Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for ciphering wireless mobile terminal communication

A mobile terminal and communication encryption technology, applied in the field of communication, can solve problems such as being unsuitable for the general needs of mobile communication users, not providing a key update and management mechanism, use, deployment, operation, maintenance and operational complexity, etc.

Active Publication Date: 2008-10-01
北京合众思壮时空物联科技有限公司
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the use of SIP signaling control can reduce the reliance on CDMA signaling control, so some data necessary for encryption operations can be transmitted without modifying the existing CDMA network signaling system, but the shortcomings of this method are also obvious
First of all, relying on SIP signaling greatly limits the scope of application. At present, most mobile terminal devices do not support the SIP protocol. Second, this method does not provide a mechanism for identity authentication and key management in the sense of cryptography, let alone prevent active attacks. , the security cannot be guaranteed
[0006] The invention patent "Portable Device with Voice Encryption / Decryption and Its Encryption and Decryption Method" (ZL03153185.7) authorized on July 20, 2005 uses asymmetric encryption algorithms such as DSA and RSA and symmetric encryption algorithms such as DES, but It does not provide a key update and management mechanism, nor can it prevent man-in-the-middle active attacks, and there are serious security vulnerabilities
However, due to the complexity of use, deployment, operation, maintenance and operation, the PKI system is not suitable for the general needs of most mobile communication users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ciphering wireless mobile terminal communication
  • Method for ciphering wireless mobile terminal communication
  • Method for ciphering wireless mobile terminal communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] A specific embodiment of the method is given here, and the specific implementation steps are as follows.

[0064] 1. KGC announces the service number on the website, and selects two additive cyclic groups G1 and multiplicative cyclic group G2 whose order is a prime number p, selects the generator P of G1, hash function Hash, and bilinear map ω: G1×G1→ G2, master key s (KGC should keep s secret), and calculate P pub = sP. Here G1 can be taken as a subgroup on the finite field elliptic curve, and ω is taken as Weil pairing (for Weil pairing, please refer to the literature Shortsignature from the weil paring, Volume 2248 of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp514-532 ).

[0065] KGC publishes public parameters through the website: p, G1, G2, P, hash function Hash, ω, P pub .

[0066] 2. Mobile user registration and private key acquisition: see figure 1 , the process of user registration and key acquisition is as follows, among which, the intera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method of secure communication for a wireless mobile terminal. In the invention, the wireless mobile communication user realizes secure information exchange of terminal to terminal based on the guarantee reliability identity authentication without bearing deployment, maintenance and complex operation of public key infrastructure, without the participation of telecom operator, without replacing or impacting telecom signaling exchange protocol. The mobile communication user uses mobile terminal identity mark as identity, introducing a credible thirst party, named for key generation center, the main function is to help user to generate key according to the identity of user. The user acquires a key corresponding to the identity from the credible third party by mobile phone message or data service. The key guarantees the encryption key exchange and safety parameter between users to negotiate and resist active attack, session key between mobile users is independent to the KGC random generation, realizing the safety communication of terminal to terminal.

Description

technical field [0001] The invention belongs to the field of communication, and relates to information security and communication technology, in particular to a security framework realization technology for secure communication of wireless mobile terminals. Background technique [0002] With the development of communication technology and the popularization of its applications, mobile communication has become a major means of communication. However, the inherent flaws in the infrastructure of telecommunication networks have caused people to pay more and more attention to the security of mobile communications. Although the air interface part of the wireless mobile network (GSM, CDMA) also provides certain encryption capabilities, the air interface encryption technology of GSM has been proven to have serious defects, and monitoring and cracking equipment have already been sold in the market. The so-called secure CDMA air interface encryption technology has also been proved to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04Q7/32
Inventor 陈辉焱吴倩林伯瀚林源赵晨啸
Owner 北京合众思壮时空物联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products