Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection module of mobile communication equipment and its processing method

A mobile communication device, a trusted technology, applied in electrical components, transmission systems, etc., can solve problems such as fragility, and achieve the effects of accurate and credible results, guaranteed process, and convenient implementation.

Inactive Publication Date: 2010-09-01
YINGHUADA (SHANGHAI) ELECTRONIC CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Only this security measure is very fragile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection module of mobile communication equipment and its processing method
  • Safety protection module of mobile communication equipment and its processing method
  • Safety protection module of mobile communication equipment and its processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0012] The invention inserts a firewall module in the bluetooth device. Figure 2A What is shown is that when the Bluetooth device is used as a slave unit, the insertion position of the firewall module 201 is at the upper layer of the Logical Link Control and Adaptation Protocol (L2CAP) 202, and the following are the basic modules of the Bluetooth device: Host Control Interface (HCI) 203 , link management layer (LMP) 204 , baseband layer (BASEBAND) 205 . This structure is mainly to prevent unknown nodes from attempting to make illegal connections and steal local data. After receiving the L2CA_ConnectInd (connection) event from the L2CAP layer 202, the firewall module 201 filters and analyzes the data packet, confirms whether it is a trusted node, and sends L2CA_ConnectRsp (permission) or L2CA_ConnectRspNeg (forbidden) to the L2CAP layer 202 according to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Present invention discloses safety protection module and processing method using blue teeth transmission technique transmission technique mobile communication equipment,It contains increasing one fire wall module In blue teeth protocol stack mainframe control interface, proceeding filtering analyses to incoming data packet according to only blue teeth equipment address of each blue teeth equipment, to credible node , allowing establishing communications linkage to transmit data,to unlikelihood node preventing all data packet transmitted to said node prohibiting responses to said node transmitted data packet, Said invention aims at ensuring messages transmission only In creditable blue teeth equipment , preventing equipment connection attempt to local equipment connection, also prohibitingnon - user original idea ' s connection with other equipment, Thereby effectively ensuring local equipment data information not be illegally filched.

Description

technical field [0001] The invention relates to a mobile user equipment, in particular to a security protection module (firewall module) of a mobile communication device (Bluetooth mobile phone) using Bluetooth (Bluetooth) transmission technology and a processing method thereof. Background technique [0002] The Bluetooth (Bluetooth) transmission technology emerging as a short-distance wireless transmission technology is currently very popular. However, with the gradual increase of Bluetooth products, there are more and more security issues. There have been multiple security vulnerabilities, such as: "Redfang" (Redfang) software can make hidden Bluetooth devices invisible; "Bluestumbling" or "Bluesnarfing" software can allow hackers to exploit certain brands of mobile phones Security protection loopholes to grab data and so on. According to the RSA security company, some security holes in Bluetooth mobile phones and handsets allow hackers to read the user's personal data, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 何翔何代水
Owner YINGHUADA (SHANGHAI) ELECTRONIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products