共查询到20条相似文献,搜索用时 171 毫秒
1.
2.
嵌入式系统中短消息实时处理的实现 总被引:12,自引:1,他引:11
提出一种在嵌入式系统中实现短消息实时处理的方法,用ATmega128单片机控制GSM模块,通过设置发送端和接收端的参数配置,使短消息不经过SIM卡而直接发送至单片机。短消息格式为PDU方式,增加了通用性。利用ATmega128快速处理能力,结合状态机的程序设计方法,在接收程序中解析出必要的信息,从而实现短消息的快速处理。 相似文献
3.
4.
TETRA是ETSI所制定的基于数字时分多址(TDM1A)技术的无线集群移动通信系统,可为用户提供群组调度、数据传输、语音通信等功能。在TETRA系统中引入端到端加密机制可以大幅提高系统的安全性。文章详细论述了TETRA端到端加密系统的关键部分——TETRA调度台加密系统的设计与实现。 相似文献
5.
刘海涛 《单片机与嵌入式系统应用》2013,13(3):11-13,17
介绍了GSM短消息中的PDU编码方式和基本AT指令,对SIM卡中的短消息存储顺序作出说明。重点介绍了在嵌入式应用中,利用查询方式和中断方式收发GSM短消息的两种基本方法。 相似文献
6.
7.
每个人都用手机.每个人的手机中也都有一张SIM卡。通过SIM卡.我们可以在移动网络中获得一个自己的号码.通过这个号码接入到网络以便进行通话和发短信。除了这些功能.我们还可以利用SIM卡来记录一些个人的电话和短消息等.大大方便了我们日常的使用。笔最近在浏览网站的时候无意中找到一款可以编辑SIM卡的工具.通过该软件,我们可以让SIM卡和电脑互相交换数据.具体怎么做,请随我来一起操作一回! 相似文献
8.
9.
密钥管理是基于移动通信系统进行端到端加密的核心问题,现有方案大多依赖于密钥管理中心,并存在不在同一加密组内的终端要进行端到端加密通信时通信消耗大、效率低等问题。为解决这些问题,提出一种基于IBE(Identity Based Encryption)的三级密钥管理方案。该方案适于在资源有限的移动终端上使用,采用IBE机制生成和管理主密钥,简化了密钥协商过程,降低了对密钥管理中心的依赖,使用对称加密算法加密通信信息,确保通信的高效性。通信双方可进行双向认证,具有前向安全性,可抵抗选择密文攻击。 相似文献
10.
11.
He Rongyu Zhao Guolei Chang Chaowen Xie Hui Qin Xi Qin Zheng 《Computer Standards & Interfaces》2009,31(4):629-641
Since the first SMS (Short Message Services) message was sent in the UK in 1992, the SMS has become a mass communication tool and has been broadly used in mobile business applications. But the security issue of the SMS has often been considered as a crucial barrier to its application in many fields that need strong authentication and confidentiality, such as mobile-commerce. The Subscriber Identity Module (SIM) inside mobile phones is a tamper resistant device which contains strong authentication mechanism and has been used in remote user authentication system, e.g. WIM1 card in Wireless Application Protocol (WAP). In this contribution, we design and realize a secure SIM card, named PK-SIM card, which is a standard SIM card with additional PKI functionality; based on the PK-SIM card, we present a security framework offering solutions for the development of secure mobile business applications using SMS as bearer. The security framework consists of a client device, in which a PK-SIM card is used to store security credentials, a Secure Access Gateway (SAG) which is used to receive and send secure SMS messages, a trusted third-party, Certification Authority (CA), which provides a public-key certification service and a Mobile Operator which provides the communication infrastructure for the SMS. Then we propose an authentication and session key distribution protocol which provides end-to-end security between the PK-SIM card and the SAG, and give a formal security analysis to the proposed protocol based on BAN authentication logic2. Lastly, we provide a typical application of the security framework in Mobile Police Information System. The evaluations of the system have proved that the security framework is suitable for actual needs both in speed and security. 相似文献
12.
文中为了拓展运营商号卡销售的渠道,实现现场制卡售卡的功能,设计了手机SIM卡售卡控件。该设计采用ActiveX控件、串口通信、Windows网络编程、金融级别加解密算法、ADO数据库等技术实现控件的功能。管理平台网页加载该售卡控件,控件将获取到的用户选定的号码、套餐、身份证照片等信息进行组包加密,通过单独的TCP链路发往特定的平台接口,收到平台回复的IMSI、短信中心号码,利用串口通信将这些信息写入手机白卡。借助此控件,可制成一张能够通话、发短信的标准手机卡。 相似文献
13.
Nowadays, the SMS is a very popular communication channel for numerous value added services (VAS), business and commercial applications. Hence, the security of SMS is the most important aspect in such applications. Recently, the researchers have proposed approaches to provide end-to-end security for SMS during its transmission over the network. Thus, in this direction, many SMS-based frameworks and protocols like Marko's SMS framework, Songyang's SMS framework, Alfredo's SMS framework, SSMS protocol, and, Marko and Konstantin's protocol have been proposed but these frameworks/protocols do not justify themselves in terms of security analysis, communication and computation overheads, prevention from various threats and attacks, and the bandwidth utilization of these protocols. The two protocols SMSSec and PK-SIM have also been proposed to provide end-to-end security and seem to be little better in terms of security analysis as compared to the protocols/framework mentioned above. In this paper, we propose a new secure and optimal protocol called SecureSMS, which generates less communication and computation overheads. We also discuss the possible threats and attacks in the paper and provide the justified prevention against them. The proposed protocol is also better than the above two protocols in terms of the bandwidth utilization. On an average the SecureSMS protocol reduces 71% and 59% of the total bandwidth used in the authentication process as compared to the SMSSec and PK-SIM protocols respectively. Apart from this, the paper also proposes a scheme to store and implement the cryptographic algorithms onto the SIM card. The proposed scheme provides end-to-end SMS security with authentication (by the SecureSMS protocol), confidentiality (by encryption AES/Blowfish; preferred AES-CTR), integrity (SHA1/MD5; preferred SHA1) and non-repudiation (ECDSA/DSA; preferred ECDSA). 相似文献
14.
RF-SIM卡越来越广泛的走向市场,与一般的SIM卡相比,RF-SIM卡多了于刷卡支付应用功能,基于RF-SIM卡移动支付应用方案,本文设计了移动支付应用文件系统,该应用文件系统的设计包括需搭建的文件系统的平台基础、访问命令处理过程的实现、安全报文数据的加解密设计、人机交互的菜单的实现几个部分,通过调试、脚本验证和模拟器模拟,该系统设计实现了支付应用的基本功能。 相似文献
15.
设计一种安全与便捷均衡的蓝牙SIM型智能IC卡产品.该产品以国密安全芯片为控制核心,结合蓝牙芯片和三轴地磁传感器,将各模块封装成蓝牙SIM型智能IC卡硬件形态,可直接嵌入到手机卡槽内,实现便捷使用.该方案符合智能IC卡检测规范,可为移动应用App提供安全、便捷的数字签名与信息加密服务.所设计的产品支持安卓和iOS两大主... 相似文献
16.
17.
通过对各种SIM卡技术的对比,说明了SIM卡不仅用于解决用户入网鉴权和加密问题,还在向着双面应用、非预置个人化信息、更小更薄、存储容量更大等方向发展。SIM卡技术的演进,推动着手机终端的发展,随着智能手机的普及,手机终端除具备通信功能外,还将具有银行卡、门禁卡、公交卡等多种个人化应用。 相似文献
18.
随着企业对使用互联网的安全需求大幅提高,VPN技术成为重要的解决方案。OpenVPN作为Linux下开源VPN的先锋,得到了广泛研究和应用。采用PKCS#11标准将硬件加密设备(KEY,一种智能密码钥匙)接入OpenVPN,使身份验证所需的数字证书能够通过硬件读写、存储,并且使VPN加密算法及加密/解密过程能够通过硬件实现,从而进一步提高OpenVPN的安全性能。 相似文献
19.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。论文通过分析与测试,证明该加密卡能在不影响软件使用和对用户透明的前提下,对硬盘中的数据进行全面的实时加密,为用户数据的安全存储提供可靠的保证。 相似文献
20.
基于SIM卡的双因素认证方案 总被引:4,自引:0,他引:4
该文通过对GSM系统安全性的分析,结合双因素认证技术,提出了一种基于GSM手机SIM卡的双因素认证协议,该认证协议使用给SIM卡内植入的种子数与GSM系统时间值进行密码运算,获得消息认证码,使认证服务器可以根据此认证码对用户进行基于SIM卡和种子数的双因素身份认证。该协议的特点在于利用SIM卡和GSM系统的已有资源,通过给SIM植入种子数,使手机实现了双因素认证机制中的时间令牌的功能。最后,对该认证协议的安全性进行了详细的分析论述。 相似文献