Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile phone security co-processing chip

A technology for co-processing chips and mobile phone security, applied in the field of mobile phone security co-processing chips, it can solve problems such as hidden dangers, existing security, inability to guarantee communication and business security, etc., and achieve the effect of communication authentication security and enhanced security.

Inactive Publication Date: 2015-02-18
NANJING ZEBEN INFORMATION TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the common solutions in the prior art can solve many problems, there are security risks in specific occasions, especially on mobile phones as mobile devices
①The public-private key cryptography system implemented by software may be cracked, especially in mobile applications, such as the private key being stolen; ②The existing fingerprint authentication scheme for fingerprint mobile phones cannot guarantee communication and business security. There is also the possibility of business security being cracked. The fingerprint authentication technology adopted by the fingerprint mobile phone only solves the problem of local authentication, that is, it proves that the mobile phone is legally owned by the person who passed the fingerprint authentication. In the existing technology, after the fingerprint authentication is completed, , the communication authentication between the mobile phone application and the server, the fingerprint module is no longer involved, and it is implemented by the specific application, there is a possibility of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone security co-processing chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0028] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0029] Structural module schematic diagram of the present invention is as figure 1 As shown in the figure, the function of the chip and how the chip ensures the security of communication authentication from the hardware aspect is explained by using the structural diagram and module diagram, combined with the input, output and inter-module processing flow.

[0030] 1. Description of the chip constituent modules ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile phone security co-processing chip. The mobile phone security co-processing chip comprises a secrete key pair generating module, a random sequence generator module, a public key storage unit, a private key storage unit, a random sequence storage unit, a signature module, a random number signature value storage module, an encoding module, a vector quantity storage module, a master controller module and a parameter storage unit which are all arranged on a chip substrate. Due to the facts that the chip realizes a signature process by adopting hardware and generated private keys cannot be acquired by an application, communication security can be guaranteed. The mobile phone security co-processing chip can also be independently used for replacing a software signature mode, so that signature security is enhanced. The mobile phone security co-processing chip can serve as independent hardware to achieve a signature function, can also serves as a subsequent module for fingerprint authentication, and works in cooperation with a fingerprint authentication module to achieve the security of the entire authentication flow, namely mobile phone local authentication and communication authentication security. The subsequent module for fingerprint authentication can also achieve password sharing among various applications, namely sharing the private keys and public keys.

Description

technical field [0001] The invention discloses a mobile phone safety co-processing chip and relates to the technical field of mobile phone safety authentication. Background technique [0002] The public-private key cryptosystem is an asymmetric cryptographic technology, which is different from the traditional symmetric cryptographic technology. The encryption and decryption process of public-private key cryptography uses different cryptographic operators, that is, public key and private key pair. This technology is widely used in Internet encryption, signature and other security aspects. The chip corresponding to the invention is a core module for realizing the security authentication of the mobile phone. [0003] The public-private key cryptography system is widely used in communication, encryption, authentication and other fields, but most of the applications are implemented by software; there are few hardware implementations, especially for the implementation of mobile ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张先利
Owner NANJING ZEBEN INFORMATION TECH