Secret key safety protection equipment and working method thereof

A security protection and key technology, applied in the field of information security passwords, can solve problems affecting information security, and achieve the effect of preventing accidental loss and ensuring reliability.

Inactive Publication Date: 2016-03-30
中电科网络安全科技股份有限公司
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the non-volatile memory is illegally stolen or the private key is stolen by illegally logging into the device system, it will seriously affect the security of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key safety protection equipment and working method thereof
  • Secret key safety protection equipment and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The purpose of the present invention is to provide a key security protection device, if any attempt is made to open the machine cover, the private key will be automatically destroyed, thereby preventing the private key from being obtained illegally and ensuring the security of the key.

[0023] Such as figure 1 As shown, the key security protection device of the present invention is composed of a body, a machine cover, a security processor disposed in the body, an encrypted FLASH memory, and a power management unit.

[0024] A key-killing switch is arranged on the machine cover.

[0025] The security processor is bidirectionally connected to the encrypted FLASH memory; the input end of the power management unit is connected to the external power supply and the battery power supply, and the output end is connected to the encrypted FLASH memory.

[0026] The safety processor includes a self-destruction input terminal and a safety password module, and a key destruction pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses secret key safety protection equipment and a working method thereof. The equipment is composed of a machine body, a machine cover, a safety processor arranged in the human body and an encrypted FLASH storer. The safety processor and the encrypted FLASH storer are in both-way connection; the safety processor comprises a self-destroying input end and a safety crypto module containing a physical noise source true random number generator and runs a secret key destroying program; the safety processor detects external uncovering action through the self-destroying input end, once the machine cover is opened, a secret key storage space wiping signal is sent to the encrypted FLASH storer, and a secret key disclosure is prevented. The encrypted FLASH storer is used for storing all the used secret keys and destroying all internal data after the secret key storage space wiping signal is received. By the adoption of the technical scheme of the secret key safety protection equipment and the working method thereof, when the machine cover is attempted to be opened during any period, a private key is destroyed automatically, thereby the private key is prevented from being obtained illegally, and safety of the secret key is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security encryption, and in particular relates to a key security protection device and a working method thereof. Background technique [0002] PKI (Public Key Infrastructure) technology is the core of information security technology and the key and basic technology of e-commerce. The basic technology of PKI includes encryption, digital signature, data integrity mechanism, digital envelope, double digital signature and so on. [0003] The digital signature technology based on public key cryptography is to encrypt the summary information with the sender's private key and send it to the receiver together with the original text. The receiver can only decrypt the encrypted summary information with the sender's public key. [0004] Digital envelope is an application of public key cryptography in practice, which uses encryption technology to ensure that only specified recipients can read the content...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/81G06F21/75G06F21/55
CPCG06F21/78G06F21/75G06F21/81
Inventor 赵银春
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products