Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification-based encryption system

An identity and public key technology, applied in transmission systems, digital transmission systems, public keys for secure communication, etc., can solve problems such as uncomfortable communication

Inactive Publication Date: 2007-07-04
MOTOROLA INC
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is only suitable for communication between the network and the mobile phone, not between different users of the mobile phone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification-based encryption system
  • Identification-based encryption system
  • Identification-based encryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Before describing in detail embodiments according to the present invention, it should be noted that embodiments reside primarily in combinations of method steps and in apparatus components related to the activation and deactivation of the restricted service provider mode in an electronic device. Accordingly, apparatus components and method steps are reproduced using conventional symbols in the drawings and only those specific details that are relevant to an understanding of the embodiments of the invention are shown so as not to overwhelm those of ordinary skill in the art with the general knowledge described herein. Bright details obscure the disclosure.

[0016] In this document, relational terms such as first and second, top and bottom, etc., may be used solely to distinguish one entity from another, or one action from another, without requiring or implying any relationship between these entities or actions. Any actual such relationship or sequence. The term "compri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to an identity-based encryption system. The invention provides the method (300) to exchange information safely by unsafe communication system, and which provides the electronic equipment (100) for implementing the method (300).This method makes sure (320) the identifier associated to the expected recipient of user's information, and then which uses a generation process of identity-based encryption function and identified identifier to generate (330) an encryption function related to the expected recipient based on identity. Next, the method decrypts (340) the user's information by using identity-based encryption function, and then which transports messaging (350) to the expected recipients by the decrypted user.

Description

technical field [0001] The present invention relates to the encryption and decryption of messages sent over a public network such as a mobile telephone network or the Internet. Background technique [0002] Communication systems in which security is provided for messages sent over public or non-secure networks generally apply public key cryptography, wherein the sender requests a public key from the intended recipient and encrypts the message using the received public key. When an encrypted message is received by recipients, they are able to decrypt the message using their corresponding private or secret key. This form of cryptography is typically used to secure Internet-based communications. [0003] In a mobile telephony network, the network and the mobile phone typically share a secret key that they use to encrypt and decrypt communications between them over the air interface. Generally, a mobile phone receives a secret key from an inserted SIM or RUIM card. However, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/10H04L9/14H04L9/30
Inventor 吴松朱宇
Owner MOTOROLA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products