Unlock instant, AI-driven research and patent intelligence for your innovation.

WiFi chip and security chip information interaction method

A security chip and information interaction technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as easy leakage of user privacy data and attacks, and achieve high reliability, good scalability, and reasonable interaction logic Effect

Inactive Publication Date: 2018-02-16
SHENZHEN XIN YUPENG ELECTRONICS TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the transmission of data through the network, most of the current data transmission of smart devices is plain text transmission or encryption and decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WiFi chip and security chip information interaction method
  • WiFi chip and security chip information interaction method
  • WiFi chip and security chip information interaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present application are described in detail below, examples of which are shown in the accompanying drawings, and the embodiments described below by referring to the accompanying drawings are exemplary and are intended to explain the present application and cannot be construed as a reference to the present application. limits.

[0031] The network topology of smart devices currently on the market is as follows: figure 1 shown. It mainly consists of three parts, cloud server, mobile APP and smart devices. In order to ensure the security of users' data and information, a security system needs to be added to this network system, and corresponding security scheme supporting measures need to be added to these three parts at the same time. The invention is applied to the smart device end and is a part of the security system of the smart device end.

[0032] like figure 2 As shown, the security solution on the smart device side is implemented based on th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a WiFi chip and security chip information interaction method. The method comprises the following steps: performing bottom layer driving initialization on the WiFi chip and a security chip; creating a ring buffer array in the WiFi chip and the security chip; querying whether the ring buffer array contains data; if it is queried that the ring buffer array contains data, judging whether the queried data are valid; if the queried data are effective, accomplishing information interaction by the WiFi chip and the security chip, and if the queried data are ineffective, discarding the queried data; querying whether the ring buffer array created in the WiFi chip and the security chip contain data, performing sequential circulation, accomplishing the information interaction bythe WiFi chip and the security chip. The interaction logic between the WiFi chip and the security chip is more reasonable, and the WiFi chip and security chip information interaction method has the features of extensibility, reliability and security.

Description

technical field [0001] The invention is applied in the security system of the Internet intelligent equipment, and relates to the information interaction method between the WiFi chip and the security chip in the intelligent equipment. Background technique [0002] In recent years, as the concept of the Internet of Things has become more and more popular, there are more and more smart devices on the market. These smart devices connect to the network through wifi, generate a large amount of data, and transmit it to the cloud server. However, due to the transmission of data through the network, most of the current data transmission of smart devices is plain text transmission or encryption and decryption security scheme is very simple, it is easy to be intercepted or attacked by hackers, and it is easy to leak the personal privacy data of users. Therefore, with the development of the Internet of Things, information security will become more and more important. [0003] As secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L1/00H04L12/823H04L12/863H04L47/32
CPCH04L1/0083H04L1/0084H04L47/32H04L47/6245
Inventor 杨俊刘复鑫罗伟民邹伟
Owner SHENZHEN XIN YUPENG ELECTRONICS TECH CO LTD