CN115967939A - Data storage card and data storage method - Google Patents

Data storage card and data storage method Download PDF

Info

Publication number
CN115967939A
CN115967939A CN202111194276.4A CN202111194276A CN115967939A CN 115967939 A CN115967939 A CN 115967939A CN 202111194276 A CN202111194276 A CN 202111194276A CN 115967939 A CN115967939 A CN 115967939A
Authority
CN
China
Prior art keywords
card
key information
data
data storage
user identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111194276.4A
Other languages
Chinese (zh)
Inventor
刚周伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Guizhou Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Guizhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Guizhou Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202111194276.4A priority Critical patent/CN115967939A/en
Publication of CN115967939A publication Critical patent/CN115967939A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data storage card and a data storage method, wherein the method comprises the following steps: the system comprises a user identification card, an encryption module and a storage module, wherein the encryption module is respectively connected with the user identification card and the storage module; the user identification card is connected with the terminal equipment through a first contact point arranged on the user identification card and is used for realizing information transmission with a communication network; the encryption module is used for acquiring key information from the user identification card; the storage module is connected with the terminal equipment through a set second contact point and is used for realizing data transmission with the terminal equipment according to the key information. By the embodiment of the invention, the safety of the data in the data storage card is improved, and the rapid migration of the data is realized.

Description

Data storage card and data storage method
Technical Field
The present invention relates to the field of communication device technologies, and in particular, to a data storage card and a data storage method.
Background
A Subscriber Identity Module (SIM) card is an Integrated Circuit card (IC) card held by a mobile Subscriber of a GSM system, and is called a Subscriber Identity card. The communication system identifies the GSM subscriber by means of a SIM card. The same SIM card can be used in different mobile phones, and the SIM card is an identity card of a communication network. Entering the 3G/4G/5G era, the SIM card is upgraded to a Universal Subscriber Identity Module (USIM), and the upgrading mainly relates to the aspect of security encryption without change of essential functions.
At present, data backup and recovery when a mobile phone is changed need two mobile phones to be simultaneously accessed into a network (both in a wired or wireless mode), then the data foresight is realized through software, and the SIM card is changed after the data foresight is finished, so that the mobile phone is changed. The super SIM card is also available at present, and the SIM card is physically connected with the storage card to provide storage for data backup and migration of the mobile phone.
However, because the SIM card in the "super SIM card" is physically connected to the memory card, once the SIM card loses data, the security cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention aims to provide a data storage card and a data storage method, so as to solve the problem that the data security cannot be ensured under the condition that an SIM card is lost.
In order to solve the above technical problem, the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides a data storage card, including: the system comprises a user identification card, an encryption module and a storage module, wherein the encryption module is respectively connected with the user identification card and the storage module;
the user identification card is connected with the terminal equipment through a first contact point arranged on the user identification card and is used for realizing information transmission with a communication network;
the encryption module is used for acquiring key information from the user identification card;
the storage module is connected with the terminal equipment through a set second contact point and is used for realizing data transmission with the terminal equipment according to the key information.
In a second aspect, an embodiment of the present invention provides a data storage method, including:
obtaining key information through a user identification card and storing the key information into an encryption module;
and realizing data transmission between the storage module and the terminal equipment according to the key information.
According to the technical scheme provided by the embodiment of the invention, the embodiment of the invention comprises a user identification card, an encryption module and a storage module, wherein the encryption module is respectively connected with the user identification card and the storage module; the user identification card is connected with the terminal equipment through a first contact point arranged on the user identification card and is used for realizing information transmission with a communication network; the encryption module is used for acquiring key information from the user identification card; the storage module is connected with the terminal equipment through a set second contact point and is used for realizing data transmission with the terminal equipment according to the key information. By the embodiment of the invention, the safety of the data in the data storage card is improved, and the rapid migration of the data is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a data storage card according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a data storage method according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a data storage card and a data storage method.
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an embodiment of the present invention provides a data storage card, including: the SIM card 101, the encryption module 102 and the storage module 103, wherein the encryption module 102 is respectively connected with the SIM card 101 and the storage module 103;
the SIM card 101 is connected to a terminal device through a first contact 104 disposed on the SIM card 101, and is configured to implement information transmission with a communication network;
the encryption module 102 is configured to obtain key information from the SIM card 101;
the storage module 103 is connected to the terminal device through a second contact point 105, and is configured to implement data transmission with the terminal device according to the key information.
The SIM card 101 in the data storage card may be used as a main card of a terminal device into which the data storage card is inserted or as a sub-card of the terminal device.
In one embodiment, the terminal device adopts a dual card slot design, where a first card slot is used for placing a SIM card as a main card, and a second card slot is used for placing the data storage card of the embodiment of the present application.
In the data storage card, the SIM card 101 adopts a design mode similar to that of the current conventional SIM card, and a first contact point 104 of the SIM card is arranged on the SIM card 101. And a second contact point 105 is also provided on the data storage card. After the data storage card is inserted into the terminal device, the SIM card 101 is connected to the terminal device through the first contact 104 to realize information transmission with the communication network, and at the same time, the storage module 103 is connected to the terminal device through the second contact 105 to realize data transmission between the storage module 103 and the terminal device.
After the data storage card is inserted into the terminal device, the encryption module 102 may obtain the key information through the SIM card 101 and store the key information. The key information is used for data encryption and data decryption in the data transmission process between the storage module 103 and the terminal device. If the encryption module 102 does not have the key information, the data transmission between the storage module 103 and the terminal device cannot be normally realized.
The data stored in the storage module 103 can be pictures, words or programs readable by the terminal device, but is essentially stored by the computer, that is, all data are represented by two numbers 0 and 1, and the two numbers 0 and 1 are records of positive and negative voltage fluctuations received on the second contact point 105, and when the data need to be read, that is, the operation is reversed, and 0 and 1 are identified by the positive and negative voltage fluctuations. The data encryption process belongs to hardware encryption, namely when data is written into the storage module 103 from the terminal equipment, the encryption chip randomly reverses 1 or more contact points 0 and 1 identification modes and records the data in the key information. At this time, the data stored in the storage module 103 is reversed due to the partial contact point identification mode, so that the entire file cannot be read correctly. Only by means of the corresponding key information is it known which contact points have their 0 and 1 identification reversed, so that a fast hardware level encryption is achieved, i.e. the data in the memory module 103 can only be correctly decrypted by means of the key information corresponding to the data.
For example, if data 00110011 in the mobile phone represents "good" characters, when the terminal device transmits the data to the storage module 103, a transmission point identification mode changes during encryption retransmission, the data that should be stored as 0 in the storage module 103 originally becomes stored as 1 and becomes 01110011, and the meaning of the whole data representation changes, thereby implementing encryption.
In one embodiment, since the data in the storage module 103 is sequentially written and read, if further encryption is required, even a regular mode change may be performed on the second contact point 105, such as a mode change every X numbers, to improve the security of encryption.
The key information may be stored on the terminal device or on the communication network.
In one embodiment, the encryption module 102 is configured to obtain the key information from the communication network through the SIM card 101.
Further, the SIM card is bound with the key information.
When the terminal device writes data into the storage module 103, the generated key information is bound with the SIM card and then stored in the communication network. Before reading the data in the storage module 103, the communication network needs to authenticate the SIM card 101, and after the authentication is passed, the key information is issued to the SIM card 101, and the SIM card 101 sends the key information to the encryption module 102 and stores the key information.
After the user loses the data storage card or the SIM card 101, the SIM card 101 and the key information bound to the SIM card 101 may be temporarily invalidated in a manner of directly reporting loss of the SIM card, so as to further ensure the security of the key information.
Further, the encryption module 102 adopts a power loss data mode.
When the data storage card is pulled out of the terminal device, or the terminal device is powered off, the encryption module 102 will remove the stored key information. And after the data storage card is inserted into the terminal equipment or the terminal equipment is started, acquiring the key information from the communication network again.
Further, the SIM card is further configured to instruct the terminal device to input a password before the encryption module obtains the key information.
After a data storage card is inserted into a terminal device or the terminal device is restarted, firstly, an input password is set and displayed on the terminal, and then, under the condition that the password input by a user is determined to be correct, key information is obtained from a communication network.
Thus, the data stored in the data storage card will have at least the following three layers of protection:
1. the data in the storage module is encrypted, and cannot be decrypted without the key information;
2. the key information is stored in the communication network and bound with the SIM card. After the SIM is lost, the safety of the key information can be ensured by making the SIM card invalid;
3. the user can acquire the key information by inputting the password in the terminal equipment, so that the safety of the key information is ensured.
In one embodiment, if the user needs to replace the terminal device, the data storage card may be inserted into the original terminal device, the original terminal device encrypts the data and stores the encrypted data in the storage module 103 of the data storage card, and the generated key information is bound with the SIM card 101 of the data storage card and stored in the communication network. And after the user inserts the data storage card into the new terminal equipment, the new terminal equipment prompts the user to input a password. After the input password is determined to be correct, the communication network authenticates the SIM card 101, and after the authentication is passed, the key information bound with the SIM card 101 is sent to the encryption module 102 of the data storage card for storage. After the data of the original terminal device stored in the storage module 103 is decrypted according to the key information, the data is read by the new terminal device, so that the data is quickly migrated.
According to the technical scheme provided by the embodiment of the invention, the embodiment of the invention comprises a user identification card, an encryption module and a storage module, wherein the encryption module is respectively connected with the user identification card and the storage module; the user identification card is connected with the terminal equipment through a first contact point arranged on the user identification card and is used for realizing information transmission with a communication network; the encryption module is used for acquiring key information from the user identification card; the storage module is connected with the terminal equipment through a set second contact point and is used for realizing data transmission with the terminal equipment according to the key information. By the embodiment of the invention, the safety of the data in the data storage card is improved, and the rapid migration of the data is realized.
Based on the above embodiment, further, the data storage card further includes a card slot, and the card slot is used for inserting the SIM card.
The data storage card can be set to be a card sleeve mode, and a user can insert an SIM card into the data storage card according to the requirement of the user, or a new card sleeve is replaced for the SIM card, so that the capacity of the storage module is increased. The SIM card is connected to the terminal device via its own contacts, so that no redesign of the SIM is necessary.
As can be seen from the technical solutions provided by the embodiments of the present invention, the data storage card according to the embodiments of the present invention further includes a card slot, and the card slot is used for inserting the user identification card, so that a user can update the data storage card at any time to meet the user's requirement for storage capacity.
Corresponding to the data storage card provided in the foregoing embodiment, based on the same technical concept, an embodiment of the present invention further provides a data storage method, fig. 2 is a schematic flow diagram of the data storage method provided in the embodiment of the present invention, an execution subject of the data storage method is the data storage card shown in fig. 1, and as shown in fig. 2, the data storage method may include the following steps.
Step S210, obtaining key information through a user identification card, and storing the key information into an encryption module;
and step S220, realizing data transmission between the storage module and the terminal equipment according to the key information.
Further, the step S210 includes:
key information is obtained from a communication network through a subscriber identity card.
Further, the encryption module adopts a power-down loss data mode.
Further, before step S210, the method further includes:
and instructing the terminal equipment to input a password.
Further, the user identification card is bound with the key information.
According to the technical scheme provided by the embodiment of the invention, the embodiment of the invention obtains the key information through the user identification card and stores the key information into the encryption module; and realizing data transmission between the storage module and the terminal equipment according to the key information. By the embodiment of the invention, the safety of the data in the data storage card is improved, and the rapid migration of the data is realized.
The data storage method provided by the embodiment of the invention can realize each process in the embodiment corresponding to the data storage card, and is not described again to avoid repetition.
It should be noted that the data storage method provided by the embodiment of the present invention and the data storage card provided by the embodiment of the present invention are based on the same inventive concept, and therefore, specific implementation of the embodiment may refer to implementation of the foregoing data storage card, and repeated details are not described again.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (10)

1. A data storage card, comprising: the system comprises a user identification card, an encryption module and a storage module, wherein the encryption module is respectively connected with the user identification card and the storage module;
the user identification card is connected with the terminal equipment through a first contact point arranged on the user identification card and is used for realizing information transmission with a communication network;
the encryption module is used for acquiring key information from the user identification card;
the storage module is connected with the terminal equipment through a set second contact point and is used for realizing data transmission with the terminal equipment according to the key information.
2. The data storage card of claim 1, wherein the encryption module is configured to obtain the key information from the communication network via the subscriber identity card.
3. The data storage card of claim 2, wherein the encryption module employs a power loss data mode.
4. The data storage card of claim 3, wherein the subscriber identity card is further configured to instruct the terminal device to enter a password before the encryption module obtains the key information.
5. A data storage card according to any one of claims 1-4, further comprising a card slot for insertion of said subscriber identity card.
6. A method of storing data, comprising:
obtaining key information through a user identification card, and storing the key information into an encryption module;
and realizing data transmission between the storage module and the terminal equipment according to the key information.
7. The method according to claim 6, wherein the obtaining the key information via the subscriber identity card comprises:
key information is obtained from a communication network through a subscriber identity card.
8. The method of claim 7, wherein the encryption module employs a loss of power data mode.
9. The method of claim 7, wherein prior to said obtaining key information from the communication network via the subscriber identity card, the method further comprises:
and instructing the terminal equipment to input a password.
10. The method according to any one of claims 6 to 9, wherein the subscriber identity card is bound to the key information.
CN202111194276.4A 2021-10-13 2021-10-13 Data storage card and data storage method Pending CN115967939A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111194276.4A CN115967939A (en) 2021-10-13 2021-10-13 Data storage card and data storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111194276.4A CN115967939A (en) 2021-10-13 2021-10-13 Data storage card and data storage method

Publications (1)

Publication Number Publication Date
CN115967939A true CN115967939A (en) 2023-04-14

Family

ID=87351549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111194276.4A Pending CN115967939A (en) 2021-10-13 2021-10-13 Data storage card and data storage method

Country Status (1)

Country Link
CN (1) CN115967939A (en)

Similar Documents

Publication Publication Date Title
US11153746B2 (en) Method and terminal for keeping subscriber identity module card in standby state
CN102149083B (en) Personalized card writing method, system and device
KR20080007446A (en) Memory card, application program holding method, and holding program
CN105701427B (en) A kind of method and device of smart card write-in data
CN103079203B (en) A kind of terminal authentication method and smart card
CN110519294B (en) Identity authentication method, device, equipment and system
CN111586671B (en) Embedded user identification card configuration method and device, communication equipment and storage medium
CN110334531B (en) Virtual machine key management method, master node, system, storage medium and device
EP1107627A1 (en) A method for protecting user data stored in memory of a mobile communication device, particularly a mobile phone
CN107124279B (en) Method and device for erasing terminal data
CN210627203U (en) UICC device with safe storage function
CN102752754A (en) Method for security certificate of user identification card locking data and mobile terminal
CN107105082B (en) Method for unlocking network of terminal, method and device for starting terminal
CN116489633A (en) Data migration method, data recovery method, device, equipment and storage medium
CN115967939A (en) Data storage card and data storage method
CN111093190A (en) Method, device and system for writing key data, electronic equipment and storage medium
KR100734395B1 (en) method for copying installed card data at mobile phone and mobile phone thereof
CN113704773B (en) Relay protection safety chip operating system and communication method thereof
KR20170089887A (en) Method of restoring a secure element to a factory state
CN110995437B (en) ETC system-based user information input method, device, equipment and storage medium
CN114579985A (en) Remote card writing method, card writing terminal, server and storage medium
CN108990046B (en) Connection method of mobile network
CN113626833A (en) Card application data backup and recovery method and related equipment
CN104134025A (en) Mobile terminal locking method and device based on SIM cards and mobile terminal
KR100641167B1 (en) Initialization method for mobile communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination