEIJING TAIJI UNITED LAB TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products