A multi-user encryption system and communication method for automatically identifying communication protocols

A communication protocol and encryption system technology, applied in the computer field, can solve the problems of wasting resources, cannot be repeated, and difficult to prevent, and achieve the effect of saving costs and simplifying inventory management

Active Publication Date: 2017-11-21
SHENZHEN JINYINDA TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are main limitations: a chip can only support one encryption algorithm and communication protocol, which is not conducive to the application of multi-system and multi-encryption; there is only one user data area, or there are multiple data areas, but must be switched by the host, which is not conducive to inventory Administration and multi-user system applications
In addition, there are still some limitations, such as due to the strict requirements on the communication speed, the speed of the host computer cannot have too much deviation; once the encryption chip is used for a certain encryption, it cannot be reused (recycled), which wastes resources; It is difficult to guard against the means of cracking encrypted chips such as data retrieval

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-user encryption system and communication method for automatically identifying communication protocols
  • A multi-user encryption system and communication method for automatically identifying communication protocols
  • A multi-user encryption system and communication method for automatically identifying communication protocols

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solution of the present invention is mainly aimed at chip applications that require encryption and system applications composed of them, including but not limited to printer encryption, system software encryption protection, PCBA encryption protection, set-top box encryption, mobile phone information encryption protection, etc.

[0036] In this specification, the word "unit" includes but not limited to software functional units, hardware circuit units, functional units realized by hardware and its complementary software.

[0037] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0038] figure 1 It is a structural block diagram of the first embodiment of a multi-user encryption system that automatically recognizes communication protocols in the present invention. As shown in the figure, it includes a communication unit 100, a communica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-user encryption system capable of automatically identifying a communication protocol and a communication method thereof. The multi-user encryption system comprises a communication unit, a communication protocol search unit, a communication protocol switching unit and a user search unit, wherein the communication unit is used for communicating multiple communication protocols with a host; the communication protocol search unit is used for matching the communication protocol involved in an initial command from the host with the multiple communication protocols in a partition storage unit to determine the adoptive communication protocol; the communication protocol switching unit is used for switching the communication protocol according to the determined communication protocol; the user search unit is used for matching a user ID (Identity) in the initial command from the host with a plurality of user IDs in the partition storage unit to determine a corresponding user so as to enable the communication unit to switch communication of enciphered data of the corresponding user. According to the multi-user encryption system capable of automatically identifying the communication protocol and the communication method thereof, coexistence of multiple communication protocols and multiple users as well as automatic identification and switching can be implemented, so that a plurality of master chip systems can share one encryption chip system, and a plurality of products share one encryption chip system, so that the cost is saved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a multi-user encryption system for automatically identifying communication protocols and a communication method thereof. Background technique [0002] Encryption chips have been widely used, for example, ATMEL's AT88SC0104 (refer to AT8SC0104 datasheet), maxim's DS1961S (refer to DS1961S datasheet), HP printer encryption chips, etc., are used in many fields. But there are main limitations: a chip can only support one encryption algorithm and communication protocol, which is not conducive to the application of multiple systems and multiple encryptions; there is only one user data area, or there are multiple data areas, but must be switched by the host, which is not conducive to inventory Administration and multi-user system applications. In addition, there are still some limitations, such as due to the strict requirements on the communication speed, the speed of the host comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘兴炎莫坚成
Owner SHENZHEN JINYINDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products