Security authentication method, master electronic device and slave electronic device

A technology for electronic equipment and security authentication, applied in the field of security authentication, can solve the problems of the service life of the main electronic equipment and the influence of safe use, infringement of user privacy, theft, etc.

Inactive Publication Date: 2017-01-11
BEIJING HUADA INFOSEC TECH
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These pirated slave electronic devices are not only ineffective during use, but also affect the normal operation of the main electronic device, affecting the service life and safe use of the main electronic device
Even some unscrupulous merchants use their secondary electronic equipment to steal user information in the main electronic equipment, infringing on user privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, master electronic device and slave electronic device
  • Security authentication method, master electronic device and slave electronic device
  • Security authentication method, master electronic device and slave electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The following embodiments of the present invention provide a security authentication method, a master electronic device, and a slave electronic device, so as to avoid the use of the slave electronic device from affecting the service life and safe use of the master electronic device, and protect user privacy from being leaked.

[0073] In order for those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above objects, features, and advantages of the embodiments of the present invention more clearly understood, the following describes the technical solutions in the embodiments of the present invention with reference to the accompanying drawings. for further details.

[0074] like figure 1 As shown, it is a flowchart of a security authentication method provided by an embodiment of the present invention, and the execution body of the security authentication method includes a main control chip and a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method, a master electronic device and a slave electronic device. The master electronic device comprises a master control chip and a security chip, and is in communication connection with the slave electronic device. The security authentication method comprises the following steps: the security chip receives a request generation instruction sent by the master control chip; the security chip generates a security authentication request comprising a group of random numbers; the security chip sends the security authentication request to the master control chip, so that the master control chip sends the security authentication request to the slave electronic device; when the security chip receives a first encryption result sent by the master control chip, the security chip judges whether the slave electronic device is an authenticated slave electronic device according to the first encryption result, the security authentication request and a built-in key in the security chip; and if so, the security chip sends an authentication pass instruction to the master control chip, so that the master control chip provides services for the slave electronic device. The scheme can avoid the influence of the use of the slave electronic device to the service life and the secure use of the master electronic device, and protect the user privacy from being leaked.

Description

technical field [0001] The invention relates to the technical field of security authentication, and in particular to a security authentication method, a master electronic device and a slave electronic device. Background technique [0002] With the rapid development of integrated circuit technology, various electronic devices based on integrated circuit technology emerge in an endless stream, and the functions of various electronic devices are becoming more and more powerful. When implementing various functions of the electronic device, some of the functions need to be realized by the corresponding slave electronic device (for convenience of description, the electronic device corresponding to the electronic device is hereinafter referred to as the master electronic device). For example, in order to avoid affecting other people around when listening to songs on the mobile phone, it is necessary to use headphones that match the mobile phone to realize related functions; in orde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/3228H04L9/0869H04L9/30
Inventor 滕虓宇张昊
Owner BEIJING HUADA INFOSEC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products