CN110752920A - User management method and management card for distributed network mobile phone - Google Patents

User management method and management card for distributed network mobile phone Download PDF

Info

Publication number
CN110752920A
CN110752920A CN201911012138.2A CN201911012138A CN110752920A CN 110752920 A CN110752920 A CN 110752920A CN 201911012138 A CN201911012138 A CN 201911012138A CN 110752920 A CN110752920 A CN 110752920A
Authority
CN
China
Prior art keywords
mobile phone
network
distributed
communication
network mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911012138.2A
Other languages
Chinese (zh)
Inventor
曹希同
赵东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongren Information Technology Co Ltd
Original Assignee
Shenzhen Zhongren Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongren Information Technology Co Ltd filed Critical Shenzhen Zhongren Information Technology Co Ltd
Priority to CN201911012138.2A priority Critical patent/CN110752920A/en
Publication of CN110752920A publication Critical patent/CN110752920A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/06Simultaneous speech and data transmission, e.g. telegraphic transmission over the same conductors
    • H04M11/066Telephone sets adapted for data transmision
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities

Abstract

A user management method and a management card for a distributed network mobile phone relate to the field of distributed network phones. Public key and private key can be obtained from the management card of the distributed network mobile phone, and the public/private key pair is stored in the flash of the phone; the public key is used as the unique equipment ID identification of the mobile phone, and is simultaneously broadcast to all network mobile phone nodes in the distributed network for addressing and node communication information encryption, and the user node checks the encrypted communication information by means of the private key; the management card acquires the IP of the network, calculates the network IP and the equipment ID of the mobile phone, generates a random number as the random addressing address IP of the network mobile phone, stores the changed numerical value of the random addressing address IP as a distributed addressing parameter in the nodes participating in network communication to form a distributed addressing parameter table, and stores the distributed addressing parameter table in the network nodes in a distributed manner.

Description

User management method and management card for distributed network mobile phone
Technical Field
The present invention relates to the field of distributed network telephones, and more particularly, to a distributed network mobile telephone (DHP) user management method and management card.
Background
A distributed network is formed by interconnecting node machines that are distributed at different locations and have multiple terminals. Any point in the network is connected with at least two lines, when any line has a fault, communication can be completed through other links, and the reliability is high. At the same time, the network is easily scalable. Therefore, it becomes a topology structure commonly used in the wide area network, the application range is wider and wider, and the mobile communication using the distributed network is mature, but the telephone is currently used as a management object as a communication system.
In the distributed network communication system, the inventor has found through analysis that if the user identification information and the operation unit can be made in the management card, the management card and the distributed network mobile phone can be separated, and the distributed mobile phone has universality.
To this end, the inventor intends to develop a network mobile phone user management method, which is to provide a management card and an application method thereof to a distributed network mobile phone (DHP) dedicated user so as to manage the user using the distributed network mobile phone.
Disclosure of Invention
In order to solve the above problems, the present invention provides a method for managing a user of a distributed network mobile phone and a management card thereof, so as to separate the management card from the distributed network mobile phone and make the distributed network mobile phone have universality.
The invention provides a distributed network mobile phone user management card, which comprises three parts: the device comprises an arithmetic unit with a storage function, a data bus, a power line and a ground line, wherein an asymmetric encryption algorithm program is stored in a ROM in the arithmetic unit. When the management card is installed in the mobile telephone set, the user management card can obtain power supply from the telephone set through the power line, and at the moment, the asymmetric encryption algorithm in the ROM in the operation unit can be called into the RAM of the MCU to start operation, and a public key and a private key are obtained. The public key can be used as a unique device ID identification of the mobile phone, and the private key can enable a user node where the management card is located to view encrypted communication information.
The invention also provides a user management method of the distributed network mobile phone applying the user card, which comprises the following steps:
step 1: obtaining a public key and a private key from a management card of a distributed network mobile phone, and storing the public/private key pair into a flash of the distributed mobile phone;
step 2: the public key is used as the unique equipment ID identification of the mobile phone, and is simultaneously broadcast to all network mobile phone nodes in the distributed network for addressing and node communication information encryption, and the user node checks the encrypted communication information by means of the private key;
and step 3: the management card of the distributed network mobile phone is accessed to the network to obtain the IP of the network, the network IP and the equipment ID of the mobile phone are operated to generate a random number as the random addressing address IP of the network mobile phone, the value of the random addressing address IP can randomly change along with the position of the network mobile phone, all the changed values are stored in nodes participating in network communication as distributed addressing parameters to form a distributed addressing parameter table, and the distributed addressing parameter table is distributed and stored in network nodes.
Further, when the method is used for communication, the network mobile phone A firstly sends a call request to the network mobile phone B, and the following operations are carried out at the moment:
s1: if the communication opposite end B and the call initiating end A are detected to be under the same IP, the equipment ID (public key) of the opposite end B is directly found out to send a findnode request instruction, and if the instruction is received by the B, the response module returns a state value to the A, and the A and the B establish network connection. If A does not receive the return state value of B, then B is judged to be in an off-line state, and the communication connection request is cancelled. If the opposite communication end is offline in the distributed network communication, the communication connection can not be established. In communication, information sent by A to B is encrypted by the public key of B, and B looks for the private key of B, or vice versa.
S2: if the communication opposite terminal B and the call initiating terminal A are detected not to be under the same IP, the call initiating terminal A sends a findnode request, the request starts to search all dynamic random addressing parameters IP of the communication opposite terminal B from a node closest to the call initiating terminal A, and after the request is received by the call initiating terminal A, a response module returns a state value to the call initiating terminal A, and the call initiating terminal A and the call initiating terminal B establish connection. If A searches all nodes and does not get the response of B, then it is determined that B is in off-line state and the communication request is cancelled.
The invention has the advantages that by means of the technical scheme, the separation of the management card and the distributed network mobile phone can be realized, so that the distributed mobile phone has universality and better customer experience can be provided.
Drawings
FIG. 1 is a schematic diagram of a user management method and a management card for a distributed network mobile phone according to the present invention.
FIG. 2 is a flow chart of a distributed network mobile phone subscriber management method of the present invention.
Fig. 3 is a flow chart of a distributed network mobile phone user management method of the present invention when used for communication.
Wherein:
GND ground wire VCC power supply
SOA data bus
The MCU + RAM + ROM is an arithmetic unit with a storage function.
Detailed Description
The technical scheme of the invention is further specifically described by the following embodiments and the accompanying drawings.
As shown in fig. 1, the network mobile phone management card is composed of three parts: the device comprises an arithmetic unit (MCU) with a storage function, a data bus SOA, a power supply VCC line and a ground wire GND.
Referring to fig. 2, the operation of one embodiment of the present invention is as follows:
1. the management card is installed in the distributed network mobile phone, and power is supplied to the management card through a power line.
And 2, calling the asymmetric encryption algorithm in the ROM in the MCU arithmetic unit into the RAM of the MCU to start running.
The source code of the asymmetric encryption algorithm of the embodiment is shown at the end of the specification.
3. The operation result obtains a public key and a private key, and the public/private key pair is stored in the flash of the distributed mobile phone and can be stored permanently. This public key serves as the unique device ID identification for the mobile phone and is broadcast to all network mobile phone nodes in the distributed network simultaneously for addressing and node communication information encryption. And the user node may view the encrypted communication with the private key.
3. The distributed network mobile phone management card is connected with a network to obtain the IP of the network, the network IP and the equipment ID of the mobile phone are calculated to generate a random number as a random addressing address IP of the network mobile phone, the value of the IP can randomly change along with the position of the network mobile phone, the changed value is stored in a node participating in network communication as a distributed addressing parameter to form a distributed addressing parameter table, and the table is distributed and stored in the network node.
4. Connection of communication:
referring to fig. 3, the network mobile phone a issues a call request to the network mobile phone B:
4.1 if detecting that the communication opposite end B and the call initiating end A are under the same IP, directly finding the equipment ID (public key) of the opposite end B to send a findnode request instruction, if the instruction is received by the B, the response module returns a state value to the A, and the A and the B establish network connection. If A does not receive the return state value of B, then B is judged to be in an off-line state, and the communication connection request is cancelled. If the opposite communication end is offline in the distributed network communication, the communication connection can not be established. In communication, information sent by A to B is encrypted by the public key of B, and B looks for the private key of B, or vice versa.
4.2 if it is detected that the opposite communication terminal B and the call initiating terminal A are not under the same IP, the call initiating terminal A sends a findnode request, the request starts to search all the dynamic random addressing parameters IP of the opposite communication terminal B from the nearest node, and after the request is received by the B, the response module returns a state value to the A, and the A and the B establish connection. If A searches all nodes and does not get the response of B, then it is determined that B is in off-line state and the communication request is cancelled.
Asymmetric encryption algorithm source code:
Figure BDA0002244522540000051
Figure BDA0002244522540000061
although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the invention.

Claims (4)

1. A method for managing users of a distributed network mobile phone, comprising the steps of:
step 1: obtaining a public key and a private key from a management card of a distributed network mobile phone, and storing the public/private key pair into a flash of the distributed mobile phone;
step 2: the public key is used as the unique equipment ID identification of the mobile phone, and is simultaneously broadcast to all network mobile phone nodes in the distributed network for addressing and node communication information encryption, and the user node checks the encrypted communication information by means of the private key;
and step 3: the management card of the distributed network mobile phone is accessed to the network to obtain the IP of the network, the network IP and the equipment ID of the mobile phone are operated to generate a random number as the random addressing address IP of the network mobile phone, the value of the random addressing address IP can randomly change along with the position of the network mobile phone, all the changed values are stored in nodes participating in network communication as distributed addressing parameters to form a distributed addressing parameter table, and the distributed addressing parameter table is distributed and stored in network nodes.
2. The method of claim 1, when the method is applied to a communication request from a network mobile phone A to a network mobile phone B, comprising the steps of:
s1: if the communication opposite end B and the call initiating end A are detected to be under the same IP, the equipment ID (public key) of the opposite end B is directly found out to send a findnode request instruction, and if the instruction is received by the B, the response module returns a state value to the A, and the A and the B establish network connection. If A does not receive the return state value of B, then B is judged to be in an off-line state, and the communication connection request is cancelled. If the opposite communication end is offline in the distributed network communication, the communication connection can not be established. In communication, information sent by A to B is encrypted by the public key of B, and B looks for the private key of B, or vice versa.
S2: if the communication opposite terminal B and the call initiating terminal A are detected not to be under the same IP, the call initiating terminal A sends a findnode request, the request starts to search all dynamic random addressing parameters IP of the communication opposite terminal B from a node closest to the call initiating terminal A, and after the request is received by the call initiating terminal A, a response module returns a state value to the call initiating terminal A, and the call initiating terminal A and the call initiating terminal B establish connection. If A searches all nodes and does not get the response of B, then it is determined that B is in off-line state and the communication request is cancelled.
3. A distributed network mobile phone user management card is applied to any one of the above distributed network mobile phone user management methods, and is characterized in that the network mobile phone management card is composed of three parts: the device comprises an arithmetic unit with a storage function, a data bus, a power line and a ground line, wherein an asymmetric encryption algorithm program is stored in a ROM in the arithmetic unit.
4. A distributed network mobile phone subscriber management card according to claim 3, wherein: when the management card is loaded in the mobile telephone set, the user management card is powered on, the asymmetric encryption algorithm in the ROM in the operation unit is called into the RAM of the MCU to start running, and a public key and a private key are obtained.
CN201911012138.2A 2019-10-23 2019-10-23 User management method and management card for distributed network mobile phone Pending CN110752920A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911012138.2A CN110752920A (en) 2019-10-23 2019-10-23 User management method and management card for distributed network mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911012138.2A CN110752920A (en) 2019-10-23 2019-10-23 User management method and management card for distributed network mobile phone

Publications (1)

Publication Number Publication Date
CN110752920A true CN110752920A (en) 2020-02-04

Family

ID=69279494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911012138.2A Pending CN110752920A (en) 2019-10-23 2019-10-23 User management method and management card for distributed network mobile phone

Country Status (1)

Country Link
CN (1) CN110752920A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163724A1 (en) * 2002-02-27 2003-08-28 Amad Tayebi Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
WO2009132446A1 (en) * 2008-05-02 2009-11-05 Toposis Corporation Systems and methods for secure management of presence information for communications services
CN106911513A (en) * 2016-12-14 2017-06-30 中国电子科技集团公司第三十研究所 A kind of credible equipment management method based on decentralization network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163724A1 (en) * 2002-02-27 2003-08-28 Amad Tayebi Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
WO2009132446A1 (en) * 2008-05-02 2009-11-05 Toposis Corporation Systems and methods for secure management of presence information for communications services
CN106911513A (en) * 2016-12-14 2017-06-30 中国电子科技集团公司第三十研究所 A kind of credible equipment management method based on decentralization network

Similar Documents

Publication Publication Date Title
US10630825B2 (en) System and method for registering an IP telephone
US8073110B2 (en) System and method for location identification
CN108924274B (en) Domain name system DNS processing method and device, storage medium and electronic equipment
CN107566233B (en) Resource sharing method and device for household electrical appliance
KR20120046547A (en) The method of determining group owner in peer to peer network and the device thereof
CN105472430A (en) Method of making mobile terminal ring through intelligent television, equipment and system thereof
WO2005033837A3 (en) A system and method for facilitating packetized calls between managed networks
CN105959188B (en) Method and device for controlling user terminal to be on-line
US20110069701A1 (en) Gateway and method for processing packets utilized thereby
CN105141789A (en) Strange number marking method and device
CN112217653B (en) Strategy issuing method, device and system
JPWO2008007693A1 (en) Mobile phone device and incoming call history creation method used therefor
CN101925158A (en) System and method for obtaining number detail
CN102208988A (en) Message processing method, system and equipment thereof
CN105281923A (en) Video conference call implementing method and device based on user identifier
CN110752920A (en) User management method and management card for distributed network mobile phone
CN101543013B (en) Communication system
US8498400B2 (en) Method and system for implementing number portability service
JP2011041245A (en) Dialing plan analysis and cleanup
CN110784510A (en) Method for accessing target service node to bus and information interaction method of service node
WO2018161827A1 (en) Address self-learning method and device, and switch
EP2394410B1 (en) Auto-configured voice over internet protocol
CN110769462B (en) Network access control method and device
CN104994116A (en) Method, device and system for multi-screen unified communication
US7149301B2 (en) Repeating device, telephone set, and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20230616