Method for encrypting application software private area of EVDO (evolution-data optimized) data card end

A technology of application software and private area, applied in digital data authentication, electronic digital data processing, computer components, etc., can solve problems such as poor security performance of EVDO data cards, and achieve security that is difficult to crack, good security, and safe high performance effect

Inactive Publication Date: 2010-08-11
TAICANG T&W ELECTRONICS CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a method for encrypting the private area of ​​the application sof

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting application software private area of EVDO (evolution-data optimized) data card end
  • Method for encrypting application software private area of EVDO (evolution-data optimized) data card end
  • Method for encrypting application software private area of EVDO (evolution-data optimized) data card end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Embodiment Encryption of application program private area of ​​EVDO data card

[0040] The EVDO data card end encryption scheme in this embodiment includes a secure read-write interface and a private area encryption scheme. Such as figure 1 , the application program of PC uses SCSI commands to read and write the private area of ​​the application software to follow the Bulk-Only transmission protocol, and some instructions on the read and write interface are as follows.

[0041] The command block packet structure transmitted between the host and the EVDO data card is shown in the following table:

[0042]

[0043] Among them, dCBWSignature: indicates that the current sending is a CBW, which is the sign of CBW, and the fixed value is 0x43425355. All CBW values ​​are sent in LSB order when transmitted on the USB bus, that is, the low bit is sent first, and then the high bit is sent. DCBWTag: Generated by the host and sent to the device, the device will fill this value...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting an application software private area of an EVDO (evolution-data optimized) data card end, which is characterized in that a read-write interface positioned between the EVDO data card end and a host machine adopts the specifications of a USB (universal serial bus) protocol and an SCSI (small computer system interface) protocol; and the content of the application software private area is read and written through an SCSI order when the host machine communicates with the EVDO data card end. The method has more concealment; in addition, the operation process is symmetrical to a program of the EVDO data card end for users so that the corresponding content can not be read and written without appointed read-write operation, thus safety is better, and decryption is difficult.

Description

technical field [0001] The invention belongs to the technical field of encryption of EVDO data cards, and in particular relates to a method for encrypting private areas of application software at the end of EVDO data cards. Background technique [0002] The 3G data card is a widely used Internet access medium for wireless wide area communication networks. At present, my country has three network standards: China Mobile's td-scdma, China Telecom's CDMA2000, and China Unicom's WCDMA. Therefore, common wireless network cards include CDMA2000 wireless network cards and TD and WCDMA wireless network cards. The cable equivalent of a modem, it can use a phone's SIM card to connect to the Internet anywhere there is wireless phone coverage. [0003] CDMA2000 EVDO enables individual users to send and receive e-mail with large attachments, enjoy real-time interactive gaming, send and receive high-resolution pictures and videos, download video and music content or maintain a wireless c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06K17/00G06F21/31
Inventor 刘可靖吴斌
Owner TAICANG T&W ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products