Log implementation method in encryption card
An implementation method, encryption card technology, applied in the protection of internal/peripheral computer components, instruments, electronic digital data processing, etc., can solve the problem of difficulty in ensuring log integrity, validity and security, and prevent illegal tampering and deletion. Log information, the effect of preventing loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The method of the present invention will be described below in conjunction with the accompanying drawings and specific embodiments.
[0015] For simplicity, all original function modules of the existing encryption card are collectively referred to as the encryption function module 210 . In addition, a safe storage module 220 is added, which can include a dedicated access interface 221 (such as figure 1 shown), may also include a dedicated write interface 221 and a dedicated read interface 222 (such as figure 2 shown). The so-called exclusive use can mean that the hardware circuit interface specification is not disclosed to ordinary users, and it can also mean that the software communication protocol is not disclosed to ordinary users.
[0016] When the encryption function module needs to record a log, it will write the log information into the secure storage module through a dedicated access interface or a dedicated write interface. For further security, the encrypt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 