Supercharge Your Innovation With Domain-Expert AI Agents!

Apparatus and method for implementing interaction between applied system and security chip

An application system and security chip technology, applied in the direction of secure communication devices, transmission systems, digital transmission systems, etc., can solve the problems that the device does not support remote access, does not support drive features, and secret information is no longer safe.

Active Publication Date: 2009-12-16
LENOVO (BEIJING) LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) Does not support driver features from different developers
[0007] 2) The security chip cannot be remotely accessed
Because remote access is very insecure, and existing interactive devices do not support remote access
[0008] 3) Since only the host with a security chip can access the security chip, each security chip can only be used by a few users. If the access authority of the same security chip is shared by multiple users, its secret information will not safe again

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for implementing interaction between applied system and security chip
  • Apparatus and method for implementing interaction between applied system and security chip
  • Apparatus and method for implementing interaction between applied system and security chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0069] Usually, when the application system uses the security chip for the first time, the physical existence switch between the application system and the security chip is set to "on". In this state, the application system directly creates the information of the owner of the security chip and stores the root key. Both the security chip owner information and the storage root key are stored in the security chip, and then the physical presence switch will be set to the "off" state.

[0070] Moreover, when creating the owner of the security chip, it is necessary to further set the authorization information of the owner of the security chip and the authorization information of the root key for storing the root key. When the application system requires the security chip to execute important instructions, such as device management instructions, key management instr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device for realizing the interaction between an application system and a security chip. The device includes a security service providing module, a security core service module and a chip driver library. Because the device adopts a layered structure, it achieves the purpose of allowing different developers to customize different driving characteristics, and also supports interoperability between upper-layer software stacks developed by different developers. The present invention also discloses a method for realizing the interaction between the application system and the security chip. The call to the security chip is realized through the security service providing module, the security core service module and the chip driver library. Since the security service providing module can be installed in A host computer with a security chip can also be installed on a host computer without a security chip, thus realizing remote calling between the application system and the security chip, and each security chip can be used jointly by multiple users. Furthermore, the existence of the key database enables the security chip to store more keys.

Description

technical field [0001] The technical field of security chip management of the present invention particularly refers to a device and method for realizing interaction between an application system and a security chip. Background technique [0002] Today's society has entered the information age, and computer networks have gradually been used in various fields of society. With the advancement of national economic informatization and the rise of new network services such as e-commerce, society is increasingly dependent on computer networks. The information age calls for information security, and data encryption is a common method to protect data from illegal access. [0003] At present, the operation of key generation and encryption and decryption using hardware has the advantages of fast speed and difficult tampering, and has been widely used. Compared with pluggable hardware, the motherboard solidified security chip can provide cryptographic operations and at the same time au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L12/24
Inventor 尹萍韦卫
Owner LENOVO (BEIJING) LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More