Safety chip, wireless control module and terminal

A wireless control module and security chip technology, applied in the field of communications, can solve problems such as inconvenience in business development, economic losses, inability to provide the best solution for users and applications, and achieve the effect of improving business security and high security.

Inactive Publication Date: 2010-10-27
DATANG MICROELECTRONICS TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In various application fields involving user privacy, industry confidentiality, and even national information security, the use of this low-level security protocol storage method will undoubtedly face major risks and tests for my country's Internet of Things and other business systems
[0016] (5) Configuration of keys, algorithms, and security protocols: In existing technical solutions, the configuration of keys, algorithms, and security protocols is customized and solidified according to specific business requirements. The reconfiguration of algorithms and security protocols, or even the reproduction of products, cannot achieve flexible configuration of the overall security system, and thus cannot provide users and applications with the best solution
[0017] (6) Personalized issuance: In the existing technical solutions, the network identification information used to identify the wireless control module needs to be personalized, and these personalized distribution data can only be stored in the general memory of the wireless control module (such as In FLASH devices), the cost and complexity of the production process using this distribution method are very high, resulting in the practical problem of difficulty in mass production of wireless control modules and personalized distribution
[0018] (7) Inconsistent marking: In the existing technical solutions, the identity marking information of the wireless control module varies with different industries, products, and services, including coding rules, identification methods, etc., which are chaotic and disorderly, and cannot be solved effectively. security management issues
[0019] (8) Inconsistent business standards: In the existing technical solutions, the wireless control module generally has many problems such as key configuration, algorithm configuration, security protocol, business use, etc., the interface is not uniform, and the specifications are chaotic. There are big problems in various aspects such as universality and compatibility; at the same time, because of the inconsistency of the identity information of the wireless control module, it is necessary to carry out the integration of the whole industry, the whole product, and the whole business (such as the Internet of Things, the integration of industrialization and industrialization) , 3C integration) will bring practical problems such as inconvenient use for users and inconvenient business development
[0020] (9) Service binding: in the existing technical solutions, through illegal means (such as cracking keys, algorithms, agreements) can transfer the object of use of the service (such as applying the home service to the mobile phone service), which brings the customer operation market chaos and the resulting economic damage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety chip, wireless control module and terminal
  • Safety chip, wireless control module and terminal
  • Safety chip, wireless control module and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Embodiment 1. A security chip, such as figure 2 As shown, including: interface unit, main control unit, storage unit;

[0065] The storage unit is used to save the program and one or more keys; the program includes the following two or any one of them: one or more security algorithms, one or more protocols;

[0066] The interface unit is used to transmit data interacted between the main control unit and an external communication entity;

[0067] The main control unit is used to save the configured currently used program and key; receive a request from an external communication entity, and the request includes one or more of the following: encryption / decryption request, parsing request, authentication request; When the above request is an encryption / decryption request or an authentication request, find the currently used security algorithm and key from the storage unit, perform encryption / decryption or authentication on the data carried in the request, and obtain the e...

Embodiment 2

[0085] Embodiment 2. A wireless control module, including: the security chip in Embodiment 1;

[0086] a control unit, configured to configure currently used security algorithms, protocols, and keys in the main control unit of the security chip;

[0087] Other components can be the same as the prior art.

[0088] In this embodiment, the wireless control module may also include:

[0089] A wireless communication unit connected to an external wireless communication entity is connected to the control unit through a first control interface;

[0090] An implementation of this embodiment is as image 3 As shown, the security chip directly interacts with the control unit, and is connected to the wireless communication unit through the control unit, thereby interacting with an external wireless communication entity.

[0091] In this embodiment, the security chip is integrated on the main board of the wireless control module.

[0092] Another implementation of this embodiment is as...

Embodiment 3

[0101] Embodiment 3. A terminal, including: the security chip in Embodiment 1;

[0102] In this embodiment, the terminal may directly include the security chip in Embodiment 1, or may include the security chip by including the wireless control module 2 in Embodiment 2.

[0103] In this embodiment, if the terminal directly includes the security chip in Embodiment 1, it also includes a control unit for configuring the currently used security algorithm, protocol and key in the main control unit of the security chip .

[0104] The security chip can be directly integrated on the main board of the terminal, or can be integrated in other components of the terminal, or can be connected with other parts of the terminal by using a newly added connecting board.

[0105] In this embodiment, the security chip may be connected to the main board of the terminal or the connecting board by SMD welding and applying anti-tampering glue, but not limited thereto.

[0106] Obviously, those skille...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety chip, a wireless control module and a terminal. The safety chip comprises an interface unit, a storage unit and a master control unit, wherein the storage unit is used for storing one or more than one safety algorithms, one or more than one protocols and each required secret key; the master control unit is used for saving the configured currently used safety algorithm, protocol and secret keys and receiving a request from an external communication entity; when the request is an encryption / decryption request or an authentication request, the currently used safety algorithm and secret key are found from the storage unit; data carried in the request are encrypted / decrypted or authenticated to obtain an encryption / decryption result or an authentication result; the encryption / decryption result or the authentication result is returned to the external communication entity through the interface unit; when the request is an analysis request, the currently used protocol and secret key are found in the storage unit to analyze the data carried in the request to obtain an analysis result; and the analysis result is returned to the external communication entity through the interface unit. The invention can improve the intensity of safety control.

Description

technical field [0001] The invention relates to the communication field, and relates to a safety chip, a wireless control module and a terminal. Background technique [0002] In the existing application fields of various industries, especially in the emerging Internet of Things industry, a new type of wireless control module is being used more and more. The functions of the wireless control module include collecting and processing the raw physical data of the sensor, and through The wireless channel is transmitted to the application system platform in the background for further analysis, processing and control, but among them, the security control of objects and the confidentiality of industry data are extremely critical, and the security issues of business use are gradually highlighted. [0003] A typical technical solution of an existing wireless control module is as follows: figure 1 As shown, the solid line part is the range of the wireless control module components, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14
Inventor 李作为王永辉孙东昱
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products