CN113743558A - Near field communication method, device, hard disk and readable storage medium - Google Patents

Near field communication method, device, hard disk and readable storage medium Download PDF

Info

Publication number
CN113743558A
CN113743558A CN202110919747.7A CN202110919747A CN113743558A CN 113743558 A CN113743558 A CN 113743558A CN 202110919747 A CN202110919747 A CN 202110919747A CN 113743558 A CN113743558 A CN 113743558A
Authority
CN
China
Prior art keywords
near field
field communication
nfc chip
soc
communication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110919747.7A
Other languages
Chinese (zh)
Inventor
斯蒂芬高
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rongming Microelectronics Jinan Co ltd
Original Assignee
Rongming Microelectronics Jinan Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rongming Microelectronics Jinan Co ltd filed Critical Rongming Microelectronics Jinan Co ltd
Priority to CN202110919747.7A priority Critical patent/CN113743558A/en
Publication of CN113743558A publication Critical patent/CN113743558A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/76Architectures of general purpose stored program computers
    • G06F15/78Architectures of general purpose stored program computers comprising a single central processing unit
    • G06F15/7807System on chip, i.e. computer system on a single chip; System in package, i.e. computer system on one or more chips in a single package

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a near field communication method, a near field communication device, a hard disk and a readable storage medium, wherein the near field communication method comprises the following steps: acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device. According to the method, the NFC chip is added to the SoC device, and the corresponding NFC key is set, so that information leakage on the SoC can be prevented, and the use of specific or all functions can be prevented, and therefore the problem that the user verification cannot be realized on the SoC on the system on chip is solved.

Description

Near field communication method, device, hard disk and readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a near field communication method and apparatus, a hard disk, and a readable storage medium.
Background
Near Field Communication (NFC) is a short-range, high frequency, contactless, point-to-point communication protocol that has been commercialized since the 2000's. The upper limit of the communication distance between two NFC enabled devices is 4CM, that is to say both are within physical contact range. This effectively eliminates (or severely limits) the possibility of long-range hacking. The main commercial uses of NFC today are contactless mobile payment, small file sharing and electronic ticketing.
Conventional systems on chip (SoC) are not capable of user authentication. Anybody, so long as the SoC is physically accessible, it can be used. Various kinds of confidential information are often found in the system on chip, and therefore, a great potential safety hazard is brought. If the device is invaded by a lawbreaker, it may cause: information stored thereon may be stolen, the device is used for unintended purposes, etc.
The lack of existing commercial technologies on the market today protects SoC devices from being misappropriated by an unknown recipient. Once these SoC devices are compromised (possibly malicious), their recipients can steal the information stored on the device or use it for their illegal purposes.
Disclosure of Invention
The embodiment of the invention provides a near field communication method, a near field communication device, a hard disk and a readable storage medium, which are used for protecting an SoC.
In a first aspect, an embodiment of the present invention provides a near field communication method, configured to implement near field communication of a system on a chip; the near field communication method comprises the following steps: acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device.
In some embodiments, further comprising: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a second aspect, an embodiment of the present invention further provides a near field communication apparatus, including an NFC chip, where the NFC chip is integrated onto an SoC device of a first device; the NFC chip is configured to: acquiring identification information of the second device in a close range; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
In some embodiments, further comprising a processor configured to: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a third aspect, an embodiment of the present invention further provides a hard disk device, including the near field communication apparatus according to the embodiments of the present disclosure.
In a fourth aspect, the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the near field communication method according to the embodiments of the present disclosure are implemented.
The embodiment of the invention is integrated on the SoC device of the first device through the NFC chip; and responding to the verification passing information of the second equipment, thereby solving the problem that the user verification cannot be realized on the system on chip.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a basic flow diagram of an embodiment of the present disclosure.
Fig. 2 is a schematic diagram of the SSD according to the embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides a near field communication method, which is used for realizing near field communication of a system on a chip; the near field communication method comprises the following steps:
s101, in a close range, acquiring identification information of a second device through an NFC chip, wherein the NFC chip is integrated on an SoC device of a first device. In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
And S102, responding to the verification passing information of the second equipment to allow near field communication between the second equipment and the first equipment. The second device in this example may be to create an external NFC key or key card that may match the cryptographic data in the NFC chip. When a matching NFC key or key fob is within a close range (4cm) of the SoC device (assuming the device is powered on), the NFC chip or a controller connected to the NFC chip will write to the LOCK/UNLOCK register on the SoC device, setting the SoC device state to "unlocked" (default state is "locked"). When an SoC device is in a "locked" state, it is virtually unusable (all data stored thereon cannot be read back, and all features and functions of the device are disabled). The implementation of how a device disables all of its features, functions, and data read-back may be defined by the SoC device itself. For example, the first device, through its firmware, continually polls the lock/unlock register and keeps its internal blocks in RESET until the unlock state is read back. When the SoC device is in the "unlocked" state, the user may use all or part of the features/functions of the device including data read-back.
According to the method, the NFC chip is added to the register or the device of the SoC and the corresponding NFC key is set, so that information leakage on the SoC can be prevented, and the use of specific or all functions can be prevented, and therefore the problem that the user verification cannot be realized on the SoC of the system on chip is solved.
In some embodiments, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device. And under the condition that the second device fails to verify, prohibiting the second device from performing near field communication, for example, under the condition that the second device is found to perform decryption forcibly, actively destroying all information to completely destroy the attacked device, thereby protecting the data from being obtained by illegal copies.
In some embodiments, further comprising: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level. That is, in this example, the NFC chip may have multiple secret data, each of which grants a different set of characteristics, functions, and data access rights. The LOCK/UNLOCK register may thus have multiple levels of "unlocked" status. Thereby achieving the "authority" level of the SoC device. For example, a client may be provided with a set of NFC keys that may unlock functions on its device that are only available to the client, but an administrator may have another set of NFC keys to unlock debuggable functions (which are not available to the client in general), although this is merely an example and is not limited in this respect.
The SoC device may also be "relocked" by completely turning off power or using another NFC key card. This NFC key card may lock it completely or may grant it a different "permission" level. The LOCK/UNLOCK register of the SoC device can have a plurality of levels of 'UNLOCK' states through multi-level authority setting, so that the 'authority' level of the SoC device is realized. The near field communication method of the present disclosure uses NFC technology (NFC chip and corresponding NFC key card) to protect SoC devices from accidental recipient use. A permission level is created on the SoC device. The privilege level may grant access to functions, features, and data on the SoC device depending on the key card used.
In summary, the near field communication method of the present disclosure can integrate the NFC function in the register of the SoC device, and the method of the present disclosure needs a physical key card to lock/unlock the SoC device, which can ensure that the SoC device cannot be used by an illegal recipient even if physically stolen, thereby protecting data therein and limiting/cancelling functions thereof. In addition to security, the near field communication method of the present disclosure also allows different levels of permissions to be provided for different users depending on the NFC key card used. This opens up many possibilities, such as using different SKUs for the same device, user policy group, etc.
In a second aspect, an embodiment of the present invention further provides a near field communication apparatus, including an NFC chip, where the NFC chip is integrated onto an SoC device of a first device; the NFC chip is configured to: acquiring identification information of the second device in a close range; enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
In some embodiments, the NFC chip is connected to a controller or register of the SoC device.
In some embodiments, the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
In some embodiments, further comprising a processor configured to: configuring a plurality of permission levels for the NFC chip; configuring corresponding authority functions for each authority level; and configuring a corresponding verification mode for each authority level.
In a third aspect, an embodiment of the present invention further provides a hard disk device, including the near field communication apparatus according to the embodiments of the present disclosure.
Taking the hard disk device as the SSD for example, as shown in fig. 2, the default device state of the SSD with NFC is "locked". After the device powers up, the SSD checks that the register does not have a matching key, and does not respond to all operations (or encrypts data). And the NFC card containing the key is placed near the SSD, the NFC chip reads the key of the NFC card and writes the key into the register, and the SSD firmware successfully matches the key stored in the register and changes the SSD state into 'unlocked'. Otherwise, the matching fails and no response is made.
In a fourth aspect, the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the near field communication method according to the embodiments of the present disclosure are implemented.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A near field communication method for implementing near field communication of a system on a chip;
the near field communication method comprises the following steps:
acquiring identification information of a second device through an NFC chip in a close range, wherein the NFC chip is integrated on an SoC device of a first device;
enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
2. The near field communication method of claim 1, wherein the NFC chip is connected to a controller or register of the SoC device.
3. The near field communication method of claim 1, further comprising disabling near field communication between the second device and the first device in response to authentication failure information of the second device.
4. The near field communication method of claim 1, further comprising:
configuring a plurality of permission levels for the NFC chip;
configuring corresponding authority functions for each authority level;
and configuring a corresponding verification mode for each authority level.
5. A near field communication apparatus includes an NFC chip integrated onto an SoC device of a first device;
the NFC chip is configured to:
acquiring identification information of the second device in a close range;
enabling near field communication between the second device and the first device in response to the authentication pass information of the second device.
6. The near field communication apparatus of claim 5, wherein the NFC chip is connected to a controller or register of the SoC device.
7. The near field communication device of claim 5, wherein the NFC chip is further configured to: in response to authentication failure information of the second device, disabling near field communication between the second device and the first device.
8. The near field communication device of claim 5, further comprising a processor configured to:
configuring a plurality of permission levels for the NFC chip;
configuring corresponding authority functions for each authority level;
and configuring a corresponding verification mode for each authority level.
9. A hard disk device characterized by comprising a near field communication apparatus according to any of claims 5-8.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the near field communication method of one of claims 1 to 4.
CN202110919747.7A 2021-08-11 2021-08-11 Near field communication method, device, hard disk and readable storage medium Pending CN113743558A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110919747.7A CN113743558A (en) 2021-08-11 2021-08-11 Near field communication method, device, hard disk and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110919747.7A CN113743558A (en) 2021-08-11 2021-08-11 Near field communication method, device, hard disk and readable storage medium

Publications (1)

Publication Number Publication Date
CN113743558A true CN113743558A (en) 2021-12-03

Family

ID=78730727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110919747.7A Pending CN113743558A (en) 2021-08-11 2021-08-11 Near field communication method, device, hard disk and readable storage medium

Country Status (1)

Country Link
CN (1) CN113743558A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984698A (en) * 2011-09-06 2013-03-20 中兴通讯股份有限公司 Near field communication safety protection method and mobile communication terminal
CN103955416A (en) * 2014-03-29 2014-07-30 华为技术有限公司 Hard disk management method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984698A (en) * 2011-09-06 2013-03-20 中兴通讯股份有限公司 Near field communication safety protection method and mobile communication terminal
CN103955416A (en) * 2014-03-29 2014-07-30 华为技术有限公司 Hard disk management method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
斯瓦鲁普·布尼亚 等: "《网络空间安全技术丛书 硬件安全 从SoC设计到系统级防御》", 31 July 2021, pages: 355 - 357 *

Similar Documents

Publication Publication Date Title
US12001857B2 (en) Device locator disable authentication
US6084968A (en) Security token and method for wireless applications
US8984291B2 (en) Access to a computing environment by computing devices
CN112513857A (en) Personalized cryptographic security access control in a trusted execution environment
TWI494785B (en) System and method for providing a system management command
EP2482220A1 (en) Multi-enclave token
CN109412812B (en) Data security processing system, method, device and storage medium
CN102291717B (en) Data protection method and terminal
JP2003058840A (en) Information protection management program utilizing rfid-loaded computer recording medium
US10680814B2 (en) Device key security
CN102792313A (en) Credential-based access to data
JP2008159059A (en) Hard disk drive
CN103839011A (en) Protecting method and device of confidential files
CN105282117A (en) Access control method and device
KR20190132957A (en) Data storage apparatus, data processing system, operating system, and data processing method
KR102192330B1 (en) Management system and method for data security for storage device using security device
WO2022052665A1 (en) Wireless terminal and interface access authentication method for wireless terminal in uboot mode
US10291609B2 (en) Vault appliance for identity verification and secure dispatch of rights
US9262619B2 (en) Computer system and method for protecting data from external threats
CN108345804B (en) Storage method and device in trusted computing environment
CN113743558A (en) Near field communication method, device, hard disk and readable storage medium
KR101133210B1 (en) Mobile Authentication System and Central Control System
JP2009129413A (en) Shared management method of portable storage device, and portable storage device
KR20210029967A (en) Management system and method for data security for storage device using security device
CN108345803A (en) A kind of data access method and device of trusted storage device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination