Unlock instant, AI-driven research and patent intelligence for your innovation.

A storage method and security device for confidential information of a cardless terminal

A terminal and secret-related technology, which is applied in the field of information security, can solve problems such as hidden dangers of secret-related data security, illegal authorization of terminals, illegal changes, etc., and achieve the effect of increasing difficulty, putting security into practical use, and increasing difficulty

Active Publication Date: 2017-12-26
CHENGDU CHITONG DIGITAL SYST
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the one-way communication system, the current security mechanism for cardless terminal confidential data is too simple, and it is easy to be obtained by hackers. The content protection key used to decrypt the information, so as to use the content protection key to illegally decrypt the information transmitted from the front end; or use external tools to analyze and illegally change the user authorization part of the confidential data in the external memory, so that the terminal illegally Obtain authorization; or use a special debugging tool to obtain the storage location of the confidential data in the internal memory, analyze the data structure, first change the content of the confidential data, and then use the originally legal embedded program to change the confidential data in the external memory Content, such as changing the user authorization part, so that the terminal obtains illegal authorization
Therefore, there is a huge security risk in the current confidential data of cardless terminals, and a new security mechanism needs to be adopted to protect it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A storage method and security device for confidential information of a cardless terminal
  • A storage method and security device for confidential information of a cardless terminal
  • A storage method and security device for confidential information of a cardless terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] Example one, figure 1 It shows a flow chart of the security mechanism for the secret-related information of the cardless terminal provided in this embodiment. The security mechanism of the secret-related information of the cardless terminal shown in this embodiment is characterized in that it includes the following steps.

[0024] S101. When storing secret-related data, obtain secret-related data from the second memory, split the secret-related data into M data units, encrypt the M data units with a data protection key, and generate M encrypted data units, Use the root key to encrypt the data protection key, generate a single encrypted data protection key unit, generate a key offset random number, and insert the single encrypted data protection key unit into M encrypted data units according to the key offset random number , The storage cell string is generated, and the storage cell string is stored in the first memory.

[0025] S102. When using secret-related data, read the...

Embodiment 2

[0031] Example two, figure 2 Shows a schematic diagram of the storage unit string in the security mechanism of the confidential information of the cardless terminal of this example, image 3 It shows a schematic diagram of the circular buffer area in the security mechanism of the secret-related information of the cardless terminal in this embodiment. This embodiment, as an optimization and extension of the first embodiment, provides a detailed description of the security mechanism for the confidential information of the cardless terminal provided in the second embodiment on the basis of the first embodiment.

[0032] In step S101, specifically, the step of splitting the secret-related data into M data units, encrypting the M data units with a data protection key, and generating M encrypted data units further includes: splitting the secret-related data Divided into M data units with the same length, the length of the data unit is N times 16 bytes; a data protection key is generate...

Embodiment 3

[0057] Example three, Figure 4 It shows a structural diagram of a security device for secret-related information of a cardless terminal in this embodiment. The security device for secret-related information of a cardless terminal is characterized by comprising: an encrypted memory, which is used to obtain secret-related data from a second memory when secret-related data is stored, and split the secret-related data into M data Unit, use the data protection key to encrypt M data units, generate M encrypted data units, use the root key to encrypt the data protection key, generate a single encrypted data protection key unit, generate a key offset random number, according to The key offset random number inserts a single encrypted data protection key unit into M encrypted data units, generates a storage unit string, and sends the storage unit string to the first memory; the first memory is used to store the storage unit string ; Load the user, used to read the storage unit string f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and discloses a storage method and a security device for confidential information of a cardless terminal. The security mechanism and security device for the confidential information of the cardless terminal encrypts both the confidential data and the data protection key used to encrypt the confidential data when the confidential data is encrypted and stored, and then encrypts the encrypted data to protect the encrypted data. The key unit is randomly inserted into the encrypted secret-related data unit string; when the secret-related data is loaded and used, the encrypted data protection key unit and the encrypted secret-related data unit string are read from the external memory, and the secret-related data is obtained after decryption data, and then store the classified data along with the disguised data in a random location in a ring buffer located in internal memory. Through the aforementioned method, it greatly increases the difficulty for hackers to illegally obtain and tamper with the confidential information of the non-card terminal, so that the low-cost one-way communication system composed of the front end and the non-card terminal can be safely put into practical use.

Description

Technical field [0001] The present invention relates to the field of information security, in particular, to a method and a security device for storing confidential information of a cardless terminal. Background technique [0002] Information security is an important technical issue in digital information transmission systems. It requires that unicast, multicast, or broadcast information can only be received and used by the target receiving end. For this reason, the transmission information is usually encrypted and decrypted to ensure transmission. The information exchange between the end and the receiving end is safe. For the receiving terminal, in addition to the function of decrypting the information, it also needs to save some sensitive confidential information for authentication, authorization, and decryption processes, such as: content protection key for decrypting information; terminal authorization data (Specify what information the terminal is allowed to receive); termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李洪钧
Owner CHENGDU CHITONG DIGITAL SYST