Supercharge Your Innovation With Domain-Expert AI Agents!

Safety intelligent hardware, and protection method and system of user data of intelligent terminal

A technology of smart hardware and smart terminals, which is applied in user identity/authority verification and key distribution, which can solve problems such as incompatibility, increased purchase costs for users, and lack of security export and import functions for keys in external keys, so as to improve the application performance, and the effect of improving safety

Inactive Publication Date: 2015-08-26
廖小谦
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current main defects of the external key encryption technology include: 1. It does not provide the safe export and import function of the key in the external key. The key can only exist in a certain external key. Once the external key is lost or damaged, the encrypted The data cannot be decrypted, which seriously affects the usability of the data; 2. The function of the external key is single, and the various cryptographic application systems are not compatible. The ciphertext or digital signature of one cryptographic application system cannot be decrypted or verified in another system, and the user Each password application system needs to apply for an external key, which not only increases the purchase cost for the user, but also causes inconvenience in the management and portability of multiple external keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety intelligent hardware, and protection method and system of user data of intelligent terminal
  • Safety intelligent hardware, and protection method and system of user data of intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0060] An embodiment of the present invention is disclosed below to illustrate a secure intelligent hardware and a file encryption storage method in a smart phone.

[0061] The security intelligent hardware is selected as an intelligent password key with a Bluetooth interface, referred to as the Bluetooth Key, and the main device in the Bluetooth Key is a secure SOC (System-on-a-Chip, System-on-Chip) chip, and the secure SOC chip includes: a pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses safety intelligent hardware, and a protection method and system of user data of an intelligent terminal. The safety intelligent hardware comprises a cryptographic algorithm module, a safety data storage module, a wireless communication module, and a safety software storage unit. The safety intelligent hardware can carry out wireless communication with the intelligent terminal, thereby providing safety protection for the user data in the intelligent terminal; and thus the user secret data in the safety intelligent hardware can be outputted and inputted safely. The provided safety intelligent hardware, and the protection method and system of user data of an intelligent terminal can be applied to the technical field of information safety.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a method and system for protecting intelligent security hardware, intelligent terminal user data. Background technique [0002] With the continuous development of information technology, smart terminals represented by smart phones are used more and more in people's daily life and work. Using smart terminals makes it easy for people to acquire, store, process and process information. Interaction greatly facilitates people's daily life and work. More common smart terminal products, such as mobile smart terminals, vehicle smart terminals, IoT smart terminals, smart home appliances and wearable smart devices. However, since many smart terminals have the function of connecting to the network, once a smart terminal is maliciously attacked, it is likely to cause leakage of user data, and even cause great losses to the user's property and other aspects. Therefore, while t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
Inventor 廖小谦汪朝晖刘放黄真勇刘晓金梅刘燕刘群
Owner 廖小谦
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More