Safety data transmission

A technology for secure data and security equipment, applied in the field of secure data transmission, which can solve the problems of weak protection and easy to be cracked.

Inactive Publication Date: 2007-03-07
NOKIA TECH OY
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the protections in the prior art are usually weak and easily cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety data transmission
  • Safety data transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Embodiments of the invention will now be described in detail, examples of which are illustrated in the accompanying drawings.

[0024] Figure 1 illustrates an exemplary embodiment of the method of the present invention. In step 1, a random first symmetric key is generated at the first wireless communication device. Then, the user data of the first wireless communication device is encrypted at the first wireless communication device with the generated first symmetric key (step 2). User data can be encrypted eg as one data block, or can be encrypted on a "file-by-file" basis.

[0025] In step 3, the generated first symmetric key is encrypted at the first wireless communication device with a third party's public key. The public key may have been obtained beforehand and embedded in the first wireless communication device in an integrity-protected manner such that an attacker cannot change or replace the public key. Alternatively, the public key can be introduced external...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention concerns secure data transfer from a first radio communication device of a first party to a second radio communication device. A random first symmetric key is generated at the first terminal device. User data of the first terminal device is encrypted with the first symmetric key. The first symmetric key is encrypted with a public key of a third party. The encrypted first symmetric key is sent from the first terminal device to the second terminal device via a transfer device. The encrypted first symmetric key is decrypted at the second terminal device by utilizing a secret key associated with the public key and comprised in a security device of the third party. The encrypted user data is sent from the first terminal device to the second terminal device via the transfer device. The encrypted user data is decrypted at the second terminal device with the first symmetric key.

Description

technical field [0001] The present invention relates to secure data transmission. In particular, the present invention relates to providing a secure data transmission from a first wireless communication device of a first party to a second wireless communication device in a novel and improved manner, wherein the data transmission will be supervised by the second party's transmitting device. Background technique [0002] In recent years, wireless communication devices such as mobile phones have rapidly incorporated more and more different applications. Applications such as address books, calendars, and notepads are common. Various messaging services such as electronic mail and short message service are commonly available with recent wireless communication devices. As a result, typical wireless communication devices contain increasing amounts of personal user data, such as saved messages, address book entries, calendar entries, and the like. Typically, user data is stored on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L2209/80H04L9/0869H04L9/3271H04L9/321H04W12/06H04W12/033H04W12/043H04W12/041
Inventor N·阿索坎T·海金农
Owner NOKIA TECH OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products