[go: up one dir, main page]

CN102207914A - Hardware encrypted trans-flash (TF) card loaded with application programs - Google Patents

Hardware encrypted trans-flash (TF) card loaded with application programs Download PDF

Info

Publication number
CN102207914A
CN102207914A CN2011101893170A CN201110189317A CN102207914A CN 102207914 A CN102207914 A CN 102207914A CN 2011101893170 A CN2011101893170 A CN 2011101893170A CN 201110189317 A CN201110189317 A CN 201110189317A CN 102207914 A CN102207914 A CN 102207914A
Authority
CN
China
Prior art keywords
card
subregion
subarea
hardware
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101893170A
Other languages
Chinese (zh)
Inventor
姚国庆
陆峰华
胡传清
肖孝鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI QINGLONG COMMUNICATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI QINGLONG COMMUNICATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI QINGLONG COMMUNICATION TECHNOLOGY Co Ltd filed Critical SHANGHAI QINGLONG COMMUNICATION TECHNOLOGY Co Ltd
Priority to CN2011101893170A priority Critical patent/CN102207914A/en
Publication of CN102207914A publication Critical patent/CN102207914A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a hardware encrypted trans-flash (TF) card loaded with application programs. Subareas are partitioned on hardware and comprise a broadcast markup language (BML) subarea, a standard template library (STL) subarea and a retention subarea; a guide program, a guide parameter block, a system mapping subarea, a downloading network video (NV) subarea, a verification subarea and a man-machine interface (MMI) resource subarea are loaded on the BML subarea; and an execution NV subarea and a U-disk subarea are loaded on the STL subarea. According to the specific requirements of a customer, the application programs with specific functions are previously installed in the hardware encrypted TF card, so that the user can conveniently plug and extract the encrypted TF card; and the encrypted TF card supports a common secure digital (SD) card, and executes the specific application programs.

Description

Load the hardware encipher TF card of application program
Technical field
The present invention relates to H04M telephone communication technology or equipment in a kind of International Classification of Patents, particularly load the hardware encipher TF card of virus killing application program.
Background technology
Arriving along with the 3G epoch, the rapid exploitation of handset use, make mobile phone progressively develop into the personal information service terminal from simple voice, information communication terminal, as online mobile-payment system, mobile office, mobile TV, mobile phone payment, mobile phone networking etc., the leakage of cell-phone internal information, be stolen, loss or stolen, all can make troubles even heavy losses to people.Simultaneously, the high popularity rate of mobile phone makes mobile phone and individual's life privacy, business activity be closely related, and the safe in utilization and personal secrets problem of mobile phone highlights.How mobile phone is effectively protected the sensitive information in its inside and the communication process as an information carrier that becomes more and more important, and has become problem demanding prompt solution.
At present, research and develop Micro SD jointly, claim T-Flash card again, full name by Motorola and SANDISK: TransFLash, and the reason that renames to microSD is because adopted upright by SD association (SDA).Other are adopted upright memory card by SDA and comprise miniSD and SD card, it is mainly used in mobile phone, but the continuous lifting of small storage volume in because of its volume, be used in now in GPS equipment, portable music player and some the flash memory dishes, its volume is 15mm x 11mm x1mm, it is the most tiny current memory card, can be docked with in the SD card slot by the SD adapter and use, current MicroSD card provides the capacity of 128MB, 256MB, 512MB, 1G, 2G, 4G, 8G, 16G and 32G.
At present, the SD card is the data card storer of representative, does not all possess the safety encipher of carrying function, as, general T F card outward appearance TF encapsulation, SDIO forms by the FLSHA+32 position, the 1-32G storage; In a traditional SD storage card, the SD control chip can only connect flash memory, and the external security module of having no idea again can only realize memory function, can't carry out function expansion, and if adopt mobile phone end software cryptography, the backstage is easy to crack.
The application formerly disclosure of the Invention a kind of hardware encipher TF card, the relevant feature of its cryptographic algorithm comprises: 1) safety encipher: but the card subregion, can set different cipher modes and authority as required; 2) support to adopt AES, the symmetric key authentication of DESB and 3DES; 3) based on the X.509 RSAC unsymmetrical key authentication of certificate chain; 4) card and the own hardware encipher of content and anti-tamper function is arranged; 5) passage of main frame and card is encrypted, and encrypt the service channel of main frame and operator.
In the application facet of the TF card that has hardware-based cryptographic, load application program and not only can satisfy the specific demand of some clients, also can satisfy the encryption safe guarantee simultaneously.
The relevant mobile phone memory card technology of install software in advance discloses less, as, the method of 200,910,198,618 1 kinds of mobile phone memory card automatic software installations of the patent No., comprise: store the application program of the corresponding different operating system of software in advance (1), and set up the corresponding relation between different operating system and the different editions application program; (2) when mobile phone memory card is installed on the mobile phone, start the inquiry unit; (3) the inquiry unit is to the systematic name and the version number of this mobile phone of mobile phone operating system inquiry; (4), determine the application program of corresponding version according to systematic name and version number; (5) operation and installation corresponding application program.
Based on above reason, clamp the technology of carrying application program for hardware encipher TF and do not see open as yet.
Summary of the invention
The purpose of this invention is to provide and a kind ofly on hardware encipher TF card, load application program, perhaps load the hardware encipher TF card of application program.
Realize that technical measures of the present invention are: on hardware, carry out subregion, comprise BML subregion, STL subregion and reserved partition, load boot, boot parameter piece, system image partitions, download NV subregion, verification subregion, MMI resource partitioning therein on the BML subregion, wherein load and execution NV subregion, U-disk subregion on the STL subregion.
The invention has the advantages that,, the application program of specific function is installed on the hardware encipher T card in advance, the user can be plugged easily encrypt the T card, support common SD card, carry out specific application program according to the specific needs of client.
Description of drawings
Fig. 1: the position of loading application program on hardware concerns synoptic diagram
Fig. 2: the procedure flow chart during antivirus engine work.
Embodiment
On hardware, carry out subregion, comprise BML subregion, STL subregion and reserved partition, load boot, boot parameter piece, system image partitions, download NV subregion, verification subregion, MMI resource partitioning therein on the BML subregion, wherein load and execution NV subregion, U-disk subregion on the STL subregion.
The present invention loads application program in hardware encipher TF card, this program can realize the dynamic load related resource.
Below in conjunction with the specific embodiment journey, describe:
Embodiment 1: antivirus engine prestores in hardware encipher TF card.
Working routine during antivirus engine work comprises encrypted work flow process and dynamic load resource workflow.When operation and virus base upgrade, online dynamic load resource.When notification line upgrades virus base automatically, or incremental update.
In the present embodiment, encrypt program on the TF card,, carry out access authentication authentication module, encryption and decryption module and NorFlash administration module respectively to the COS module through the operation of standard read write command by being installed in advance of read-only subregion, encrypted partition and privately owned subregion.
The standard read write command is Linux/Win standard read write command or the privately owned read write command of COS.
Certainly, to cloud service safety and senior heuristic technique under, the present invention is suitable equally.
High in the clouds safety is by the exception monitoring of netted a large amount of clients to software action in the network, obtain the up-to-date information of wooden horse in the internet, rogue program, being pushed to service end analyzes automatically and handles, again the solution of virus and wooden horse is distributed to each client, whole internet has become a super big antivirus software; Senior heuristic technique (Advanced Heuristics technology) is a kind of active defense technique, do not rely on any property data base, but when scanning, disassemble and analyze actuating code on one's own initiative, and program is discharged into temporarily the TEMP catalogue of " system variable ", in virtual analogue system environment, carry out it, observe the malicious act that whether comprises any tool danger, inspire the deletion temporary file automatically that finishes.
The antivirus engine that prestores in hardware encipher TF card, the product that the later stage forms itself has the virus killing function, improves the security performance of storer self and fetch equipment simultaneously.And further, mobile storage standard configurations virus killing function provides condition for being set.
Embodiment 2: place in encrypting the TF card based on JVM operation relative program.
JVM is a Java Virtual Machine(Java virtual machine) abbreviation, it is a computing machine of fabricating out, realizes by the various computer functions of analogue simulation on the actual calculation machine.Java Virtual Machine has own perfect hardware structure, as processor, storehouse, register etc., also has the corresponding instruction system.JVM has shielded the information relevant with the specific operating system platform, and the object code (bytecode) that makes java applet only need be created on to move on the Java Virtual Machine just can not add on kinds of platform and revises the ground operation.Java Virtual Machine is when carrying out bytecode, and the in fact final machine instruction that still bytecode is construed on the platform specific is carried out.
The present invention is before adopting micro SD to be TF card 15mm * 11mm * 1mm outward appearance encapsulation, built-in SD/SDIO module, encryption and decryption module, COS module, NandFlash administration module and NandFlash medium, wherein, the SD/SDIO module is connected the NandFlash administration module with the COS module by the encryption and decryption module respectively, and and then is connected with the NandFlash medium.
Oug encrypted partition and privately owned subregion are arranged on the NandFlash medium, and the NandFlash administration module is connected with the read-only subregion of NandFlash medium, encrypted partition and privately owned subregion respectively.
On the read-only subregion of NandFlash medium, solidify and load antivirus engine.
Adopt encryption COS(Card Operation System among the present invention) framework, support present all cryptographic algorithm, storage, transmission, reception, backup whole process to be encrypted, encrypt file is reliable, and processing speed is fast, and is difficult to crack.Simultaneously, under the antivirus engine work that carries, ensure and encrypt and data storage management safety.
As this virus killing encrypted card of configuration on mobile phone, promptly can carry out dynamic encryption to user's private photos and DV, carry out passive virus killing safeguard protection; simultaneously, viruses such as killing wooden horse is initiatively detectd in antivirus engine work; carry out the active safety protection, make the TF card safety to significantly improve.
The present invention kills virus and encrypts under the situation that the TF card only authorizes in the opposite end, just can decipher your voice signal, can realize the sector application of differentiation like this; Can also utilize this encrypted card to realize the management and control of DRM copyright, and can realize internal file encryption granting, can not leak; The encryption storage of news record is disposed this encrypted card and can be realized encrypting the vast capacity short message, the storage of multimedia message Fetion; On existing cell phone platform, implant the software of encrypted card; Do not change hardware design, outward appearance, the design of aspects such as structure; By downloading and installing or can realize encryption function, and provide the cryptographic services support by the code packages that us transplant in design corporation; Support present main flow cell phone platform on the market, as MTK, SPREADTRUM, MSTAR.
The present invention possesses key simultaneously and generates, data storage and data encrypting and deciphering three big functions, and blocking built-in security module provides various Secure Application by the SD interface, comprises authentication, digital signature, access rights and data encrypting and deciphering etc.
The present invention can adopt multiple packing forms such as StandardSD, MiniSD, MicroSD, and the same with common SD card possess superpower equipment access capability, can be widely used in all kinds of terminals with internal or external SD draw-in groove such as PAD, mobile phone, notebook, PC.
Windows 2000 support/2003/XP/VISTA of the present invention, MAC, Linux, Android, Symbian, Palms, Nucleus, operating systems such as WindowsMobile.
Interface protocol of the present invention and standard meet the SD2.0 standard, capacity 512MB~32GB, and data rate is read>10MB/s for writing>4MB/s; Support SPI pattern and SD pattern, data error correcting, operating voltage range 2.7V~3.6 V, operating frequency range are 0~60MHz, operating temperature range be-25C~85 ℃, card band point plugs protection, write-protect characteristic, clip pin protection feature; 3DES, RSA, ECC scheduling algorithm engine, the privately owned read-write operation of customization are supported in the security function indication; The power consumption index, read operation<40mA, write operation<40mA, safe operation<70mA, free time<0.2mA.
The present invention utilizes the built-in security module of SD security control of brand-new design, can connect flash memory module simultaneously, and can realize synchronous read and write access, on one side promptly the client can use flash memory space, Yi Bian carry out the operation of authentication.
In above embodiment, do not reach the technology of narration, and the employing prior aries such as other necessary technologies that relate to enforcement, enumerate detailed description no longer successively.

Claims (4)

1. load the hardware encipher TF card of application program, it is characterized in that: on hardware, carry out subregion, comprise BML subregion, STL subregion and reserved partition, load boot, boot parameter piece, system image partitions, download NV subregion, verification subregion, MMI resource partitioning therein on the BML subregion, wherein load and execution NV subregion, U-disk subregion on the STL subregion.
2. the hardware encipher TF card of loading application program as claimed in claim 1 is characterised in that, loads application program in hardware encipher TF card, and this program can realize the dynamic load related resource.
3. the hardware encipher TF card of loading application program as claimed in claim 1, it is characterized in that, antivirus engine prestores in hardware encipher TF card, encrypt program on the TF card by being installed in advance of read-only subregion, encrypted partition and privately owned subregion, through the operation of standard read write command, carry out access authentication authentication module, encryption and decryption module and NorFlash administration module respectively to the COS module.
4. the hardware encipher TF card of loading application program as claimed in claim 1, it is characterized in that, in encrypting the TF card, place based on JVM operation relative program, JVM is a Java Virtual Machine(Java virtual machine) abbreviation, it is a computing machine of fabricating out, realize by the various computer functions of analogue simulation on the actual calculation machine, Java Virtual Machine has own perfect hardware structure, as processor, storehouse, register etc., also has the corresponding instruction system, VM has shielded the information relevant with the specific operating system platform, the object code (bytecode) that makes java applet only need be created on to move on the Java Virtual Machine, just can on kinds of platform, not add and revise the ground operation, Java Virtual Machine is when carrying out bytecode, and the in fact final machine instruction that still bytecode is construed on the platform specific is carried out.
CN2011101893170A 2011-07-07 2011-07-07 Hardware encrypted trans-flash (TF) card loaded with application programs Pending CN102207914A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101893170A CN102207914A (en) 2011-07-07 2011-07-07 Hardware encrypted trans-flash (TF) card loaded with application programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101893170A CN102207914A (en) 2011-07-07 2011-07-07 Hardware encrypted trans-flash (TF) card loaded with application programs

Publications (1)

Publication Number Publication Date
CN102207914A true CN102207914A (en) 2011-10-05

Family

ID=44696756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101893170A Pending CN102207914A (en) 2011-07-07 2011-07-07 Hardware encrypted trans-flash (TF) card loaded with application programs

Country Status (1)

Country Link
CN (1) CN102207914A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497531A (en) * 2011-11-21 2012-06-13 上海凯卓信息科技有限公司 Human face recognition wireless video monitoring system based on cloud computing platform
CN103235917A (en) * 2013-03-28 2013-08-07 东莞宇龙通信科技有限公司 Application protection method and device
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN106056017B (en) * 2016-04-29 2019-01-22 星汉智能科技股份有限公司 Smart card COS encryption downloading system
CN110532817A (en) * 2019-08-29 2019-12-03 北京计算机技术及应用研究所 A kind of pre installation software package hides the safety protecting method of operation
CN112184212A (en) * 2020-09-17 2021-01-05 深圳市银通商智能卡有限公司 Method for controlling the operation of applet for IC card

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986597A (en) * 2010-10-20 2011-03-16 杭州晟元芯片技术有限公司 Identity authentication system with biological characteristic recognition function and authentication method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101986597A (en) * 2010-10-20 2011-03-16 杭州晟元芯片技术有限公司 Identity authentication system with biological characteristic recognition function and authentication method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SW FAE GROUP: "《http://hwplatform.googlecode.com/svn/trunk/Spreadtrum平台/》", 28 February 2006 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497531A (en) * 2011-11-21 2012-06-13 上海凯卓信息科技有限公司 Human face recognition wireless video monitoring system based on cloud computing platform
CN103235917A (en) * 2013-03-28 2013-08-07 东莞宇龙通信科技有限公司 Application protection method and device
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
CN104361290A (en) * 2014-11-28 2015-02-18 山东鲁能智能技术有限公司 Program encryption downloader and working method thereof
CN106056017B (en) * 2016-04-29 2019-01-22 星汉智能科技股份有限公司 Smart card COS encryption downloading system
CN108985104A (en) * 2018-07-20 2018-12-11 南昌黑鲨科技有限公司 The encryption method and intelligent terminal of intelligent terminal
CN108985104B (en) * 2018-07-20 2022-01-21 南昌黑鲨科技有限公司 Encryption method of intelligent terminal and intelligent terminal
CN110532817A (en) * 2019-08-29 2019-12-03 北京计算机技术及应用研究所 A kind of pre installation software package hides the safety protecting method of operation
CN112184212A (en) * 2020-09-17 2021-01-05 深圳市银通商智能卡有限公司 Method for controlling the operation of applet for IC card

Similar Documents

Publication Publication Date Title
CN102207914A (en) Hardware encrypted trans-flash (TF) card loaded with application programs
CN104318182B (en) A kind of intelligent terminal shielding system and method extended based on processor security
US11126753B2 (en) Secure processor chip and terminal device
Wang et al. Implementing and optimizing an encryption filesystem on android
CN101071463A (en) Method and device for virtulizing personal office environment
KR20170042344A (en) Mobile Payment Device and Method
CN104468562B (en) A kind of data security protecting portable terminal transparent towards Mobile solution
CN101026834A (en) Locking method and unlocking method
CN103106372A (en) Lightweight class privacy data encryption method and system for Android system
EP2446355A1 (en) Virtualized mobile devices
EP3494482B1 (en) Systems and methods for storing administrator secrets in management controller-owned cryptoprocessor
CN104539467A (en) Terminal equipment management system and method based on cloud server
US20090172412A1 (en) System for and method of auto-registration with cryptographic modules
CN109614204A (en) Memory insulation blocking method, isolation check hardware, SOC chip and storage medium
EP3066604B1 (en) Data accessibility control
CN102222254A (en) Intelligent safe digital card
Umar et al. A comparative study of modern operating systems in terms of memory and security: A case study of windows, ios, and android
KR101953444B1 (en) Software security method based on virtualization technologies to ensure the security level equivalent to hardware and system using the same
CN106326782A (en) Information processing method and electronic device
CN104182691A (en) Data encryption method and device
KR20130048508A (en) Generating method for root key and system, device, and mobile terminal supporting the same
CN103699853B (en) A kind of intelligent SD card and control system thereof and method
CN105681306A (en) Spatial data security control system based on access mode protection
CN107769917A (en) A kind of credible platform and method for wireless terminal
CN101079090B (en) Apparatus for reproducing personal application environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 201705 Shanghai city Qingpu New Road No. 1218, room 217

Applicant after: Shanghai Kaizhuo Information Technology Co., Ltd.

Address before: The new road Qingpu Industrial Park Qingpu District Shanghai city 201700 No. 1218 Building No. 1 room 217

Applicant before: Shanghai Qinglong Communication Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SHANGHAI QINGLONG COMMUNICATION TECHNOLOGY CO., LTD. TO: SHANGHAI KAIZHUOINFORMATION TECHNOLOGY CO., LTD.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111005