Method for realizing security and credibility of intelligent mobile terminal and system thereof

A technology of smart mobile terminals and secure channels, which is applied in the field of realizing the security and trustworthiness of smart mobile terminals, and can solve difficult problems

Inactive Publication Date: 2014-03-19
BEIJING LIYUN TECH DEV
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Aiming at the security problems of smart mobile terminals, there are many solutions, such as installing anti-virus software on the terminal to prevent virus and malicious code infection, controlling the programs that can run on the terminal according to the time and space range of the terminal, using some plug-in ultra- Small and large-capacity mobile memory cards or external Keys with extended interfaces or Key devices based on wireless communication technology ensure the security of online payments, etc., but the focus of these solutions is still limited to the smart mobile terminal itself, and the smart mobile terminal usually carries Various applications with different functions, because users lack sufficient understanding of the source and operation mode of certain programs on smart mobile terminals, it is difficult to fundamentally eliminate potential threats such as virus variants or the latest Trojan horses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing security and credibility of intelligent mobile terminal and system thereof
  • Method for realizing security and credibility of intelligent mobile terminal and system thereof
  • Method for realizing security and credibility of intelligent mobile terminal and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described in detail below in conjunction with specific embodiments.

[0053] as attached figure 1 As shown, the system composition includes: a multifunctional security terminal, an intelligent mobile terminal and a trusted server.

[0054] The multifunctional security terminal is completely independently developed, including: 1 set of system interface, 1 set of input and output devices and internal functional modules. The entire system interface includes but is not limited to: 1 Bluetooth, 1 Wi-Fi, 1 USB interface, 1 NFC and 1 audio interface. The whole set of input and output devices includes but not limited to: 1 display screen, 1 touch screen, 1 buzzer / vibrator, 1 LED indicator light and 3 buttons. The internal functional modules are based on the open source operating system on the mobile platform, combined with a security chip with a unique serial number, and reinforced according to security requirements; the internal function...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing the security and credibility of an intelligent mobile terminal and a system thereof, belonging to the field of information security and credibility management of the intelligent mobile terminal. The system comprises a multifunctional safety terminal, an intelligent mobile terminal and a trusted server. The multifunctional safety terminal mainly comprises one set of system interfaces, one set of input and output devices and an internal function module. The internal function modules comprise a terminal application program, an application level interface integrated module, a connection management module, a safety channel module, a digital certificate management module and an information security processing module. By using the connection between the multifunctional safety terminal and the intelligent mobile terminal, a safety channel from the multifunctional safety terminal to the trusted server is established, and the security and credibility of intelligent mobile terminal are realized. According to the method and the system, the cross platform is realized, a series of application level call interfaces are provided, the realization detail of a system bottom layer is effectively protected, and the potential risk of the intelligent mobile terminal is effected evaded by using the transparent, encrypted and controllable safety channel.

Description

technical field [0001] The invention relates to a method and system for realizing security and trustworthiness of an intelligent mobile terminal, and belongs to the field of information security and trust management of an intelligent mobile terminal. Background technique [0002] All kinds of smart mobile terminals have won wide acclaim for their rich functions, friendly interface, simple operation, and convenient portability since their birth, and have quickly occupied the market and achieved leapfrog development. . With the advancement of technology, new products are constantly emerging, and the cost performance is increasing day by day, which has promoted the mass popularization of various smart mobile terminals, and has gradually had a greater impact on people's life and work styles. [0003] All kinds of smart mobile terminals have their own specific operating systems, and on top of the operating systems are applications installed to achieve certain functions. These a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/22H04W12/00H04W12/03H04W12/069
Inventor 杨海张伟涛殷祺陈灿灿王佳温勇于光明刘凤伟
Owner BEIJING LIYUN TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products