Mobile-terminal ultra-low power consumption and high safety communication method

A mobile terminal, high security technology, applied in the field of data communication, can solve the problems of user loss, need a long time, high power consumption, etc., to achieve the effect of improving security, avoiding theft, and low power consumption

Inactive Publication Date: 2016-08-10
SHANGHAI XINCHU INTEGRATED CIRCUIT
View PDF7 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Now more and more mobile terminals such as mobile phones are equipped with biometric information collection modules. The user's biometric information is generally stored in the cloud or in the flash memory of the mobile phone, but the user's biometric information is stored in the cloud or in the flash memory of the mobile phone. Not safe, because the user's biometric information may still be stolen by hackers, causing users to suffer losses
[0004] For mobile terminals such as smart phones, there are generally two processors, which are application processors and baseband processors. With more and more functions of smart phones and more complex applications, the application processor in smart phones Both the baseband processor and the baseband processor will be implemented under advanced process technology conditions, such as 28nm / 20nm / 16nm / 10nm / 7nm FinFET and other advanced processes, but as the process size shrinks, the leakage current of CMOS is getting larger and larger, so in order to save The power consumption of smartphones, the application processor or / and baseband processor will be turned off in standby mode, so it takes a long time for the smartphone to switch from standby mode to working mode, because the data needs to be read from the mobile phone The flash memory is moved to the memory in the phone, and then processed by the application processor or / and baseband processor
For example, it is becoming more and more common to use mobile terminals such as smart phones to make small-amount payments. When the smart phone switches from standby mode to small-amount payment, the user's information needs to be transferred from the flash memory of the smart phone to the memory of the smart phone. The application processor or / and baseband processor completes the small payment, so it takes a long time from the standby state to the application processor or / and baseband processor to complete the small payment. When the payment is completed, the application processor or / and baseband The processor is turned off and enters standby mode. If the frequency of micropayments is high, it will take a long time to complete each micropayment, and the application processor or / and baseband in the smartphone needs to be turned on and off continuously Processor, so starting the application processor or / and baseband processor in the smartphone consumes a lot of power every time a small payment is made

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile-terminal ultra-low power consumption and high safety communication method
  • Mobile-terminal ultra-low power consumption and high safety communication method
  • Mobile-terminal ultra-low power consumption and high safety communication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] like Figure 13 As shown, a mobile terminal ultra-low power consumption communication method, the SIM unit forms a judgment result output according to identity information and standard verification information when the mobile terminal is in standby mode, and the standby mode is when the screen of the mobile terminal is in Off state, no information is displayed, and the screen is in a power-off state, but not limited to the above-mentioned states; specifically include:

[0052] Step A1, the standard verification information of the user is prefabricated in the SIM unit;

[0053] Step A2, when the first communication module in the mobile terminal receives an identity verification request, the identity information collection module of the mobile terminal acquires the identity information of the current user;

[0054] Step A3, judging whether the identity information matches the standard verification information, and outputting a judging result.

[0055] It should be noted...

Embodiment 2

[0057] This embodiment proposes a method for completing micropayment without starting the application processor or / and baseband processor of the mobile terminal and with high security and ultra-low power consumption, by storing the biometric information in the SIM card (SIM Unit) in the embedded non-volatile memory, so as to ensure the absolute security of the standard verification information (the biometric information is used as an example below), by adding a first communication module, the mobile terminal communicates with the external identity authentication terminal through the first communication module (transaction terminal) to communicate, the communication protocol that the first communication module communicates with the external identity authentication terminal is a short-distance wireless communication protocol, such as NFC, RF, BLE and ZigBee, etc., the absolute security of fingerprint information is guaranteed by this embodiment, At the same time, micropayment can...

Embodiment 3

[0069] Compared with the ultra-low power consumption offline transaction mode proposed in the second embodiment, this embodiment also proposes two online transaction modes, which are the first online transaction mode and the second online transaction mode. The online transaction mode is explained.

[0070] The first online transaction mode is the situation where users use terminals other than mobile terminals, such as computers, to purchase commodities. The specific structure is as follows: Figure 4 shown, with Figure 4 Among them, 4_1 is the terminal used by the user to purchase goods, and the terminal is a terminal other than a mobile terminal, such as a computer, etc. 4_2 is a third-party trading platform for telecommunications, and 4_3 is a merchant. In a traditional situation, a user needs to enter a password for authentication when purchasing goods for payment, but since the password may be stolen and cracked, the security of using a password for authentication in a t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the data communication technology field and especially relates to a mobile-terminal ultra-low power consumption and high safety communication method and a high-safety online payment method. The mobile-terminal ultra-low power consumption and high safety communication method comprises the following steps that a standard verification information of a user is prefabricated in a SIM unit of a mobile terminal; when a first communication module in the mobile terminal receives an identity verification request, an identity information acquisition module of the mobile terminal acquires identity information of a current user; whether the identity information matches with the standard verification information is determined, and a determination result is formed and output.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a mobile terminal ultra-low power consumption and high security communication method and a high security online payment method. Background technique [0002] Traditional mobile terminals, such as mobile phones, generally use specific encryption and decryption algorithms and keys for identity verification when performing identity verification. However, with the development of information technology, encryption and decryption algorithms are subject to more and more attacks. Therefore, using encryption and decryption algorithms Traditional mobile terminals that authenticate with keys have become increasingly insecure. If the user's key for identity authentication is stolen or leaked artificially, criminals will use the user's key for identity authentication instead of the user. Sending corresponding instructions or performing corresponding operations will cause certain lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/34G06Q20/32G06Q20/40
CPCG06Q20/341G06Q20/3229G06Q20/3278G06Q20/40145
Inventor 景蔚亮陈邦明
Owner SHANGHAI XINCHU INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products