Unlock instant, AI-driven research and patent intelligence for your innovation.

Embedded intelligent safety module, safety hardware device, safe data processing system and operation method of embedded intelligent safety module

A technology of security modules and working methods, applied in computer parts, instruments, computing, etc., can solve the problems of prolonged development cycle, easy data interception, difficult adjustment work, etc., to improve security and improve interface compatibility. Effect

Active Publication Date: 2016-06-08
GOLDPAC GRP LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the technical application of the current market, all embedded solutions involving smart IC chips need to follow its contact communication protocol—ISO7816 communication protocol, that is, the peripheral interface of the embedded intelligent security module only supports the ISO7816 communication protocol, which makes the demand The peripheral interface embedded in the hardware device of the embedded intelligent security module supports the ISO7816 communication protocol, resulting in poor interface compatibility of the embedded intelligent security module
[0004] In practical applications, since the ISO7816 communication protocol is the only communication protocol used in the industry, most of the embedded hardware devices need to be improved in line with industry standards when using devices with security requirements, which has caused the entire security hardware device (including: Embedded intelligent security modules and embedded hardware devices) the extension of the actual development cycle and the instability of communication
In addition, when the smart IC chip is maintained and updated, the corresponding embedded hardware device also needs to be adjusted appropriately. However, due to the relatively complicated structure of the embedded hardware device, the workload in the upgrading process is relatively large, and the adjustment work is not easy. It is easy to carry out, which makes it inconvenient for users to use; at the same time, due to the conflict between the unique communication mode of smart IC chips and the frequent changes of various hardware system versions in actual use, smart IC chips must be in an open environment. The data in the actual communication is easy to be intercepted, resulting in a decrease in the security of the smart IC chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded intelligent safety module, safety hardware device, safe data processing system and operation method of embedded intelligent safety module
  • Embedded intelligent safety module, safety hardware device, safe data processing system and operation method of embedded intelligent safety module
  • Embedded intelligent safety module, safety hardware device, safe data processing system and operation method of embedded intelligent safety module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 2 A structural block diagram of an embedded intelligent security module provided in Embodiment 1 of the present invention, such as figure 2 As shown, the embedded intelligent security module includes: a micro control unit 3 (MicrocontrollerUnit, referred to as MCU) and an intelligent IC chip 1, the micro control unit 3 is provided with at least one preset communication interface 4, the micro control unit 3 and the intelligent IC chip 1 Communication via the first preset communication protocol. Wherein, the micro-control unit 3 is used for analyzing and translating (message format conversion) the data received by the preset communication interface 4 into the data applicable to the delivery of the first preset communication protocol, and the data received from the smart IC chip 1 Analyzing and translating (message format conversion) into data applicable to the preset communication interface 4 for transmission.

[0053] It should be noted that in the present inv...

Embodiment 2

[0062] image 3 It is a flowchart of a working method of an embedded intelligent security module provided by Embodiment 2 of the present invention, such as image 3 As shown, the embedded intelligent security module adopts the embedded intelligent security module in the first embodiment above, and the specific structure can refer to the content in the first embodiment. The working method of the embedded intelligent security module includes:

[0063] Step 101, the micro control unit parses and translates the data received by the preset communication interface into data applicable to the first preset communication protocol, and transmits the translated data to the smart IC chip.

[0064] Since the peripheral interface of the embedded intelligent security module is a preset communication interface on the MCU, the data (command) sent by the embedded hardware device will be received by the MCU first. However, since the message format of the data sent by the embedded hardware devic...

Embodiment 3

[0071] Figure 4 A structural block diagram of a security hardware device provided by Embodiment 3 of the present invention, such as Figure 4 As shown, the security hardware device includes: an embedded hardware device 6 and an embedded intelligent security module 7, wherein the embedded intelligent security module 7 includes: a micro control unit 3 and an intelligent IC chip 1, and the micro control unit 3 is provided with At least one preset communication interface 4, the preset communication interface 4 is connected to the peripheral interface of the embedded hardware device 6 as the peripheral interface of the embedded intelligent security module 7, and the micro control unit 3 and the smart IC chip 1 communicate through the first preset protocol to communicate.

[0072] Optionally, an NFC antenna 5 is also arranged on the smart IC chip 1, so that the smart IC chip 1 can perform contactless communication.

[0073] It should be noted that, for the specific structure and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded intelligent safety module, an operation method thereof and a safe hardware device. The embedded intelligent safety module comprises a micro-control unit and an intelligent IC chip. The micro-control unit is provided with at least one preset communication interface. The preset communication interface is used as the peripheral interface of the embedded intelligent safety module. The micro-control unit performs bidirectional communication with the intelligent IC chip through a first preset communication protocol. The micro-control unit is used for performing data analysis and transcoding between the micro-control unit and the intelligent IC chip. According to the embedded intelligent safety module, through arranging the micro-control unit for data analysis and transcoding on the intelligent IC chip, and using the preset communication interface on the micro-control unit as the peripheral interface of the embedded intelligent safety module, interface compatibility of the embedded intelligent safety module is improved. Furthermore, because the intelligent IC chip is packaged in the embedded intelligent safety module for forming a semi-closed environment, safety in use of the intelligent IC chip is greatly improved.

Description

technical field [0001] The invention relates to the field of security equipment, in particular to an embedded intelligent security module, a security hardware device, a system and a working method. Background technique [0002] Embedded products have become increasingly popular and become an indispensable part of daily life. figure 1 It is a structural block diagram of an embedded intelligent security module in the prior art, such as figure 1 As shown, the embedded intelligent security module includes: an intelligent IC chip 1, and the communication interface 2 of the intelligent IC chip 1 serves as the peripheral interface of the embedded intelligent security module. After the embedded intelligent security module is embedded in the embedded hardware device, the intelligent IC chip 1 directly performs data transmission with the peripheral interface of the embedded hardware device. [0003] In the technical application of the current market, all embedded solutions involving...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/07G06K19/073
CPCG06K19/0723G06K19/07309
Inventor 任鸣柏向锟
Owner GOLDPAC GRP LTD