CN1832596A - Method for enciphering to personal handy phone - Google Patents

Method for enciphering to personal handy phone Download PDF

Info

Publication number
CN1832596A
CN1832596A CNA2005100242355A CN200510024235A CN1832596A CN 1832596 A CN1832596 A CN 1832596A CN A2005100242355 A CNA2005100242355 A CN A2005100242355A CN 200510024235 A CN200510024235 A CN 200510024235A CN 1832596 A CN1832596 A CN 1832596A
Authority
CN
China
Prior art keywords
mobile phone
encryption
user
encrypted
negotiation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005100242355A
Other languages
Chinese (zh)
Inventor
蔡林川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2005100242355A priority Critical patent/CN1832596A/en
Publication of CN1832596A publication Critical patent/CN1832596A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

This invention discloses a method for ciphering PAS phones, which adds a ciphering and de-ciphering module on the cell phone and realizes the setting, negotiation of thr ciphering mode and user ciphered communication.

Description

A kind of to the PHS mobile phone encryption method
Technical field
The present invention relates to the encryption in the mobile communication process, more specifically refer to a kind of the PHS mobile phone encryption method.
Background technology:
Along with rapid development of social economy, PHS mobile phone has become one of indispensable communication tool of more and more people with advantages such as its economy, radiation are little.Yet radio communication has also been brought Communication Security Problem inevitably when offering convenience to people, and aerial signal is is often intercepted and captured easily.Tracing it to its cause, mainly is that following traffic model is followed in the communication between the PHS mobile phone, as shown in Figure 1.As can be seen from Figure 1, without any encryption measures, be easy to be eavesdropped during owing to the interface propagation aloft of PHS mobile phone signal.Therefore be necessary the communication mode of existing PHS mobile phone is improved.
Summary of the invention
The objective of the invention is the above-mentioned shortcoming that exists at the communication between the existing PHS mobile phone, provide a kind of realizations simple, with low cost, and the cellphone subscriber can Autonomous Control and selection with network have nothing to do to the PHS mobile phone encryption method.
To achieve these goals, the present invention adopts following technical scheme:
Should well-informed implementation method of encrypting mobile phone at first in user mobile phone, add encrypting module,
May further comprise the steps:
A, the setting of user encryption pattern,
The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;
B, the user encryption mode negotiation
After encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;
C, user encryption communication
After user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
Among the described step a, encryption mode is set and further be may further comprise the steps:
A1, the user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;
A2, user set pattern according to the user after finishing and encrypting setting, generate the parameter relevant with encryption mode automatically;
A3 triggers the encryption mode negotiation module and carries out encrypted negotiation.
Among the described step b,
Described system short message is meant the short message that encryption mode is consulted, and this short message adopts different forms with user's short message coding, and it is consulted signaling and comprises the request of encryption, encrypts cancellation, encrypted response and response etc.
Among the described step b, user encryption mode negotiation originating end further may further comprise the steps:
B11, the A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;
B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;
B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;
B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;
B15 after timer T3 overflows, changes step b16 over to;
B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
Among the described step b, user encryption mode negotiation receiving terminal further may further comprise the steps:
B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;
B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;
B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;
B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
Among the described step c, user encryption communication transmitting terminal further may further comprise the steps:
C11 carries out source encoding to voice signal or data-signal;
C12 reads this communication object user encryption and sets pattern from mobile phone memory, then encrypt according to the setting pattern if need to encrypt;
C13 carries out chnnel coding, finishes transmission.
Among the described step c, the user encryption communication receiver further may further comprise the steps:
C21 receives aerial signal, finishes channel-decoding;
C22 judges whether to exist user encryption according to the record in the mobile phone register, if exist, then is decrypted according to the encryption mode that configures;
C23 finishes source coding and output.
This method also further comprises the encryption mode hot-swap, and the encryption mode hot-swap is meant that the cellphone subscriber switches conversion between encryption mode and the non-encrypted pattern by switching key setting in mobile phone.
Described encryption mode hot-swap further may further comprise the steps:
D1, the cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and is encrypted request;
D2, after this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;
D3 behind this sign off, encrypts this communication object in the memory and sets schema modification and be encrypted state not.
From technique scheme of the present invention as can be seen, as long as on traditional PHS mobile phone, increase the encryption and decryption module, and realize setting, user encryption mode negotiation, the user encryption communication of user encryption pattern by corresponding software, this method makes Personal Handyphone System user's mobile phone not only can equally with regular handset use, can also carry out speech scrambling, and, make and monitor very difficulty the different encryption mode of different user employing; In addition, realize that this function need not the network equipment is done any change, the cellphone subscriber can Autonomous Control and selection and the irrelevant software cryptography mode of network, and this method realizes simple, and is with low cost.
Description of drawings
Fig. 1 is traditional PHS mobile phone traffic model schematic diagram.
Fig. 2 is a PHS mobile phone traffic model schematic diagram of the present invention.
Fig. 3 is in the inventive method, encryption mode setting process schematic diagram.
Fig. 4 is in the method for the present invention, and encryption mode is consulted the originating end schematic flow sheet.
Fig. 5 is in the method for the present invention, and encryption mode is consulted the receiving terminal schematic flow sheet.
Fig. 6 is in the method for the present invention, the schematic flow sheet of user encryption communication transmitting terminal.
Fig. 7 is in the method for the present invention, the schematic flow sheet of user encryption communication receiver.
Fig. 8 is in the method for the present invention, the schematic flow sheet of encryption mode hot-swap.
Embodiment
For further specifying above-mentioned purpose of the present utility model, technical scheme and effect, in conjunction with above-mentioned each figure the utility model is described in detail by the following examples.
Please consult shown in Figure 2 earlier, basic thought of the present invention is to increase a user encryption software module in PHS mobile phone, this software module has user encryption setting, user encryption negotiation, user encryption communication and four functions of encryption mode hot-swap, will narrate respectively below:
The setting of user encryption pattern,
The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;
The user encryption mode negotiation
After encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;
User encryption communication
After user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
Particularly,
The process that encryption mode is set is please in conjunction with shown in Figure 3,
The user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;
The user sets pattern according to the user after finishing and encrypting setting, generates the parameter relevant with encryption mode automatically;
Row encrypted negotiation when triggering the encryption mode negotiation module.
After the user encryption mode negotiation is meant that encryption mode is set, encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode, the notion of system's short message is proposed here, be because encryption mode consults to utilize short message to send and receiving platform, purpose is to make full use of mature technology, reduces and realizes cost and complexity.But must distinguish with the visible short message in general sense of user, therefore, will be called system's short message as the short message that encryption mode is consulted in this article, system's short message is invisible to the user.As long as adopt and the different form of existing short message coding, just can be easy to compartment system short message and user's short message.Encryption mode is consulted signaling and is comprised the request of encryption, encrypts cancellation, and encrypted response and response etc. can be expanded according to the actual requirements, and concrete each producer of signaling format can be self-defined.Encryption mode is consulted signaling bear in system's short message.
The flow process that encryption mode is consulted originating end is please in conjunction with Fig. 4 and be described below,
The A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;
B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;
B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;
B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;
B15 after timer T3 overflows, changes step b16 over to;
B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
Encryption mode is consulted the flow process of receiving terminal please in conjunction with shown in Figure 5,
B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;
B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;
B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;
B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
After user encryption mode initialization and negotiation are finished, just need carry out according to the encryption mode of setting with communicating by letter of special object.Any signaling between network and mobile phone is not revised in user encryption communication, only after voice link is set up, increases the encryption and decryption process in encoding-decoding process.
The flow process of user encryption communication transmitting terminal is asked for an interview shown in Figure 6,
Voice signal or data-signal are carried out source encoding;
From mobile phone memory, read this communication object user encryption and set pattern, then encrypt according to the setting pattern if need to encrypt;
Carry out chnnel coding, finish transmission.
The flow process of user encryption communication receiver as shown in Figure 7,
Receive aerial signal, finish channel-decoding;
Judge whether to exist user encryption according to the record in the mobile phone register,, then be decrypted according to the encryption mode that configures if exist;
Finish source coding and output.
The encryption mode hot-swap
The encryption mode hot-swap is meant that the cellphone subscriber can cancel user encryption by singly-bound in conversation, thereby switches to non-encrypted pattern.This function is for fear of producing, and to change reception and transmitting terminal encryption mode that mobile phone causes inconsistent owing to occur accident or mobile phone fault or user in the encrypted negotiation process, thereby the situation that can't communicate by letter, in case the situation that appearance can't be communicated by letter, the user can switch to non-encrypted pattern immediately.
Please consult shown in Figure 8ly at last, described encryption mode hot-swap further may further comprise the steps:
The cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and encrypted request;
After this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;
Behind this sign off, this communication object in the memory encrypted set schema modification and be encrypted state not.
Need to prove at last, when practice, can adopt normally used A5 in the GSM network, the cipher mode of A8 maturation is also according to adopting the higher cipher mode of complexity.Owing to adopt short message to carry out encrypted negotiation, therefore can increase user's short message expense in right amount, under the normal condition, finishing encrypted negotiation needs 1-3 bar short message.In addition, though adopt short message communication can not guarantee its reliability fully, because the encryption mode hot-swapping function is arranged, even the inconsistent situation of two ends user encryption pattern occurs, also can very fast recovery communication.
Certainly, those of ordinary skill in the art will be appreciated that, above embodiment is used for illustrating the utility model, and be not to be used as qualification of the present utility model, as long as in connotation scope of the present utility model, all will drop in the scope of the utility model claims variation, the modification of the above embodiment.

Claims (9)

  1. It is 1, a kind of to the PHS mobile phone encryption method,
    It is characterized in that,
    This method at first adds encrypting module in user mobile phone, this method may further comprise the steps:
    A, the setting of user encryption pattern,
    The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;
    B, the user encryption mode negotiation
    After encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;
    C, user encryption communication
    After user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
  2. It is 2, as claimed in claim 1 to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step a, encryption mode is set and further be may further comprise the steps:
    A1, the user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;
    A2, user set pattern according to the user after finishing and encrypting setting, generate the parameter relevant with encryption mode automatically;
    A3 triggers the encryption mode negotiation module and carries out encrypted negotiation.
  3. It is 3, as claimed in claim 1 to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step b,
    Described system short message is meant the short message that encryption mode is consulted, and this short message adopts different forms with user's short message coding, and it is consulted signaling and comprises the request of encryption, encrypts cancellation, encrypted response and response etc.
  4. 4, as claim 1 or 3 described to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step b, user encryption mode negotiation originating end further may further comprise the steps:
    B11, the A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;
    B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;
    B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;
    B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;
    B15 after timer T3 overflows, changes step b16 over to;
    B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
  5. 5, as claim 1 or 3 described to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step b, user encryption mode negotiation receiving terminal further may further comprise the steps:
    B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;
    B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;
    B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;
    B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
  6. It is 6, as claimed in claim 1 to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step c, user encryption communication transmitting terminal further may further comprise the steps:
    C11 carries out source encoding to voice signal or data-signal;
    C12 reads this communication object user encryption and sets pattern from mobile phone memory, then encrypt according to the setting pattern if need to encrypt;
    C13 carries out chnnel coding, finishes transmission.
  7. It is 7, as claimed in claim 1 to the PHS mobile phone encryption method,
    It is characterized in that,
    Among the described step c, the user encryption communication receiver further may further comprise the steps:
    C21 receives aerial signal, finishes channel-decoding;
    C22 judges whether to exist user encryption according to the record in the mobile phone register, if exist, then is decrypted according to the encryption mode that configures;
    C23 finishes source coding and output.
  8. It is 8, as claimed in claim 1 to the PHS mobile phone encryption method,
    It is characterized in that,
    This method also further comprises the encryption mode hot-swap, and the encryption mode hot-swap is meant that the cellphone subscriber switches conversion between encryption mode and the non-encrypted pattern by switching key setting in mobile phone.
  9. It is 9, as claimed in claim 8 to the PHS mobile phone encryption method,
    It is characterized in that,
    Described encryption mode hot-swap further may further comprise the steps:
    D1, the cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and is encrypted request;
    D2, after this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;
    D3 behind this sign off, encrypts this communication object in the memory and sets schema modification and be encrypted state not.
CNA2005100242355A 2005-03-07 2005-03-07 Method for enciphering to personal handy phone Pending CN1832596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2005100242355A CN1832596A (en) 2005-03-07 2005-03-07 Method for enciphering to personal handy phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2005100242355A CN1832596A (en) 2005-03-07 2005-03-07 Method for enciphering to personal handy phone

Publications (1)

Publication Number Publication Date
CN1832596A true CN1832596A (en) 2006-09-13

Family

ID=36994558

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005100242355A Pending CN1832596A (en) 2005-03-07 2005-03-07 Method for enciphering to personal handy phone

Country Status (1)

Country Link
CN (1) CN1832596A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009018684A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The keyboard for encrypting and authenticating against trojan horse with one time key
CN102307346A (en) * 2011-08-29 2012-01-04 成都华之芯科技有限公司 Method for security of mobile phone communication and security mobile phone
WO2015188411A1 (en) * 2014-06-13 2015-12-17 快车科技有限公司 Method and system for automatic selection of secure channel on the basis of user use characteristics

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009018684A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The keyboard for encrypting and authenticating against trojan horse with one time key
CN102307346A (en) * 2011-08-29 2012-01-04 成都华之芯科技有限公司 Method for security of mobile phone communication and security mobile phone
CN102307346B (en) * 2011-08-29 2014-01-29 成都华之芯科技有限公司 Method for security of mobile phone communication and security mobile phone
WO2015188411A1 (en) * 2014-06-13 2015-12-17 快车科技有限公司 Method and system for automatic selection of secure channel on the basis of user use characteristics

Similar Documents

Publication Publication Date Title
CN100338545C (en) Integration of secure identification logic into cell phone
CN101345965A (en) Encryption call method based on speech code stream and mobile terminal
CN1949709A (en) Method of network access indentifying and authorizing and method of updating authorizing key
CN1925681A (en) End-to-end encrypting method and system based on mobile communication network
CN106790281A (en) A kind of end-to-end voice encryption device and encryption method towards intercom system
CN105743914A (en) Voice encrypted communication method and system, calling party and called party
JP5739006B2 (en) Method and apparatus for sending and receiving secure and non-secure data
CN1705261A (en) End-to-end encrypting communication system and method
CN105050082A (en) Voice communication method and device
CN1968539A (en) Encrypted information processing method and terminal
CN101287274A (en) Voice encryption system for mobile communication and encryption method thereof
KR20080080152A (en) Method for cipher key conversion in wireless communication
CN1649295A (en) Device and its method for end-to-end enciphering and deenciphering in clony system
CN1832596A (en) Method for enciphering to personal handy phone
CN103379486A (en) Plug and play type portable communication secrecy device and communication method thereof
CN1688171A (en) Apparatus and method for implementing data safety transmission of mobile communication apparatus
CN101500231A (en) Mobile terminal, audio data processing method and system
CN102307346B (en) Method for security of mobile phone communication and security mobile phone
CN1592141A (en) Terminal to terminal encryption method of cell phone voice and data
CN1564504A (en) Chaos coding/decoding method of data stream and modularized circuit
CN1893474A (en) Method and apparatus for realizing voice enciphering in communication system
EP2809045B1 (en) Information security attachment device for voice communication and information security method for voice communication using the same
CN203537408U (en) End-to-end voice communication privacy device with assignable secret key
CN1285227C (en) Short message security method and SIM card for implementing short message security
CN104581711A (en) Mobile terminal with communication encryption function as well as communication encryption method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication