Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile terminal file encryption and decryption system and method based on hardware encryption TF card

A hardware encryption and mobile terminal technology, applied in the field of information security, can solve the problems that the software encryption method cannot meet the requirements, multiple security risks, and be cracked, so as to save hardware design costs and driver software adaptation costs, ensure safety, and speed. The effect of encryption and decryption

Active Publication Date: 2021-08-24
江苏北弓智能科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are two major problems in this method: (1) the performance problem of encryption / decryption, software encryption / decryption takes up more CPU performance of terminal equipment
(2) Security issues. At present, the encryption software on the market often only has one layer of confidentiality, and the encryption key is relatively fixed, so there are still many security risks
[0004] In case of high encryption requirements, software encryption methods cannot meet the requirements
The disclosed patent CN103559453A related to hardware encryption TF card also utilizes the DevID of the mobile terminal device, the IMEI of the SIM card, and the SN of the storage chip as parameters for generating the encryption key, but the encryption / decryption of the generated files is done through a fixed Undisclosed formula generation, which can be cracked once leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal file encryption and decryption system and method based on hardware encryption TF card
  • A mobile terminal file encryption and decryption system and method based on hardware encryption TF card
  • A mobile terminal file encryption and decryption system and method based on hardware encryption TF card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The design scheme in the embodiment of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the present invention. Obviously, the described embodiment is only a part of the embodiment of the system of the present invention, not the entire implementation example.

[0044] Such as figure 1 As shown, a kind of mobile terminal file encryption and decryption system based on hardware encryption TF card is proposed, wherein the mobile terminal operating system (for the support framework of the operating system underlying system of hardware encryption TF card, hardware encryption TF card monitoring system service and application layer Registration) and hardware encrypted TF card system (encrypted TF card internal file encryption / decryption key storage area, root key storage area, true random number generator, encryption chip CPU);

[0045] The mobile terminal operating system refers to the syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile terminal file encryption and decryption system and method based on a hardware encryption TF card, and relates to the technical field of information security. The file encryption and decryption method is applied to the file encryption and decryption system, and the system includes: the underlying support framework of the operating system for the hardware encryption TF card, the hardware encryption TF card monitoring system service, application layer registration, and the hardware encryption TF card system; the method described Including: hardware encryption TF card According to the device DevID of the mobile terminal, the IMEI of the SIM card, the SN of the memory chip, and the SN of the hardware encryption TF card as parameters, AES encryption is performed using the true random number generated in the hardware encryption TF card as the key to generate hardware Encrypted TF card root key, this root key is the key bound with the mobile device, responsible for encrypting and decrypting the file header information of the mobile terminal. The file encryption and decryption method and system provided by the embodiments of the present invention effectively guarantee information security and protect user data and privacy from being leaked.

Description

technical field [0001] The invention relates to the technical field of information security, in particular, a mobile terminal file encryption and decryption system and method based on a hardware encryption TF card is designed. Background technique [0002] With the popularity of mobile terminal devices (mobile phones, tablets, etc.), their functions have become more and more abundant, and people have paid more and more attention to content security and sensitivity. Smart terminals store a variety of personal privacy information. Mobile terminals use an open mobile operating system, which can easily be implanted with malicious codes such as Trojan horses and viruses to steal users' personal information, posing a great challenge to security. [0003] At present, most mobile terminals on the market do not use hardware encryption chips for data protection, and mainly use pure software applications to encrypt and decrypt some files. The usual implementation method is: set a secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/79G06F21/72
CPCG06F21/72G06F21/79G06F2221/2107
Inventor 周军张李秋刘铮喻鑫马兴荣
Owner 江苏北弓智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products