Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology

A control method and technology of cipher machines, applied in the field of information security ciphers, can solve problems such as illegal use of cipher machines, real-time security monitoring cannot work, etc., and achieve the effects of preventing misuse of cipher machines, increasing management overhead, and avoiding security defects

Active Publication Date: 2014-12-24
中电科网络安全科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Usually, when the cipher machine is running in the production environment, there are complete log records, monitoring and other protection technologies to prevent illegal tampering and stealing of sensitive information stored in the cipher machine; however, when the cipher machine is powered off and stops running, real-time security monitoring will cannot work; therefore, illegal users may illegally use the cipher machine by stopping the operation of the cipher machine, thereby bypassing the real-time security monitoring mechanism of the cipher machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0034] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0035] During the start-up process of the cipher machine, the cipher machine requires authorized operators to switch the cipher machine from the management state to the working state. The cipher machine only provides password security services for the outside world in the working state. Cipher machine management and maintenance operations. The conversion of the cipher machine from the management state to the working state needs to pass th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a control method for enhancing the using security of a cryptographic machine by adopting a dual-factor mandatory certification technology, and relates to the technical field of information security and cryptology. The control method comprises the following steps that: (1) a manager sets a running security strategy of the cryptographic machine; (2) the manager starts the cryptographic machine; (3) after being started, the cryptographic machine enters a function authority management state; (4) if the cryptographic machine is used at the first time, the cryptographic machine enters a personalized flow of the dual-factor mandatory certification technology; and (5) if the cryptographic machine is not used at the first time, the cryptographic machine enters a security service starting flow of the dual-factor mandatory certification technology. The method has the advantages that during actual application, the security risk caused by a reason that a non-authorized user operates the cryptographic machine is completely avoided, so that the overall application security of the cryptographic machine is improved; and furthermore, the authority of the manager is separated, so that problem that safety defect is brought to system management is avoided, and the management security of the cryptographic machine is improved.

Description

technical field [0001] The invention relates to the technical field of information security ciphers, in particular to a control method for enhancing the use security of a cipher machine by adopting a two-factor compulsory authentication technology. Background technique [0002] Cryptography technology is the basic technology of information security, and cipher machine is the foundation of secure application of cryptography technology and the core of information security. With the rapid and comprehensive development of my country's information industry, cryptographic equipment, as the core of information security, has been providing secure cryptographic technology for the development of information industry and modern service industry, but it is also facing more and more stringent security requirements. [0003] In information security, the safe operation and maintenance management of cipher machines is a very important part of the application process of cipher machines. Thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
Inventor 张世雄李元正黄锦
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products