A smart cryptographic key cryptographic algorithm detection system based on a security sandbox mechanism

An intelligent cryptographic key and cryptographic algorithm technology, applied in digital data protection, digital data authentication, platform integrity maintenance, etc., can solve the problems of complex and unclear operation process, cumbersome interaction, difficult to adapt to on-site forensics, on-site analysis, etc. Avoid the effects of loading driver conflicts

Inactive Publication Date: 2017-12-15
SHANGHAI JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the update of the test case database is generally carried out manually, and the update cycle is long
[0008] 2) The call interface is encapsulated, with low transparency
The traditional USB Key cryptographic algorithm detection platform only calls the interface provided by the manufacturer. This type of interface has been compiled into a dynamic or static link library by the manufacturer, and the internal implementation is opaque. The manufacturer may modify its interface to avoid the normal process of testing
[0009] 3) The test sample is small and does not meet the specifications of the State Cryptography Administration
Most of the existing test platforms are released earlier than the specification and cannot meet the standard
[0010] 4) The interface is simple and the operation is cumbersome
Most of the traditional USB Key cryptographic algorithm detection platforms use Microsoft Foundation Classes (MFC), or even only interactive consoles, with simple or no interface, poor sense of the times, cumbersome interaction, and complicated and unclear operation procedures. Difficulty in using
[0011] In view of the above-mentioned problems that the traditional smart password key takes a long time and is difficult to adapt to on-site evidence collection and on-site analysis, the smart password key cryptographic algorithm detection system based on the security sandbox mechanism developed by the present invention can quickly discover the cryptographic algorithm used by the smart password key, and On-site evidence collection, suitable for grassroots management departments to carry out on-site law enforcement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A smart cryptographic key cryptographic algorithm detection system based on a security sandbox mechanism
  • A smart cryptographic key cryptographic algorithm detection system based on a security sandbox mechanism
  • A smart cryptographic key cryptographic algorithm detection system based on a security sandbox mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] The present invention adopts a hierarchical module design, which includes: USB Key device hardware layer, USB Key device driver layer, cryptographic algorithm interface layer, cryptographic algorithm detection engine layer and user interface layer from bottom to top. In addition, the present invention also includes some pre-placed test cases for backup in special cases. All other layers except the USB Key device hardware layer are pre-placed in the security sandbox to avoid crashes caused by loading driver conflicts and incomplete uninstallation of drivers.

[0039] The hardware layer of the USB Key device is a USB Key device obtained by the hardware manufacturer after integrating the smart card chip and the storage unit on the integrated circuit board and designing according to the appearance specification of the USB Key device by the State Cryptograp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent cryptographic key cryptographic algorithm detection system based on a security sandbox mechanism, which includes a USB Key device hardware layer, a USB Key device driver layer, a cryptographic algorithm interface layer, a cryptographic algorithm detection engine layer, and a user interface layer. The USB Key device hardware layer is used to provide hardware support for the USB Key device driver layer; the USB Key device driver layer provides driver support for the cryptographic algorithm interface layer; the cryptographic algorithm interface layer is used to complete the cryptographic algorithm calculation function according to the test case; The cryptographic algorithm detection engine layer is used to generate test case data and analyze calculation results; the user interface layer is used to provide the detection party with input detection parameters, output detection results and operation prompts. The invention overcomes the problems of fixed test cases, long consuming period and difficulty in adapting to on-site evidence collection and on-site analysis in traditional detection and testing, and has the advantages of high stability, strong robustness, strong detection strength and the like.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a cryptographic algorithm compliance detection system for a smart cryptographic key (USB Key) based on a security sandbox mechanism. Background technique [0002] With the implementation of the Gold Card Project in 1993, the application of the smart password key (USB Key) has gradually moved from exploration to standardization, and has been widely used in the fields of e-government, e-commerce, transportation, public security law enforcement, social security, taxation and health care. used widely. USB Key uses Universal Serial Bus (USB) interface technology, built-in single-chip microcomputer or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and use the built-in cryptographic algorithm of USB Key to realize the encryption of business information and Authentication of user identity. The wide applic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53G06F21/46G06F21/62
Inventor 李建华刘雨辰张爱新朱桦周志洪
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products