CN1262132C - Method for realizing remote cipher key destruction for secret mobile phone - Google Patents

Method for realizing remote cipher key destruction for secret mobile phone Download PDF

Info

Publication number
CN1262132C
CN1262132C CN02128103.3A CN02128103A CN1262132C CN 1262132 C CN1262132 C CN 1262132C CN 02128103 A CN02128103 A CN 02128103A CN 1262132 C CN1262132 C CN 1262132C
Authority
CN
China
Prior art keywords
mobile phone
distant
getting killed
secret
secret mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN02128103.3A
Other languages
Chinese (zh)
Other versions
CN1512799A (en
Inventor
梁鸿斌
余海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Westone Information Industry Inc
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN02128103.3A priority Critical patent/CN1262132C/en
Publication of CN1512799A publication Critical patent/CN1512799A/en
Application granted granted Critical
Publication of CN1262132C publication Critical patent/CN1262132C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention discloses a method for realizing remotely destroying a key through a signaling channel provided by the global system for mobile communication (GSM), which comprises: the secure mobile phones of a user group are composed of an administrator secure mobile phone and a plurality of user secure mobile phones, a remote killing command is input into the administrator secure mobile phone, and a short message with the signals of the remote killing command is sent to one or a plurality of user secure mobile phones which are already out of control through the signaling channel of the GSM; once each user secure mobile phone is started, the secure mobile phone can receive the remote killing command, instantly destroy corresponding key data, and return a short message with the information codes of successfully destroying the key data to the administrator secure mobile phone through the signaling channel of the GSM; the whole remote killing process is carried out under the condition that the invalid user of the secure mobile phone which is remotely killed knows nothing about the process, and the encrypted conversation function of each of the secure mobile phones which are out of control is lost through remote killing, so that the process of automatically destroying key data is completed, the harm of each secure mobile phone under the condition of being out of control to the system is lowered, and the security of each secure mobile phone is ensured.

Description

A kind of secret mobile phone is realized the method for remote cipher key destruction
Technical field:
The present invention relates to a kind of safe practice of secret mobile phone, particularly a kind of signaling channel that provides by global system for mobile communications (GSM) is realized the method for remote cipher key destruction, it can make secret mobile phone out of control lose the secret telephony function, guarantee the fail safe of secret mobile phone, avoided the loss of know-how and various business secrets.
Background technology:
Gsm system is a kind of digital tdma public cell mobile communication systems, and it has successfully designed thousand and one way protection authority of a user, comprises authentication, recognition of devices and encryption etc., prevents aloft interface leak user identification code and positional information.Provide the sport technique segment of safety management function to mainly contain: (1) access network-authentication; (2) mobile device-recognition of devices; (3) wireless path-encryption; (4) international mobile subscriber identity IMSI-temporary user identifier TMSI.Method according to the protection authority of a user of above gsm system design; can see; though gsm system provides a cover network security management function, its safety function is imperfect and halfway, can not realize between mobile phone that speech information is encrypted end to end.Communicate by letter for making Party and government organs, financial industry and enterprises and institutions can utilize GSM mobile handset to carry out the secure digital secure voice, calendar year 2001, Chengdu Westone limited company has succeeded in developing the GSM secret mobile phone, the non-voice channel that this mobile phone utilizes gsm system to provide is realized numeric security Speech Communication end to end, is adapted at using on the domestic and international existing GSM cell mobile communication systems.
Secret mobile phone also has control special when secure communication, identification and processing capacity except that all functions with GSM mobile handset.Secret mobile phone comprises the piece of touching that the module that realizes the regular handset function and realization secure voice communicate by letter, the module of realization secure voice communication mainly partly is made up of voice codec, encryption and decryption device, data-interface, system's control and key management, intellective IC card etc., finishes the enciphering/deciphering of speech and handles.
Secret mobile phone is when providing the secure voice communication service for the user, and himself also may be subjected to the attack of following various potential threats: as the disabled user privately the steal secret mobile phone, snatch password or distort cryptographic algorithm in the machine and association key etc.Though when the development secret mobile phone, in safety Design, taked corresponding measure, as encryption storage of identity card, key message etc., but because secret mobile phone belongs to portable set, if (as losing) out of control, the disabled user equally can have an opportunity to intercept the encrypted word of validated user.At present, secret mobile phone both domestic and external all exists under the out-of-control condition, and the disabled user has an opportunity to intercept the danger of the encrypted word of validated user.
Summary of the invention:
The objective of the invention is to provide on the basis of existing technology a kind of signaling channel that provides by global system for mobile communications (GSM) to carry out the method for remote cipher key destruction (distant getting killed), guaranteed that secret mobile phone is under definite situation out of control, can destroy all key datas, make secret mobile phone out of control lose the encrypted word function, reduced the harm that secret mobile phone causes system safety under situation out of control.
Concrete technical scheme of the present invention is as follows:
Secret mobile phone of the present invention comprises: keeper's secret mobile phone and some user cipher device mobile phones, it is characterized in that: the distant order of getting killed of keeper's secret mobile phone input with encrypted word communication function and remote cipher key destruction function, signaling channel by GSM, send with distant getting killed to one or more user cipher device mobile phones out of control and to make the short message of signal, the user cipher device mobile phone is in case start will be received the distant order of getting killed, it destroys corresponding key data at once, and replys the successful message code short message of destruction by the signaling channel of GSM to keeper's secret mobile phone.
Keeper's secret mobile phone of the present invention has the different identity code that is stored on the interior intellective IC card of secret mobile phone respectively with each user cipher device mobile phone.
Keeper's secret mobile phone of the present invention has the authority of initiating the distant order of getting killed.
The short message storage portions of user cipher device mobile phone of the present invention does not hold distant getting killed makes signal.
The method concrete steps of remote cipher key destruction of the present invention are as follows:
The secret mobile phone input of A, the distant order of getting killed of initiation is sent the distant order of getting killed by the number of the distant secret mobile phone of getting killed, and promptly the signaling channel by gsm system sends the short message of getting killed and making with distant;
B, after initiating the affirmation signaling of base station that distant secret mobile phone of getting killed order receives gsm system, enter wait state, wait for by the affirmation signaling of the distant secret mobile phone of getting killed;
C, received short message by the distant secret mobile phone of getting killed after, at first confirm whether be the distant order of getting killed, in this way, then will not deposit the short message memory block in, and not point out the user with the distant short message that makes of getting killed; As not being, then deposit the short message of receiving in the short message memory block, and the prompting user;
D, received the distant order of getting killed by the distant secret mobile phone of getting killed, after successfully having destroyed the key data in the secret mobile phone, signaling channel by gsm system returns the short message that band is confirmed signaling, and this process is all carried out having under the situation of being known nothing by the disabled user of the distant secret mobile phone of getting killed;
The secret mobile phone of E, the distant order of getting killed of initiation is finished once the distant operation of getting killed after receiving the affirmation signaling.
The signaling channel that the present invention adopts gsm system to provide carries out remote cipher key destruction, do not need the other side to cooperate, do not require that the other side's secret mobile phone starts shooting simultaneously, the other side's secret mobile phone is in case start, will receive the distant order of getting killed automatically, the whole distant process of getting killed is all carried out having under the situation of being known nothing by the disabled user of the distant secret mobile phone of getting killed, and make secret mobile phone out of control lose the encrypted word function by distant getting killed, thereby finish the auto-destruct of key data, reduced secret mobile phone harm to system under the situation out of control.
Embodiment:
Embodiment 1:
Keeper's secret mobile phone is initiated the distant order of getting killed, and the signaling channel by gsm system sends the short message with the distant order of getting killed, received the distant order of getting killed once starting shooting by distant secret mobile phone of getting killed, after successfully having destroyed the key data in the secret mobile phone, signaling channel by gsm system returns the short message that band is confirmed signaling, at this moment, all confidential datas of user cipher device mobile phone all are eliminated, lost the secret telephony function by distant secret mobile phone of getting killed, this process is carried out having under the situation of being known nothing by the disabled user of the distant secret mobile phone of getting killed.
Embodiment 2:
The secret mobile phone of certain financial company is made up of keeper's secret mobile phone and some user cipher device mobile phones, have only keeper's secret mobile phone just to have and initiate the distant authority of getting killed and making, the differentiation of keeper's secret mobile phone and user cipher device mobile phone is determined by the identity code on the intellective IC card in the secret mobile phone.The input of keeper's secret mobile phone is sent the distant order of getting killed by the number of distant user cipher device mobile phone of getting killed, and promptly the signaling channel by gsm system sends the short message of getting killed and making with distant.The user cipher device mobile phone is received with behind the distant short message that makes of getting killed, after successfully having destroyed the key data in the secret mobile phone, signaling channel by gsm system returns the short message that band is confirmed signaling, the user cipher device mobile phone will not deposit the short message memory block in distant short message of getting killed order, and not point out the user.Keeper's secret mobile phone is finished once the distant operation of getting killed after receiving the affirmation signaling, and will show the corresponding distant result that gets killed on LCD.
The signaling channel that the present invention adopts gsm system to provide carries out remote cipher key destruction, do not need the other side to cooperate, do not require that the other side's secret mobile phone starts shooting simultaneously, the other side's secret mobile phone is in case start, will receive the distant order of getting killed automatically, the whole distant process of getting killed is all carried out having under the situation of being known nothing by the disabled user of the distant secret mobile phone of getting killed, and make secret mobile phone out of control lose the encrypted word function by distant getting killed, thereby finish the auto-destruct of key data, reduced secret mobile phone harm to system under the situation out of control, guarantee the fail safe of secret mobile phone, avoided the loss of know-how and various business secrets.

Claims (5)

1, a kind of secret mobile phone is realized the method for remote cipher key destruction, described secret mobile phone comprises: keeper's secret mobile phone and some user cipher device mobile phones, it is characterized in that: the distant order of getting killed of keeper's secret mobile phone input with encrypted word communication function and remote cipher key destruction function, signaling channel by GSM, send with distant getting killed to one or more user cipher device mobile phones out of control and to make the short message of signal, the user cipher device mobile phone is in case start will be received the distant order of getting killed, it destroys corresponding key data at once, and replys the successful message code short message of destruction by the signaling channel of GSM to keeper's secret mobile phone.
2, a kind of secret mobile phone according to claim 1 is realized the method for remote cipher key pin, it is characterized in that: described keeper's secret mobile phone has the different identity code that is stored on the interior intellective IC card of secret mobile phone respectively with each user cipher device mobile phone.
3, a kind of secret mobile phone according to claim 1 is realized the method for remote cipher key destruction, it is characterized in that: described keeper's secret mobile phone has the authority of initiating the distant order of getting killed.
4, a kind of secret mobile phone according to claim 1 is realized the method for remote cipher key destruction, it is characterized in that: do not hold distant getting killed in the short message storage portions of described user cipher device mobile phone and make signal.
5, a kind of secret mobile phone according to claim 1 is realized the method for remote cipher key destruction, and it is characterized in that: the method concrete steps of described remote cipher key destruction are as follows:
The secret mobile phone input of A, the distant order of getting killed of initiation is sent the distant order of getting killed by the number of the distant secret mobile phone of getting killed, and promptly the signaling channel by gsm system sends the short message of getting killed and making with distant;
B, after initiating the affirmation signaling of base station that distant secret mobile phone of getting killed order receives gsm system, enter wait state, wait for by the affirmation signaling of the distant secret mobile phone of getting killed;
C, received short message by the distant secret mobile phone of getting killed after, at first confirm whether be the distant order of getting killed, in this way, then will not deposit the short message memory block in, and not point out the user with the distant short message that makes of getting killed; As not being, then deposit the short message of receiving in the short message memory block, and the prompting user;
D, received the distant order of getting killed by the distant secret mobile phone of getting killed, after successfully having destroyed the key data in the secret mobile phone, signaling channel by gsm system returns the short message that band is confirmed signaling, and this process is all carried out having under the situation of being known nothing by the disabled user of the distant secret mobile phone of getting killed;
The secret mobile phone of E, the distant order of getting killed of initiation is finished once the distant operation of getting killed after receiving the affirmation signaling.
CN02128103.3A 2002-12-26 2002-12-26 Method for realizing remote cipher key destruction for secret mobile phone Expired - Fee Related CN1262132C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN02128103.3A CN1262132C (en) 2002-12-26 2002-12-26 Method for realizing remote cipher key destruction for secret mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN02128103.3A CN1262132C (en) 2002-12-26 2002-12-26 Method for realizing remote cipher key destruction for secret mobile phone

Publications (2)

Publication Number Publication Date
CN1512799A CN1512799A (en) 2004-07-14
CN1262132C true CN1262132C (en) 2006-06-28

Family

ID=34231225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN02128103.3A Expired - Fee Related CN1262132C (en) 2002-12-26 2002-12-26 Method for realizing remote cipher key destruction for secret mobile phone

Country Status (1)

Country Link
CN (1) CN1262132C (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464613C (en) * 2005-09-28 2009-02-25 乐金电子(中国)研究开发中心有限公司 Method for automatically destroying cell phone and cell phone thereof
CN101119539B (en) * 2007-09-12 2012-07-11 中兴通讯股份有限公司 Method to implement inhibition, revival function in digital cluster system
CN101141710B (en) * 2007-10-15 2011-05-25 中兴通讯股份有限公司 Cluster scheduling system and cipher key remote destroying method
CN101389086B (en) * 2008-10-29 2011-09-14 华为终端有限公司 Mobile terminal, server, system and method for short message withdraw
CN102006584A (en) 2009-08-28 2011-04-06 中兴通讯股份有限公司 Intelligent card remote control method and system
CN101996445B (en) * 2009-08-28 2015-05-13 中兴通讯股份有限公司 Method and system for remotely controlling intelligent card
CN104780040A (en) * 2015-04-06 2015-07-15 安徽问天量子科技股份有限公司 Handheld device encryption method and system based on quantum cryptography
CN107135491B (en) * 2017-05-19 2020-05-12 哈尔滨海能达科技有限公司 Terminal control method and base station

Also Published As

Publication number Publication date
CN1512799A (en) 2004-07-14

Similar Documents

Publication Publication Date Title
CN104333455B (en) A kind of smart mobile phone secret signalling and method
CN101960738B (en) Method and system of providing personal information control service for mobile communication terminal
US5056140A (en) Communication security accessing system and process
EP2525622B1 (en) Method and apparatus for communication based on pseudo-contact information
EP1502467B1 (en) Paired sim card function
CN1249637A (en) Method for encryption of wireless communication in wireless system
CN1926802A (en) Safety data transmission
CN101478595A (en) Mobile communication terminal data protection method
CN100353787C (en) Security guarantee for memory data information of mobile terminal
CN102209318A (en) Real-time mobile phone encrypted conversation method and device based on intelligent TF (Transflash) card
CN101398949A (en) Fingerprint identification gate inhibition system and method
CN1997188A (en) A recognition method of the user identity and its handset
CN103886661A (en) Entrance guard management method and system
CN106231092A (en) A kind of phone information security protection method
CN1262132C (en) Method for realizing remote cipher key destruction for secret mobile phone
CN105553669A (en) Identity authentication based information encryption transmission apparatus, method, and control method
CN108347730B (en) Wireless communication processing method and device
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN101262669B (en) A secure guarantee method for information stored in a mobile terminal
EP0018129B1 (en) Method of providing security of data on a communication path
US9277403B2 (en) Authentication method and device
US8121580B2 (en) Method of securing a mobile telephone identifier and corresponding mobile telephone
CN106211146B (en) Adding method, information communicating method and call method and system are recorded in safety communication
CN103440443A (en) Mobile police terminal
WO1998000956A2 (en) System and method for preventing cellular fraud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20060628

Termination date: 20151226

EXPY Termination of patent right or utility model