Hardware security module, security terminal and realizing method of security terminal

An implementation method and hardware technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as high production costs

Inactive Publication Date: 2014-05-07
DATANG SEMICON DESIGN
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This means that when changing from an ordinary smart terminal to a security terminal, the terminal structure must be modified, such as adding an SD slot, and for small batch trial production, a full set of mobile phone film and hardware needs to be independently opened, and the production cost is very high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware security module, security terminal and realizing method of security terminal
  • Hardware security module, security terminal and realizing method of security terminal
  • Hardware security module, security terminal and realizing method of security terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0030] The first embodiment of the present invention relates to a hardware security module, the hardware security module is integrated on any supporting component of the terminal equipment, and is used for encrypting or decrypting the sending and receiving information of the terminal equipment. The supporting components of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication field and discloses a hardware security module, a security terminal and a realizing method of the security terminal. According to the hardware security module, the security terminal and the realizing method of the security terminal of the invention, the hardware security module is integrated on any supporting assembly of a terminal and is used for encrypting or decrypting transmitted and received information of the terminal equipment; the hardware security module supports near field communication (NFC); and the hardware security module encrypts or decrypts the transmitted and received information of the terminal equipment through a near field communication (NFC) channel which is built between the hardware security module and the terminal equipment. With the above technical schemes adopted, under the premise that the structure of a machine of an original type is not modified, a simple and universal method is adopted to transform the machine into the security terminal, and the terminal equipment is not required to be modified in structure, and therefore, cost can be decreased; preferably, information transmitted by a terminal main body and the hardware security module in the near field communication (NFC) channel is a ciphertext which is encrypted by a transmission key, and therefore, hazards that data are stolen can be further avoided, and guarantee can be provided for the security of the security terminal.

Description

technical field [0001] The invention relates to the field of communication, in particular to the field of safe and confidential terminals. Background technique [0002] At present, a security terminal using a hardware security module generally uses an SDIO interface for data interaction. The hardware form of the security module also appears in the form of an SD (Standard Definition, standard definition) card to adapt to the form of the terminal interface. The size of a typical SD card is as figure 1 shown. [0003] However, as the thickness of smart terminals is getting smaller and smaller, and the volume requirements are getting more and more precise, SD cards are obviously not suitable for today's structure. This is because, to independently develop a slot for it, it will also affect the structure of the mobile phone. Moreover, many terminals remove the SD card slot by increasing the capacity of their own built-in memory during design, such as smart machines such as IP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04B5/00
Inventor 张烁
Owner DATANG SEMICON DESIGN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products