End to end real-time encrypting process of a mobile commerce WAP data transmission section and the module of the same
First Claim
1. An end to end real-time encrypting module of a mobile commerce WAP data transmission section, wherein the uppermost layer of the wireless application environment (WAE) is used as a developing platform and executing environment and is suitable for various communication networks, comprising at least one of GSM, PDC, CDPD, CDMA, TDMA, PHS, DECT, or GPRS and third generation mobile phone (3G) the real-time encrypting module comprising:
- an information encryption code security system matching the public key infrastructure being installed in a WML server end of a current mobile server of a wireless service provider; and
the system includes a handset software encryption and decryption module, a cipher server, and a key management, said key management randomly generating an ideal key, said ideal key being stored and held secretly, said key management further generating a second set of keys which are in high demand and are frequently updated by a pseudo-random process, said key management further performing a secret sharing process wherein an original key is divided into a plurality of key shadows, said original key being restored only when a selected number of key shadows are combined, said original key being non-recoverable when said original key is lost or destroyed; and
, a pre-compressor for compression of transmission data, said pre-compressor performing the pre-compression processing steps including;
a) dividing original data into a plurality of unit character strings, each said character string having 8 or 9 characters;
b) converting each said unit character string into a decimal value;
c) converting each said decimal value into a unit character string of hexadecimal characters;
d) dividing each said hexadecimal character into two unit character sets;
e) converting each said unit character set into a decimal character code between 0 and 255; and
, f) converting each said character code into a respective ANSI character set.
1 Assignment
0 Petitions
Accused Products
Abstract
An end to end real-time encrypting process of a mobile commerce WAP data transmission section and the module of the same are disclosed. The wireless application environment (WAE) is used as a technical platform. An information encryption code security system matching a public key infrastructure is installed in the WML server end. This system includes a handset software encryption and decryption module, a cipher server, and a key management. The added cipher server dynamically downloads a public key using the HTTP service through a WAP gateway of WAN, GSM/GPRS/CDMA and other digital mobile system. When the user is desired to execute an M-commerce, the user may input commerce service according WML and then the input data is up-linked through an encryption and decryption process of the handset encryption and decryption module. After the information transfers to the WML server, it is decrypted by a public key.
33 Citations
4 Claims
-
1. An end to end real-time encrypting module of a mobile commerce WAP data transmission section, wherein the uppermost layer of the wireless application environment (WAE) is used as a developing platform and executing environment and is suitable for various communication networks, comprising at least one of GSM, PDC, CDPD, CDMA, TDMA, PHS, DECT, or GPRS and third generation mobile phone (3G) the real-time encrypting module comprising:
-
an information encryption code security system matching the public key infrastructure being installed in a WML server end of a current mobile server of a wireless service provider; and
the system includes a handset software encryption and decryption module, a cipher server, and a key management, said key management randomly generating an ideal key, said ideal key being stored and held secretly, said key management further generating a second set of keys which are in high demand and are frequently updated by a pseudo-random process, said key management further performing a secret sharing process wherein an original key is divided into a plurality of key shadows, said original key being restored only when a selected number of key shadows are combined, said original key being non-recoverable when said original key is lost or destroyed; and
,a pre-compressor for compression of transmission data, said pre-compressor performing the pre-compression processing steps including;
a) dividing original data into a plurality of unit character strings, each said character string having 8 or 9 characters;
b) converting each said unit character string into a decimal value;
c) converting each said decimal value into a unit character string of hexadecimal characters;
d) dividing each said hexadecimal character into two unit character sets;
e) converting each said unit character set into a decimal character code between 0 and 255; and
,f) converting each said character code into a respective ANSI character set. - View Dependent Claims (2, 3, 4)
-
Specification