CN113743558A - Near field communication method, device, hard disk and readable storage medium - Google Patents
Near field communication method, device, hard disk and readable storage medium Download PDFInfo
- Publication number
- CN113743558A CN113743558A CN202110919747.7A CN202110919747A CN113743558A CN 113743558 A CN113743558 A CN 113743558A CN 202110919747 A CN202110919747 A CN 202110919747A CN 113743558 A CN113743558 A CN 113743558A
- Authority
- CN
- China
- Prior art keywords
- near field
- field communication
- nfc chip
- soc
- communication method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 title claims abstract description 53
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000004044 response Effects 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000004590 computer program Methods 0.000 claims description 6
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/76—Architectures of general purpose stored program computers
- G06F15/78—Architectures of general purpose stored program computers comprising a single central processing unit
- G06F15/7807—System on chip, i.e. computer system on a single chip; System in package, i.e. computer system on one or more chips in a single package
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a near field communication method, a near field communication device, a hard disk and a readable storage medium, wherein the near field communication method comprises the following steps: acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device. According to the method, the NFC chip is added to the SoC device, and the corresponding NFC key is set, so that information leakage on the SoC can be prevented, and the use of specific or all functions can be prevented, and therefore the problem that the user verification cannot be realized on the SoC on the system on chip is solved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a near field communication method and apparatus, a hard disk, and a readable storage medium.
Background
Near Field Communication (NFC) is a short-range, high frequency, contactless, point-to-point communication protocol that has been commercialized since the 2000's. The upper limit of the communication distance between two NFC enabled devices is 4CM, that is to say both are within physical contact range. This effectively eliminates (or severely limits) the possibility of long-range hacking. The main commercial uses of NFC today are contactless mobile payment, small file sharing and electronic ticketing.
Conventional systems on chip (SoC) are not capable of user authentication. Anybody, so long as the SoC is physically accessible, it can be used. Various kinds of confidential information are often found in the system on chip, and therefore, a great potential safety hazard is brought. If the device is invaded by a lawbreaker, it may cause: information stored thereon may be stolen, the device is used for unintended purposes, etc.
The lack of existing commercial technologies on the market today protects SoC devices from being misappropriated by an unknown recipient. Once these SoC devices are compromised (possibly malicious), their recipients can steal the information stored on the device or use it for their illegal purposes.
Disclosure of Invention
The embodiment of the invention provides a near field communication method, a near field communication device, a hard disk and a readable storage medium, which are used for protecting an SoC.
In a first aspect, an embodiment of the present invention provides a near field communication method, configured to implement near field communication of a system on a chip; the near field communication method comprises the following steps: acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device.
In some embodiments, further comprising: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a second aspect, an embodiment of the present invention further provides a near field communication apparatus, including an NFC chip, where the NFC chip is integrated onto an SoC device of a first device; the NFC chip is configured to: acquiring identification information of the second device in a close range; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
In some embodiments, further comprising a processor configured to: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a third aspect, an embodiment of the present invention further provides a hard disk device, including the near field communication apparatus according to the embodiments of the present disclosure.
In a fourth aspect, the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the near field communication method according to the embodiments of the present disclosure are implemented.
The embodiment of the invention is integrated on the SoC device of the first device through the NFC chip; and responding to the verification passing information of the second equipment, thereby solving the problem that the user verification cannot be realized on the system on chip.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a basic flow diagram of an embodiment of the present disclosure.
Fig. 2 is a schematic diagram of the SSD according to the embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a near field communication method, which is used for realizing near field communication of a system on a chip; the near field communication method comprises the following steps:
s101, in a close range, acquiring identification information of a second device through an NFC chip, wherein the NFC chip is integrated on an SoC device of a first device. In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
And S102, responding to the verification passing information of the second equipment to allow near field communication between the second equipment and the first equipment. The second device in this example may be to create an external NFC key or key card that may match the cryptographic data in the NFC chip. When a matching NFC key or key fob is within a close range (4cm) of the SoC device (assuming the device is powered on), the NFC chip or a controller connected to the NFC chip will write to the LOCK/UNLOCK register on the SoC device, setting the SoC device state to "unlocked" (default state is "locked"). When an SoC device is in a "locked" state, it is virtually unusable (all data stored thereon cannot be read back, and all features and functions of the device are disabled). The implementation of how a device disables all of its features, functions, and data read-back may be defined by the SoC device itself. For example, the first device, through its firmware, continually polls the lock/unlock register and keeps its internal blocks in RESET until the unlock state is read back. When the SoC device is in the "unlocked" state, the user may use all or part of the features/functions of the device including data read-back.
According to the method, the NFC chip is added to the register or the device of the SoC and the corresponding NFC key is set, so that information leakage on the SoC can be prevented, and the use of specific or all functions can be prevented, and therefore the problem that the user verification cannot be realized on the SoC of the system on chip is solved.
In some embodiments, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device. And under the condition that the second device fails to verify, prohibiting the second device from performing near field communication, for example, under the condition that the second device is found to perform decryption forcibly, actively destroying all information to completely destroy the attacked device, thereby protecting the data from being obtained by illegal copies.
In some embodiments, further comprising: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level. That is, in this example, the NFC chip may have multiple secret data, each of which grants a different set of characteristics, functions, and data access rights. The LOCK/UNLOCK register may thus have multiple levels of "unlocked" status. Thereby achieving the "authority" level of the SoC device. For example, a client may be provided with a set of NFC keys that may unlock functions on its device that are only available to the client, but an administrator may have another set of NFC keys to unlock debuggable functions (which are not available to the client in general), although this is merely an example and is not limited in this respect.
The SoC device may also be "relocked" by completely turning off power or using another NFC key card. This NFC key card may lock it completely or may grant it a different "permission" level. The LOCK/UNLOCK register of the SoC device can have a plurality of levels of 'UNLOCK' states through multi-level authority setting, so that the 'authority' level of the SoC device is realized. The near field communication method of the present disclosure uses NFC technology (NFC chip and corresponding NFC key card) to protect SoC devices from accidental recipient use. A permission level is created on the SoC device. The privilege level may grant access to functions, features, and data on the SoC device depending on the key card used.
In summary, the near field communication method of the present disclosure can integrate the NFC function in the register of the SoC device, and the method of the present disclosure needs a physical key card to lock/unlock the SoC device, which can ensure that the SoC device cannot be used by an illegal recipient even if physically stolen, thereby protecting data therein and limiting/cancelling functions thereof. In addition to security, the near field communication method of the present disclosure also allows different levels of permissions to be provided for different users depending on the NFC key card used. This opens up many possibilities, such as using different SKUs for the same device, user policy group, etc.
In a second aspect, an embodiment of the present invention further provides a near field communication apparatus, including an NFC chip, where the NFC chip is integrated onto an SoC device of a first device; the NFC chip is configured to: acquiring identification information of the second device in a close range; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
In some embodiments, further comprising a processor configured to: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a third aspect, an embodiment of the present invention further provides a hard disk device, including the near field communication apparatus according to the embodiments of the present disclosure.
Taking the hard disk device as the SSD for example, as shown in fig. 2, the default device state of the SSD with NFC is "locked". After the device powers up, the SSD checks that the register does not have a matching key, and does not respond to all operations (or encrypts data). And the NFC card containing the key is placed near the SSD, the NFC chip reads the key of the NFC card and writes the key into the register, and the SSD firmware successfully matches the key stored in the register and changes the SSD state into 'unlocked'. Otherwise, the matching fails and no response is made.
In a fourth aspect, the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the near field communication method according to the embodiments of the present disclosure are implemented.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (10)
1. A near field communication method for implementing near field communication of a system on a chip;
the near field communication method comprises the following steps:
acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device;
enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
2. The near field communication method of claim 1, wherein the NFC chip is connected to a controller or register of the SoC device.
3. The near field communication method of claim 1, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device.
4. The near field communication method of claim 1, further comprising:
configuring a plurality of permission levels for the NFC chip;
configuring corresponding authority functions for each authority level;
and configuring a corresponding verification mode for each authority level.
5. A near field communication apparatus includes an NFC chip integrated onto an SoC device of a first device;
the NFC chip is configured to:
acquiring identification information of the second device in a close range;
enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
6. The near field communication apparatus of claim 5, wherein the NFC chip is connected to a controller or register of the SoC device.
7. The near field communication device of claim 5, wherein the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
8. The near field communication device of claim 5, further comprising a processor configured to:
configuring a plurality of permission levels for the NFC chip;
configuring corresponding authority functions for each authority level;
and configuring a corresponding verification mode for each authority level.
9. A hard disk device characterized by comprising a near field communication apparatus according to any of claims 5-8.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the near field communication method of one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110919747.7A CN113743558A (en) | 2021-08-11 | 2021-08-11 | Near field communication method, device, hard disk and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110919747.7A CN113743558A (en) | 2021-08-11 | 2021-08-11 | Near field communication method, device, hard disk and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113743558A true CN113743558A (en) | 2021-12-03 |
Family
ID=78730727
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110919747.7A Pending CN113743558A (en) | 2021-08-11 | 2021-08-11 | Near field communication method, device, hard disk and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113743558A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984698A (en) * | 2011-09-06 | 2013-03-20 | 中兴通讯股份有限公司 | Near field communication safety protection method and mobile communication terminal |
CN103955416A (en) * | 2014-03-29 | 2014-07-30 | 华为技术有限公司 | Hard disk management method, device and system |
-
2021
- 2021-08-11 CN CN202110919747.7A patent/CN113743558A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984698A (en) * | 2011-09-06 | 2013-03-20 | 中兴通讯股份有限公司 | Near field communication safety protection method and mobile communication terminal |
CN103955416A (en) * | 2014-03-29 | 2014-07-30 | 华为技术有限公司 | Hard disk management method, device and system |
Non-Patent Citations (1)
Title |
---|
斯瓦鲁普·布尼亚 等: "《网络空间安全技术丛书 硬件安全 从SoC设计到系统级防御》", 31 July 2021, pages: 355 - 357 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12001857B2 (en) | Device locator disable authentication | |
US6084968A (en) | Security token and method for wireless applications | |
US8984291B2 (en) | Access to a computing environment by computing devices | |
CN112513857A (en) | Personalized cryptographic security access control in a trusted execution environment | |
TWI494785B (en) | System and method for providing a system management command | |
EP2482220A1 (en) | Multi-enclave token | |
CN109412812B (en) | Data security processing system, method, device and storage medium | |
CN102291717B (en) | Data protection method and terminal | |
JP2003058840A (en) | Information protection management program utilizing rfid-loaded computer recording medium | |
US10680814B2 (en) | Device key security | |
CN102792313A (en) | Credential-based access to data | |
JP2008159059A (en) | Hard disk drive | |
CN103839011A (en) | Protecting method and device of confidential files | |
CN105282117A (en) | Access control method and device | |
KR20190132957A (en) | Data storage apparatus, data processing system, operating system, and data processing method | |
KR102192330B1 (en) | Management system and method for data security for storage device using security device | |
WO2022052665A1 (en) | Wireless terminal and interface access authentication method for wireless terminal in uboot mode | |
US10291609B2 (en) | Vault appliance for identity verification and secure dispatch of rights | |
US9262619B2 (en) | Computer system and method for protecting data from external threats | |
CN108345804B (en) | Storage method and device in trusted computing environment | |
CN113743558A (en) | Near field communication method, device, hard disk and readable storage medium | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System | |
JP2009129413A (en) | Shared management method of portable storage device, and portable storage device | |
KR20210029967A (en) | Management system and method for data security for storage device using security device | |
CN108345803A (en) | A kind of data access method and device of trusted storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |