Unlock instant, AI-driven research and patent intelligence for your innovation.

A data processing method and security chip device

A data processing and security chip technology, applied in the direction of internal/peripheral computer component protection, etc., can solve problems such as security needs to be improved, and achieve the effect of increasing difficulty and improving security

Active Publication Date: 2019-01-15
LENOVO (BEIJING) LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] It can be seen that the security chip device in the prior art is easy to be cracked by the energy attack method, so the security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and security chip device
  • A data processing method and security chip device
  • A data processing method and security chip device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0066] First of all, it should be explained that the data processing method of the present invention is applied to a security chip device. The security chip device refers to a device with a security chip inside. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data processing method and a security chip apparatus. The method comprises the steps of obtaining a running instruction for a first password algorithm module; in response to the running instruction, starting the first password algorithm module at a first moment to execute the running instruction; starting a second password algorithm module at a second moment to execute a preset calculation instruction, wherein a difference value of the first moment and the second moment is less than a first preset threshold; judging whether the first password algorithm module completely executes the running instruction or not, and obtaining a first calculation result and a first judgment result; when the first judgment result represents that the first password algorithm module completely executes the running instruction, outputting the first calculation result and stopping the calculation process of the second password algorithm module. With the adoption of the method or apparatus, the security of the security chip apparatus can be improved.

Description

technical field [0001] The invention relates to the security field, in particular to a data processing method and a security chip device. Background technique [0002] At present, security chip devices with cryptographic algorithms have been widely used in many fields such as banking, telecommunications, finance, securities, military industry, and government. [0003] For example, a USB Key is a security chip device with a cryptographic algorithm. It is a hardware device with a USB interface. It has a built-in single-chip microcomputer or smart card chip, and has a certain storage space, which can store the user's private key and digital certificate, and use the built-in public key algorithm of the USB Key to realize the authentication of the user's identity. Since the user's private key is stored in the password lock, theoretically it cannot be read by any means, thus ensuring the security of user authentication. [0004] However, in the prior art, there is a method to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/71
Inventor 毛兴中
Owner LENOVO (BEIJING) LTD