CN1177431C - Method and mobile device for end-to-end enciphere - Google Patents
Method and mobile device for end-to-end enciphereInfo
- Publication number
- CN1177431C CN1177431C CNB011042451A CN01104245A CN1177431C CN 1177431 C CN1177431 C CN 1177431C CN B011042451 A CNB011042451 A CN B011042451A CN 01104245 A CN01104245 A CN 01104245A CN 1177431 C CN1177431 C CN 1177431C
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- encryption
- terminal apparatus
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses a method and a device for realizing end-to-end encryption for a mobile communication system. A universal encryption interface is added to the existing mobile terminal device to transmit the enciphered information of a user's cipher chip; during information transmission, communicating parties perform end-to-end encryption and decryption operation via the user's cipher chip; the user's cipher chip is inserted into the mobile terminal device via the universal encryption interface for direct encryption and decryption operation on information sources. Both communicating parties have the same user's cipher chip. On the basis of guaranteeing the safety performance of the original system, the present invention can meet special user requirements to transmit the information of both communicating parties via an enciphering algorithm in the whole system from an access network to a core network.
Description
Technical field
The present invention relates to the mobile communication technology field, particularly a kind of method and mobile terminal apparatus thereof of realizing End to End Encryption of mobile communication system terminal Secure Application technical field.
Background technology
Mobile communication system has been taked to carry out the symmetric cryptography mode between network terminal radio network controller (RNC) and the mobile terminal apparatus (ME) to the cipher mode of transmission information at present, and the cryptographic algorithm of employing is the standardized algorithm that defines.The cryptographic algorithm of network side is in radio network controller (RNC), and the cryptographic algorithm of mobile side is in mobile terminal apparatus rather than in SIM card.The information encryption mode of existing mobile communication system is described as follows referring to shown in Figure 1.
User's first and user's second are conversed, and it is as follows to the safe transmission process that user's second sends information:
1. information transmitted comprises speech, data message etc., at first encrypts on the portable terminal A of user's first, and sends to the RNC A of corresponding network side.
2. RNC A is decrypted checking to transmission information, is transferred to the RNC B of called subscriber second corresponding network side then by the core network of mobile communication system.
3. RNC B carries out encryption and sends to called subscriber second transmission information.
4. the portable terminal B of user's second is decrypted checking to information, answers this information.
Said process has guaranteed the airlink information transmitted fail safe between user and network access equipment, and is not provided at information transmitted safety guarantee in the core network.
Said process requires end side must adopt identical cryptographic algorithm with network side, because mobile phone and base station that different manufacturers is made, perhaps in mobile phone and base station that country variant uses, must guarantee consistent cryptographic algorithm, present 3GPP (3-G (Generation Three mobile communication system) standardization body) defines above-mentioned cryptographic algorithm in relevant criterion be standardized algorithm.
Summary of the invention
Based on the invention described above prior art situation, for satisfying some special users' application demand, the invention provides the implementation method and the mobile terminal apparatus of End to End Encryption in a kind of mobile communication system, the algorithm that self provides can be provided in the encryption that makes the group user of specific (special) requirements transmit information, guarantees can both use own cryptographic algorithm realization safe transmission in the whole system of information from the Access Network to the core net of correspondent.
Realize that the technical scheme that the object of the invention adopts is:
A kind of implementation method that is applied to the End to End Encryption in the mobile communication system comprises: increase by an encipher interface in existing mobile terminal apparatus, with the cipher-text information of transmission user self crypto chip; The operation of encryption and decryption end to end that correspondent uses described user cipher chip cipher-text information to transmit information, and the calling user both sides have identical user cipher chip.
Described encryption and decryption operation comprises: the cipher-text information that the user's that gives orders or instructions crypto chip produces sends in its mobile terminal apparatus by its encipher interface, carries out cryptographic calculation with the digital service information that obtains after source encoding, produces the business information of having encrypted; The crypto chip of called subscriber produces corresponding cipher-text information, and sends in its mobile terminal apparatus by its encipher interface, is decrypted computing with the business information of having encrypted that obtains behind the receiving demodulation, the digital service information after obtaining deciphering.
Described encryption and decryption adopts the symmetric cryptography mode.
A kind of mobile terminal apparatus that is applied to the realization End to End Encryption in the mobile communication system, this device is except that the module of the mobile terminal apparatus that includes prior art, particularly including an encipher interface that increases is arranged, the cipher-text information that the user cipher chip is produced is sent in this mobile terminal apparatus, directly information source is carried out the encryption and decryption operation.
Described user cipher chip is inserted in the described mobile terminal apparatus by described encipher interface.And calling user both sides' mobile terminal apparatus plugs identical user cipher chip.
Described encipher interface is general standard interface.
The present invention increases a universal standard encipher interface on existing mobile terminal apparatus, make the terminal use that the outside cipher-text information of oneself can be provided by this interface, thereby on the basis that guarantees the original system security performance, satisfy some special users' requirement, make encryption function more powerful.
The present invention meets the group's user's request with specific (special) requirements, the algorithm that self provides can be provided in the encryption that the user is transmitted information, thereby guarantees can both use own cryptographic algorithm realization safe transmission in the whole system of information from the Access Network to the core net of both call sides.
Description of drawings
Fig. 1 is the information security transmission course schematic diagram of prior art.
Fig. 2 is an end-to-end information encryption mode schematic diagram of the present invention.
Embodiment
Below in conjunction with drawings and the specific embodiments the present invention is described in more detail.
Existing SIM card interface in the present mobile terminal apparatus, the present invention increases a universal standard encipher interface in mobile terminal apparatus, be used for the cipher-text information of transmission user self crypto chip, so that business information is encrypted, implementation procedure is described as follows referring to shown in Figure 2:
1. the voice signal that send the words user obtains digital service information after A/D conversion, source encoding.
2. user's self crypto chip produces cipher-text information, and sends among the ME by general encipher interface.
3. the digital service information after cipher-text information and the source encoding is carried out mould 2 and is added, and produces the business information of having encrypted.
4. the same with usual manner, the business information of having encrypted is modulated transmission.
5. called subscriber receiving demodulation information, the business information of having been encrypted.
6. user's self crypto chip produces corresponding decrypting ciphertext, sends among the ME by general encipher interface.
7. the encrypted information of cipher-text information and reception carries out mould 2 and adds the digital service information after obtaining deciphering.
8. business information is converted to voice signal through source coding, D/A.
Require the calling user both sides should have identical crypto chip among the present invention, encryption and decryption adopts the symmetric cryptography mode, should guarantee the cipher-text information initial synchronisation of encryption and decryption before the conversation.
The present invention has following effect:
Increase a general standard interface in existing mobile terminal apparatus, this interface can be realized encrypting Function.
By increasing an Interface realization encryption function, can not affect existing network function and safe body System, namely to the practical function of existing system without any impact.
Encryption function by this Interface realization is directly to Source Encryption, and the information that guaranteed is in whole system Safe transmission.
Realized that real terminal is to terminal encryption.
Claims (8)
1, a kind of implementation method that is applied to the End to End Encryption in the mobile communication system is characterized in that this method comprises:
In existing mobile terminal apparatus, increase by an encipher interface, with the cipher-text information of transmission user self crypto chip; The operation of encryption and decryption end to end that correspondent uses described user cipher chip cipher-text information to transmit information, and the calling user both sides have identical user cipher chip.
2, the implementation method of End to End Encryption according to claim 1 is characterized in that described encryption and decryption operation comprises:
The cipher-text information that user's crypto chip produces of giving orders or instructions sends in its mobile terminal apparatus by its encipher interface, carries out cryptographic calculation with the digital service information that obtains after source encoding, produces the business information of having encrypted;
The crypto chip of called subscriber produces corresponding cipher-text information, and sends in its mobile terminal apparatus by its encipher interface, is decrypted computing with the business information of having encrypted that obtains behind the receiving demodulation, the digital service information after obtaining deciphering.
3, the implementation method of End to End Encryption according to claim 1 and 2 is characterized in that:
Described encryption and decryption adopts the symmetric cryptography mode.
4, the implementation method of End to End Encryption according to claim 1 and 2 is characterized in that:
Described encipher interface is general standard interface.
5, a kind of mobile terminal apparatus that is applied to the realization End to End Encryption in the mobile communication system is characterized in that:
This device is except that the module of the mobile terminal apparatus that includes prior art, and particularly including an encipher interface that increases is arranged, the cipher-text information that the user cipher chip is produced is sent in this mobile terminal apparatus, directly information source is carried out the encryption and decryption operation.
6, mobile terminal apparatus according to claim 5 is characterized in that:
Described user cipher chip is inserted in the described mobile terminal apparatus by described encipher interface.
7, according to claim 5 or 6 described mobile terminal apparatus, it is characterized in that:
Described encipher interface is general standard interface.
8, according to claim 5 or 6 described mobile terminal apparatus, it is characterized in that: calling user both sides' mobile terminal apparatus plugs identical user cipher chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB011042451A CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB011042451A CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1371082A CN1371082A (en) | 2002-09-25 |
CN1177431C true CN1177431C (en) | 2004-11-24 |
Family
ID=4653787
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB011042451A Expired - Fee Related CN1177431C (en) | 2001-02-23 | 2001-02-23 | Method and mobile device for end-to-end enciphere |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1177431C (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100466770C (en) * | 2006-03-21 | 2009-03-04 | 中兴通讯股份有限公司 | Method for realizing end-to-end encrypting call in cluster system |
CN101203025B (en) * | 2006-12-15 | 2010-11-10 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
CN101330537B (en) * | 2008-07-30 | 2010-11-17 | 中国电信股份有限公司 | Method and device for end-to-end ciphering voice |
CN102625301A (en) * | 2011-02-01 | 2012-08-01 | 上海晨兴希姆通电子科技有限公司 | Wireless module, mobile phone and key transport method |
-
2001
- 2001-02-23 CN CNB011042451A patent/CN1177431C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1371082A (en) | 2002-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1123159C (en) | Method and apparatus for encryption radio traffic in a telecommunications network | |
CN1925681A (en) | End-to-end encrypting method and system based on mobile communication network | |
CN101384042A (en) | Mobile phone ciphering method based on safe digital interface ciphering card | |
EP1156694B1 (en) | Radio communication device | |
CN112153641B (en) | Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF | |
CN106790281A (en) | A kind of end-to-end voice encryption device and encryption method towards intercom system | |
CN101951601A (en) | Method and system for encrypting voice calls in mobile communication network, terminal and network side | |
CN105681310A (en) | Bluetooth based voice source real-time voice encryption method | |
CN111884802B (en) | Media stream encryption transmission method, system, terminal and electronic equipment | |
CN1283063A (en) | Encryption method for mobile telephone | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN110691359A (en) | Safety protection method for power marketing professional Bluetooth communication | |
CN106878277B (en) | Method and device for realizing voice encryption based on DMR standard | |
CN1177431C (en) | Method and mobile device for end-to-end enciphere | |
CN1138366C (en) | Network structure suitable for encryption at terminals of mobile communication system and its implementation method | |
CN100512103C (en) | Secret key distributing method of end-to-end encrypted telecommunication | |
CN1592141A (en) | Terminal to terminal encryption method of cell phone voice and data | |
CN1237752C (en) | Methods and apparatus for enhanced security expansion of secret key into lookup table for improved security for wireless telephone messages | |
CN100463551C (en) | System and method for realizing encrypted communication in mobile communication system | |
CN1247041C (en) | Method of encrypting mobile terminals | |
CN106559402B (en) | User terminal and identity authentication method and device for encrypted voice telephone service thereof | |
CA2371811A1 (en) | Method and apparatus for enhanced security in a broadband telephony network | |
RU2132597C1 (en) | Method for encryption and transmission of encrypted voice data in gsm-900 and dcs-1800 cellular mobile communication networks | |
CN1229551A (en) | Method and apparatus for enhanced security expansion of secret key into lookup table for improved security for wireless telephone messages | |
KR20000054258A (en) | Method of securing shot message and the system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20041124 Termination date: 20170223 |
|
CF01 | Termination of patent right due to non-payment of annual fee |