Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile terminal file encryption and decryption system and method based on a hardware encryption TF card

A hardware encryption, mobile terminal technology, applied in the field of information security, can solve the problems of software encryption method can not meet the requirements, fixed, multiple security risks, etc.

Active Publication Date: 2018-12-07
江苏北弓智能科技有限公司
View PDF9 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are two major problems in this method: (1) the performance problem of encryption / decryption, software encryption / decryption takes up more CPU performance of terminal equipment
(2) Security issues. At present, the encryption software on the market often only has one layer of confidentiality, and the encryption key is relatively fixed, so there are still many security risks
[0004] In case of high encryption requirements, software encryption methods cannot meet the requirements
The disclosed patent CN103559453A related to hardware encryption TF card also utilizes the DevID of the mobile terminal device, the IMEI of the SIM card, and the SN of the storage chip as parameters for generating the encryption key, but the encryption / decryption of the generated files is done through a fixed Undisclosed formula generation, which can be cracked once leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal file encryption and decryption system and method based on a hardware encryption TF card
  • A mobile terminal file encryption and decryption system and method based on a hardware encryption TF card
  • A mobile terminal file encryption and decryption system and method based on a hardware encryption TF card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the design document scheme in the embodiment of the present invention with reference to the drawings in the embodiment of the present invention. Obviously, the described embodiment is only a part of the embodiment of the system of the present invention, rather than the whole implementation. example.

[0044] like figure 1 As shown, a mobile terminal file encryption and decryption system based on hardware encryption TF card is proposed, wherein the mobile terminal operating system (for the support framework of the operating system underlying system of the hardware encryption TF card, the hardware encryption TF card monitoring system service and the application layer registration) and hardware encryption TF card system (encrypted TF card internal file encryption / decryption key storage area, root key storage area, true random number generator, encryption chip CPU);

[0045] The mobile terminal operating system refers to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile terminal file encryption and decryption system and method based on a hardware encryption TF card, which relate to the technical field of information security. The fileencryption and decryption method is applied to a file encryption and decryption system. The system comprises: an operating system bottom support framework for a hardware encrypted TF card, a hardwareencrypted TF card monitoring system service, an application layer registration, and a hardware encrypted TF card system. The method comprises: the hardware encryption TF card is configured to encryptthe device according to the device DevID of the mobile terminal, the IMEI of the SIM card, the SN of the memory chip and the SN of the hardware encrypted TF card are used as parameters, and the true random number generated in the hardware encrypted TF card is used as a key to carry out AES encryption to generate a hardware encrypted TF card root key, which is a key bound with the mobile device andis responsible for encrypting and decrypting the file header information of the mobile terminal. The file encryption and decryption method and system provided by the embodiment of the invention effectively guarantee the information security, and ensure that user data and privacy are not disclosed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular, a mobile terminal file encryption and decryption system and method based on a hardware encryption TF card is designed. Background technique [0002] With the popularity of mobile terminal devices (mobile phones, tablets, etc.), their functions have become more and more abundant, and people have paid more and more attention to content security and sensitivity. Smart terminals store a variety of personal privacy information. Mobile terminals use an open mobile operating system, which can easily be implanted with malicious codes such as Trojan horses and viruses to steal users' personal information, posing a great challenge to security. [0003] At present, most mobile terminals on the market do not use hardware encryption chips for data protection, and mainly use pure software applications to encrypt and decrypt some files. The usual implementation method is: set a secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/79G06F21/72
CPCG06F21/72G06F21/79G06F2221/2107
Inventor 周军张李秋刘铮喻鑫马兴荣
Owner 江苏北弓智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products