Bridge encryption and decryption chip card

An encryption and decryption, chip card technology, which is applied in the field of bridge encryption and decryption chip cards, can solve the problems that storage devices cannot be used as system boot disks, cracked, and easy to crack.

Inactive Publication Date: 2018-05-18
广东微格科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the most common way to protect personal information is to use password protection, but due to problems such as password loss and easy cracking, it is only suitable for information protection with a lower security level.
Another way is to use a hard disk encryption card to hard-encrypt the data in the storage device, but this method has the following problems: one, because the entire storage device is hard-encrypted, the storage device cannot be used as a system boot disk; Only authenticate the legitimacy of the user, once the user password is cracked or the certified USB Key is obtained, the contents of the entire hard disk can be cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bridge encryption and decryption chip card
  • Bridge encryption and decryption chip card
  • Bridge encryption and decryption chip card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described implementation Examples are only some of the embodiments of the present application, but not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application shall fall within the protection scope of this application.

[0022] The specific implementation of the present application will be further described below in conjunction with the drawings of the present application.

[0023] This application provides a bridge encryption and decryption chip system, such as figure 1 As shown, it includes a main board 1 , a bridge encryption and decryption chip card 2 , a memory componen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a bridge type encryption and decryption chip card capable of connecting a main board and a memory module. The bridge type encryption and decryption chip card comprises an authentication module and an encryption and decryption module, wherein the authentication module is used for judging the legitimacy of access requests for different areas of the memory module; the encryption and decryption module is used for encrypting data written into the memory module when the authentication module judges that the access requests are legal, and decrypting the data when the main board reads the data of the memory module. According to the bridge type encryption and decryption chip card, each operation of a user can be authenticated when the user is authenticated, and the memory module can be used as a system boot disk through partition of the areas of the memory module.

Description

technical field [0001] The application relates to the field of computer information security, in particular to a bridge encryption and decryption chip card. Background technique [0002] With the rapid development of information technology, computing equipment has penetrated into all walks of life. While bringing convenience to people's lives, hackers and virus attacks have become the biggest threat to information security. How to ensure the security of personal data has become an urgent problem to be solved. [0003] At present, the most common way to protect personal information is to use password protection, but due to problems such as password loss and easy cracking, it is only suitable for information protection with a lower security level. Another way is to use a hard disk encryption card to hard-encrypt the data in the storage device, but this method has the following problems: one, because the entire storage device is hard-encrypted, the storage device cannot be used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 王景春
Owner 广东微格科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products