Unlock instant, AI-driven research and patent intelligence for your innovation.

encrypted card

An encryption card and card slot technology, applied in the field of encryption cards, can solve the problems of difficulty for users to obtain, Trojan horse attack, and long card issuance process, so as to reduce the risk of remote malicious cracking, be easy to carry and use, and prevent Trojan horse attacks.

Active Publication Date: 2018-07-13
GUILIN WEIWANG INTERNET INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology has the following disadvantages: the external encryption device needs to be carried separately by the user, and needs to be charged irregularly by the user, which is inconvenient for the user to use; while the built-in security chip in the SIM card is convenient for the user to carry, but requires Cooperating with SIM card operators to issue cards, the card issuance process is long, and it is difficult for users to obtain it conveniently. In addition, the security chip is built into the SIM card, which is in a working state for a long time, and effective user confirmation cannot be obtained. There is a risk of being attacked by a Trojan horse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • encrypted card
  • encrypted card
  • encrypted card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0033] The invention provides an encryption card, which is installed in a SIM card slot of a mobile terminal and is convenient for users to carry and use. Specifically, the mobile terminal may be a terminal with a SIM card slot, such as a mobile phone. Taking mobile terminals as mobile phones as an example, dual-card dual-standby mobile phones have been widely popularized. Dual-card dual-standby mobile phones have two SIM card slot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption card which is arranged in the SIM card slot of a mobile terminal. The encryption card includes a wireless communication module, a sensor, a security chip and a power interface; the wireless communication module establishes a communication channel between the encryption card and the mobile terminal; the sensor detects the user confirmation signal of a user; the security chip is connected with the wireless communication module and the sensor for receiving the user information operation instruction from the wireless communication module to generate a random target confirmation signal and comparing whether the user confirmation signal detected by the sensor is consistent with the target confirmation signal, if yes, the user information is encrypted or decrypted; and the power interface of the encryption card is connected with the power interface of the SIM card slot of the mobile terminal and is used to supply power to the encryption card through the power interface of the SIM card slot of the mobile terminal. According to the invention, users can conveniently obtain, carry and use the encryption card, and the transaction operation security is improved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an encryption card. Background technique [0002] Mobile payment means that users use mobile terminals such as mobile phones to pay for the goods or services they consume. Due to the advantages of convenience and speed of mobile payment, more and more users like to pay through mobile payment. However, the security issues of transaction operations in mobile payment are also becoming more and more prominent. For example, when mobile terminals transmit user information such as bank account numbers and passwords to remote servers such as bank servers, they are vulnerable to Trojan horse attacks and malicious interception by hackers and other illegal elements, thereby threatening the security of user accounts. [0003] Therefore, in the process of data transmission, an encrypted transmission method needs to be adopted. In the prior art, people have developed some technical sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q20/32G06Q20/38G06Q20/40
CPCG06Q20/322G06Q20/382G06Q20/40145
Inventor 温咏
Owner GUILIN WEIWANG INTERNET INFORMATION TECH CO LTD