Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card

A hardware encryption and mobile phone technology, applied in electrical components, user identity/authority verification, security devices, etc., can solve problems such as saving only pictures, audio files and video files, not being able to save many files, and occupying memory independently , to achieve the effects of saving design costs, large data storage capacity, and simplifying the manufacturing process and structure

Inactive Publication Date: 2012-02-22
SHANGHAI QINGLONG COMM TECH
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method also has disadvantages: 1. You need to set up an encrypted SMS folder in advance; 2. The operation is more cumbersome, and the same file exists in multiple places after restoration, all occupying memory independently, and if you want to delete it, you must go to the above three places If you delete them all, you will accidentally leave evidence, and the "commonly used templates" is generally not password-protected; 3. Because the text messages occupy the memory of the mobile phone, so you can't save a lot of files in this way; 4. The maximum capacity of each MMS is 300k, and the size of the saved file cannot exceed this limit; 5. Now only pictures, audio files and video files can be saved, and files in other formats cannot be saved yet
[0007] On this basis, if there are a large number of files to be encrypted and stored, and the method of directly storing them in the SIM card, due to some limitations of the SIM card itself, there are still some difficulties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card
  • Method for binding hardware encryption trans-flash (TF) card with mobile phone subscriber identity module (SIM) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The hardware encrypted TF card is bound to the SIM card of the mobile phone to realize the unique pairing function of the hardware encrypted TF card and the SIM card.

[0016] The host or mobile phone only needs to upgrade the software to support the TF card hardware encryption technology, and does not need to add or change the hardware; it can be applied to data security access, identity authentication and mobile e-commerce; to realize the terminal remote query center server information; when the SIM card is changed , the hardware encryption TF card program is automatically closed, and any external access to the TF card is denied.

[0017] Adopt Micro SD (TF card 15mm×11mm×1mm) before packaging, built-in SD / SDIO module, encryption and decryption module, COS module, NandFlash management module and NandFlash medium, among which, SD / SDIO module is connected through encryption and decryption module and COS module respectively The NandFlash management module is connected to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for binding a hardware encryption trans-flash (TF) card with a mobile phone subscriber identity module (SIM) card. The method is characterized in that: encryption / decryption module hardware is added on a storage medium of the TF card, after the TF card is bound with the corresponding SIM card, the TF card has functions of key generation, data storage and data encryption / decryption, supports all conventional encryption algorithms and encrypts the whole process from storage, transmission, receiving to backups; encryption files are reliable; processing speed is high, cracking is avoided, a plurality of packaging types such as StandardSD, MiniSD, MicroSD and the like can be adopted, the SIM card bound with the TF card has the same strong equipment access ability as an ordinary secure digital (SD) card, high data storage capacity, can be synchronously upgraded and extended, and is convenient and flexible in use; moreover, design cost is reduced, and production process and structure can be simplified; and illegal use of the data card and illegal acquisition of the stored data in the data card are effectively prevented after the data card is lost or stolen. The invention can be widely used in a personal digital assistant (PDA), the mobile phone, a laptop, a personal computer (PC) and various terminals with an internal or an external SD card slot.

Description

technical field [0001] The present invention relates to a technology for selling and applying a mobile communication SIM / USIM / UIM card and TF memory card as a whole product after binding H04M telephone communication technology in the international patent classification, especially a kind of hardware encryption TF card and mobile phone SIM card Binding method. Background technique [0002] At present, the commonly used SD card, that is, Secure Digital Memory Card, translated into Chinese as a safe digital card, is a new generation of memory devices based on semiconductor flash memory, widely used in portable devices, such as mobile phones, digital cameras, Personal Digital Assistant (PDA) and multimedia players, etc. The SD card was jointly developed by Panasonic, Toshiba and SanDisk in August 1999. SD memory card, the size of a postage stamp, weighs only 2 grams, but it has high memory capacity, fast data transfer rate, great mobility flexibility and good security. The SD...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W12/04H04W12/041H04W12/48
Inventor 姚国庆陆峰华胡传清肖孝鸿
Owner SHANGHAI QINGLONG COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products