Background technology
Arriving along with the 3G epoch, the rapid exploitation of handset use, make mobile phone progressively develop into the personal information service terminal from simple voice, information communication terminal, as online mobile-payment system, mobile office, mobile TV, mobile phone payment, mobile phone networking etc., the leakage of cell-phone internal information, be stolen, loss or stolen, all can make troubles even heavy losses to people.Simultaneously, the high popularity rate of mobile phone makes mobile phone and individual's life privacy, business activity be closely related, and the safe in utilization and personal secrets problem of mobile phone highlights.How mobile phone is effectively protected the sensitive information in its inside and the communication process as an information carrier that becomes more and more important, and has become problem demanding prompt solution.
At present, research and develop Micro SD jointly, claim T-Flash card again, full name by Motorola and SANDISK: TransFLash, and the reason that renames to microSD is because adopted upright by SD association (SDA).Other are adopted upright memory card by SDA and comprise miniSD and SD card, it is mainly used in mobile phone, but the continuous lifting of small storage volume in because of its volume, be used in now in GPS equipment, portable music player and some the flash memory dishes, its volume is 15mm x 11mm x1mm, it is the most tiny current memory card, can be docked with in the SD card slot by the SD adapter and use, current MicroSD card provides the capacity of 128MB, 256MB, 512MB, 1G, 2G, 4G, 8G, 16G and 32G.
At present, the SD card is the data card storer of representative, does not all possess the safety encipher of carrying function, as, general T F card outward appearance TF encapsulation, SDIO forms by the FLSHA+32 position, the 1-32G storage; In a traditional SD storage card, the SD control chip can only connect flash memory, and the external security module of having no idea again can only realize memory function, can't carry out function expansion, and if adopt mobile phone end software cryptography, the backstage is easy to crack.
The application formerly disclosure of the Invention a kind of hardware encipher TF card, the relevant feature of its cryptographic algorithm comprises: 1) safety encipher: but the card subregion, can set different cipher modes and authority as required; 2) support to adopt AES, the symmetric key authentication of DESB and 3DES; 3) based on the X.509 RSAC unsymmetrical key authentication of certificate chain; 4) card and the own hardware encipher of content and anti-tamper function is arranged; 5) passage of main frame and card is encrypted, and encrypt the service channel of main frame and operator.
In the application facet of the TF card that has hardware-based cryptographic, load application program and not only can satisfy the specific demand of some clients, also can satisfy the encryption safe guarantee simultaneously.
The relevant mobile phone memory card technology of install software in advance discloses less, as, the method of 200,910,198,618 1 kinds of mobile phone memory card automatic software installations of the patent No., comprise: store the application program of the corresponding different operating system of software in advance (1), and set up the corresponding relation between different operating system and the different editions application program; (2) when mobile phone memory card is installed on the mobile phone, start the inquiry unit; (3) the inquiry unit is to the systematic name and the version number of this mobile phone of mobile phone operating system inquiry; (4), determine the application program of corresponding version according to systematic name and version number; (5) operation and installation corresponding application program.
Based on above reason, clamp the technology of carrying application program for hardware encipher TF and do not see open as yet.
Embodiment
On hardware, carry out subregion, comprise BML subregion, STL subregion and reserved partition, load boot, boot parameter piece, system image partitions, download NV subregion, verification subregion, MMI resource partitioning therein on the BML subregion, wherein load and execution NV subregion, U-disk subregion on the STL subregion.
The present invention loads application program in hardware encipher TF card, this program can realize the dynamic load related resource.
Below in conjunction with the specific embodiment journey, describe:
Embodiment 1: antivirus engine prestores in hardware encipher TF card.
Working routine during antivirus engine work comprises encrypted work flow process and dynamic load resource workflow.When operation and virus base upgrade, online dynamic load resource.When notification line upgrades virus base automatically, or incremental update.
In the present embodiment, encrypt program on the TF card,, carry out access authentication authentication module, encryption and decryption module and NorFlash administration module respectively to the COS module through the operation of standard read write command by being installed in advance of read-only subregion, encrypted partition and privately owned subregion.
The standard read write command is Linux/Win standard read write command or the privately owned read write command of COS.
Certainly, to cloud service safety and senior heuristic technique under, the present invention is suitable equally.
High in the clouds safety is by the exception monitoring of netted a large amount of clients to software action in the network, obtain the up-to-date information of wooden horse in the internet, rogue program, being pushed to service end analyzes automatically and handles, again the solution of virus and wooden horse is distributed to each client, whole internet has become a super big antivirus software; Senior heuristic technique (Advanced Heuristics technology) is a kind of active defense technique, do not rely on any property data base, but when scanning, disassemble and analyze actuating code on one's own initiative, and program is discharged into temporarily the TEMP catalogue of " system variable ", in virtual analogue system environment, carry out it, observe the malicious act that whether comprises any tool danger, inspire the deletion temporary file automatically that finishes.
The antivirus engine that prestores in hardware encipher TF card, the product that the later stage forms itself has the virus killing function, improves the security performance of storer self and fetch equipment simultaneously.And further, mobile storage standard configurations virus killing function provides condition for being set.
Embodiment 2: place in encrypting the TF card based on JVM operation relative program.
JVM is a Java Virtual Machine(Java virtual machine) abbreviation, it is a computing machine of fabricating out, realizes by the various computer functions of analogue simulation on the actual calculation machine.Java Virtual Machine has own perfect hardware structure, as processor, storehouse, register etc., also has the corresponding instruction system.JVM has shielded the information relevant with the specific operating system platform, and the object code (bytecode) that makes java applet only need be created on to move on the Java Virtual Machine just can not add on kinds of platform and revises the ground operation.Java Virtual Machine is when carrying out bytecode, and the in fact final machine instruction that still bytecode is construed on the platform specific is carried out.
The present invention is before adopting micro SD to be TF card 15mm * 11mm * 1mm outward appearance encapsulation, built-in SD/SDIO module, encryption and decryption module, COS module, NandFlash administration module and NandFlash medium, wherein, the SD/SDIO module is connected the NandFlash administration module with the COS module by the encryption and decryption module respectively, and and then is connected with the NandFlash medium.
Oug encrypted partition and privately owned subregion are arranged on the NandFlash medium, and the NandFlash administration module is connected with the read-only subregion of NandFlash medium, encrypted partition and privately owned subregion respectively.
On the read-only subregion of NandFlash medium, solidify and load antivirus engine.
Adopt encryption COS(Card Operation System among the present invention) framework, support present all cryptographic algorithm, storage, transmission, reception, backup whole process to be encrypted, encrypt file is reliable, and processing speed is fast, and is difficult to crack.Simultaneously, under the antivirus engine work that carries, ensure and encrypt and data storage management safety.
As this virus killing encrypted card of configuration on mobile phone, promptly can carry out dynamic encryption to user's private photos and DV, carry out passive virus killing safeguard protection; simultaneously, viruses such as killing wooden horse is initiatively detectd in antivirus engine work; carry out the active safety protection, make the TF card safety to significantly improve.
The present invention kills virus and encrypts under the situation that the TF card only authorizes in the opposite end, just can decipher your voice signal, can realize the sector application of differentiation like this; Can also utilize this encrypted card to realize the management and control of DRM copyright, and can realize internal file encryption granting, can not leak; The encryption storage of news record is disposed this encrypted card and can be realized encrypting the vast capacity short message, the storage of multimedia message Fetion; On existing cell phone platform, implant the software of encrypted card; Do not change hardware design, outward appearance, the design of aspects such as structure; By downloading and installing or can realize encryption function, and provide the cryptographic services support by the code packages that us transplant in design corporation; Support present main flow cell phone platform on the market, as MTK, SPREADTRUM, MSTAR.
The present invention possesses key simultaneously and generates, data storage and data encrypting and deciphering three big functions, and blocking built-in security module provides various Secure Application by the SD interface, comprises authentication, digital signature, access rights and data encrypting and deciphering etc.
The present invention can adopt multiple packing forms such as StandardSD, MiniSD, MicroSD, and the same with common SD card possess superpower equipment access capability, can be widely used in all kinds of terminals with internal or external SD draw-in groove such as PAD, mobile phone, notebook, PC.
Windows 2000 support/2003/XP/VISTA of the present invention, MAC, Linux, Android, Symbian, Palms, Nucleus, operating systems such as WindowsMobile.
Interface protocol of the present invention and standard meet the SD2.0 standard, capacity 512MB~32GB, and data rate is read>10MB/s for writing>4MB/s; Support SPI pattern and SD pattern, data error correcting, operating voltage range 2.7V~3.6 V, operating frequency range are 0~60MHz, operating temperature range be-25C~85 ℃, card band point plugs protection, write-protect characteristic, clip pin protection feature; 3DES, RSA, ECC scheduling algorithm engine, the privately owned read-write operation of customization are supported in the security function indication; The power consumption index, read operation<40mA, write operation<40mA, safe operation<70mA, free time<0.2mA.
The present invention utilizes the built-in security module of SD security control of brand-new design, can connect flash memory module simultaneously, and can realize synchronous read and write access, on one side promptly the client can use flash memory space, Yi Bian carry out the operation of authentication.
In above embodiment, do not reach the technology of narration, and the employing prior aries such as other necessary technologies that relate to enforcement, enumerate detailed description no longer successively.