Device and method for securing information associated with a subscriber in a communication apparatus
First Claim
1. A device, used in a communication apparatus, for securing an information associated with a subscriber, said communication apparatus comprising a cipher-key generating module for generating a cipher key, said device comprising:
- a storage module, which the information associated with the subscriber, is stored in;
a cipher-key acquiring module for transmitting an input to the cipher-key generating module, and then receiving the cipher key generated by the cipher-key generating module in response to the input;
an encrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the information associated the subscriber from the storage module, and encrypting the information associated with the subscriber using the cipher key to generate an encrypted information, wherein after generated, the encrypted information is stored in the storage module and replaces the information associated with the subscriber stored in the storage module; and
a decrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the encrypted information from the storage module, and decrypting the encrypted information using the cipher key to recover the information associated with the subscriber when the information associated with the subscriber needs to be used, and wherein when the decrypting module retrieves the cipher key through the cipher-key acquiring module, the cipher-key acquiring module transmits the input once more to the cipher-key generating module, and then receives the cipher key generated once more by the cipher-key generating module in response to the input.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a device, used in a communication apparatus including a cipher-key generating module, for securing a subscriber'"'"'s information. The device includes a storage module, a cipher-key acquiring module, an encrypting module and a decrypting module. The subscriber'"'"'s information is stored in the storage module. The cipher-key acquiring module transmits an input to the cipher-key generating module, and then receives a cipher key generated by the cipher-key generating module in response to the input. The encrypting module retrieves the cipher key through the cipher-key acquiring module, retrieves the subscriber'"'"'s information from the storage module, and encrypts the subscriber'"'"'s information using the cipher key to generate an encrypted information. After generated, the encrypted information is stored into the storage module and replaces the subscriber'"'"'s information. When the subscriber'"'"'s information needs to be used, the decrypting module retrieves the cipher key through the cipher-key acquiring module, retrieves the encrypted information, and decrypts the encrypted information using the cipher key to recover the subscriber'"'"'s information. When the decrypting module retrieves the cipher key through the cipher-key acquiring module, the cipher-key acquiring module transmits the input once more to the cipher-key generating module, and then receives the cipher key generated once more by the cipher-key generating module in response to the input.
-
Citations
22 Claims
-
1. A device, used in a communication apparatus, for securing an information associated with a subscriber, said communication apparatus comprising a cipher-key generating module for generating a cipher key, said device comprising:
-
a storage module, which the information associated with the subscriber, is stored in; a cipher-key acquiring module for transmitting an input to the cipher-key generating module, and then receiving the cipher key generated by the cipher-key generating module in response to the input; an encrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the information associated the subscriber from the storage module, and encrypting the information associated with the subscriber using the cipher key to generate an encrypted information, wherein after generated, the encrypted information is stored in the storage module and replaces the information associated with the subscriber stored in the storage module; and a decrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the encrypted information from the storage module, and decrypting the encrypted information using the cipher key to recover the information associated with the subscriber when the information associated with the subscriber needs to be used, and wherein when the decrypting module retrieves the cipher key through the cipher-key acquiring module, the cipher-key acquiring module transmits the input once more to the cipher-key generating module, and then receives the cipher key generated once more by the cipher-key generating module in response to the input. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device, used in a communication apparatus, for securing an information associated with a subscriber, said communication apparatus comprising a cipher-key generating module for generating a cipher key, said device comprising:
-
a storage module which the information associated with the subscriber is stored in; a random input generating module for generating a random input; a cipher-key acquiring module for receiving the random input from the random data generating module, transmitting the random input to the cipher-key generating module, and then receiving the cipher key generated by the cipher-key generating module in response to the random input; an encrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the information associated the subscriber from the storage module, and encrypting the information associated with the subscriber using the cipher key to generate an encrypted information, wherein after generated, the encrypted information is stored together with the random input in the storage module and replaces the information associated with the subscriber stored in the storage module; and a decrypting module for retrieving the cipher key through the cipher-key acquiring module, retrieving the encrypted information from the storage module, and decrypting the encrypted information using the cipher key to recover the information associated with the subscriber when the information associated with the subscriber needs to be used, and wherein when the decrypting module retrieves the cipher key through the cipher-key acquiring module, the cipher-key acquiring module retrieves the random input stored in the storage module, transmits the random input once more to the cipher-key generating module, and then receives the cipher key generated once more by the cipher-key generating module in response to the random input. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A method, performed in a communication apparatus, for securing an information associated with a subscriber, said communication apparatus comprising a cipher-key generating module for generating a cipher key, said method comprising the steps of:
-
transmitting an input to the cipher-key generating module; receiving the cipher key generated by the cipher-key generating module in response to the input; encrypting the information associated with the subscriber using the cipher key to generate an encrypted information; and when the information associated with the subscriber needs to be used, transmitting the input once more to the cipher-key generating module, receiving the cipher key generated once more by the cipher-key generating module in response to the input, and decrypting the encrypted information using the cipher key to recover the information associated with the subscriber. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method, performed in a communication apparatus, for securing an information associated with a subscriber, said communication apparatus comprising a cipher-key generating module for generating a cipher key, said method comprising the steps of:
-
generating a random input; transmitting the random input to the cipher-key generating module; receiving a cipher key generated by the cipher-key generating module in response to the random input; encrypting the information associated with the subscriber using the cipher key to generate an encrypted information; and when the information associated with the subscriber needs to be used, transmitting the random input once more to the cipher-key generating module, receiving the cipher key generated once more by the cipher-key generating module in response to the random input, and decrypting the encrypted information using the cipher key to recover the information associated with the subscriber. - View Dependent Claims (20, 21, 22)
-
Specification