Portable transparent data safety protection terminal oriented to mobile applications

A portable terminal and mobile application technology, applied in the field of information security, can solve problems such as data leakage, and achieve the effect of solving the limitation of computing resources and energy consumption, high-strength data encryption and security protection, and high-speed and high-strength encryption and decryption computing capabilities.

Active Publication Date: 2015-03-25
NANJING UNIV OF INFORMATION SCI & TECH
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The invention also realizes the trusted identity authentication of the user, device and terminal module by means of the encryption and decryption module, and solves the problem of data leakage caused by the loss or embezzlement of the mobile device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable transparent data safety protection terminal oriented to mobile applications
  • Portable transparent data safety protection terminal oriented to mobile applications
  • Portable transparent data safety protection terminal oriented to mobile applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings.

[0050] The specific implementation of the present invention is divided into two parts, one part is hardware equipment, and the other part is software, wherein the hardware architecture of the present invention is as follows: figure 1 shown, including:

[0051] 1. The main control chip is an embedded ARM series chip to meet the needs of the project function for computing power.

[0052] 2. The trusted chip TPM and the encryption chip Enc, these two parts of the chip realize the trusted reasoning support of the present invention, wherein the TPM uses a dedicated chip, and the memory key includes the corresponding encryption and decryption calculation capabilities, which are controlled by the special chip circuit To protect against illegal theft, the ENC chip is a general-purpose encryption and decryption chip that provides various types of encryption calculation support...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a portable transparent data safety protection terminal oriented to mobile applications. The terminal is mainly divided into a data encryption and decryption module part and a mobile equipment client end part. According to the data encryption and decryption module part, a TPM (trusted platform module) and a chip which supports international standard encryption algorithms are used for achieving high-speed hardware data encryption and decryption computation, and a file encryption and decryption service is provided for the outside through Bluetooth or a wireless network. Meanwhile, the data encryption and decryption module part is based on a trusted computing architecture, and the trusted authentication of a user, the terminal and mobile equipment is achieved. According to the mobile equipment client end part, the data encryption and decryption service provided by an encryption and decryption module is called based on the Bluetooth or the wireless network, meanwhile, a local remote file system service is achieved, a data file storage service is provided for the mobile applications, the stored data are encrypted in the way of calling the encryption and decryption service by the mobile equipment client end part, the taken-out data are decrypted by the mobile equipment client end part, and therefore transparent encryption and decryption oriented to the mobile applications is achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a mobile application-oriented transparent data security protection portable terminal. Background technique [0002] With the substantial improvement in the performance of mobile devices such as mobile phones and PADs, mobile applications have also become a rapidly developing emerging computing model, and the scope of mobile applications is also showing a rapid expansion trend. Mobile applications include not only instant messaging, entertainment, etc., but also applications in mobile payment, mobile office, data storage, and remote data access, and most of these applications involve high-value and private data. Such data stored in mobile devices faces special security risks, such as: mobile terminals are easy to be lost, stolen, stolen, etc. Due to the limited computing resources and capabilities of mobile terminals, existing information security protection technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/00
CPCH04L63/0428H04W12/00
Inventor 韩进王璐李烨李玲刘烨
Owner NANJING UNIV OF INFORMATION SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products