Hardware encryption protection method and system for cellphone data

A technology of hardware encryption and protection system, applied in the field of mobile communication and information security, it can solve problems such as inability to meet requirements and performance problems, and achieve the effects of high security, high performance and high reliability

Active Publication Date: 2014-02-05
深圳市中易通安全芯科技有限公司
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are following two main deficiencies in this method: (1) the performance problem of encryption and decryption
For a large number of pictures or videos, even partially encrypted, there are performance problems when the pictures need to be seen in real time
(2) Security issues
If the encryption requirements are relatively high, these methods will not meet the requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware encryption protection method and system for cellphone data
  • Hardware encryption protection method and system for cellphone data
  • Hardware encryption protection method and system for cellphone data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to better understand the technical solutions of the present invention, the embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] like figure 1 As shown, a hardware encryption protection system for mobile phone data is proposed, including a mobile phone device, a memory chip, a key generation module, an AES encryption and decryption module, a hardware encryption and decryption module, and a file storage module.

[0031] The memory chip includes a core processor and a built-in memory, and is fixed on the circuit board of the mobile phone by welding. The chip not only provides encryption and decryption functions; but also has a built-in small storage space, which can only be accessed through the SDK provided by the manufacturer. It can be used to save private data, or establish a data binding relationship, and is used for data recovery in special cases. The main function of the chi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hardware encryption protection method and system for cellphone data. The hardware encryption protection method includes utilizing ID (identity) of a cellphone, IMEI (international mobile equipment identity) numbers of an SIM (subscriber identity module), SNs (serial numbers) of a storage chip and name of a source file as dynamic parameters, calling a key generating module and an AES (advanced encryption standard) encrypting and decrypting module to generate Keys for encryption and decryption by being matched with logic calculation; calling a hardware encrypting module to encrypt the file or data for the source file. The key generating module, the AES encryption and decryption module and the encryption and decryption module operate file storage equipment through the storage chip, data encryption and decryption are completed, and the storage chip is welded on a circuit board of the cellphone and provided with an independent core processor. The hardware encryption protection technology for the cellphone data overcomes the defects of the prior art, is free of system resource occupation, has high performance, safety and reliability, and can effectively meet the encryption protection requirements on important files of people.

Description

technical field [0001] The invention is applied to the fields of mobile communication, information security and the like, and in particular relates to a mobile phone data hardware encryption method and system with high reliability and high security. Background technique [0002] Through investigation, there is no method for mobile phones to use hardware encryption chips for data protection in the market at present, and some files are encrypted and decrypted mainly through pure software applications. The usual way to achieve this is: set a security password (it can be a password or a pattern) for user login authentication; after passing the authentication, you can enter the private space, and in the private space you can specify files for encryption, or Encrypted files are decrypted here. But there are following two main deficiencies in this method: (1) the performance problem of encryption and decryption. Because of software encryption, full-text encryption is required for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107
Inventor 刘美云
Owner 深圳市中易通安全芯科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products