CN1649295A - Device and its method for end-to-end enciphering and deenciphering in clony system - Google Patents

Device and its method for end-to-end enciphering and deenciphering in clony system Download PDF

Info

Publication number
CN1649295A
CN1649295A CN 200510042374 CN200510042374A CN1649295A CN 1649295 A CN1649295 A CN 1649295A CN 200510042374 CN200510042374 CN 200510042374 CN 200510042374 A CN200510042374 A CN 200510042374A CN 1649295 A CN1649295 A CN 1649295A
Authority
CN
China
Prior art keywords
key
portable terminal
encrypting module
cluster
group system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510042374
Other languages
Chinese (zh)
Inventor
魏崇毓
朱路阳
蒋安泉
周春林
邵东志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Group Co Ltd
Qingdao Hisense Communication Co Ltd
Original Assignee
Hisense Group Co Ltd
Qingdao Hisense Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Group Co Ltd, Qingdao Hisense Communication Co Ltd filed Critical Hisense Group Co Ltd
Priority to CN 200510042374 priority Critical patent/CN1649295A/en
Publication of CN1649295A publication Critical patent/CN1649295A/en
Pending legal-status Critical Current

Links

Images

Abstract

This invention discloses a method and a device for realizing end-to-end ciphering in a cluster communication system, which adds a cryptographic key management center responsible for generating, distributing and managing cryptographic keys and adds a user ciphered module responsible for ciphering and de-ciphering user phonetic and data contents and applies a symmetric cryptographic key mode to ask the two communication sides use the ciphered modules with the same chips or modules and secures the same cryptographic key and guarantees meeting the requirement of even more safety and secrecy for special users.

Description

The devices and methods therefor of end-to-end encryption and decryption in the group system
Technical field
The invention belongs to the trunking communicating technology field, more specifically to a kind of to carrying out the technology of encryption and decryption in the trunked communication system.
Background technology
Trunking communication is command dispatch communication one of the most effective means in realize moving, and also is one of most important communication mode of commander's scheduling.It is a kind of shared resource, contribution, provides the multipurpose of excellent service, dynamical mobile communication system to the user.
Trunked communication system is along with technology reaches its maturity, and uses more and more widely, can be applied to the command system of the action of recovering, airport civil aviaton, city underground etc. of intelligent transportation, various natural calamities.Particularly it seems more important in anti-terrorism or military exercises.In the various performances of trunking communication, its fail safe seems more with the obvious advantage, and this satisfies the special requirement aspect communication security of state security department and army.This system is in the measure of secure context, adopt authentication, air-interface encryption technology AIE (Air Interface Encryption) and End to End Encryption technology E2EE (End to End Encryption) respectively, what wherein authentication and aerial encryption technology adopted at present all is the safe practice of being determined by the trunking communication standard.
Air-interface encryption technology AIE encrypts when only data aloft being transmitted, and transmission is no close in system, and therefore for the application of the very high special sector of security requirement, the encryption reliability of air-interface encryption technology AIE is good inadequately; In the occasion very high to security requirement, need carry out highly confidentially to user data, this requires end to end security E2EE.For E2EE, signaling is not encrypted, and do not encrypt as the user identification code of signaling, otherwise system can't discern yet.
At present in group system, the End to End Encryption technology has disclosed Chinese patent application on July 16th, 2003 " realizing the method and the mobile device of End to End Encryption ", its application number is 01104245.1, a kind of End to End Encryption method of communication of mobile terminal has been proposed, this method is to the effect that: increase by a general encrypting module in existing mobile terminal apparatus, with the key stream information in transmission user self crypto chip, the operation of encryption and decryption end to end that correspondent transmits information by the user cipher chip, the user cipher chip is inserted in the portable terminal by general encipher interface.The key that the method is used is generated by terminal user oneself, and privacy degrees is than higher.But still have following shortcoming:
(1) in trunked mobile communication system, being used for the key of encryption and decryption mainly is that mode by short message exchanges between the both call sides portable terminal, just produce and interchange key in the time of conversation, can increase the time of delay before conversing like this, if the side's talked about terminal is not received key simultaneously, then can make whole conversation failure.
(2) according to described in this invention, being used for the operation of encryption and decryption is not to carry out in encrypting module, and in portable terminal, the design of portable terminal or production firm just might know cryptographic algorithm even might know the key of each encryption and decryption like this, conversation confidentiality to the user has certain influence like this, can not reach very high secret effect.
Summary of the invention
Purpose of the present invention is exactly conversation time delay and the not high shortcoming of fail safe that occurs when encrypting in the current cluster system in order to solve, the devices and methods therefor of end to end security in a kind of new group system is provided, the voice or the data message that transmit in the mobile communication are encrypted by key and encrypting module in terminal, in whole system and Radio Link, maintained secrecy to guarantee voice-and-data.User's language and data are subjected to multiple protective in system like this, have realized strict more security mechanism, and having satisfied some has the industry user's of requirements at the higher level specific (special) requirements to safety.
To achieve these goals, the present invention includes base station, main control base station, network management system and dispatching patcher, also comprise:
Be connected with network management system with main control base station, be used for sending the Key Management server of key to the cluster portable terminal in the service area;
Be connected with encrypting module, produce or extract initial value, and send the cluster portable terminal that receives secure service information;
Be connected with the cluster portable terminal, produce key stream as parameter according to certain algorithm, and produce the encrypting module of secure service information with digital service information and key stream according to certain enciphering and deciphering algorithm with key and initial value.
Produce the Key Management server of key, regular update key and key management according to certain calculation, Key Management server sends key for the cluster portable terminal in the service area by short message way, receive key, reply the cluster portable terminal of replying Key Management server by short message, KMC is distributed to the key of the cluster portable terminal unanimity in the service area.
By the encrypting module that UART interface or SIM card interface are connected with the cluster portable terminal, encrypting module can regular update produce the algorithm of key stream and the cryptographic algorithm of generation secure service information.
The initial value that the cluster portable terminal produces is a random value, and the initial value that is produced is additional in the business information by the mode of secure service information being stolen frame.
Employed key is the symmetric cryptography mode in end-to-end enciphering and deciphering algorithm, and both sides' call terminal connects the encrypting module of key agreement.
The business information of encrypting can be voice messaging, data message and image information.
The method of KMC's distributed key in the group system may further comprise the steps:
Key Management server generation, renewal and managing keys send to cluster portable terminal in the service area to key;
The cluster portable terminal is received key, replys the response message of having received key to KMC;
KMC's affirmation portable terminal is received key, just no longer sends this key, does not send key otherwise do not stop paying out in during certain hour.
End-to-end method of encrypting in a kind of group system may further comprise the steps:
KMC sends key for the cluster portable terminal in the service area;
The cluster portable terminal produces initial value, sends to the encrypting module that is connected with the cluster portable terminal, and encrypting module uses key and initial value as parameter, produces key stream according to certain algorithm;
Data message in the cluster portable terminal or be the voice signal of digital service information through A/D conversion, source encoding, send to encrypting module, digital service information and key stream produce the business information of encrypting according to certain cryptographic algorithm, and initial value is additional in the business information;
The business information of having encrypted in the cluster portable terminal sends by the air interface modulation.
The method of end-to-end deciphering in a kind of group system may further comprise the steps:
The business information that the cluster portable terminal is encrypted by the air interface demodulate reception;
The cluster portable terminal detects and extracts the initial value that is added in the business information of encrypting, and sends to encrypting module, and this initial value and the key of preserving in encrypting module are produced key stream according to certain algorithm;
The business information that encrypting module receive to be encrypted, and and key stream produce digital service information after the deciphering according to certain decipherment algorithm;
Digital service information behind the cluster portable terminal receiving and deciphering obtains data service or is converted to voice signal through source coding, D/A.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples.
Fig. 1 is the group system structural representation among the present invention;
Fig. 2 is the block diagram of Key Management server and portable terminal among the present invention;
Fig. 3 is the flow chart of end-to-end encryption and decryption among the present invention;
Fig. 4 is the hardware interface figure that encrypting module and cluster portable terminal pass through the UART bus communication;
Fig. 5 hardware interface figure that to be encrypting module be connected by SIM card with the cluster portable terminal.
Embodiment
As depicted in figs. 1 and 2, adopt the digital cluster system of End to End Encryption technology, comprise the base station, main control base station, network management system, LDS (Lined Dispatch Station) controller and wired dispatching desk, a Key Management server is set in system specially, be responsible for the generation of key, distribution and management, in system, operate control by the user, Key Management server is all cluster portable terminal distributed key in service area regularly, and according to certain key distribution strategy to guarantee the cipher consistency in all portable terminals of service area, so that can correctly carry out encryption and decryption.Local KMC (KMC) is responsible for key downloaded in the portable terminal and goes, and is responsible for simultaneously producing key, regularly carrying out the change of key and carry out the management etc. of key according to the certain calculation strategy.Two kinds of methods of downloading key in portable terminal are arranged, promptly be directly downloaded to portable terminal by suitable hardware interface PEI and neutralize by air interface download in portable terminal, optimization is to adopt the second way that key is downloaded in the encrypting module of portable terminal.
Have many consumers and the system of key in, key management generally will be carried out under security control, how the key term of validity that this policy comprises particular task changes currently in key, the portable terminal must have how many keys for how long, when reaching.End-to-end encryption key management OTAK (Over the Air Keying) utilizes the SDS short message to realize, should comprise following content in the short message: the encryption key of encryption key number, ciphering unit identification and sealing etc.In order to confirm a short data message communicating success, in short data message management mechanism, there is one to confirm service.If short data communication is unsuccessful, the receiving terminal of short message will not send acknowledge message or send failed message.
Before carrying out the business information End to End Encryption, the portable terminal of both call sides must be received the key that is used for the encryption and decryption operation of the unanimity of the KMC distribution in the system.
Key Management server is responsible for the generation and the management of key, and by the personnel operation of being responsible for the control of trunked communication system security strategy specially, according to the self-ordained security mechanism of user, KMC sends for regularly or aperiodically the cluster portable terminal in this service area or new key more; Portable terminal is replied the response message that this portable terminal has been received key by short message to the system management center after receiving key at once.Portable terminals all in KMC confirms this service area have been received the key of firm transmission, then no longer send this key, otherwise all portable terminal distributed keys in this service area ceaselessly in during certain.
Increasing an encrypting module by interface in mobile terminal apparatus, mainly is that voice-and-data is encrypted.Cryptographic algorithm in the encrypting module can be carried out periodic modification according to user's security needs and be downloaded.The startup of encryption function is to be selected by the encrypted word function that mobile phone users is selected to encrypt in the menu in the cluster portable terminal.End to end security is encryption between terminal and the terminal to information, and system does not have encrypted secret key, and system is only for enciphered data provides transparent transmission channel, decoding/decrypting process not in network transmission process.
Encrypting employed is the symmetric cryptography mode, can reduce the difficulty that encryption and decryption realize, is convenient to Key Management server and carries out key management.Here in the encryption policy that is adopted, key is the part in the cryptographic algorithm wherein just, also introduced initial value (IV) notion in addition, also can be referred to as message key to this initial value, so said key just is not our traditional said key among the present invention.Initial value is as a random seed that produces key stream (being used for to voice-and-data), and initial value and key are as two input values of key generator.
Form by three parts with the encryption key that generates encrypted secret key stream section: master key, working key and message key.Master key is just to have determined before dispatching from the factory, and working key is to be downloaded by KMC's distribution at every turn, and message key produces at random at encrypting module.And the distribution download system of working key only is responsible for transparent transmission, needn't know particular content wherein.
As shown in Figure 3, after in the cluster portable terminal, increasing the chip interface of an encrypting module, then the Tx/Rx communication process of the data of the encryption in the portable terminal is as follows, at correspondent portable terminal place, mainly finishing data encryption handles, the cluster portable terminal produces initial value, send to the encrypting module that is connected with the cluster portable terminal, encrypting module uses key and initial value as parameter, produce key stream according to certain algorithm, the voice signal of cluster portable terminal is changed through A/D, source encoding is a digital service information, send to encrypting module, digital service information and key stream produce the business information of encrypting according to certain cryptographic algorithm, and initial value is additional in the business information, voice or data are carried out encryption by encrypting module, and the ciphertext of generation is encrypted modulation more in the air and sent.
Corresponding deciphering flow process is as follows, at the side's talked about portable terminal place, business information by the encryption of air interface demodulate reception, detect and extract the initial value that is added in the business information of encrypting, send to encrypting module, this initial value and the key of preserving in encrypting module are produced key stream according to certain algorithm, encrypting module receives secure service information, and and key stream produce digital service information after the deciphering according to certain decipherment algorithm, voice or data are decrypted processing by encrypting module, through source coding, the D/A conversion is reduced into original voice or data-signal at last.
The enciphering/deciphering process that these two processes are bidirectional reversibles, the data of this double-encryption can guarantee enough that user's data can not satisfied the requirement of special user aspect safety and confidentiality by disabled user or system's eavesdropping and unauthorized access.
Portable terminal adopts hardware mode to realize with being connected of encrypting module, provides two kinds of hardware encipher interfaces: general encrypting module ED (Encryption Device) interface and SIM card encipher interface.Aspect software, relate to the encryption software programming.Provide general encrypting module hardware interface (serial mode) and configuring external SIM interface (ISO7816 standard interface) at hardware aspect.The processor of encrypting module or memory space, system frequency and the message transmission rate of SIM card chip there are certain requirement, otherwise can influence the performance of End to End Encryption even the performance of system.
Embodiment 1, as shown in Figure 5, adopts encrypting module to be connected by the UART bus communication with the cluster portable terminal; The chip that processor adopting among the encrypting module ED is special, the communication mode of the core processor CPU in encrypting module and the mobile terminal apparatus adopt UART serial bus form, and interface definition represents that in the drawings wherein holding wire and power line are defined as follows:
TX: encrypting module sends the holding wire of data,
RX: encrypting module receives the holding wire of data,
Vcc: power line,
Gnd: ground wire.
The transmission of enciphered data between travelling carriage and hardware encryption module ED, to adopt serial ports to realize, to comprise detection validation and a series of signaling control transmission between them, the flank speed of the UART serial bus communication of this chip reaches encrypts needed message transmission rate.
Embodiment 2, as shown in Figure 6, are that encrypting module is connected by SIM card with the cluster portable terminal.Because it is more convenient that the characteristics that SIM card is encrypted are exactly that the user changes cryptographic algorithm, and SIM card occupation space in mobile phone is smaller, the interface of SIM card is the standard that adopts ISO7816, so adopt being defined among Fig. 6 of hardware interface of the encrypting module of this mode to represent.Wherein Ding Yi various holding wires and power line is as follows:
Vcc: power line,
Gnd: ground wire,
Rst: reseting signal line,
I/O: the bi-directional transfer of data line,
Clk: clock cable.
This also has characteristics the SIM card chip very much in the fail safe aspect, it has hardware protection and software protection measure, at hardware aspect, can prevent that the disabled user from utilizing physical friction to obtain logical message among the SIM, in a single day SIM notes abnormalities and understands auto-destruct, then can not re-use; Aspect software, prevent that the disabled user from reading the information among the SIM, in case the key of disabled user's input error, then SIM card starts the self-destruction program automatically, thoroughly self-destruction.Owing to be integrated with the hardware encipher algorithm of standard in the chip, can accelerate cryptographic algorithm greatly so simultaneously.If adopt the method for software cryptography, the operating rate of software cryptography algorithm can not influence the speech quality of system, need certain performance requirement be arranged to the SIM card chip that adopts this encryption technology.
Directly information is encrypted by the encryption function that end-to-end encipher interface among the present invention is realized, guaranteed the safe transmission of information in whole system and Radio Link.Strict more security mechanism is provided like this, has realized the end-to-end terminal encryption function on the complete meaning.

Claims (13)

1. the device of end to end security in the group system comprises base station, main control base station, network management system and dispatching patcher, it is characterized in that also comprising:
Be connected with network management system with main control base station, be used for sending the Key Management server of key to the cluster portable terminal in the service area;
Be connected with encrypting module, produce or extract initial value, and send the cluster portable terminal that receives secure service information;
Be connected with the cluster portable terminal, produce key stream as parameter according to certain algorithm, and produce the encrypting module of secure service information with digital service information and key stream according to certain enciphering and deciphering algorithm with key and initial value.
2. the device of end to end security in the group system according to claim 1 is characterized in that the Key Management server according to certain calculation generation key, regular update key and key management.
3. the device of end to end security in the group system according to claim 1 is characterized in that:
Give the Key Management server of the cluster portable terminal transmission key in the service area by short message way;
Receive key, reply the cluster portable terminal of replying Key Management server by short message.
4. the device of end to end security in the group system according to claim 1 is characterized in that KMC is distributed to the key of the cluster portable terminal unanimity in the service area.
5. the device of end to end security in the group system according to claim 1 is characterized in that the encrypting module that is connected with the cluster portable terminal by UART interface or SIM card interface.
6. the device of end to end security in the group system according to claim 1 is characterized in that the initial value that produces is the cluster portable terminal of a random value.
7. the device of end to end security in the group system according to claim 6 is characterized in that the initial value that produces is additional to cluster portable terminal in the business information by the mode of secure service information being stolen frame.
8. the device of end to end security in the group system according to claim 1, the encrypting module that it is characterized in that producing the algorithm of key stream and produce the cryptographic algorithm regular update of secure service information.
9. the device of end to end security in the group system according to claim 8 is characterized in that employed key is the symmetric cryptography mode in the enciphering and deciphering algorithm, and call terminal connects the encrypting module of key agreement.
10. according to the device of end to end security in the described group system of any claim of claim 1 to 9, it is characterized in that the business information of encrypting is voice messaging, data message and image information.
11. the method for KMC's distributed key in the group system is characterized in that may further comprise the steps:
Key Management server generation, renewal and managing keys send to cluster portable terminal in the service area to key;
The cluster portable terminal is received key, replys the response message of having received key to KMC;
KMC's affirmation portable terminal is received key, just no longer sends this key, does not send key otherwise do not stop paying out in during certain hour.
12. end-to-end method of encrypting in the group system is characterized in that may further comprise the steps:
KMC sends key for the cluster portable terminal in the service area;
The cluster portable terminal produces initial value, sends to the encrypting module that is connected with the cluster portable terminal, and encrypting module uses key and initial value as parameter, produces key stream according to certain algorithm;
Data service in the cluster portable terminal or be the voice signal of digital service information through A/D conversion, source encoding, send to encrypting module, digital service information and key stream produce the business information of encrypting according to certain cryptographic algorithm, and initial value is additional in the business information;
The business information of having encrypted in the cluster portable terminal sends by the air interface modulation.
13. the method for end-to-end deciphering in the group system is characterized in that may further comprise the steps:
The business information that the cluster portable terminal is encrypted by the air interface demodulate reception;
The cluster portable terminal detects and extracts the initial value that is added in the business information of encrypting, and sends to encrypting module, and this initial value and the key of preserving in encrypting module are produced key stream according to certain algorithm;
The business information that encrypting module receive to be encrypted, and and key stream produce digital service information after the deciphering according to certain decipherment algorithm;
Digital service information after the deciphering that cluster portable terminal reception encrypting module sends obtains data-signal or is converted to voice signal through source coding, D/A.
CN 200510042374 2005-01-26 2005-01-26 Device and its method for end-to-end enciphering and deenciphering in clony system Pending CN1649295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200510042374 CN1649295A (en) 2005-01-26 2005-01-26 Device and its method for end-to-end enciphering and deenciphering in clony system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510042374 CN1649295A (en) 2005-01-26 2005-01-26 Device and its method for end-to-end enciphering and deenciphering in clony system

Publications (1)

Publication Number Publication Date
CN1649295A true CN1649295A (en) 2005-08-03

Family

ID=34876357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510042374 Pending CN1649295A (en) 2005-01-26 2005-01-26 Device and its method for end-to-end enciphering and deenciphering in clony system

Country Status (1)

Country Link
CN (1) CN1649295A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100466770C (en) * 2006-03-21 2009-03-04 中兴通讯股份有限公司 Method for realizing end-to-end encrypting call in cluster system
CN101203025B (en) * 2006-12-15 2010-11-10 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
CN101483813B (en) * 2008-01-09 2010-12-01 中兴通讯股份有限公司 System and method for implementing ciphered synchronous information transmission in digital cluster
CN102523581A (en) * 2011-05-31 2012-06-27 迈普通信技术股份有限公司 Method and system for secure communication during short message-based out-of-band management on 3G equipment
CN102523563A (en) * 2011-12-26 2012-06-27 深圳市华信安创科技有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN104581712A (en) * 2014-12-25 2015-04-29 中国科学院信息工程研究所 Encryption communication method and system of mobile terminal
CN106921827A (en) * 2015-12-25 2017-07-04 北京计算机技术及应用研究所 Secure network high-definition camera
CN112491535A (en) * 2020-11-04 2021-03-12 郑州信大捷安信息技术股份有限公司 Encryption key cooperation system and method between differential units in differential protection group

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100466770C (en) * 2006-03-21 2009-03-04 中兴通讯股份有限公司 Method for realizing end-to-end encrypting call in cluster system
CN101203025B (en) * 2006-12-15 2010-11-10 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
CN101483813B (en) * 2008-01-09 2010-12-01 中兴通讯股份有限公司 System and method for implementing ciphered synchronous information transmission in digital cluster
CN102523581A (en) * 2011-05-31 2012-06-27 迈普通信技术股份有限公司 Method and system for secure communication during short message-based out-of-band management on 3G equipment
CN102523563A (en) * 2011-12-26 2012-06-27 深圳市华信安创科技有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN102523563B (en) * 2011-12-26 2015-04-15 深圳奥联信息安全技术有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN104581712A (en) * 2014-12-25 2015-04-29 中国科学院信息工程研究所 Encryption communication method and system of mobile terminal
CN106921827A (en) * 2015-12-25 2017-07-04 北京计算机技术及应用研究所 Secure network high-definition camera
CN112491535A (en) * 2020-11-04 2021-03-12 郑州信大捷安信息技术股份有限公司 Encryption key cooperation system and method between differential units in differential protection group

Similar Documents

Publication Publication Date Title
CN101340443B (en) Session key negotiating method, system and server in communication network
CN1319294A (en) Adapter having secure function and computer secure system using it
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
CN1841996A (en) Apparatus and method for protecting transmission of communication content
CN102196375A (en) Securing out-of-band messages
CN1659821A (en) Method for secure data exchange between two devices
CN105792190B (en) Data encryption, decryption and transmission method in communication system
CN101384042A (en) Mobile phone ciphering method based on safe digital interface ciphering card
CN101677269A (en) Method and system for transmitting keys
CN105208028A (en) Data transmission method and related device and equipment
CN103167494B (en) Method for sending information and system
CN103222290B (en) For the method and apparatus sending and receiving secure data and non-secure data
US10601586B2 (en) Method and apparatus for key management of end encrypted transmission
CN105007163A (en) Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
CN102404337A (en) Data encryption method and device
CN101057446A (en) Method and apparatus for receiving broadcast content
CN101964805A (en) Method, equipment and system for safely sending and receiving data
CN104602208B (en) A kind of SMS encryption communication means based on mobile network
US20070154015A1 (en) Method for cipher key conversion in wireless communication
CN110212991B (en) Quantum wireless network communication system
CN113591109B (en) Method and system for communication between trusted execution environment and cloud
CN105262759A (en) Method and system for encrypted communication
CN112184967A (en) Unlocking method and system for power distribution net cage
KR100931986B1 (en) Terminal and method for transmitting message and receiving message
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication