CN1832596A - Method for enciphering to personal handy phone - Google Patents
Method for enciphering to personal handy phone Download PDFInfo
- Publication number
- CN1832596A CN1832596A CNA2005100242355A CN200510024235A CN1832596A CN 1832596 A CN1832596 A CN 1832596A CN A2005100242355 A CNA2005100242355 A CN A2005100242355A CN 200510024235 A CN200510024235 A CN 200510024235A CN 1832596 A CN1832596 A CN 1832596A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- encryption
- user
- encrypted
- negotiation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
This invention discloses a method for ciphering PAS phones, which adds a ciphering and de-ciphering module on the cell phone and realizes the setting, negotiation of thr ciphering mode and user ciphered communication.
Description
Technical field
The present invention relates to the encryption in the mobile communication process, more specifically refer to a kind of the PHS mobile phone encryption method.
Background technology:
Along with rapid development of social economy, PHS mobile phone has become one of indispensable communication tool of more and more people with advantages such as its economy, radiation are little.Yet radio communication has also been brought Communication Security Problem inevitably when offering convenience to people, and aerial signal is is often intercepted and captured easily.Tracing it to its cause, mainly is that following traffic model is followed in the communication between the PHS mobile phone, as shown in Figure 1.As can be seen from Figure 1, without any encryption measures, be easy to be eavesdropped during owing to the interface propagation aloft of PHS mobile phone signal.Therefore be necessary the communication mode of existing PHS mobile phone is improved.
Summary of the invention
The objective of the invention is the above-mentioned shortcoming that exists at the communication between the existing PHS mobile phone, provide a kind of realizations simple, with low cost, and the cellphone subscriber can Autonomous Control and selection with network have nothing to do to the PHS mobile phone encryption method.
To achieve these goals, the present invention adopts following technical scheme:
Should well-informed implementation method of encrypting mobile phone at first in user mobile phone, add encrypting module,
May further comprise the steps:
A, the setting of user encryption pattern,
The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;
B, the user encryption mode negotiation
After encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;
C, user encryption communication
After user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
Among the described step a, encryption mode is set and further be may further comprise the steps:
A1, the user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;
A2, user set pattern according to the user after finishing and encrypting setting, generate the parameter relevant with encryption mode automatically;
A3 triggers the encryption mode negotiation module and carries out encrypted negotiation.
Among the described step b,
Described system short message is meant the short message that encryption mode is consulted, and this short message adopts different forms with user's short message coding, and it is consulted signaling and comprises the request of encryption, encrypts cancellation, encrypted response and response etc.
Among the described step b, user encryption mode negotiation originating end further may further comprise the steps:
B11, the A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;
B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;
B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;
B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;
B15 after timer T3 overflows, changes step b16 over to;
B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
Among the described step b, user encryption mode negotiation receiving terminal further may further comprise the steps:
B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;
B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;
B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;
B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
Among the described step c, user encryption communication transmitting terminal further may further comprise the steps:
C11 carries out source encoding to voice signal or data-signal;
C12 reads this communication object user encryption and sets pattern from mobile phone memory, then encrypt according to the setting pattern if need to encrypt;
C13 carries out chnnel coding, finishes transmission.
Among the described step c, the user encryption communication receiver further may further comprise the steps:
C21 receives aerial signal, finishes channel-decoding;
C22 judges whether to exist user encryption according to the record in the mobile phone register, if exist, then is decrypted according to the encryption mode that configures;
C23 finishes source coding and output.
This method also further comprises the encryption mode hot-swap, and the encryption mode hot-swap is meant that the cellphone subscriber switches conversion between encryption mode and the non-encrypted pattern by switching key setting in mobile phone.
Described encryption mode hot-swap further may further comprise the steps:
D1, the cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and is encrypted request;
D2, after this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;
D3 behind this sign off, encrypts this communication object in the memory and sets schema modification and be encrypted state not.
From technique scheme of the present invention as can be seen, as long as on traditional PHS mobile phone, increase the encryption and decryption module, and realize setting, user encryption mode negotiation, the user encryption communication of user encryption pattern by corresponding software, this method makes Personal Handyphone System user's mobile phone not only can equally with regular handset use, can also carry out speech scrambling, and, make and monitor very difficulty the different encryption mode of different user employing; In addition, realize that this function need not the network equipment is done any change, the cellphone subscriber can Autonomous Control and selection and the irrelevant software cryptography mode of network, and this method realizes simple, and is with low cost.
Description of drawings
Fig. 1 is traditional PHS mobile phone traffic model schematic diagram.
Fig. 2 is a PHS mobile phone traffic model schematic diagram of the present invention.
Fig. 3 is in the inventive method, encryption mode setting process schematic diagram.
Fig. 4 is in the method for the present invention, and encryption mode is consulted the originating end schematic flow sheet.
Fig. 5 is in the method for the present invention, and encryption mode is consulted the receiving terminal schematic flow sheet.
Fig. 6 is in the method for the present invention, the schematic flow sheet of user encryption communication transmitting terminal.
Fig. 7 is in the method for the present invention, the schematic flow sheet of user encryption communication receiver.
Fig. 8 is in the method for the present invention, the schematic flow sheet of encryption mode hot-swap.
Embodiment
For further specifying above-mentioned purpose of the present utility model, technical scheme and effect, in conjunction with above-mentioned each figure the utility model is described in detail by the following examples.
Please consult shown in Figure 2 earlier, basic thought of the present invention is to increase a user encryption software module in PHS mobile phone, this software module has user encryption setting, user encryption negotiation, user encryption communication and four functions of encryption mode hot-swap, will narrate respectively below:
The setting of user encryption pattern,
The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;
The user encryption mode negotiation
After encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;
User encryption communication
After user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
Particularly,
The process that encryption mode is set is please in conjunction with shown in Figure 3,
The user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;
The user sets pattern according to the user after finishing and encrypting setting, generates the parameter relevant with encryption mode automatically;
Row encrypted negotiation when triggering the encryption mode negotiation module.
After the user encryption mode negotiation is meant that encryption mode is set, encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode, the notion of system's short message is proposed here, be because encryption mode consults to utilize short message to send and receiving platform, purpose is to make full use of mature technology, reduces and realizes cost and complexity.But must distinguish with the visible short message in general sense of user, therefore, will be called system's short message as the short message that encryption mode is consulted in this article, system's short message is invisible to the user.As long as adopt and the different form of existing short message coding, just can be easy to compartment system short message and user's short message.Encryption mode is consulted signaling and is comprised the request of encryption, encrypts cancellation, and encrypted response and response etc. can be expanded according to the actual requirements, and concrete each producer of signaling format can be self-defined.Encryption mode is consulted signaling bear in system's short message.
The flow process that encryption mode is consulted originating end is please in conjunction with Fig. 4 and be described below,
The A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;
B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;
B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;
B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;
B15 after timer T3 overflows, changes step b16 over to;
B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
Encryption mode is consulted the flow process of receiving terminal please in conjunction with shown in Figure 5,
B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;
B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;
B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;
B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
After user encryption mode initialization and negotiation are finished, just need carry out according to the encryption mode of setting with communicating by letter of special object.Any signaling between network and mobile phone is not revised in user encryption communication, only after voice link is set up, increases the encryption and decryption process in encoding-decoding process.
The flow process of user encryption communication transmitting terminal is asked for an interview shown in Figure 6,
Voice signal or data-signal are carried out source encoding;
From mobile phone memory, read this communication object user encryption and set pattern, then encrypt according to the setting pattern if need to encrypt;
Carry out chnnel coding, finish transmission.
The flow process of user encryption communication receiver as shown in Figure 7,
Receive aerial signal, finish channel-decoding;
Judge whether to exist user encryption according to the record in the mobile phone register,, then be decrypted according to the encryption mode that configures if exist;
Finish source coding and output.
The encryption mode hot-swap
The encryption mode hot-swap is meant that the cellphone subscriber can cancel user encryption by singly-bound in conversation, thereby switches to non-encrypted pattern.This function is for fear of producing, and to change reception and transmitting terminal encryption mode that mobile phone causes inconsistent owing to occur accident or mobile phone fault or user in the encrypted negotiation process, thereby the situation that can't communicate by letter, in case the situation that appearance can't be communicated by letter, the user can switch to non-encrypted pattern immediately.
Please consult shown in Figure 8ly at last, described encryption mode hot-swap further may further comprise the steps:
The cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and encrypted request;
After this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;
Behind this sign off, this communication object in the memory encrypted set schema modification and be encrypted state not.
Need to prove at last, when practice, can adopt normally used A5 in the GSM network, the cipher mode of A8 maturation is also according to adopting the higher cipher mode of complexity.Owing to adopt short message to carry out encrypted negotiation, therefore can increase user's short message expense in right amount, under the normal condition, finishing encrypted negotiation needs 1-3 bar short message.In addition, though adopt short message communication can not guarantee its reliability fully, because the encryption mode hot-swapping function is arranged, even the inconsistent situation of two ends user encryption pattern occurs, also can very fast recovery communication.
Certainly, those of ordinary skill in the art will be appreciated that, above embodiment is used for illustrating the utility model, and be not to be used as qualification of the present utility model, as long as in connotation scope of the present utility model, all will drop in the scope of the utility model claims variation, the modification of the above embodiment.
Claims (9)
- It is 1, a kind of to the PHS mobile phone encryption method,It is characterized in that,This method at first adds encrypting module in user mobile phone, this method may further comprise the steps:A, the setting of user encryption pattern,The user sets the object carry out coded communication, and the mode of carrying out coded communication for this Object Selection, and generates automatically and the relevant parameter of cipher mode;B, the user encryption mode negotiationAfter encryption mode is set, make encrypting module automatically by system's short message with end subscriber is carried out the negotiation of encryption mode;C, user encryption communicationAfter user encryption mode initialization and negotiation are finished, according to the encryption mode that sets, make both call sides in any signaling of not revising between network and the mobile phone, only after voice link is set up, in encoding-decoding process, increase the encryption and decryption process.
- It is 2, as claimed in claim 1 to the PHS mobile phone encryption method,It is characterized in that,Among the described step a, encryption mode is set and further be may further comprise the steps:A1, the user is that by man-machine interface the particular communication object sets the communication encryption pattern, comprises whether needing the cipher mode encrypting and adopt;A2, user set pattern according to the user after finishing and encrypting setting, generate the parameter relevant with encryption mode automatically;A3 triggers the encryption mode negotiation module and carries out encrypted negotiation.
- It is 3, as claimed in claim 1 to the PHS mobile phone encryption method,It is characterized in that,Among the described step b,Described system short message is meant the short message that encryption mode is consulted, and this short message adopts different forms with user's short message coding, and it is consulted signaling and comprises the request of encryption, encrypts cancellation, encrypted response and response etc.
- 4, as claim 1 or 3 described to the PHS mobile phone encryption method,It is characterized in that,Among the described step b, user encryption mode negotiation originating end further may further comprise the steps:B11, the A mobile phone sends the request of encryption or encrypts cancellation to the B mobile phone, carries the associated encryption parameter in this signaling, and establishes timer T1;B12, before timer T1 overflowed, the A mobile phone received the encrypted response that the B mobile phone sends, and the A mobile phone sends response to the B mobile phone, establishes timer T3, changes step b14 over to;B13, timer T1 overflow and do not receive the response of B mobile phone, and the A mobile phone is notified the user this encrypted negotiation failure by man-machine interface, changes step b16 over to;B14 before timer T3 overflows, if receive the encrypted response that the B mobile phone sends once more, then sends response once more;B15 after timer T3 overflows, changes step b16 over to;B15, the A mobile phone writes memory in the mobile phone with the result of encrypted negotiation.
- 5, as claim 1 or 3 described to the PHS mobile phone encryption method,It is characterized in that,Among the described step b, user encryption mode negotiation receiving terminal further may further comprise the steps:B21, B mobile phone receive the encrypted negotiation signaling that the A mobile phone sends, and the B mobile phone is responded encrypted response to the A mobile phone, and establishes timer T2;B22, T2 timer expiry, B mobile phone without putting through receive the response that the A mobile phone sends, and then repeat above-mentioned steps N1 time, change step b24 over to after N1 time;B23 before timer T2 overflows, receives the response that the A mobile phone sends, and then changes step b24 over to;B24, the B mobile phone writes the mobile phone register with the result of encrypted negotiation.
- It is 6, as claimed in claim 1 to the PHS mobile phone encryption method,It is characterized in that,Among the described step c, user encryption communication transmitting terminal further may further comprise the steps:C11 carries out source encoding to voice signal or data-signal;C12 reads this communication object user encryption and sets pattern from mobile phone memory, then encrypt according to the setting pattern if need to encrypt;C13 carries out chnnel coding, finishes transmission.
- It is 7, as claimed in claim 1 to the PHS mobile phone encryption method,It is characterized in that,Among the described step c, the user encryption communication receiver further may further comprise the steps:C21 receives aerial signal, finishes channel-decoding;C22 judges whether to exist user encryption according to the record in the mobile phone register, if exist, then is decrypted according to the encryption mode that configures;C23 finishes source coding and output.
- It is 8, as claimed in claim 1 to the PHS mobile phone encryption method,It is characterized in that,This method also further comprises the encryption mode hot-swap, and the encryption mode hot-swap is meant that the cellphone subscriber switches conversion between encryption mode and the non-encrypted pattern by switching key setting in mobile phone.
- It is 9, as claimed in claim 8 to the PHS mobile phone encryption method,It is characterized in that,Described encryption mode hot-swap further may further comprise the steps:D1, the cellphone subscriber triggers switching key, and man-machine interface is sent cancellation to this cellphone subscriber's encrypting module and is encrypted request;D2, after this cellphone subscriber's encrypting module receives this request, in encoding-decoding process subsequently, cancellation user encryption and decrypting process;D3 behind this sign off, encrypts this communication object in the memory and sets schema modification and be encrypted state not.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100242355A CN1832596A (en) | 2005-03-07 | 2005-03-07 | Method for enciphering to personal handy phone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100242355A CN1832596A (en) | 2005-03-07 | 2005-03-07 | Method for enciphering to personal handy phone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1832596A true CN1832596A (en) | 2006-09-13 |
Family
ID=36994558
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2005100242355A Pending CN1832596A (en) | 2005-03-07 | 2005-03-07 | Method for enciphering to personal handy phone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1832596A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009018684A1 (en) * | 2007-08-08 | 2009-02-12 | Kamfu Wong | The keyboard for encrypting and authenticating against trojan horse with one time key |
CN102307346A (en) * | 2011-08-29 | 2012-01-04 | 成都华之芯科技有限公司 | Method for security of mobile phone communication and security mobile phone |
WO2015188411A1 (en) * | 2014-06-13 | 2015-12-17 | 快车科技有限公司 | Method and system for automatic selection of secure channel on the basis of user use characteristics |
-
2005
- 2005-03-07 CN CNA2005100242355A patent/CN1832596A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009018684A1 (en) * | 2007-08-08 | 2009-02-12 | Kamfu Wong | The keyboard for encrypting and authenticating against trojan horse with one time key |
CN102307346A (en) * | 2011-08-29 | 2012-01-04 | 成都华之芯科技有限公司 | Method for security of mobile phone communication and security mobile phone |
CN102307346B (en) * | 2011-08-29 | 2014-01-29 | 成都华之芯科技有限公司 | Method for security of mobile phone communication and security mobile phone |
WO2015188411A1 (en) * | 2014-06-13 | 2015-12-17 | 快车科技有限公司 | Method and system for automatic selection of secure channel on the basis of user use characteristics |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100338545C (en) | Integration of secure identification logic into cell phone | |
CN101345965A (en) | Encryption call method based on speech code stream and mobile terminal | |
CN1949709A (en) | Method of network access indentifying and authorizing and method of updating authorizing key | |
CN1925681A (en) | End-to-end encrypting method and system based on mobile communication network | |
CN106790281A (en) | A kind of end-to-end voice encryption device and encryption method towards intercom system | |
CN105743914A (en) | Voice encrypted communication method and system, calling party and called party | |
JP5739006B2 (en) | Method and apparatus for sending and receiving secure and non-secure data | |
CN1705261A (en) | End-to-end encrypting communication system and method | |
CN105050082A (en) | Voice communication method and device | |
CN1968539A (en) | Encrypted information processing method and terminal | |
CN101287274A (en) | Voice encryption system for mobile communication and encryption method thereof | |
KR20080080152A (en) | Method for cipher key conversion in wireless communication | |
CN1649295A (en) | Device and its method for end-to-end enciphering and deenciphering in clony system | |
CN1832596A (en) | Method for enciphering to personal handy phone | |
CN103379486A (en) | Plug and play type portable communication secrecy device and communication method thereof | |
CN1688171A (en) | Apparatus and method for implementing data safety transmission of mobile communication apparatus | |
CN101500231A (en) | Mobile terminal, audio data processing method and system | |
CN102307346B (en) | Method for security of mobile phone communication and security mobile phone | |
CN1592141A (en) | Terminal to terminal encryption method of cell phone voice and data | |
CN1564504A (en) | Chaos coding/decoding method of data stream and modularized circuit | |
CN1893474A (en) | Method and apparatus for realizing voice enciphering in communication system | |
EP2809045B1 (en) | Information security attachment device for voice communication and information security method for voice communication using the same | |
CN203537408U (en) | End-to-end voice communication privacy device with assignable secret key | |
CN1285227C (en) | Short message security method and SIM card for implementing short message security | |
CN104581711A (en) | Mobile terminal with communication encryption function as well as communication encryption method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |