Secret key device and method for mobile phone

A key and mobile phone technology, applied in the computer and financial fields, can solve the problems of high security and the inability of USBKEY to connect with mobile phones.

Inactive Publication Date: 2011-06-15
胡旭光
View PDF4 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In applications such as online banking, electronic payment, and e-commerce, data security is very important. In these applications, the safe storage of keys, data encryption and authentication are the security foundations of these applications. On ordinary computers, the encryption of these applications Key security storage devices mainly use USB KEY to store, and USB KEY also provides data en

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key device and method for mobile phone
  • Secret key device and method for mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0008] figure 1 It is a block diagram of a key device for a mobile phone according to the first embodiment of the present invention.

[0009] Such as figure 1 As shown, a key device 100 for a mobile phone includes: an audio input interface 101 , an audio output interface 102 , an audio codec unit 103 , and a key storage and security microprocessor unit 104 .

[0010] When this embodiment is connected to a mobile phone, the audio input interface 101 is connected to the earphone interface of the mobile phone, and the audio output interface 102 is connected to the microphone interface of the mobile phone. Install the audio codec program in the mobile phone. The powe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the fields of computers and finance, and in particular relates to secret key security storage, data encryption and authentication for applications of mobile banking services, electronic payment and electronic commerce on mobile phones. The invention discloses a secret key device and method for a mobile phone. The device is provided with an audio input interface, an audio output interface, an audio coder and decoder unit and a secret key storage and security microprocessor unit. The device can realize the functions of the secret key security storage, the data encryption and the authentication. The device can be communicated with a mobile phone and other mobile devices in an audio signal mode. When the device is connected with the mobile phone and the other mobile devices, the audio signal input interface of the device and the headphone interfaces of the mobile phone and the other mobile devices are connected, the audio signal output interface is connected with mic interfaces of the mobile phone and the other mobile devices, and audio data coder and decoder programs are arranged in the mobile phone and the other mobile devices respectively. The device can store one or more secret keys for data encryption and authentication. The secret keys stored in the device can not be read. The device can be applied to the mobile banking service, the mobile payment, the electronic commerce and other occasions requiring the secret key security storage, the data encryption and the authentication.

Description

technical field [0001] The invention belongs to the fields of computers and finance, and in particular relates to providing safe key storage, data encryption and authentication for mobile banking, electronic payment and e-commerce applications on mobile phones. technical background [0002] In applications such as online banking, electronic payment, and e-commerce, data security is very important. In these applications, the safe storage of keys, data encryption and authentication are the security foundations of these applications. On ordinary computers, the encryption of these applications Key security storage devices mainly use USB KEY to store, and USB KEY also provides data encryption and authentication functions for these applications, but because mobile phones generally do not have USB HOST interface, USB KEY cannot be connected with mobile phones, so many mobile phones based on Banking, electronic payment, e-commerce and other applications mostly use passwords or file ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04M1/725G10L19/00H04M1/72409
Inventor 胡旭光
Owner 胡旭光
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products