Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless communication device and method for realizing service security thereof

A wireless communication device and wireless communication module technology, applied in wireless communication, safety devices, electrical components, etc., can solve problems such as chaotic economy in customer operation market, different software and hardware interfaces, losses, etc.

Active Publication Date: 2013-06-26
DATANG MICROELECTRONICS TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Through illegal means (such as cracking keys, algorithms, agreements) can transfer the object of use of the business (such as applying the home business to the mobile phone business), which will bring about chaos in the customer operation market and economic losses caused by it
[0019] Identity identification: In existing technical solutions, the identification information of wireless communication devices varies with different industries, products, and services, including coding rules, identification methods, etc., which are chaotic and disorderly, and cannot solve the problem of effective security management , did not realize the corresponding management of the algorithm corresponding to the identity and the key
In a field that needs to integrate the whole industry, all products, and all services (such as the Internet of Things, the integration of two industrializations, and 3C integration), it will bring practical problems such as inconvenient use for users and inconvenient business development.
[0020] Standards and interfaces: In existing technical solutions, wireless communication devices generally have many problems such as software, hardware, key configuration, algorithm configuration, security protocol, business use, etc., the interface is not uniform and the specifications are chaotic. The algorithm is different and the key configuration is different; the software and hardware interfaces between products are different. For example, in the above-mentioned typical technical solutions, there are many standards for the first control interface and the second control interface. Each product Developers often use specific interfaces according to their own characteristics, and there are big problems in various aspects such as interconnectivity, versatility, and compatibility between products; The interfaces are also different, which brings about difficulties in related business development, interconnection, and compatibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless communication device and method for realizing service security thereof
  • Wireless communication device and method for realizing service security thereof
  • Wireless communication device and method for realizing service security thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0088] In this embodiment, the structure of the wireless communication device is as follows Figure 2AAs shown, it includes a control module, a wireless communication module, a storage module and a security chip, wherein the control module, the wireless communication module and the storage module have original functions. The security chip is integrated on the main board of the wireless communication device, directly connected with the control module, and has no direct interface with the wireless communication module. In each embodiment, the security chip can be packaged in the wireless control device by SMD welding and applying anti-tamper glue, so as to realize the integration of the wireless control device and the security chip.

[0089] The security chip stores one or more keys, and can optionally store one or more of the following data:

[0090] a) one or more security algorithms;

[0091] b) one or more security protocols;

[0092] c) A network identification of the wi...

no. 2 example

[0165] The structure of the wireless communication device of this embodiment is as follows Figure 6 As shown, it includes a control module, a wireless communication module, a storage module and a security chip. The difference from the first embodiment is that the security chip is integrated in the wireless communication module and becomes an integral part of the wireless communication module. The security chip passes wireless The communication module is connected with the control module. for Figure 2B wireless communication device, a security chip can be integrated in each wireless communication module.

[0166] The function and processing flow of each module in this embodiment are basically the same as those in the first embodiment, except that when the security chip interacts with the control module, it needs to forward data through the wireless communication module, and when the wireless communication module needs to obtain the key from the security chip, It can no long...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wireless communication device and a method for realizing service security thereof. The wireless communication device comprises a control module, and a storage module and a wireless communication module connected with the control module, and also comprises one or more security chips which are connected with the control module or the wireless communication module and storeone or more keys; one or more of the security chips, the storage module and the wireless communication module store security algorithms and security protocols corresponding to the keys; and when the control module and / or the wireless communication device sends and / or receives data, the data is encrypted and / or decrypted based on a key corresponding to the opposite communication end and stored in the security chip, and the corresponding security algorithm and security protocol. The device and the method can improve the service application security.

Description

technical field [0001] The invention relates to a wireless communication device and a method for realizing service security. Background technique [0002] With the rapid development of mobile services, especially the rapid development of Internet of Things business applications, wireless communication modules (such as Bluetooth, ZIGBEE, WIFI, WAPI, GSM, CDMA, TD-SCDMA, WCDMA, CDMA2000, LTE, WIMAX, etc.) are widely used use. [0003] Figure 1A Shows a typical existing wireless communication device, the wireless communication device is used to collect and process the raw data of the sensor, and the wireless communication module transmits it to an external wireless communication node (such as a background business application system or user terminal, etc.) for further analysis, processing and control. As shown in the figure, the structure of the wireless communication device mainly includes: [0004] The wireless communication module is mainly used for data transmission and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/06H04W12/041H04W12/0433
Inventor 李作为郑辉王京阳
Owner DATANG MICROELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products