Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic password configuration based mobile communication method and system

A mobile communication system and a dynamic password technology are applied in the field of mobile communication methods and systems based on dynamic password configuration, and can solve problems such as information leakage and inability to resist decryption means.

Inactive Publication Date: 2010-11-24
WUHAN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the device is lost, information will be leaked, even encrypted files cannot resist various decryption methods, and the loss will be immeasurable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password configuration based mobile communication method and system
  • Dynamic password configuration based mobile communication method and system
  • Dynamic password configuration based mobile communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The mobile communication method based on dynamic password configuration provided by the present invention specifically adopts the following technical solutions.

[0043] Such as figure 1 As shown, the method includes:

[0044] Step 1: The client enters the user name, password, and device number to log in, and the server responds to the client's login to determine whether it is a legal user.

[0045] Step 2: The client sends a session request to the server, and the server returns a list of online users of the client.

[0046] Step 3: The client selects users who need a session in the online user list, and submits the selected user list to the server.

[0047] Step 4: The client performs key negotiation with the selected session user to generate the control key and encryption key for this session. At the same time, these users form a conversation group. The server records the group number, group members, session control key and encryption key of this session.

[0048...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of mobile communication information safety, in particular to dynamic password configuration based mobile communication method and system. In the invention, a dynamic password algorithm is applied to communication with higher requirement on secrecy so as to ensure the safety of conversions and file content; and an application program is implanted to embedded equipment, thereby achieving convenient use and strong mobility and better facilitating an access network and other equipment. In the invention, a dynamic S-box generation algorithm based on evolution calculation and an AES algorithm are combined to encrypt message content and large transmitted files in a communication process; an identity authentication system is applied to prevent lawless persons from logging in the system; and the establishment of a software communication platform is completed based on the communication protocol of a TCP protocol, which has positive and beneficial technical effects as communication software.

Description

technical field [0001] The invention relates to the technical field of mobile communication information security, in particular to a mobile communication method and system based on dynamic password configuration. Background technique [0002] Mobile portable devices are becoming more and more popular, and their application scope is wider and wider. Some of these applications involve secret information, such as storing important confidential documents and conveying important messages. Such devices require high security and reliability. sex. Once the device is lost, information will be leaked. Even encrypted files cannot resist various decryption methods, and the loss will be immeasurable. How to design a good encryption algorithm is very important. [0003] At present, there are many encryption strategies based on mobile terminals at home and abroad, which can be roughly divided into the following methods: [0004] 1. Increase the safety factor through the algorithm itself...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04L29/06H04L9/06H04W12/0431H04W12/06
Inventor 唐明伍前红张欣雨闵震宇翟壮李杭斌
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products