Terminal equipment and method for encrypting user information

A technology of terminal equipment and encryption algorithm, applied in the field of communication, can solve problems such as hidden dangers, stealing property and personal privacy, forgetting passwords, etc., to avoid information leakage

Active Publication Date: 2012-04-18
宁波青年优品共享科技有限公司
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From the perspective of cryptography, the above methods of establishing passwords will bring huge hidden dangers
People with ulterior motives can easily crack weaker passwords through exhaustive and dictionary attacks, obtain users' confidential information, and steal users' property and personal privacy
Therefore, it is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment and method for encrypting user information
  • Terminal equipment and method for encrypting user information
  • Terminal equipment and method for encrypting user information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention overcomes that the encryption and decryption processes existing in the prior art all depend on the software operation in the mobile phone. If the user's mobile phone is implanted with viruses and Trojan horse programs, it can monitor the information in the user's mobile phone memory and steal the password input by the user ( key) or the password output after decryption, causing significant property and economic losses to the user.

[0032] The invention includes two parts, an encryption chip and a terminal body. The encryption algorithm built into the encryption chip can be one or a combination of multiple encryption methods such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), RSA (Rivest Shamir and Adleman), and MD5 (Message Digest Algorithm). The AES128 algorithm is used as an example for illustration.

[0033] The key of the AES encryption algorithm is extracted by the biometric information identification module, and cons...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses terminal equipment and a method for encrypting user information. The terminal equipment comprises an encryption chip and a terminal main body, wherein the terminal main body is used for acquiring the biological information and private information of a user; and the encryption chip is used for encrypting the private information of the user by using biological identification information as a key and using an encryption algorithm, sending encrypted information to the terminal main body, and storing the encrypted information. By adoption of the technical scheme, a mobile internet device (MID) can change a display policy according to different external lighting environments, so that the satisfaction of visual sensory of the user is improved, and the performance of products is improved. A hardware solution of the encryption chip is superior to a software method in terms of both speed and performance. By adoption of a biological identification technology, the user does not need to memorize any password; and operation processes of encryption, decryption, display and input are finished inside the encryption chip without adoption of a mobile phone, so that information leakage caused by a virus or Trojan in the mobile phone is avoided.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to a terminal device and a user information encryption method thereof. Background technique [0002] People live in modern society and deal with different types of passwords every day, such as power-on passwords of work computers, passwords of bank credit cards, login passwords of personal e-mails, passwords of various registration websites, passwords of online banking, securities trading passwords, etc. , it can be said that we live in an environment surrounded by passwords. Although the length, number of digits, and types of each password are different. But any kind of password disclosure or loss will cause huge losses to users. [0003] At present, most users use some numbers or names that are special to themselves as passwords, such as birthdays, phone numbers, ID numbers, names, etc. Moreover, in order to make the password simple and easy to remember, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/72
Inventor 唐贵杰韩辰雷春雪李春雨谢群
Owner 宁波青年优品共享科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products