Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Object-oriented security chip and encryption method thereof

A security chip, object-oriented technology, applied in the field of information security, can solve the problems of low communication efficiency and concurrent processing capability, weak security communication flexibility, and difficulty in adapting to the business application environment of the information collection system.

Active Publication Date: 2017-07-21
CHINA ELECTRIC POWER RES INST +1
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing security chips use 7816 communication interface or single-channel serial peripheral communication interface SPI (Serial Peripheral Interface), the communication efficiency and concurrent processing capability are relatively low, and the security communication flexibility is relatively weak, which cannot meet the security requirements of object-oriented protocols. Transmission requirements, it is difficult to adapt to the complex business application environment of the current information collection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object-oriented security chip and encryption method thereof
  • Object-oriented security chip and encryption method thereof
  • Object-oriented security chip and encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0044] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an object-oriented security chip and an encryption method thereof. The security chip comprises a central processing unit (CPU), a symmetric cryptographic algorithm unit, an asymmetric cryptographic algorithm unit, a communication unit, a security protection unit, a data storage unit, an interruption source and a timer / counter, wherein the CPU is used for coordinating other functional modules in the security chip to ensure the normal operation; the symmetric cryptographic algorithm unit is used for implementing encryption and decryption operations on the data by adopting a national secret symmetric cryptographic algorithm; the asymmetric cryptographic algorithm unit is used for achieving signing and signature verification of digital certificates and calculating message abstracts and key negotiations between two communication parties by adopting a national secret asymmetric cryptographic algorithm; the communication unit is used for performing data communication; the security protection unit is used for guaranteeing the normal operation of the security chip; the data storage unit is used for storing keys; the interruption source is used for initiating an event interruption request to the CPU; and the timer / counter is used for counting and timing during the operation of the security chip. The encryption method of the security chip comprises the following steps: separately establishing a transmission layer security link and an application layer security link, and achieving the secure transmission of the information by adopting a transmission layer and application layer dual-layer protection mechanism.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, relates to an object-oriented security chip and an encryption method thereof. Background technique [0002] At present, various information collection systems have a higher degree of information integration and integration, stronger system dependence, richer and more frequent real-time interactions between business systems and between business systems and external users, and a large number of terminals connected to the system. The access methods and access environment of terminal equipment are relatively complex, and the amount of concurrency is relatively large, resulting in an increasingly complex operating environment and increasing information security threats from the public network. As an important medium for protecting terminal information security, security chips play an irreplaceable role in identification, security isolation, information encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0838H04L9/3247H04L9/3263H04L63/045H04L63/06H04L63/08H04L63/0823
Inventor 梁晓兵翟峰岑炜赵兵刘鹰吕英杰李保丰付义伦曹永峰许斌孔令达徐文静冯占成任博张庚杨全萍周琪袁泉卢艳韩文博李丽丽
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products