Unlock instant, AI-driven research and patent intelligence for your innovation.

Security certification method and device

A technology for security authentication and security conditions, applied in the field of security authentication methods and devices, can solve problems such as flexibility restrictions, and achieve the effect of improving security performance and reducing the probability of leaking secrets

Inactive Publication Date: 2011-04-20
SHENZHEN EXCELSECU DATA TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the security state generally only has sixteen states, and multiple keys correspond to one security state. The flexibility of the design and application security processing mechanism is also greatly limited.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certification method and device
  • Security certification method and device
  • Security certification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] figure 1 It is a schematic flowchart of an embodiment of the security authentication method of the present invention.

[0035] The full authentication method provided by the present invention needs to keep an authentication record table in the security device in advance, and the authentication record information of successfully executed external authentication can be written into the authentication record table. If the external authentication fails or the external authentication is canceled, the corresponding authentication record information is deleted. The security device here can specifically be the EsecuCOS intelligent operating system.

[0036] The specific steps are as follows:

[0037] Step S101, receiving an operation instruction, and obtaining safety conditions that need to be satisfied by the opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security certification method and a device. The method comprises: receiving an operating instruction, and obtaining security conditions needed by the operation; analyzing the security conditions and obtaining a key set to be certificated by the security conditions; and querying a certification record list, when the to-be-certificated key set has been certificated successfully, allowing the operation. In the invention, the certification record list is preset in a security device, and one key only corresponds to one key certification record; one security condition consists of one or more key certification records; after receiving the operating instruction, the method judges whether the key set corresponding to the security condition is certificated successfully or not according to the security condition corresponding to the operating instruction, if so, allowing the operation, or else, refusing the operation. Therefore, the attackers cannot damage the security of the existing application files, keys and algorithms by modifying application parameters (for example, adding new key), so the rate of secret leakage is further reduced, and the security performance of the system is improved.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to a security authentication method and device. Background technique [0002] In existing smart security devices, the security authentication mechanism adopts a state machine, and there is only one security state in the security device, and the operations on files, keys or algorithms in the smart security device are all related to the security state. The security authentication method is: after receiving the security authentication request, updating the security state according to the authentication result. In this security authentication method, multiple keys can correspond to the same security state. In this way, by adding a new key, after the key authentication is successful, the security state can be modified, so as to achieve the security of files, keys or algorithms. operating authority. In addition, the security state generally has only sixteen states, and multip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/62
Inventor 陈柳章
Owner SHENZHEN EXCELSECU DATA TECH