CN101420693B - Method for enhancing security of PHS communication - Google Patents

Method for enhancing security of PHS communication Download PDF

Info

Publication number
CN101420693B
CN101420693B CN2008102041091A CN200810204109A CN101420693B CN 101420693 B CN101420693 B CN 101420693B CN 2008102041091 A CN2008102041091 A CN 2008102041091A CN 200810204109 A CN200810204109 A CN 200810204109A CN 101420693 B CN101420693 B CN 101420693B
Authority
CN
China
Prior art keywords
key
phs
mobile phone
card
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2008102041091A
Other languages
Chinese (zh)
Other versions
CN101420693A (en
Inventor
涂小鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Saibo Yuhua Electronic Technology Co., Ltd.
Original Assignee
SHENZHEN SAIBO YUHUA ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN SAIBO YUHUA ELECTRONIC TECHNOLOGY Co Ltd filed Critical SHENZHEN SAIBO YUHUA ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN2008102041091A priority Critical patent/CN101420693B/en
Publication of CN101420693A publication Critical patent/CN101420693A/en
Application granted granted Critical
Publication of CN101420693B publication Critical patent/CN101420693B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a PHS mobile phone and a PHS mobile network, in particular to a method used for reinforcing the PHS communication safety; the PHS mobile phone realizes set-card separation or number borrowing; the method comprises the following steps: as for the mobile phone side, (1) during the establishing process of a service channel, the last two bytes of PSID of the PHS mobile phone are used as RT encrypted key and transmitted to the CS of the network side; (2) the Key is extended so as to gain an E_Key by a PHS mobile phone authentication arithmetic; (3) the E_Key is used as a scrambling code initial register; as for the PHS network side, after the RT encrypted Key sent by the mobile phone side is received, the operations in step (2) and step (3) are carried out. The method combines the key of the plain text with the PHS authentication arithmetic, reinforces the communication safety of the PHS, thus preventing the PHS communication from being illegally eavesdropped.

Description

A kind of method that strengthens the PHS communication security
Technical field
The present invention relates to PHS mobile phone and PHS mobile network, particularly a kind of method that strengthens the PHS communication security.
Background technology
RCR STD-28 standard according to existing PHS network, the flow process that portable terminal obtains Communications service is at first to set up Traffic Channel, be authentication then, authentication by after just begin to transmit user data. user data transmits on Traffic Channel, encrypt the back transmission by user's scrambler, user's scrambler is by FACCH or SACCH Channel Transmission, and the content of FACCH or SACCH Channel Transmission is expressly, be stolen easily, thereby cause user data to be eavesdropped.
Summary of the invention
The invention provides a kind of method of the PHS of enhancing communication security, mainly solve above-mentioned existing in prior technology defective, the present invention combines expressly key and PHS authentication arithmetic, has strengthened the communication security of PHS, thereby has avoided the PHS communication by illegal wiretapping.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is as follows:
A kind of method that strengthens the PHS communication security, this PHS mobile phone have realized separation between machine and card or have burnt number, it is characterized in that it may further comprise the steps:
In the mobile phone side,
(1) sets up the CS (Cell Station, base station) that in the process latter two byte of PHS mobile phone PSID is passed to network side as RT encryption key Key in Traffic Channel;
(2) key K ey is expanded, and by drawing E_Key after the PHS mobile phone identification algorithm computation;
(3) with E_Key as scrambler register initial value;
At the PHS network side,
Adopt above-mentioned same (2) and (3) to operate after receiving the RT encryption key Key that the mobile phone side sends.
The method of described enhancing PHS communication security is characterized in that described step (2) further comprises:
(201) key K ey is expanded to 8 bytes, extended byte is filled with 0;
(202), draw execution in step (204) behind the Authentication Response if the PHS mobile phone that burns number is then carried out FEAL32 or STEPHI algorithm with the key and the authentication code Ki of expansion;
(203), wait for that the PIM card returns execution in step (204) after the authenticating result if separation between machine and card PHS mobile phone is then issued the PIM card with the key of expansion; This PIM card authentication operations is that the key of expansion and authentication code Ki are carried out FEAL32 or STEPHI algorithm, draws Authentication Response;
(204) getting preceding two bytes of authenticating result is E_Key;
(205) if E_Key is 0, then be 1 back execution in step (3) with the E_Key assignment, otherwise direct execution in step (3).
By technique scheme, the present invention has following advantage:
The present invention be by FACCH or SACCH Channel Transmission be expressly user key Key, but after Key expanded, the E_Key that draws after calculating by authentication arithmetic again was as real scrambler initial value.After calculating by authentication arithmetic, the same employing of PHS network draws E_Key as real scrambler initial value.Thus, though the Key value of plaintext of transmission, real use be that the E_Key that calculates by the privately owned KI Ki of mobile phone is as the scrambler initial value.Network side also calculates E_Key by same flow process after receiving key K ey, and equally with E_Key as the scrambler initial value.Because PHS mobile phone side is used identical Key and KI Ki with network side, so two scrambler initial values that calculate are consistent, and this initial value is to be not easy to be cracked, and so just can prevent to be stolen, thereby strengthens privacy of user data.
Embodiment
Embodiment 1, a kind of method that strengthens the PHS communication security, and this PHS mobile phone has been realized separation between machine and card.It may further comprise the steps:
In the mobile phone side,
(1) sets up the CS that in the process latter two byte of PHS mobile phone PSID is passed to network side as RT encryption key Key in Traffic Channel;
(2) key K ey is expanded, and by drawing E_Key after the PHS mobile phone identification algorithm computation;
(3) with E_Key as scrambler register initial value;
At the PHS network side,
Adopt above-mentioned same (2) and (3) to operate after receiving the RT encryption key Key that the mobile phone side sends.
Described step (2) further comprises:
A expands to 8 bytes with key K ey, and extended byte is filled with 0;
B issues the PIM card with the key of expansion, waits for that the PIM card returns authenticating result; This PIM card authentication operations is that the key of expansion and authentication code Ki are carried out FEAL32 or STEPHI algorithm, draws Authentication Response;
It is E_Key that c gets preceding two bytes of authenticating result;
D then is 1 back execution in step (3) with the E_Key assignment if E_Key is 0, otherwise direct execution in step (3).
Embodiment 2, a kind of method that strengthens the PHS communication security, and this PHS mobile phone has been realized burning number.It may further comprise the steps:
In the mobile phone side,
(1) sets up the CS that in the process latter two byte of PHS mobile phone PSID is passed to network side as RT encryption key Key in Traffic Channel;
(2) key K ey is expanded, and by drawing E_Key after the PHS mobile phone identification algorithm computation;
(3) with E_Key as scrambler register initial value;
At the PHS network side,
Adopt above-mentioned same (2) and (3) to operate after receiving the RT encryption key Key that the mobile phone side sends.
Described step (2) further comprises:
A expands to 8 bytes with key K ey, and extended byte is filled with 0;
B carries out FEAL32 or STEPHI algorithm with the key and the authentication code Ki of expansion, draws Authentication Response;
It is E_Key that C gets preceding two bytes of authenticating result;
D then is 1 back execution in step (3) with the E_Key assignment if E_Key is 0, otherwise direct execution in step (3).
The above only is the preferred embodiments of the present invention; be not limited to the present invention; for a person skilled in the art; the present invention can have multiple variation; all any modifications of being done within the spirit and principles in the present invention, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (2)

1. method that strengthens the PHS communication security, this PHS mobile phone have realized separation between machine and card or have burnt number, it is characterized in that it may further comprise the steps:
In the mobile phone side,
(1) sets up the base station of in the process latter two byte of PHS mobile phone PSID being passed to network side as RT encryption key Key in Traffic Channel;
(2) key K ey is expanded, and by drawing E_Key after the PHS mobile phone identification algorithm computation;
(3) with E_Key as scrambler register initial value;
At the PHS network side,
Adopt above-mentioned same (2) and (3) to operate after receiving the RT encryption key Key that the mobile phone side sends.
2. the method for enhancing PHS communication security according to claim 1 is characterized in that described step (2) further comprises:
(201) key K ey is expanded to 8 bytes, extended byte is filled with 0;
(202), draw execution in step (204) behind the Authentication Response if the PHS mobile phone that burns number is then carried out FEAL32 or STEPHI algorithm with the key and the authentication code Ki of expansion;
(203), wait for that the PIM card returns execution in step (204) after the authenticating result if separation between machine and card PHS mobile phone is then issued the PIM card with the key of expansion; This PIM card authentication operations is that the key of expansion and authentication code Ki are carried out FEAL32 or STEPHI algorithm, draws Authentication Response;
(204) getting preceding two bytes of authenticating result is E_Key;
(205) if E_Key is 0, then be 1 back execution in step (3) with the E_Key assignment, otherwise direct execution in step (3).
CN2008102041091A 2008-12-05 2008-12-05 Method for enhancing security of PHS communication Expired - Fee Related CN101420693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102041091A CN101420693B (en) 2008-12-05 2008-12-05 Method for enhancing security of PHS communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102041091A CN101420693B (en) 2008-12-05 2008-12-05 Method for enhancing security of PHS communication

Publications (2)

Publication Number Publication Date
CN101420693A CN101420693A (en) 2009-04-29
CN101420693B true CN101420693B (en) 2010-11-03

Family

ID=40631234

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102041091A Expired - Fee Related CN101420693B (en) 2008-12-05 2008-12-05 Method for enhancing security of PHS communication

Country Status (1)

Country Link
CN (1) CN101420693B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413463B (en) * 2011-10-12 2013-09-25 厦门大学 Wireless media access layer authentication and key agreement method for filling variable sequence length

Also Published As

Publication number Publication date
CN101420693A (en) 2009-04-29

Similar Documents

Publication Publication Date Title
CN102130768B (en) Terminal equipment having capability of encrypting and decrypting link layer and data processing method thereof
KR100572498B1 (en) Method for establishing a key using over-the-air communication and password protocol and password protocol
CN100488305C (en) Method of network access indentifying and authorizing and method of updating authorizing key
CN100463391C (en) Network key management and session key updating method
EP1972125A2 (en) Apparatus and method for protection of management frames
CN104092663A (en) Encryption communication method and encryption communication system
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN101707767B (en) Data transmission method and devices
CN101895882A (en) Data transmission method, system and device in WiMAX system
CN104270244A (en) NFC encryption method and system
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN105471845A (en) Communication method and communication system for preventing man-in-the-middle attack
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN103179514A (en) Cell phone safe group-sending method and device for sensitive message
CN101257358B (en) Method and system for updating user cipher key
CN106789845A (en) A kind of method of network data security transmission
CN101998393A (en) Method and apparatus for reducing overhead for integrity check of data in wireless communication system
CN107426251A (en) Terminal security detection method and device
CN101420693B (en) Method for enhancing security of PHS communication
CN105827601A (en) Data encryption application method and system of mobile device
CN104735626A (en) Achieving method and device for trunking group communication public security
CN106358159A (en) Shared channel management method and system of broadband cluster system, terminals and base station
CN112054905B (en) Secure communication method and system of mobile terminal
CN100396156C (en) Synchronous SQN processing method
CN105245532A (en) WLAN access method based on NFC authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHENZHEN CITY SAIBO YUHUA ELECTRONIC SCIENCE CO.,

Free format text: FORMER OWNER: SHANGHAI WENTAI ELECTRONIC SCIENCE CO., LTD.

Effective date: 20091016

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20091016

Address after: Shenzhen, Futian District Binhe Road and Xiangmi Lake Road intersection, tian an innovation science and Technology Plaza (phase two), East Block 901, zip code: 518040

Applicant after: Shenzhen Saibo Yuhua Electronic Technology Co., Ltd.

Address before: G, 6 floor, district 668, Beijing East Road, Shanghai, Huangpu District, China: 200001

Applicant before: Shanghai Wentai Electronic Science & Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101103

Termination date: 20111205