Supercharge Your Innovation With Domain-Expert AI Agents!

Data line, terminal, data line encryption system and data line encryption method

A data line and terminal technology, applied in data line, data line encryption system, terminal, data line encryption field, can solve the problem of unauthorized access and use of mobile devices

Inactive Publication Date: 2018-05-25
珠海市横琴新区龙族科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in actual scenarios, it often happens that mobile devices are acquired and used by unauthorized persons
Although there is system password protection, which restricts unauthorized persons from invading the mobile device operating system, unauthorized persons can still intrude into the mobile device's operating system by connecting and decrypting the mobile device through a universal data cable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data line, terminal, data line encryption system and data line encryption method
  • Data line, terminal, data line encryption system and data line encryption method
  • Data line, terminal, data line encryption system and data line encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data line, a terminal, a data line encryption system and a data line encryption method. The data line includes a channel key request module for sending a key to a channel authentication matching module in the terminal. According to the data line encryption system and the data line encryption method, the key is sent to the terminal through the data line, whether or not the data line and the terminal are authenticated and matched is calculated in the terminal, and the special-line exclusive use of the terminal and the data line is achieved to prevent an operating system in the terminal from being intruded and prevent stored data from being stolen. According to the data line encryption system and the data line encryption method, the third party with the highest permission authorizes initialization of authorization matching between the data line and the terminal to prevent others from invading the operating system of the terminal and stealing the terminal data through a data line forged by means of copying a counterfeit encryption authentication and match chip.

Description

technical field [0001] The invention relates to the field of terminal encryption, in particular to a data line, a terminal, a data line encryption system, and a data line encryption method. Background technique [0002] Existing terminals, such as mobile devices, are equipped with a data cable that integrates charging and data transmission when leaving the factory. The data line has the functions of charging and data transmission, and multiple data lines of the same format can all realize the above functions in general on the mobile device. [0003] However, in actual application scenarios, it often happens that mobile devices are acquired and used by unauthorized persons. Although there is system password protection, which restricts unauthorized persons from invading the function of the mobile device operating system, unauthorized persons can still intrude into the mobile device's operating system by means of connecting and decrypting the mobile device through a universal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06F21/82G06F21/45
Inventor 李彦辰
Owner 珠海市横琴新区龙族科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More