High-secrecy mobile information safety system and safety method for distributed secret keys

A mobile information and security system technology, applied in computer security devices, telephone communications, branch equipment, etc., can solve the problems of inability to meet user mobile information security, infeasibility, and high cost, and achieve high-secrecy mobile information security guarantee, scalability The effect of strong sex and safety improvement

Inactive Publication Date: 2012-06-13
潘铁军
View PDF6 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This solution is suitable for dedicated computers, but not suitable for smart phones, because the mobile phone needs to be modified, ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-secrecy mobile information safety system and safety method for distributed secret keys
  • High-secrecy mobile information safety system and safety method for distributed secret keys
  • High-secrecy mobile information safety system and safety method for distributed secret keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: a security device of a mobile information security system, such as figure 1 As shown in , it includes a client 3 installed on a mobile phone 1 to communicate with a server 2 and a security device 5 installed in an earphone 4 to communicate with the mobile phone 1. It is characterized in that the earphone 4 is connected with a hardware-based Security device 5 for encryption or biometric identification. The security device 5 stores at least one of key, password, digital certificate, and biometric information for identifying users, supports SWP protocol, PBOC specification, QPBOC protocol, and integrates with TF card.

Embodiment 2

[0028] Embodiment two: a kind of NFC earphone that is used for mobile information security protection, such as figure 2 As shown in , it includes an ARM Cortex A8 single-chip microcomputer 2 installed in a housing 1, an earphone module 4 connected to the single-chip microcomputer 2 through a UART interface module 3, and a mobile information security protection device connected to the single-chip microcomputer 2 through a PIO interface module 3 An ESAM security device 5 , an NFC module 6 for communicating with the outside world, an antenna 7 for receiving external NFC signals and obtaining working energy, and a power supply 8 , and the antenna 7 is connected to the NFC module 6 . ESAM security device 5 is an embedded security module based on hardware encryption, supports SWP protocol, PBOC specification, and QPBOC protocol, and can be combined with at least one of SIM card, Micro SD card, TF card, and USB device.

Embodiment 3

[0029] Embodiment three: a kind of NFC earphone that is used for mobile information security protection, such as image 3 As shown in , it includes an ARM Cortex A8 single-chip microcomputer 2 installed in a housing 1, a BF10 earphone module 4 connected to the single-chip microcomputer 2 through a UART interface module 3, and a BF10 earphone module 4 connected to the single-chip microcomputer 2 through a TF card socket interface module 3 and used for mobile information TF card information security device 5 for security protection, NFC module 6 for communicating with the outside world, antenna 7 for receiving external NFC signals and obtaining working energy, power supply module 8 for power supply, antenna 7 is connected to NFC module 6 . TF card information security device 5 is an information security card integrated with hardware-encrypted smart card and TF card, and supports SWP protocol, PBOC specification, QPBOC protocol, CUPMobile bank card application specification and CU...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-secrecy mobile information safety system and a safety method for distributed secret keys. The high-secrecy mobile information safety system comprises a client side and safety equipment, the client side is mounted on a mobile phone and communicated with a server, and the safety equipment is arranged in an earphone and communicated with the mobile phone. The high-secrecy mobile information safety system is characterized in that the earphone is connected with the safety equipment based on hardware encryption or biometrics identification by the aid of an interface, and the safety equipment stores at least one of secret keys, passwords, digital certificates and biometrics information of identification users. The high-secrecy mobile information safety system has the advantages that high-intensive information safety protection is provided for cellphone users since the earphone is utilized as the hardware encryption based mobile information safety equipment. Meanwhile, by the aid of the safety equipment based on parallel computation, single instruction calls to superior application can be met and safety guarantees of multiple services for storage and high-efficient processing of mass data can be realized. Safety of the system is greatly improved by the aid of authentication and cross check of multiple subscription information.

Description

technical field [0001] The invention relates to a mobile information security system, in particular to a distributed key high-secrecy mobile information security system and security method. [0002] Background technique [0003] With the advent of the third-generation mobile communication system (The Third-Generation Mobile Communication System, 3G) era, the wireless mobile business is booming unprecedentedly, and the combination of smart phones, handheld computers and other mobile devices into standard business activities will become a 3G standard. "Killer Application", mobile applications ushered in a golden age of rapid development, but security issues are still the key bottleneck restricting the "blowout" of mobile services. Scholars at home and abroad are trying to find solutions in mobile phones with severely limited computing power and resources. However, under the increasingly rampant mobile phone viruses and the attacks of SIM card cloning machines, security protec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725H04L9/32G06F21/00
Inventor 潘铁军
Owner 潘铁军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products