Check patentability & draft patents in minutes with Patsnap Eureka AI!

Embedded enciphering system

An embedded system, encryption system technology, applied in the direction of user identity/authority verification, etc., can solve the problem that the general encryption system is not suitable for use

Inactive Publication Date: 2009-05-27
上海千镭星电子科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the resource limitation of embedded devices, the general encryption system used by ordinary PCs is not suitable for specific embedded systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded enciphering system
  • Embedded enciphering system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] specific implementation plan

[0010] An embedded encryption system including server and client.

[0011] The most important mechanisms in the embedded encryption system of the present invention are multi-level key mechanism, security certificate, digital signature, etc., which will be introduced in detail below.

[0012] The main process of the encryption system is: the server side establishes a connection with the client side by generating a security certificate loaded with a specific digital signature, and establishes an encrypted communication connection for communication after a series of information exchanges between the two parties.

[0013] When an encrypted communication connection needs to be established, the client first sends a connection establishment request. The server sends a response after receiving the request. After receiving the response, the client first needs to confirm that it is communicating with the correct server, and then establish an encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an embedded encryption system, which is characterized in that the whole system is divided into a server and a client. The server provides a safety certificate containing a specific digital signature; the client identifies the server end through identifying the certificate; and two parties establish an encrypted communication connection after exchanging a series of information. Encrypted communication can be realized through a specific encryption mode under a condition that resource of the embedded system is restricted, thereby ensuring that safety of the embedded system in intercommunication, networking communication and other interactive works. Furthermore, the embedded system can not be crashed in case of failed electronic equipment, hacker attack and the like.

Description

technical field [0001] The invention is an embedded encryption system for establishing encrypted communication. Background technique [0002] From industrial equipment to household equipment, the application of various embedded devices and systems has increasingly penetrated into all aspects of human life. [0003] Therefore, the security problem has increasingly become an important issue that threatens the development of embedded systems. As embedded devices become more and more intelligent, and systems are networked, downloaded, and upgraded more and more frequently, how to ensure the security of network communications has become a key issue for whether the system can work stably. For embedded applications such as smart buildings, ATMs, remote surgery, etc., in addition to ensuring the security under normal working conditions, the security under unexpected conditions such as electronic equipment errors and hacker attacks must also be carefully considered. However, due to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 王铁城
Owner 上海千镭星电子科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More