Trusted wireless storage equipment for wireless power supply and application method thereof

A storage device and wireless power supply technology, applied in the field of information security, to achieve the effect of ensuring security issues, reducing energy consumption, and improving operating efficiency

Inactive Publication Date: 2011-05-18
BEIJING UNIV OF TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Of course, at this stage, this transmission is limited to a short distance of a few meters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted wireless storage equipment for wireless power supply and application method thereof
  • Trusted wireless storage equipment for wireless power supply and application method thereof
  • Trusted wireless storage equipment for wireless power supply and application method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] Device selection:

[0076] Controller: use CPU as OMAP3530 CORTEX-A processor

[0077] Electric energy acquisition unit: responsible for controlling the induction frequency of the electromagnetic induction coil, and responsible for controlling the energy storage operation of the electric energy storage unit.

[0078] Multi-stage power supply unit: refer to Linear LTC2978 chip

[0079] Security chip: ZTE SSX44 trusted cryptographic module security chip

[0080] Non-volatile storage unit: Jinxun Xingye EEPROM 24C16

[0081] Light energy collection unit: No. 23 solar panel 5V35MA of Guangzhou Fuji Solar Technology Co., Ltd.

[0082] Wireless interface:

[0083] Chip selection: Broadcom BCM43225 open source chipset, communication protocol selection 801.11n protocol, using MIMO (multiple input multiple output technology) theoretical speed up to 300M, actual transmission speed between 80-150M. No wireless encryption technology is used.

[0084] Storage device interface,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses trusted wireless storage equipment for wireless power supply and an application method thereof, and relates to the field of secure information storage. A secure chip is a root of trust of the trusted wireless storage equipment and is a core module of the trusted wireless storage equipment. The invention points out information security problem in a wireless transmission process of the wireless storage equipment and provides a new trusted wireless storage solution for the wireless power supply. Each chip in the trusted wireless storage equipment for the wireless power supply is powered in turn according to a multi-stage power supply method, so that a system can quickly switch to a normal working state, and energy consumption is reduced to the greatest extent. Reliable power guarantee is provided for the trusted wireless storage equipment for the wireless power supply by various power supply methods. A trusted storage method guarantees confidentiality and completeness of data during interaction of the trusted wireless storage equipment for the wireless power supply and a computer and the confidentiality of the data during the interaction of the trusted wireless storage equipment and the storage equipment.

Description

technical field [0001] The invention relates to the field of information security, in particular to a trusted wireless storage device with wireless power supply and an application method thereof. Background technique [0002] trusted computing [0003] Trusted computing includes 5 key technical concepts, which are necessary for a complete trusted system, and this system will comply with the TCG (Trusted Computing Group) specification [0004] 1.Endorsement key endorsement key [0005] The endorsement key is a 2048-bit RSA public and private key pair, which is randomly generated when the chip leaves the factory and cannot be changed. This private key is always on the chip, and the public key is used to authenticate and encrypt sensitive data sent to the chip [0006] 2.Secure input and output [0007] Secure I / O refers to the protected paths between computer users and the software they think they are interacting with. Currently, malware on computer systems has many ways ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G11C16/34G06F12/14
CPCY02B60/1225Y02D10/00
Inventor 毛军捷方娟王昱波刘毅张宁
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products