Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for Realizing User Data Security Migration Based on Voice Channel

A technology of user data and voice channel, which is applied in the direction of public key for secure communication, secure communication device, user identity/authority verification, etc., can solve the problems of long-distance transmission, unusable security, and extremely high security requirements, and achieve Occupies less resources, improves security, and reduces the effect of deciphering

Active Publication Date: 2022-03-22
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the field of telephone communication that requires high security, the user data of fixed-line terminals is relatively small, but there is a need for long-distance transmission, and the security requirements in the process are extremely high. Peripherals such as Bluetooth or WIFI or due to distance reasons, or are unavailable due to security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for Realizing User Data Security Migration Based on Voice Channel
  • Method for Realizing User Data Security Migration Based on Voice Channel
  • Method for Realizing User Data Security Migration Based on Voice Channel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to express the present invention more clearly, the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0042] see Figure 1 to Figure 3 A method for implementing secure migration of user data based on a voice channel is applied to data transfer between two device terminals, including a request terminal, a transfer terminal and a broadband voice server, and includes the following steps:

[0043] Establish a connection: the requesting terminal and the transfer terminal use the signaling channel with the broadband voice server to establish a call connection;

[0044]Identity authentication request and verification: the requesting terminal uses the media channel in the call connection to send an identity authentication request to the transfer terminal, and the transfer terminal verifies the identity authentication request to realize the identity authentication and authentication of both parties;

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing safe migration of user data based on a voice channel. A cryptographic system combining symmetric cipher and asymmetric cipher is deployed on a trusted terminal of a secure telephone communication network. Utilize the characteristics of fast encryption and decryption speed, high computing efficiency, and less resource occupation of symmetric ciphers to complete the confidentiality protection of user information; use asymmetric ciphers to calculate the difficulty of discrete logarithms in finite fields to realize the identity authentication of both parties in communication, and at the same time With the help of the complex characteristics of the elliptic curve algorithm, the shared factor of the two parties in the communication is obtained through the point multiplication of the temporary public and private keys, and a one-time secret service data protection key is generated to ensure the forward security of user data; finally, the hash algorithm is used respectively The calculation determinism of the random sequence and the uncertainty of the random sequence solve the integrity protection of the user data during transmission and the anti-replayability of the cryptographic protocol.

Description

technical field [0001] The invention relates to the technical field of data migration, in particular to a method for realizing safe migration of user data based on a voice channel. Background technique [0002] In recent years, with the development of mobile communication technology, the dominance of fixed telephone in the traditional market has been continuously impacted. However, the broadband voice communication platform with the voice exchange server as the core breaks through the restrictions of the network firewall on VoIP technology. It is more in line with the development trend of the new generation network represented by IMS, and plays an irreplaceable role in the field of fixed telephone communication. [0003] In order to meet the diverse needs of users, more and more services are integrated on broadband telephone terminals, such as short messages, memos, private calls, voice assistants, meeting schedules, etc. As an important carrier for storing user informatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/32H04L9/40
CPCH04L9/3066H04L9/3236H04L9/0869H04L63/045H04L65/80H04L65/65
Inventor 张鹤鸣李庚欣杨龙剑李铎许志强李鉴杨宏康敏
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products