Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for realizing confidence counter in personal communication device

A technology of communication equipment and counters, applied in the direction of digital transmission system, transmission system, confidential communication, etc., can solve the problems of infeasibility, expensive read-write memory, etc., to achieve the effect of ensuring integrity

Inactive Publication Date: 2008-08-06
VIVO MOBILE COMM CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, both of these prior art approaches require a small amount of read-write tamper-resistant memory in the device itself
These approaches are often not feasible due to the high cost of read-write memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing confidence counter in personal communication device
  • Method and system for realizing confidence counter in personal communication device
  • Method and system for realizing confidence counter in personal communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Figure 1 illustrates an embodiment of the integrity protected storage system of the present invention incorporated into a wireless personal communication device 100, such as a wireless telephone, satellite phone, personal digital assistant, or Bluetooth device. The personal communication device 100 includes internal memory 102 and external memory 106 . The internal memory 102 has a security module 200 that provides tamper-proof storage for several units and systems of the personal communication device 100 . For example, the security module 200 provides secure storage for the tamper-resistant storage device 101 , the CPU 210 , the operating system 107 and the application program 108 . It is assumed in the embodiments of the present invention that the personal communication device 100 does not have any read-write storage device inside the device (without or without tamper resistance). Tamper resistance is a term well known in the art that defines a secure protected porti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Method, system and computer program product for achieving integrity-protected storage in a personal communication device (100) by implementing DRM in a personal communication device (100). In particular, the method, system and computer program product utilizes cryptography and an external, read-write storage device (103) that stores important state information that need not be secret, but should be unmodifable or replayable without detection. Using the present invention, the integrity of data storage in a personal communication can be assured even if data is stored in an insecure storage device (105).

Description

technical field [0001] A method, system and computer program product for achieving integrity protected storage in a personal communication device by implementing digital rights management (DRM) on the personal communication device. In particular, the method, system and computer program product incorporate cryptographic and external tamper-resistant storage devices to securely protect critical data from unauthorized use or modification. Background technique [0002] Over the past few years, the use of personal communication devices has grown rapidly in all aspects of our daily lives. With the growth of personal communication devices, it has become more and more important to protect the critical data stored on the devices. For example, the use of a PIN to control access to the device has been implemented with personal communication devices. However, if there is no limit to the time and number of attempts to enter the PIN, people may guess the PIN. Therefore, in addition to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04K1/00G06Q20/00G07F7/10
CPCG06Q20/04G06Q20/35765H04M2250/14G07F7/082G06Q20/045G06Q20/1235G06Q20/341G06Q20/346G07F7/0826G07F7/1008G07F7/1083G06Q20/3823
Inventor 纳达拉扎·阿索肯珍-艾瑞克·艾克伯尔格劳丽·帕特罗
Owner VIVO MOBILE COMM CO LTD