Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

113 results about "Chip operating system" patented technology

Method for receiving and processing multi-terminal information by self-adapting SIM chip operating system

The invention relates to a multi-terminal information receiving and processing method for a self-adapting SIM chip operating system, which pertains to the technical field of mobile communication. The method comprises the steps that: first, a data communication interface of a mobile terminal is connected with a C6 pin on an SIM chip; then an NFC module in the mobile terminal receives a PBOC data command sent by an external terminal POS machine in a non-access manner according to14443 Wireless Application Protocol; the SIM chip receives data in a bidirectional 7816 standard data transmission way or in an SWP data transmission way; in the 7816 standard data transmission way, after receiving PBOC data, an SIM card enters an approach operation; a PBOC logic processing module processes credit for unload operation and credit for load operation corresponding to the PBOC data command and enters a withdrawal operation and backs to a GSM operation mode. In the SWP data transmission way, the SIM chip receives the data by the C6 pin and executes relevant operations; after operations are finished, the SIM chip is in the GSM operation mode; the two transmission ways are complementary and mutually independent and can be compatible with various mobile terminals and the hardware of the SIM chip.
Owner:SHANGHAI COS SOFTWARE CO LTD

Heterogeneous many-core chip oriented quantized power consumption control method

The invention discloses a heterogeneous many-core chip oriented quantized power consumption control method. The method comprises: obtaining reference power consumption data of a heterogeneous many-core chip in each state and establishing an external basic power consumption data table; obtaining a frequency grade table of all stable running frequencies supported by the heterogeneous many-core chip; and for all the stable running frequencies, establishing an existence relationship of chip power consumption of running same application codes in different frequencies, wherein the higher the frequency is and the higher the power consumption is, and the working power consumption of the lowest frequency grade is certainly smaller than the maximum stable running power consumption; establishing a power consumption management policy of the chip as a power consumption management basis; after a many-core operating system is started, initializing both a power consumption threshold register and a power consumption pre-warning register according to the maximum stable running power consumption; and when the operating system of the many-core chip runs, starting a power consumption management process by an external power consumption management system, and notifying the basic power consumption table, the frequency grade table and the power consumption management policy to the operating system of each heterogeneous many-core chip.
Owner:JIANGNAN INST OF COMPUTING TECH

Work method of analog card reader and analog communication system

The invention discloses a work method of an analog card reader and an analog communication system. The method is applied to a system comprising the analog card reader, a chip operating system, an instruction transceiver and a smart card register, wherein the analog card reader is used for detecting the communication state between the analog card reader and the instruction transceiver, and the state of the smart card register, conducting read-write operation on the smart card register according to the communication state and the state of the smart card register, and updating the state of the smart card register; the chip operating system is used for detecting the state of the smart card register, conducting read-write operation on the smart card register according to the detected result, and updating the state of the smart card register. As the analog communication between the chip operating system and the instruction transceiver is established through the analog card reader, the purpose of inputting terminal data to the chip operating system under the condition that no hardware simulator is used is realized, the emulation function range is broadened, hardware resource is saved, and emulation power consumption is reduced.
Owner:FEITIAN TECHNOLOGIES

USB (Universal Serial Bus) embedded trustworthiness private information processing device and system

The invention discloses a USB (Universal Serial Bus) embedded trustworthiness private information processing device and system. The USB embedded type trustworthiness private information processing device is used as a hardware base and a safe support of the whole system, and a self-clipped LINUX operating system and a private information processing assembly are used as a software base of the wholesystem. The USB embedded type trustworthiness private information processing device physically comprises a safety chip, a Flash storage chip and a safety COS (Chip Operating System), and logically comprises a starting region, a USB smart key region, a hiding region and an encrypting region. When a computer terminal is set to be introduced from a USB port and operates after started by the system, the whole computing environment is trustable through trusted guide and measurement; and when the computer terminal is not started and guided by the system, the system can be individually used as an encrypted U disk. According to the invention, the safety problem of individual private information processing is solved and a trustable computing environment is constructed.
Owner:ZHENGZHOU XINDA JIEAN INFORMATION TECH

Method for achieving symmetric cipher service based on intelligent card chip operating system (COS)

The invention provides a method for achieving symmetric cipher service based on an intelligent card chip operating system (COS). The symmetric cipher service in the intelligent card COS is packaged into an application interface layer of cipher service, an algorithm call parameter mapping layer and an algorithm software and hardware interface layer, wherein the application interface layer of the cipher service transfers corresponding data to be processed and control parameters, and the algorithm call parameter mapping layer is used for transferring corresponding cipher service parameters and performing secure environment detection. Corresponding working processes of the algorithm software and hardware interface layer are started, detection on whether cipher service processes are completed is performed, and the intelligent card operation system obtains results of the current cipher service through the application interface layer of the cipher service if crypto-operation is completed. According to the method, the object-oriented programming design concept is adopted, the symmetric cipher service in the COS is packaged, seamless transplantation and extension of the symmetric cipher service on different hardware platforms can be achieved, efficiency of the cipher service is improved, centralized safety control is performed on symmetric cipher algorithm, and safety in using of the cipher algorithm is improved.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

High security removable storage device

The invention provides a high security removable storage device which comprises a safe main control chip, a chip operating system (COS) arranged in the chip, a flash memory and removable storage device safety management software arranged in the flash memory, wherein the COS system is stored in the safe chip and is used for managing the authority certificates corresponding to users; the removable storage device safety management software adopts a memory sandbox technology, and is used for monitoring and filtering various operations which are carried out on a removable storage device by the users and programs, checking the device service environment and the access authority of the removable storage device by being matched with the COS system, controlling the unauthorized use behaviors of data files of the removable storage device decoded to the memory, and recording various key sensitive operations. The high security removable storage device adopts an integral protection technology combining software and hardware, so that the security access control of the removable storage device can be realized, and the users having different authorities have different data views and fine grit operation authorities for the removable storage device; therefore, the users are prevented from privately copying the files and the content in the removable storage device, and the data of the removable storage device is prevented from being broken and stolen by viruses and Trojan horses.
Owner:张永昌

SIM (Subscriber Identity Module) card and system supporting mobile communication network switching

The invention relates to an SIM (Subscriber Identity Module) card and a system supporting mobile communication network switching. The conventional mobile communication network switching method requires replacing the SIM card of a user. The SIM card comprises a microprocessor CPU (Central Processing Unit), a program memory ROM (Read Only Memory), a working memory RAM (Random Access Memory), a data memory EEPROM (Electrically Erasable Programmable Read-Only Memory), a serial communication unit and an in-card operating system, wherein the in-card operating system comprises a COS (Chip Operating System). The operating system in the SIM card further comprises an application module for storing different types of applications in a grouping way, a receiving and transmitting module for receiving a command issued by a remote service management system, and a management module for processing the command received by the receiving and transmitting module, including writing personalized data into the storage directory of a corresponding application in the application module according to an application marker, calling the application module to perform application state management, and switching the application into which the personal data is written into a valid application. By adopting the SIM card and the system disclosed by the invention, a communication network can be switched without replacing the SIM card.
Owner:BEIJING WATCH DATA SYST

Safety processing system and method for intelligent card (IC) card application

The invention discloses a safety processing system for an intelligent card (IC) card application, which comprises a main control key configuration unit, a key attribute expansion unit and a write key writing unit, wherein the main control key configuration unit is used for configuring and recording the quantity of main control keys and attribute of each main control key in an chip operation system, and the attribute of the main control key comprises a main control key value, a main control key identifier and a key purpose list controlled by the main control key; the key attribute expansion unit is used for expanding a main control key identifier byte in the attribute of each key, and the byte is used for indicating the main control key identifier of the key; and the write key writing unit is connected with the main control key configuration unit and the key attribute expansion unit and is used for utilizing a write key writing order withcarrying the main control key identifier and for writing the key into a card. The invention also discloses a corresponding safety processing method of the intelligent IC card application. Due to the adoption of the system and the method, multiple main control keys can be realized under one application, and the safety independence problem of each party when a card is issued by multiple parties.
Owner:WUHAN TIANYU INFORMATION IND

Testing device for operating system of security chip

The invention discloses a testing device for a security chip operating system, which is constructed through Python language and comprises a PCSC communication interface layer, an algorithm library interface layer, a function instruction interface layer, a basic algorithm interface layer and a script writing and executing layer. And communication with the to-be-tested security chip is realized through the PCSC communication interface layer. And the algorithm library interface layer is used for packaging interfaces of various security algorithms applied by the to-be-tested security chip. And thefunction instruction interface layer is used for packaging a function instruction in an operating system of the to-be-tested security chip. And the basic algorithm interface layer is used for performing secondary combination and packaging on the interface of the algorithm library interface layer and newly adding an operation function. The script writing and executing layer is used for storing, executing and modifying test scripts, and the script writing and executing layer achieves testing by combining and calling the PCSC communication interface layer, the algorithm library interface layer,the function instruction interface layer and the basic algorithm interface layer. The testing device for the operating system of the security chip can effectively improve the writing and debugging speed of the testing script.
Owner:BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +2

Fingerprint KEY device

The invention discloses a fingerprint KEY device, comprising a chip, a memory, a housing, a power supply, a fingerprint collecting unit, a fingerprint verification unit, a modulation and demodulation module, and an audio plug, wherein the fingerprint collecting unit, the fingerprint verification unit and the modulation and demodulation module are connected with the chip; the audio plug is connected with the modulation and demodulation module; the chip has a chip operation system; the memory is used for storing a private key, a digital certificate, and a fingerprint template; the audio plug includes an MIC (microwave integrated circuit) pole and a sound track pole; the modulation and demodulation module is used for converting an analogue data received from the audio plug into a digital data and then transmitting to the chip, and converting the digital data to be conveyed by the fingerprint KEY device into the analogue data and then transmitting to the audio plug; and the chip can authorize to use the private key and the digital certificate in the memory after the fingerprint verification unit verifies. The fingerprint KEY device replaces PIN code verification with fingerprint verification, and can achieve information interaction of the fingerprint KEY device and electric equipment with an audio interface through the modulation and demodulation module and the audio plug. Therefore, the security and the reliability of identity authentication of a user are improved; and meanwhile, the adaptability and the convenience are also enhanced.
Owner:SHENZHEN ARATEK BIOMETRICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products