Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Usb KEY protocol conversion equipment and method

A technology of protocol conversion and USB interface, which is applied in the field of mobile terminal authentication, can solve problems such as limited popularity, unsupported SD card, unfavorable unified authentication, etc., and achieve the effect of ensuring legality

Active Publication Date: 2017-09-08
CHINA TELECOM CORP LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Since many mobile terminal devices do not have a USB interface, the traditional USBKEY cannot be used on most mobile terminals
Most mobile terminal transactions only use account password authentication, SMS verification code, WAP (Wireless Application Protocol, wireless application protocol) authentication to complete user identity authentication, which has security risks;
[0005] (2) Some application parties have introduced solutions based on SD card (Secure Digital Memory Card, secure digital card), SIM (Subscriber Identity Module, customer identification module) card or other special equipment to store digital certificates to realize mobile terminal transaction services, but these solutions Restricted by terminal capabilities, for example, some terminals do not support SD cards (such as iPhone (iPhone)) or do not support SIM card access channels (for example, the terminal operating system does not provide SIM card access instructions to the application layer), etc., which affect the promotion , with very limited popularity
[0006] There are many types of mobile terminals, and the supported interfaces are also different. It is difficult for the application side to provide security authentication devices that support all different types of mobile terminals, and it is not conducive to unified authentication between different devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Usb KEY protocol conversion equipment and method
  • Usb KEY protocol conversion equipment and method
  • Usb KEY protocol conversion equipment and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0039] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0040] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0041] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authoriz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USB KEY protocol conversion device and method, and relates to the technical field of mobile terminal authentication. The device includes: USB interface, used to connect the USB KEY device; more than two output interfaces, respectively used to connect the corresponding interface of the terminal equipment; protocol conversion chip, used to convert the USB protocol into the protocol type of the output interface; conversion control unit , used to determine the target output interface actually connected to the terminal device, and instruct the protocol conversion chip to convert the USB protocol to the protocol type of the target output interface. Using the existing USB KEY, after protocol conversion, it can be connected to different types of terminal equipment, and realize unified user identity security authentication for online transactions on different terminals to ensure the legality and validity of transactions.

Description

technical field [0001] The invention relates to the technical field of mobile terminal authentication, in particular to a USB (Universal Serial BUS, universal serial bus) KEY (key) protocol conversion device and method. Background technique [0002] In order to ensure the security of transactions, users are currently accustomed to using USB KEY on computers for online banking, online payment, e-government, OA (Office Automation, office automation) and other operations, to encrypt and sign transaction information to ensure transaction security. And the authenticity and validity of the user's identity. With the development of the mobile Internet, more and more users wish to use the above-mentioned functions on mobile terminal devices such as mobile phones and tablet computers. [0003] However, there are some problems in the transaction security of mobile terminal equipment as follows: [0004] (1) Since many mobile terminal devices do not have a USB interface, the tradition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F13/42G06F21/34
Inventor 张湘东张文安谢云黄泽龙李庆艳杨豫湘
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products