Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, device and system for secure pairing

A security device and security technology, applied in the direction of computer security devices, instruments, digital data authentication, etc., can solve the problems of no secure pairing of the security device and the host device, and the host device is in an untrusted environment, so as to achieve safe pairing, reduce The effect of safety costs

Active Publication Date: 2020-08-21
MICROARRAY MICROELECTRONICS CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in order to ensure secure pairing between the security device (such as the fingerprint module) and the host device (such as the mobile device itself) in a trusted environment (secure pairing refers to mutual exchange of certificates and mutual trust), security is usually performed before leaving the factory. The secure pairing of the device and the host device, however, the host device is often in an untrusted environment during assembly, testing, maintenance, etc., and there is no technology for secure pairing between the security device and the host device in an untrusted environment in the prior art Program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for secure pairing
  • A method, device and system for secure pairing
  • A method, device and system for secure pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] figure 1 It is a schematic flowchart of a secure pairing method provided by Embodiment 1 of the present invention. This embodiment can be applied to scenarios where the security device is paired with the host device and there is no information about pairing with the security device in the host device. The method specifically Including the following steps:

[0078] S101. Establish a network connection between the security device, the host device and the server.

[0079] The network connection established between the security device, the host device and the server may be a trusted network connection (that is, a trusted environment) or an untrusted network connection (that is, an untrusted environment), which is not specifically limited in this embodiment of the present invention.

[0080] It should be noted that the host device may be a user equipment or an APP loaded in the user equipment, wherein the user equipment includes but is not limited to smart phones, tablet co...

Embodiment 2

[0135] Figure 5 A schematic structural diagram of a security device provided by Embodiment 2 of the present invention includes a receiving module 10 , a processing module 11 and a sending module 12 .

[0136] The receiving module 10 is configured to receive first information sent by the host device in an untrusted environment, wherein the first information includes the information identification code of the host device and the certificate of the host device;

[0137] The processing module 11 is configured to generate second information according to the first information received by the receiving module 10, wherein the second information includes the information identification code of the host device, the certificate of the host device, and the information identification code of the security device;

[0138] The sending module 12 is configured to send the second information generated by the processing module 11 to the server, so that the server judges whether the security devi...

Embodiment 3

[0150] Figure 7 A schematic structural diagram of a host device provided by Embodiment 3 of the present invention includes a sending module 20 and a receiving module 21 .

[0151] The sending module 20 is configured to send first information to the security device in an untrusted environment, where the first information includes the information identification code of the host device and the certificate of the host device;

[0152] The receiving module 21 is configured to receive fourth information sent by the security device to pair the security device with the host device, wherein the fourth information includes a certificate of the security device.

[0153] further, Figure 8 It is a schematic structural diagram of another host device provided in Embodiment 3 of the present invention, and the host device further includes a storage module 22 .

[0154] The storage module 22 is configured to record pairing information, wherein the pairing information includes the correspond...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a device and a system for safe pairing. The method comprises the following steps: in an untrusted environment, a security device receives a first information sent bya host device, the first information including an information identification code of the host device and a certificate of the host device; the security device generates second information according tothe first information, the second information including an information identification code of the host device, a certificate of the host device and an information identification code of the securitydevice; the security device sends the second information to the server so that the server judges whether the security device and the host device allow pairing or not; the security device receives thethird information sent by the server; the security device sends a fourth message to the host device such that the security device and the host device are paired, the fourth message comprising a certificate of the security device. By the method, the secure pairing of the secure device and the host device in an untrusted environment can be realized, and the security cost can be reduced.

Description

technical field [0001] Embodiments of the present invention relate to the field of mobile computing security, in particular to a method, device and system for secure pairing. Background technique [0002] With the continuous development of electronic technology, more and more mobile devices start to use security devices (such as fingerprint modules) to improve the security of mobile devices. The fingerprint security device is an unlocking device that uses fingerprint data for record verification and avoids additional cumbersome identification processes. [0003] In the prior art, in order to ensure secure pairing between the security device (such as the fingerprint module) and the host device (such as the mobile device itself) in a trusted environment (secure pairing refers to mutual exchange of certificates and mutual trust), security is usually performed before leaving the factory. The secure pairing of the device and the host device, however, the host device is often in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/32
CPCG06F21/32G06F21/445
Inventor 李扬渊黄鑫
Owner MICROARRAY MICROELECTRONICS CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products