Security-sandbox-based USB key cryptographic algorithm detecting system

An intelligent cryptographic key and cryptographic algorithm technology, applied in the direction of digital data protection, digital data authentication, platform integrity maintenance, etc., can solve the problems of complex and unclear operation process, simple interface, no interface, etc., to avoid conflicts between loading drivers Effect

Inactive Publication Date: 2015-06-10
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the update of the test case database is generally carried out manually, and the update cycle is long
[0008] 2) The call interface is encapsulated, with low transparency
The traditional USB Key cryptographic algorithm detection platform only calls the interface provided by the manufacturer. This type of interface has been compiled into a dynamic or static link library by the manufacturer, and the internal implementation is opaque. The manufacturer may modify its interface to avoid the normal process of testing
[0009] 3) The test sample is small and does not meet the specifications of the State Cryptography Administration
Most of the existing test platforms are released earlier than the specification and cannot meet the standard
[0010] 4) The interface is simple and the operation is cumbersome
Most

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security-sandbox-based USB key cryptographic algorithm detecting system
  • Security-sandbox-based USB key cryptographic algorithm detecting system
  • Security-sandbox-based USB key cryptographic algorithm detecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] The present invention adopts a hierarchical module design, which includes: USB Key device hardware layer, USB Key device driver layer, cryptographic algorithm interface layer, cryptographic algorithm detection engine layer and user interface layer from bottom to top. In addition, the present invention also includes some pre-placed test cases for backup in special cases. All other layers except the USB Key device hardware layer are pre-placed in the security sandbox to avoid crashes caused by loading driver conflicts and incomplete uninstallation of drivers.

[0039] The hardware layer of the USB Key device is a USB Key device obtained by the hardware manufacturer after integrating the smart card chip and the storage unit on the integrated circuit board and designing according to the appearance specification of the USB Key device by the State Cryptograp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security-sandbox-based USB key cryptographic algorithm detecting system. The security-sandbox-based USB key cryptographic algorithm detecting system comprises a USB key equipment hardware layer, a USB key equipment driving layer, a cryptographic algorithm interface layer, a cryptographic algorithm detection engine layer and a user interface layer. The USB key equipment hardware layer is used for supplying hardware support to the USB key equipment driving layer. The USB key equipment driving layer is used for supplying driving support to the cryptographic algorithm interface layer. The cryptographic algorithm interface layer is used for implementing a cryptographic algorithm computing function according to a test case. The cryptographic algorithm detection engine layer is used for generating test case data and analyzing computation results. The user interface layer is used for inputting detection parameters, outputting detection results and providing operation tips for a detector. The security-sandbox-based USB key cryptographic algorithm detecting system has the advantages of high stability, robustness and detection degree and the like, and the problems that a traditional detecting system is fixed in test case, long in consumed period and hard to adapt to scene evidence obtaining and crime scene analysis are solved.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a cryptographic algorithm compliance detection system for a smart cryptographic key (USB Key) based on a security sandbox mechanism. Background technique [0002] With the implementation of the Gold Card Project in 1993, the application of the smart password key (USB Key) has gradually moved from exploration to standardization, and has been widely used in the fields of e-government, e-commerce, transportation, public security law enforcement, social security, taxation and health care. used widely. USB Key uses Universal Serial Bus (USB) interface technology, built-in single-chip microcomputer or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and use the built-in cryptographic algorithm of USB Key to realize the encryption of business information and Authentication of user identity. The wide applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/53G06F21/46G06F21/62
Inventor 李建华刘雨辰张爱新朱桦周志洪
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products