Mobile device encrypted USB key

A mobile device, encryption and decryption technology, applied in the field of information security, can solve the problems of inability to meet the needs of mobile applications, strict requirements for network security transmission and data security storage, etc.

Active Publication Date: 2019-09-20
XIAMEN GREAT POWER GEO INFORMATION TECH +1
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of mobile Internet and Internet of Things technology and the popularization of mobile smart terminals, in the fields of industry applications and government affairs offices, the traditional use of handheld computers with limited application program loading or network access, or mobile operations of dedicated terminals for private lines and private networks The means have been unable to meet the needs of mobile applications in the era of mobile intelligent Internet, and the demand for scene-based and intelligent mobile office and mobile operations has become increasingly strong. At the same time, the requirements for secure network transmission of sensitive information and secure data storage harsh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile device encrypted USB key
  • Mobile device encrypted USB key
  • Mobile device encrypted USB key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to have a further understanding of the technical solution and beneficial effects of the present invention, the technical solution of the present invention and its beneficial effects will be described in detail below in conjunction with the accompanying drawings.

[0064] figure 1 A schematic structural diagram of the mobile device encryption U-shield provided by the present invention, such as figure 1 As shown, the mobile device encryption U-shield provided by the present invention includes a circuit board 10 and a smart card chip 20 arranged on the circuit board 10. The encryption U-shield is also provided with a mobile terminal 30 for connecting to a third-party APP. The serial bus interface 40 for inter-communication.

[0065] Please combine figure 2 Shown, it shows the main structure of the chip part of the present invention, as figure 2 The serial bus interface 40 includes an SKF interface 41 and an encryption / decryption interface 42, and the smart ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a mobile device encrypted USB key. The encrypted USB key comprises a circuit board and an intelligent card chip arranged on the circuit board, the encrypted USB key is also provided with a serial bus interface connected with the mobile terminal and used for realizing communication with a third-party APP; the serial bus interface comprises an SKF interface and an encryption and decryption interface. The intelligent card chip comprises an identity authentication module and a data storage module, the identity authentication module is in communication connection with a mobile terminal through an SKF interface; and the data storage module is used for detecting the user PIN code and the application characteristic value, realizing communication connection with the mobile terminal through the encryption and decryption interface, and realizing encryption and decryption storage of encrypted data in the data storage module through the encryption and decryption interface after the user identity authentication is passed. According to the invention, the security authentication of a user and the secure storage of information in mobile operation can be ensured, so that the personal mobile phone can be safely used in a general network environment.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an encrypted U-shield for mobile equipment. Background technique [0002] With the development of mobile Internet and Internet of Things technology and the popularization of mobile smart terminals, in the fields of industry applications and government affairs offices, the traditional use of handheld computers with limited application program loading or network access, or mobile operations of dedicated terminals for private lines and private networks The means have been unable to meet the needs of mobile applications in the era of mobile intelligent Internet, and the demand for scene-based and intelligent mobile office and mobile operations has become increasingly strong. At the same time, the requirements for secure network transmission of sensitive information and secure data storage Harsh. [0003] Based on this application background, it is necessary to provide a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/35G06F21/62G06Q20/40
CPCG06F21/35G06F21/6209G06Q20/40
Inventor 王继业黄超林黎鸣苏簪铀孔哲葛亮万宇
Owner XIAMEN GREAT POWER GEO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products