Mobile phone battery protection board security authentication method and device based on encryption chip

A mobile phone battery and encryption chip technology, applied in the field of security authentication, can solve problems such as cracking the verification method of the mobile phone battery protection board, and achieve the effect of ensuring security and strengthening security verification.

Active Publication Date: 2021-05-11
ZHEJIANG GEOFORCECHIP TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the purpose of the present invention is to solve the problem of cracking the verification method of the existing mobile phone battery protection board by analyzing the serial number of the cracker, and then implanting the serial number in the counterfeit mobile phone charger.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile phone battery protection board security authentication method and device based on encryption chip
  • Mobile phone battery protection board security authentication method and device based on encryption chip
  • Mobile phone battery protection board security authentication method and device based on encryption chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0084] The mobile phone battery protection board sets a random number, encodes the random number, and generates a first signal;

[0085] Assuming that the width of the initial signal is 2M, the time slot signal a and the preset time slot threshold a s Compare;

[0086] If the time slot signal is less than the time slot threshold, the first signal is defined as A 1 , the empty transmission width of the first signal is defined as M / 2, the width of the high-level signal is 3M / 2, the interval between the first signal and the time slot signal is aM, and the first signal is transmitted to mobile phone charger;

[0087] When the transmission of the initial signal is completed, send an interval signal to the mobile phone charger to detect whether the interval signal has been sent, if the interval signal has not been sent, continue to send the interval signal until the interval signal send completed;

[0088] The mobile phone charger collects the DC pulse signal, and judges whether...

Embodiment 2

[0093] The mobile phone battery protection board sets a random number, encodes the random number, and generates a first signal;

[0094] Assuming that the width of the initial signal is 2M, the time slot signal a and the preset time slot threshold a s Compare;

[0095] If the time slot signal is greater than the time slot threshold, the first signal is defined as A 2 , the empty transmission width of the first signal is defined as 3M / 2, the width of the high-level signal is M / 2, and the interval between the first signal and the time slot signal is (a s -a), transmitting the first signal to the mobile phone charger;

[0096] When the transmission of the initial signal is completed, send an interval signal to the mobile phone charger to detect whether the interval signal has been sent, if the interval signal has not been sent, continue to send the interval signal until the interval signal send completed;

[0097] The mobile phone charger collects the DC pulse signal, judges ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method and device for a mobile phone battery protection board based on an encryption chip. The method includes: setting a random number on the mobile phone battery protection board, and using the random number to modulate the DC pulse interval; Collect the modulated DC pulse interval in the time window, demodulate the modulated DC pulse interval, and generate the random number; use the random number to connect the private key of the mobile phone charger with the mobile phone battery The public key of the protection board is matched and verified, and the mobile phone charger is charged and connected to the corresponding mobile phone battery protection board according to the matching verification result. The method can strengthen the safety verification of the mobile phone battery protection board and ensure the charging safety of the mobile phone equipment.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to a security authentication method and device for a cell phone battery protection board based on an encryption chip. Background technique [0002] In order to ensure the safety of charging mobile devices and avoid the negative impact of charging with third-party non-standard chargers, encryption chips are now installed on the battery protection boards of some mobile phones. In addition to conventional charging protection functions such as preventing overcharging, the battery protection board also authenticates the mobile phone charger through the encryption chip when the mobile phone interface is electrically connected to the mobile phone charger. For charging the battery, if the verification fails, the charging circuit will not be connected, and the battery cannot be charged, and the mobile phone will display a prompt that the charger verification fails. In this wa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H02J7/00H04L9/08H04L9/30H01M10/44
CPCH01M10/44H04L9/0861H04L9/30H02J7/00045Y02E60/10
Inventor 不公告发明人
Owner ZHEJIANG GEOFORCECHIP TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products