Unlock instant, AI-driven research and patent intelligence for your innovation.

Log implementation method in encryption card

An implementation method, encryption card technology, applied in the protection of internal/peripheral computer components, instruments, electronic digital data processing, etc., can solve the problem of difficulty in ensuring log integrity, validity and security, and prevent illegal tampering and deletion. Log information, the effect of preventing loss

Inactive Publication Date: 2011-04-27
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the shortcomings of existing encrypted cards that use external software to record logs that are difficult to ensure log integrity, validity and security, thereby providing a method to prevent encrypted card log information from being lost due to host failure or illegally tampered with by users. delete method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log implementation method in encryption card
  • Log implementation method in encryption card
  • Log implementation method in encryption card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The method of the present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0015] For simplicity, all original function modules of the existing encryption card are collectively referred to as the encryption function module 210 . In addition, a safe storage module 220 is added, which can include a dedicated access interface 221 (such as figure 1 shown), may also include a dedicated write interface 221 and a dedicated read interface 222 (such as figure 2 shown). The so-called exclusive use can mean that the hardware circuit interface specification is not disclosed to ordinary users, and it can also mean that the software communication protocol is not disclosed to ordinary users.

[0016] When the encryption function module needs to record a log, it will write the log information into the secure storage module through a dedicated access interface or a dedicated write interface. For further security, the encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a log implementation method in an encryption card. In the method, a secure storage module is utilized, and the steps are as follows: automatically writing corresponding log information into the secure storage module through a special access interface when the encryption card implements management operation or a fault occurs; and directly connecting to the secure storage module through the special access interface when reading a log, and using special software to analyze the log. The log implementation method has the advantages that the log information is recorded in the secure storage module in the encryption card, and the software of a host can not access the module, thereby not only preventing log loss due to the faults of the software and hardware of the host, but also preventing a user from tampering and deleting the log information illegally.

Description

technical field [0001] The invention relates to a log realization method, in particular to a log realization method in an encrypted card. Background technique [0002] As an important cryptographic device, encryption cards have been more and more widely used in industries such as government, finance, communications, and national defense. As it involves the protection and security of sensitive information, the management and maintenance of the encryption card itself becomes more important. [0003] Generally speaking, the software system supporting the encryption card will record some important log information, such as the specific time and execution personnel of the encryption card start, stop, key replacement and backup, and the on-site information when the encryption card fails, etc. . But these softwares all run on the computer outside the encryption card, so the log information is not only easily lost due to system software and hardware failures, but also easily tamper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/77
Inventor 宋辉孙国忠叶丞唐焕焕万伟
Owner DAWNING CLOUD COMPUTING TECH CO LTD