CN1371082A - Method and mobile device for end-to-end enciphere - Google Patents
Method and mobile device for end-to-end enciphere Download PDFInfo
- Publication number
- CN1371082A CN1371082A CN01104245.1A CN01104245A CN1371082A CN 1371082 A CN1371082 A CN 1371082A CN 01104245 A CN01104245 A CN 01104245A CN 1371082 A CN1371082 A CN 1371082A
- Authority
- CN
- China
- Prior art keywords
- cipher
- mobile terminal
- encryption
- terminal apparatus
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The present invention discloses a method and device for end-to-end encipher for mobile communication system. An universal enciphering interface is added to available mobile terminal to transmit enciphered information of user's cipher chip, and during information transmission, the communicating parties performs end-to-end enciphering and deciphering operation via the user's cipher chip, which is inserted via the universal enciphering interface into mobile terminal. On the basis of meeting original system safety performance, the present invention can meet the special requirement to transmit information via enciphering algorithm in the whole system from the access network to kernel network.
Description
The present invention relates to the mobile communication technology field, particularly a kind of method and mobile terminal apparatus thereof of realizing End to End Encryption of mobile communication system terminal Secure Application technical field.
Mobile communication system has been taked to carry out the symmetric cryptography mode between network-side radio network controller (RNC) and the mobile terminal apparatus (ME) to the cipher mode of transmission information at present, and the cryptographic algorithm of employing is the standardized algorithm that defines.The cryptographic algorithm of network side is in radio network controller (RNC), and the cryptographic algorithm of mobile side is in mobile terminal apparatus rather than in SIM card.The information encryption mode of existing mobile communication system is described as follows referring to shown in Figure 1.
User's first and user's second are conversed, and it is as follows to the safe transmission process that user's second sends information:
1. information transmitted comprises speech, data message etc., at first encrypts on the portable terminal A of user's first, and sends to the RNC A of corresponding network side.
2. RNC A is decrypted checking to transmission information, is transferred to the RNC B of called subscriber second corresponding network side then by the core network of mobile communication system.
3. RNC B carries out encryption and sends to called subscriber second transmission information.
4. the portable terminal B of user's second is decrypted checking to information, answers this information.
Said process has guaranteed the airlink information transmitted security between user and network access equipment, and is not provided at information transmitted safety guarantee in the core network.
Said process requires end side must adopt identical cryptographic algorithm with network side, because mobile phone and base station that different manufacturers is made, perhaps in mobile phone and base station that country variant uses, must guarantee consistent cryptographic algorithm, present 3GPP (3-G (Generation Three mobile communication system) standardization body) defines above-mentioned cryptographic algorithm in relevant criterion be standardized algorithm.
Based on the invention described above prior art situation, for satisfying some special users' application demand, the invention provides the implementation method and the mobile terminal apparatus of End to End Encryption in a kind of mobile communication system, the algorithm that self provides can be provided in the encryption that makes the group user of specific (special) requirements transmit information, guarantees can both use own cryptographic algorithm realization safe transmission in the total system of information from the Access Network to the core net of correspondent.
Realize that the technical scheme that the object of the invention adopts is:
A kind of implementation method that is applied to the End to End Encryption in the mobile communication system comprises: increase by an encipher interface in existing mobile terminal apparatus, with the cipher-text information of transmission user self crypto chip; The operation of encryption and decryption end to end that correspondent transmits information by described user cipher chip, and the calling user both sides have identical user cipher chip.
Described encryption and decryption operation comprises: the cipher-text information that the user's that gives orders or instructions crypto chip produces sends in its mobile terminal apparatus by its encipher interface, carries out cryptographic calculation with the digital service information that obtains after information source coding, produces the business information of having encrypted; The crypto chip of called subscriber produces corresponding cipher-text information, and sends in its mobile terminal apparatus by its encipher interface, is decrypted computing with the business information of having encrypted that obtains behind the receiving demodulation, the digital service information after obtaining deciphering.
Described encryption and decryption adopts the symmetric cryptography mode.
A kind of mobile terminal apparatus that is applied to the realization End to End Encryption in the mobile communication system, this device is except that the module of the mobile terminal apparatus that includes prior art, particularly including an encipher interface that increases is arranged, the cipher-text information that the user cipher chip is produced is sent in this mobile terminal apparatus, directly information source is carried out the encryption and decryption operation.
Described user cipher chip is inserted in the described mobile terminal apparatus by described encipher interface.And calling user both sides' mobile terminal apparatus plugs identical user cipher chip.
Described encipher interface is general standard interface.
The present invention increases a universal standard encipher interface on existing mobile terminal apparatus, make the terminal user that the outside cipher-text information of oneself can be provided by this interface, thereby on the basis that guarantees the original system security performance, satisfy some special users' requirement, make encryption function more powerful.
The present invention meets the group's user's request with specific (special) requirements, the algorithm that self provides can be provided in the encryption that the user is transmitted information, thereby guarantees can both use own cryptographic algorithm realization safe transmission in the total system of information from the Access Network to the core net of both call sides.
Below in conjunction with drawings and the specific embodiments the present invention is described in more detail.
Fig. 1 is the information security transmission course synoptic diagram of prior art.
Fig. 2 is an end-to-end information encryption mode synoptic diagram of the present invention.
Existing SIM card interface in the present mobile terminal apparatus, the present invention increases a universal standard encipher interface in mobile terminal apparatus, be used for the cipher-text information of transmission user self crypto chip, so that business information is encrypted, implementation procedure is described as follows referring to shown in Figure 2:
1. the voice signal that send the words user obtains digital service information after A/D conversion, information source coding.
2. user's self crypto chip produces cipher-text information, and sends among the ME by general encipher interface.
3. the digital service information after cipher-text information and the information source coding is carried out mould 2 and is added, and produces the business information of having encrypted.
4. the same with usual manner, the business information of having encrypted is modulated transmission.
5. called subscriber receiving demodulation information, the business information of having been encrypted.
6. user's self crypto chip produces corresponding decrypting ciphertext, sends among the ME by general encipher interface.
7. the encrypted information of cipher-text information and reception carries out mould 2 and adds the digital service information after obtaining deciphering.
8. business information is converted to voice signal through source coding, D/A.
Require the calling user both sides should have identical crypto chip among the present invention, encryption and decryption adopts the symmetric cryptography mode, should guarantee the cipher-text information initial synchronisation of encryption and decryption before the conversation.
The present invention has following effect:
Increase a general standard interface in existing mobile terminal apparatus, this interface can be realized encrypting Function.
By increasing an Interface realization encryption function, can not affect existing network function and safe body System, namely to the practical function of existing system without any impact.
Encryption function by this Interface realization is directly to Source Encryption, and the information that guaranteed is in whole system Safe transmission.
Realized that real terminal is to terminal encryption.
Claims (10)
1, a kind of implementation method that is applied to the End to End Encryption in the mobile communication system is characterized in that this method comprises:
In existing mobile terminal apparatus, increase by an encipher interface, with the cipher-text information of transmission user self crypto chip; The operation of encryption and decryption end to end that correspondent transmits information by described user cipher chip, and the calling user both sides have identical user cipher chip.
2, the implementation method of End to End Encryption according to claim 1 is characterized in that described encryption and decryption operation comprises:
The cipher-text information that user's crypto chip produces of giving orders or instructions sends in its mobile terminal apparatus by its encipher interface, carries out cryptographic calculation with the digital service information that obtains after information source coding, produces the business information of having encrypted;
The crypto chip of called subscriber produces corresponding cipher-text information, and sends in its mobile terminal apparatus by its encipher interface, is decrypted computing with the business information of having encrypted that obtains behind the receiving demodulation, the digital service information after obtaining deciphering.
3, the implementation method of End to End Encryption according to claim 1 and 2 is characterized in that:
Described encryption and decryption adopts the symmetric cryptography mode.
4, the implementation method of End to End Encryption according to claim 3 is characterized in that:
Described cipher mode is the stream cipher mode, and should guarantee the cipher-text information initial synchronisation of encryption and decryption before conversation.
5, the implementation method of End to End Encryption according to claim 3 is characterized in that:
Described cipher mode is the block cipher mode, and should guarantee that the piece of cipher-text information of encryption and decryption is synchronous.
6, the implementation method of End to End Encryption according to claim 1 and 2 is characterized in that:
Described encipher interface is general standard interface.
7, a kind of mobile terminal apparatus that is applied to the realization End to End Encryption in the mobile communication system is characterized in that:
This device is except that the module of the mobile terminal apparatus that includes prior art, and particularly including an encipher interface that increases is arranged, the cipher-text information that the user cipher chip is produced is sent in this mobile terminal apparatus, directly information source is carried out the encryption and decryption operation.
8, mobile terminal apparatus according to claim 6 is characterized in that:
Described user cipher chip is inserted in the described mobile terminal apparatus by described encipher interface.
9, according to claim 7 or 8 described mobile terminal apparatus, it is characterized in that:
Described encipher interface is general standard interface.
10, according to claim 7 or 8 described mobile terminal apparatus, it is characterized in that:
Calling user both sides' mobile terminal apparatus plugs identical user cipher chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB011042451A CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB011042451A CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1371082A true CN1371082A (en) | 2002-09-25 |
CN1177431C CN1177431C (en) | 2004-11-24 |
Family
ID=4653787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB011042451A Expired - Fee Related CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1177431C (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100466770C (en) * | 2006-03-21 | 2009-03-04 | 中兴通讯股份有限公司 | Method for realizing end-to-end encrypting call in cluster system |
CN101203025B (en) * | 2006-12-15 | 2010-11-10 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
CN101330537B (en) * | 2008-07-30 | 2010-11-17 | 中国电信股份有限公司 | Method and device for end-to-end ciphering voice |
CN102625301A (en) * | 2011-02-01 | 2012-08-01 | 上海晨兴希姆通电子科技有限公司 | Wireless module, mobile phone and key transport method |
-
2001
- 2001-02-23 CN CNB011042451A patent/CN1177431C/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100466770C (en) * | 2006-03-21 | 2009-03-04 | 中兴通讯股份有限公司 | Method for realizing end-to-end encrypting call in cluster system |
CN101203025B (en) * | 2006-12-15 | 2010-11-10 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
CN101330537B (en) * | 2008-07-30 | 2010-11-17 | 中国电信股份有限公司 | Method and device for end-to-end ciphering voice |
CN102625301A (en) * | 2011-02-01 | 2012-08-01 | 上海晨兴希姆通电子科技有限公司 | Wireless module, mobile phone and key transport method |
Also Published As
Publication number | Publication date |
---|---|
CN1177431C (en) | 2004-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4464046B2 (en) | ENCRYPTION DEVICE, DECRYPTION DEVICE, AND RADIO COMMUNICATION DEVICE | |
CN1925681A (en) | End-to-end encrypting method and system based on mobile communication network | |
CN101384042A (en) | Mobile phone ciphering method based on safe digital interface ciphering card | |
CN1236517A (en) | Method and apparatus for encryption radio traffic in a telecommunications network | |
CN106982419B (en) | Single call end-to-end encryption method and system for broadband cluster system | |
CN106790281A (en) | A kind of end-to-end voice encryption device and encryption method towards intercom system | |
EP1156694B1 (en) | Radio communication device | |
CN112153641B (en) | Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF | |
WO2012024903A1 (en) | Method for encrypting voice calls in mobile communication network, and system, terminal, and network side thereof | |
CN103167494B (en) | Method for sending information and system | |
CN103096304A (en) | Method for encryption and decryption of secure voice tendencies of internet protocol (IP) network communication terminal | |
CN112911588A (en) | Lightweight narrowband Internet of things secure transmission method and system | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN1649295A (en) | Device and its method for end-to-end enciphering and deenciphering in clony system | |
CN105049201A (en) | Mobile equipment secret communication system based on quantum cryptography and mobile equipment secret communication method based on quantum cryptography | |
CN110691359A (en) | Safety protection method for power marketing professional Bluetooth communication | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
CN100512103C (en) | Secret key distributing method of end-to-end encrypted telecommunication | |
CN1138366C (en) | Network structure suitable for encryption at terminals of mobile communication system and its implementation method | |
CN100463551C (en) | System and method for realizing encrypted communication in mobile communication system | |
CA2371811A1 (en) | Method and apparatus for enhanced security in a broadband telephony network | |
RU2132597C1 (en) | Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks | |
US8971534B2 (en) | Mobile communication terminal and method | |
CN1229551A (en) | Method and apparatus for enhanced security expansion of secret key into lookup table for improved security for wireless telephone messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20041124 Termination date: 20170223 |
|
CF01 | Termination of patent right due to non-payment of annual fee |