CN2785270Y - Device for realizing mobile secret terminal secret communication safety - Google Patents

Device for realizing mobile secret terminal secret communication safety Download PDF

Info

Publication number
CN2785270Y
CN2785270Y CN 200420105808 CN200420105808U CN2785270Y CN 2785270 Y CN2785270 Y CN 2785270Y CN 200420105808 CN200420105808 CN 200420105808 CN 200420105808 U CN200420105808 U CN 200420105808U CN 2785270 Y CN2785270 Y CN 2785270Y
Authority
CN
China
Prior art keywords
circuit
terminal
secret
utility
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 200420105808
Other languages
Chinese (zh)
Inventor
虞忠辉
梁鸿斌
肖红英
陈爱华
曾勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu 30ruitong Mobile Communication Co., Ltd.
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN 200420105808 priority Critical patent/CN2785270Y/en
Application granted granted Critical
Publication of CN2785270Y publication Critical patent/CN2785270Y/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model discloses a device for realizing the secure communication safety of a mobile secure terminal, which is composed of a shell of the device and a circuit, wherein the shell of the device is provided with a status indicator and a power switch; the circuit is arranged in the shell of the device and realizes wireless connection with a secure terminal, carries out terminal identity authentication and sends split secret keys and algorithm programs to the secure terminal; the circuit is composed of a Bluetooth interface module circuit, a control module circuit and a power supply module circuit, wherein the Bluetooth interface module circuit is connected with the control module circuit; the Bluetooth interface module circuit and the control module circuit are respectively connected with the power supply module. The utility model has the advantages that because the secret keys and the algorithm programs are split and stored in the utility model and the mobile secure terminal, the utility model and the mobile secure terminal can be used in an authentication mode only when the utility model and the mobile secure terminal are bound, and after the distance between the utility model and the mobile secure terminal is larger than 10 meters, the split secret keys and the algorithm programs stored in the mobile secure terminal are automatically destroyed, so that harm can not be caused if the mobile secure terminal is lost. The utility model has the advantages of simple structure, small size and convenient operation.

Description

Realize moving the device of secret terminal security communication security
Technical field
The utility model relates to a kind of device that can guarantee to move secret terminal security communication security, particularly relates to the protective device that a kind of and mobile secret terminal realizes wireless connections, guarantees its secure communication safety.
Background technology
Move secret terminal (moving secret terminal, vehicle-mounted secret terminal etc. as GSM) when the secure communication service is provided for the user, himself also exists various potential threats, moves secret terminal as illegally using by force; Personation validated user steal moves secret terminal; Steal or distort cryptographic algorithm and the cipher key store that moves on the secret terminal; Lose separate unit and move secret terminal or intellective IC card etc.Therefore, must take safety precautions to moving secret terminal, to reduce potential threat to its generation.Such as, to private datas such as the key that moves secret terminal storage, cryptographic algorithm, adopt the encryption of cryptographic algorithm to cover protection, and it is stored in respectively in the FLASH memory, intellective IC card of CPU; Intellective IC card is provided with PIN (password) protection, when making it the PIN input error, can not reads the technical measures such as private data of intellective IC card.
Yet existing to move the safety measure that secret terminal adopted perfect not enough, still exists owing to move losing of intelligent IC that secret terminal and binding use, and cause the serious threat to the user cipher device communication security.
Summary of the invention
The objective of the invention is to: for using the user who moves secret terminal, provide a kind of and the supporting use of this terminal, can guarantee the protective device of this terminal security communication security.
Goal of the invention of the present utility model realizes by implementing following technical proposals:
Realize moving the device of secret terminal security communication security, by the crust of the device that is provided with status indicator lamp and mains switch, the key that is contained in the device case and realizes wireless connections with secret terminal, carries out the terminal identity authentication and cut apart to its transmission and the circuit of algorithm routine are formed, it is characterized in that: realize authentication with secret terminal and send the key cut apart and the circuit of algorithm routine, form by blue tooth interface modular circuit, control module circuit and power module circuitry; Wherein, the blue tooth interface modular circuit is connected with the control module circuit, and the blue tooth interface modular circuit is connected with power module circuitry respectively with the control module circuit.
Advantage of the present utility model is: because key and algorithm routine, be to cut apart to leave in secret terminal and this device, and in this device, write corresponding mobile secret terminal use's identification code, both only just can authenticate use mutually under the binding situation, and both are after exceeding 10 meters distances, owing to leave the key cut apart in the secret terminal and algorithm routine in by auto-destruct,, also can not work the mischief to whole system even therefore move secret lost terminal; Another advantage of the utility model is that this apparatus structure is simple, and volume is little, and is easy to use, easy to utilize.
Description of drawings
Fig. 1 is the utility model structural representation and and bluetooth GSM secret mobile phone traffic diagram
Fig. 2 is the bluetooth module circuit structure diagram
Fig. 3 is the control module circuit structure diagram
Fig. 4 is the power module circuitry structure chart.
Mark among the figure: 1, be bluetooth channel, 2 is the utility model device, and 3 is bluetooth GSM secret mobile phone.
Embodiment:
Realize moving the device 2 of secret terminal security communication security, by the crust of the device that is provided with status indicator lamp and mains switch, be contained in the device case, realize wireless connections, carry out the terminal identity authentication and the key cut apart to its transmission and the circuit of algorithm routine are formed by bluetooth channel 1 with bluetooth GSM secret mobile phone 3; Wherein: realize authentication and send the circuit of Split Key and algorithm routine to it with bluetooth GSM secret mobile phone 3, form by blue tooth interface modular circuit, control module circuit and power module circuitry, the blue tooth interface modular circuit is connected with the control module circuit, and the blue tooth interface modular circuit is connected with power module circuitry respectively with the control module circuit.
This installs 2 used blue tooth interface modules, can select the BC219159A-BN of CSR company production and sales for use, power module can be selected the MAX1792 of Maxim company production and sales for use, and control module is made up of CPU and peripheral circuit, the single-chip microcomputer C8051F020 that CPU can select for use Cygnal company to produce.
Every GSM secret mobile phone all has this device of a pairing.This device of numbering is done writing of Split Key and partitioning algorithm program in safe and secret administrative center (SCMC).Writing content comprises: the GSM secret mobile phone authenticate key of respective user, master key, working key; The IMEI number, SIM card number that are used for the corresponding mobile phone of authentication.Finish this device after data write, just can give the user use with corresponding mobile phone is supporting.
The utility model operation principle is as follows:
Make GSM secret mobile phone 3 be in open state, closely (less than 10 meters) press the mains switch on this device 2, this device is activated, its status indicator lamp glows, bluetooth module circuit in the device 2 receives the signal that GSM secret mobile phone 3 sends from its antenna, and it is transferred to the control module circuit, finish authentication by the CPU in this circuit to GSM secret mobile phone 3, Split Key and algorithm routine with storage returns to the bluetooth module circuit again, send to GSM secret mobile phone 3 by its antenna by bluetooth channel 1, finish the synthetic of Split Key and algorithm routine, make GSM secret mobile phone 3 enter the secure communication operating state, the status indicator lamp on the device sends green glow.If authentication is unsuccessful, then this device 2 can not send Split Key and algorithm routines to GSM secret mobile phone 3, and GSM secret mobile phone 3 can not be finished the synthetic of Split Key and algorithm routine, so communication channel can not connect, and the status indicator lamp that installs on 2 glows.Surpass 10 meters if GSM secret mobile phone 3 leaves the distance of this device 2, then Split Key in the mobile phone 3 and algorithm routine are by auto-destruct.

Claims (1)

1, realizes moving the device of secret terminal security communication security, by the crust of the device that is provided with status indicator lamp and mains switch, be contained in the device case and realize wireless connections, carry out the terminal identity authentication and form to its circuit that sends Split Key and algorithm routine with secret terminal, it is characterized in that: realize authentication and the circuit that sends Split Key and algorithm routine with secret terminal, form by blue tooth interface modular circuit, control module circuit and power module circuitry; Wherein, the blue tooth interface modular circuit is connected with the control module circuit, and the blue tooth interface modular circuit is connected with power module circuitry respectively with the control module circuit.
CN 200420105808 2004-12-29 2004-12-29 Device for realizing mobile secret terminal secret communication safety Expired - Lifetime CN2785270Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200420105808 CN2785270Y (en) 2004-12-29 2004-12-29 Device for realizing mobile secret terminal secret communication safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200420105808 CN2785270Y (en) 2004-12-29 2004-12-29 Device for realizing mobile secret terminal secret communication safety

Publications (1)

Publication Number Publication Date
CN2785270Y true CN2785270Y (en) 2006-05-31

Family

ID=36772231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200420105808 Expired - Lifetime CN2785270Y (en) 2004-12-29 2004-12-29 Device for realizing mobile secret terminal secret communication safety

Country Status (1)

Country Link
CN (1) CN2785270Y (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376280A (en) * 2017-11-03 2018-08-07 河南芯盾网安科技发展有限公司 Bluetooth pasting card

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108376280A (en) * 2017-11-03 2018-08-07 河南芯盾网安科技发展有限公司 Bluetooth pasting card
CN108376280B (en) * 2017-11-03 2023-11-03 河南芯盾网安科技发展有限公司 Bluetooth film card

Similar Documents

Publication Publication Date Title
CN103778693B (en) The coding lock system that a kind of mobile phone light is unblanked
CN102497465A (en) High-secrecy mobile information safety system and safety method for distributed secret keys
CN102915588A (en) Bluetooth technology-based intelligent lock system and control method thereof
CN103259664A (en) Nfc dynamic password chip and working method thereof
CN201716733U (en) USB safe storage crypto card
CN211063630U (en) 4G full network router
CN2785270Y (en) Device for realizing mobile secret terminal secret communication safety
CN206348778U (en) A kind of device of instrument program upgrading
CN106627852A (en) Electric bicycle wireless locking system based on mobile phone authentication
CN104794789A (en) Photoelectric coded lock system
CN107426184A (en) Power system Mobile solution information safety system and its transmission method
CN203206256U (en) A mobile storage device
CN204216909U (en) Special service system information safety device
CN201928292U (en) Multifunctional electronic cryptoguard device communicating through audio signal
CN203699577U (en) Inner call panel inside car and call system of elevator
CN202067291U (en) Multifunctional mobile police affair validating terminal
CN105681943A (en) Multifunctional Bluetooth earphone
CN2901750Y (en) Mobile terminal safety system
CN205068537U (en) Outdoor machine door prohibits system based on cell -phone control
CN201185463Y (en) Fingerprint mobile phone capable of controlling authority
CN201017467Y (en) Infrared intelligent electrical energy meter remote controller
CN204242229U (en) A kind of firearms management system
CN104929442B (en) Intelligent anti-theft lock
CN102314733A (en) Method for preventing cashes in bank card from being falsely withdrawn
CN207442938U (en) A kind of encrypted antitheft smart mobile phone

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: CHENGDU 30 RTOM MOBILE COMMUNICATIONS CO. LTD.

Free format text: FORMER OWNER: NO.30 INST., CHINA ELECTRONIC SCI. + TECH. GROUP CO.

Effective date: 20061117

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20061117

Address after: 610041, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu

Patentee after: Chengdu 30ruitong Mobile Communication Co., Ltd.

Address before: 610041, No. 6, pioneering Road, hi tech Zone, Sichuan, Chengdu

Patentee before: No.30 Inst., China Electronic Science & Technology Group Corp.

C17 Cessation of patent right
CX01 Expiry of patent term

Expiration termination date: 20141229

Granted publication date: 20060531