Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-user access system and method based on communication module security module

A security module and access system technology, applied in the field of secure communication, can solve the problems of increasing the deployment cost of the Internet of Things, lack of communication capabilities, and terminal equipment without encryption and decryption capabilities, and achieve the effect of reducing deployment costs.

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional terminal equipment does not have communication capabilities because it is not equipped with a communication module when it leaves the factory. Therefore, we usually need to install a communication module on the terminal equipment so that the terminal equipment can communicate with the platform side through the communication module.
In many fields, in order to increase the confidentiality and security of the transmitted data, the data reported by the terminal device to the platform needs to be presented in ciphertext, but traditional terminal devices do not have the ability to encrypt and decrypt. The terminal device meets the encryption and decryption capabilities, and it is necessary to attach an encryption and decryption hardware module (U-key) to the terminal device to achieve secure communication with the platform side. However, this method requires each terminal device to be equipped with a separate encryption and decryption hardware module, which undoubtedly increases IoT Deployment Costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user access system and method based on communication module security module
  • A multi-user access system and method based on communication module security module
  • A multi-user access system and method based on communication module security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0034] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0035] figure 1 It shows a block diagram of a multi-user access system based on the security module of the communication module of the present invention.

[0036] like figure 1 As shown, the first...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a multi-user access system and method based on a communication module security module, including a host computer and a communication module. The host computer includes a plurality of terminal applications, and each terminal application forms an external transaction and a transaction lock request for the external transaction , and send the external transaction to the communication module through the API interface or AT command; the communication module includes the local SDK module, security middleware, and security module; the local SDK module forms the local transaction and the transaction lock request of the local transaction, and the security The middleware receives the transaction lock requests of external transactions and local transactions, selects the currently processed transaction and configures transaction locks based on the order of receipt; and receives the current transaction’s access request to the security module, adds a device lock for the security module, and configures the transaction lock for the current transaction Transactions provide cryptographic services. The invention can effectively reduce the deployment cost of the secure communication of the Internet of Things, and solve the problem of mutual exclusion of multi-user access to the security module through the transaction lock and the device lock.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a multi-user access system and method based on a security module of a communication module. Background technique [0002] In recent years, with the advent of the Internet of Everything era, more and more terminal devices need to be connected to the Internet of Things. However, traditional terminal equipment does not have communication capabilities because it is not equipped with a communication module when it leaves the factory. Therefore, we usually need to install a communication module on the terminal equipment so that the terminal equipment can communicate with the platform side through the communication module. In many fields, in order to increase the confidentiality and security of transmitted data, the data reported by terminal devices to the platform needs to be presented in ciphertext, but traditional terminal devices do not have the ability to encrypt and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/125H04L67/00G06F21/60
CPCH04L63/10H04L67/125H04L67/34G06F21/604G06F2221/2141
Inventor 李涛涛杨廷马骥刘熙胖王平
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH