Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure chip key issuing system and secure chip key issuing method

A key issuer and security technology, applied in the field of information security, can solve problems such as security risks, achieve the effects of high security, prevent illegal monitoring or interception, and enhance security

Active Publication Date: 2013-06-26
CHINA ELECTRIC POWER RES INST +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the key is transmitted between the PC and the key issuing machine in the chip key issuing system, and the communication between the key issuing machine and the encryption chip is mainly through the network, it is easy for attackers to use technical means such as eavesdropping, monitoring, or deciphering. Obtaining key information has a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure chip key issuing system and secure chip key issuing method
  • Secure chip key issuing system and secure chip key issuing method
  • Secure chip key issuing system and secure chip key issuing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The chip key issuing system and method thereof of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0047] like figure 1As shown, the chip key issuing system in this example includes a chip key issuing machine, a chip key issuing host, a key management server and a cryptographic machine. The chip key issuing machine is mainly used to send the key issuing request instruction, write all kinds of keys required into the chip to be issued, and negotiate the session key with the encryption machine; the chip key issuing host is installed with the chip key Issuing software is mainly used to store key files, control the opening and closing of the data communication port connected to the chip key issuing machine, transmit the key and key issuance request information, control the issuance of chip key information and detect whether the issuance is successful; The key management server is mainly used to receive the key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure chip key issuing system and a secure chip key issuing method. The system comprises a chip key issuer, a chip key issuing mainframe, a key management server and a cipher machine. A certain improvement is made to the chip key issuer and the cipher machine, namely, in the chip key issuer, a chip key reading-writing mechanism is directly fixed on the chip key issuer, and a chip fixing device is embedded in the chip reading-writing mechanism to enable the chip fixing device to be directly in physical connection with a pin of an issued chip so as to effectively prevent information monitoring and key interception of the chip key issuer from the outside. In the system and the method, a secure chip and the cipher machine of the chip key issuer are supportive of the symmetric encryption technology and the asymmetric encryption technology and have a data encryption and decryption operation function, an SSL (safety session link) is established between the chip key issuer and a server cipher machine by performing session key negotiation through the symmetric encryption technology and the asymmetric encryption technology, and safety of a chip key issuing system is effectively improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a security chip key issuing system and method thereof. Background technique [0002] With the rapid development of computer and Internet technology, information security issues have become increasingly prominent, and encrypted transmission of key data has become the most fundamental means of security protection. However, the security of transmitted data depends not only on the encryption algorithm, but also on the security of the encryption key. Due to the serious defect of poor key security performance in software encryption, hardware encryption has become a new choice. At present, various encryption chips are already on the market, but the safe issuance of keys in encryption chips is still a key issue. The traditional chip key issuance process is as follows: first, the operator logs into the PC to select the business application module according to the business needs, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 翟峰赵兵刘鹰吕英杰付义伦岑炜李保丰孙志强梁晓兵
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products