Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric encryption authentication method and embedded device based on asymmetric encryption authentication

An asymmetric encryption and embedded device technology, applied in digital data protection, electrical digital data processing, instruments, etc., can solve problems such as inappropriate embedded devices, and achieve the effect of increasing security features and system security

Active Publication Date: 2014-03-26
湖南长城科技信息有限公司 +1
View PDF8 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in special application fields, especially in confidential and security-related applications, this general embedded device is not suitable. At this time, some specific technologies need to be provided to meet the relevant requirements of confidentiality and security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric encryption authentication method and embedded device based on asymmetric encryption authentication
  • Asymmetric encryption authentication method and embedded device based on asymmetric encryption authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] like Figure 1-2 , the hardware system consists of an encryption chip for generating private keys, Exynos4412 processor, touch screen, serial port, I2C port, SPI port, USB port, FLASH, SD / TF, DDR3, power supply, etc. The software system is based on the Linux operating system, adding an asymmetric encryption authentication program. The program needs to complete the following tasks: 1) Obtain the private key from the encryption chip, 2) Save the private key to a specific storage area, 3) Obtain the public key passed in by other drivers or upper-level applications in the kernel, 4) Store the private key in a specific storage area. The RSA asymmetric encryption algorithm is used for key authentication in the area (such as memory or FLASH). This authentication procedure is invisible to the application and is only scheduled by the operating system.

[0034] The present invention selects Exynos4412 as the processor, and the processor has a good application in the tablet fiel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetric encryption authentication method and an embedded device based on asymmetric encryption authentication. The method includes the steps of arranging an encryption chip for generating a private key in a hardware system; opening up a specific storage area in a storage space to be used for storing data related to encryption and decryption; activating the authentication process to complete authentication when an operation system receives public keys from other drivers in a core or upper layer application programs in the core. The authentication process includes the following steps of firstly, reading the private key from the encryption chip through a driving program of the encryption chip; secondly, storing the private key into the specific storage area; thirdly, conducting authentication through an RSA algorithm, completing authentication, and feeding an authentication result back to the operation system. The asymmetric encryption authentication method and the embedded device based on asymmetric encryption authentication are high in security, and it can be effectively ensured that critical data are not modified or deleted or stolen.

Description

technical field [0001] The invention relates to an asymmetric encryption authentication method and an embedded device based on the asymmetric encryption authentication. Background technique [0002] With the technical development of handheld mobile terminal equipment, embedded equipment (such as tablet PC) has been widely used. At present, embedded devices are mainly used in ordinary civilian fields. The requirements of these fields are universal and universal, so most of the software and hardware adopt popular and generalized designs. [0003] However, in special application fields, especially in confidentiality and security-related application fields, this general embedded device is not suitable. At this time, some specific technologies need to be provided to meet the relevant requirements of confidentiality and security. Therefore, it is necessary to design a new encryption authentication method and embedded equipment to meet the confidentiality and security requirements...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/62
CPCG06F21/62G06F2221/2121
Inventor 刘智臣肖弱谭永祥孙文德聂世刚黄波
Owner 湖南长城科技信息有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products