Safety equipment, multi-application system and safety method for ubiquitous networks

A security device and security technology, applied in the transmission system, climate change adaptation, electrical components, etc., can solve problems such as single access mode, lack of security guarantee, and failure to consider the characteristics and advantages of multi-network integration

Inactive Publication Date: 2013-08-28
潘铁军
View PDF11 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The access method of this invention is too simple, does not consider the characteristics and advantages of multi-network integration in smart cities under the ubiquitous computing environment, and lacks technical means for security in the solution. This patent will build a multi-application access platform and adopt a dedicated The combination mechanism of the security module and PKI improves the security of the system through multi-factor cross combination verification; provides automatic multi-path selection and mutual backup to ensure the reliability, stability and robustness of system transmission; Software technology to achieve full matching of mobile terminals, and seamless integration with existing systems through digital signature, biometric identification and other technologies, enabling smooth transition of existing systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety equipment, multi-application system and safety method for ubiquitous networks
  • Safety equipment, multi-application system and safety method for ubiquitous networks
  • Safety equipment, multi-application system and safety method for ubiquitous networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: A security device for ubiquitous network, such as figure 1As shown, it includes that the device may at least include a casing 1 of PC plastic or silicone material, a main control chip AU6438BS as MCU 2, an interface adapter 3 and corresponding external equipment 4; MCU 2 is connected to 30-pin, 8-pin interface adapter 3, and send and receive instructions on the bus 6 to control the corresponding external device 4 through the interface adapter 3; it is characterized in that the external device 4 includes at least a security module MicroSD financial IC card SE 5, also includes a transceiver, an amplifier , antenna, iPhone mobile phone or Android mobile phone 7 docked with the interface adapter 3; the SE 5 is used to store keys, digital certificates, biometric identification information, personal privacy information, and contract service information, and the contract service information includes The network priority method, security method, transaction method...

Embodiment 2

[0028] Embodiment 2: A multi-application system using ubiquitous network-oriented security equipment, such as figure 2 As shown, it at least includes a client 1, a ubiquitous network adapter 2, a merchant terminal 3, an authentication center 4, a server 5 and a security device SE 6; it is characterized in that the security device 6 includes at least a PC plastic shell, A main control chip AU6438BS is used as an MCU, a 30-pin, 8-pin interface adapter and an iphone correspondingly connected to it, the MCU is connected to the interface adapter through a bus, and the external device includes at least one MicroSD financial IC card security Module SE, the SE is an IC card with an on-chip operating system, the IC card stores keys, digital certificates, biometric identification information, personal privacy information, and contract service information, and the contract service information includes ubiquitous Network optimization methods, security methods, and transaction methods for...

Embodiment 3

[0030] Embodiment 3: A security method using a multi-application system for ubiquitous network security equipment, such as image 3 As shown, it is characterized in that it includes at least the following steps:

[0031] ①Individual users and merchants sign up for services. According to the server information, the authentication center uses multiple people to input passwords, server IDs and keys, authentication center keys, and at least two factors of the random numbers generated to randomly generate system keys. Security-level keys, using the merchant terminal identifier, client identifier, and random numbers generated, according to the contract information and combined with the merchant terminal's own security equipment such as POS, personal user security equipment such as MicroSD financial smart card identification, such as smart cards serial number, generate a master key, pre-set a set of master keys shared by both parties on the merchant terminal POS and the security modu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile payment multi-application system, which uses an intelligent terminal as a platform, a safety module as a carrier and an e-commerce platform as a supporter, builds the ubiquitous computing environment for smart cities and realizes the seamless joint with the existing system. The mobile payment multi-application system has the advantages that the NFC (near field communication), UHF(ultra high frequency), Zigbee and WiFi (wireless fidelity) converged access technology, the distributed key technology, the embedded middleware technology and the multi-interface adapting technology are adopted, a mobile communication network, a wireless sensing network and the Internet are organically merged, an multi-application access platform is built, a special safety module and PKI (public key infrastructure) combining mechanism is adopted, and the safety of the system is improved through the multi-factor cross combination checking; multipath automatic selection and mutual backup are provided for ensuring the reliability, the safety and the robustness of the system transmission; and the perfect matching of a mobile terminal is realized through the cross-platform middleware technology, and the seamless integration with the existing system is realized through the technology of digital signature, biometric feature recognition and the like, so the existing system realizes the stable transition.

Description

technical field [0001] The invention relates to a ubiquitous network-oriented security device and system, in particular to a ubiquitous network-oriented security device, a multi-application system and a security method. Background technique [0002] In the next ten years, mobile phones will replace computers and become the next computing center. The wireless city solves the popularization of ubiquitous computing and multi-network integration, and promotes the migration of e-commerce (E-commerce) to mobile commerce (M-commerce). A golden age of explosive development has ushered in. Juniper Research predicts that by 2015, the transaction volume of mobile payment will exceed 170 billion U.S. dollars, while in 2011 it was only 60 billion U.S. dollars. Mobile payment will become the next killer application of mobile value-added services. The combination of NFC, UHF, Zigbee, WiFi technology and mobile payment is the general trend, and innovative applications based on the two are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCY02A30/60
Inventor 潘铁军
Owner 潘铁军
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products