Security control system applied to mobile terminal

A mobile terminal and security control module technology, applied in the Internet field, can solve the problems of poor data security and easy to be tampered with

Active Publication Date: 2016-08-03
POSBANK
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a security control system applied to mobile terminals, to at least solve the techn

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control system applied to mobile terminal
  • Security control system applied to mobile terminal
  • Security control system applied to mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0029] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security control system applied to a mobile terminal. A main board of the mobile terminal is provided with a security chip. The system comprises a chip driving module which is connected with the security chip and is used for driving the security chip to generate security keys, and types of the security keys at least comprise an asymmetric key, a transmission key and a work key; a key management module which is connected with the chip driving module and is used for driving the chip driving module to employ the key type corresponding to the data information according to the content of the data information for encryption and decryption processing on the data information; and a security control module which is connected with the key management module and is used for sending a control instruction to the key management module for encryption processing on the data information, and the control instruction is used for controlling the key management module. The system solves technical problems of poor data security and easy tampering caused by only soft encryption processing on the data existing in a mobile terminal in the prior art.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a security control system applied to mobile terminals. Background technique [0002] The rapid development of mobile networks and the improvement of mobile terminal security technology have brought opportunities for banks to handle cashless business through mobile devices. Equipped with tablet computers and other mobile terminals, adopting the method of digitization, informatization, and image transfer of data, using the cellular data private network provided by the operator or the wireless local area private network built by the province to connect with the background system, It can realize functions such as credit business acceptance, account opening by appointment, electronic bank signing, and financial product sales, providing customers with "one-stop" financial services. This innovative marketing model that combines mobile technology with financial services not only impr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/02
CPCH04L63/0853H04W12/02
Inventor 邵智宝徐朝辉汪航陈震宇文禄江黎枫
Owner POSBANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products