Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for securely burning key

A key and security technology, applied in the field of encryption, can solve problems such as hidden security risks in keys, and achieve the effect of improving security and reducing the possibility of illegal or malicious data attacks

Active Publication Date: 2018-01-12
FUZHOU ROCKCHIP SEMICON
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the second smart key device does not generate a key factor for the key data in a safe environment, so there is still a security risk in the generation of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for securely burning key
  • Method and device for securely burning key
  • Method and device for securely burning key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] see figure 1 , is a schematic structural diagram of the first embodiment of the device of the present invention. In the first embodiment, a device for safely burning keys according to the present invention includes a device terminal 1,

[0052] The device end 1 includes a key generation module 10 and a key storage module 11;

[0053] The key generation module 10 is connected to the key storage module 11;

[0054] The key generation module 10 generates a random key according to an external instruction from the device terminal 1 in a safe environment;

[0055] The device end 1 burns the random key in a secure environment into the key storage module 11; the key storage module 11 is only allowed to be written once and is only visible to applications or services in a secure environment hardware.

[0056] see figure 2 , is a schematic structural diagram of the second embodiment of the device of the present invention. In the second embodiment, a device for safely burning ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a device for securely burning a key. The device comprises a device side, wherein the device side comprises a key generation module and a key storage module. The key generation module and the key storage module are connected. The key generation module generates a random key according to an instruction transmitted from the exterior of the device side in a secure environment. The device side burns the random key in the secure environment to the key storage module. The key storage module is the hardware which is only allowed to be written once and is only visible to an application or service in the secure environment. The invention also provides a method for securely burning the key. The key burning security is improved, the probability of receiving illegal or maliciousdata is reduced, and the key access security is improved.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a method and device for securely burning keys. Background technique [0002] Nowadays, more and more functions on mobile devices require random keys to ensure data security. How to ensure the safety of random key burning and storage is very important. Most of the existing methods are to generate a random key through a PC-side burning program, and then transmit the random key to the device through a wired or wireless method. After the device-side program receives the key, it writes it into a fixed location on the storage medium. Since the random key is transmitted in a non-secure environment, it is easy to be intercepted and tampered with; the client burning program may also be maliciously modified, resulting in the transmission of illegal or malicious data to the device. [0003] A "method and device for setting dynamic token key factors" is disclosed in the prior art, see th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 张昊
Owner FUZHOU ROCKCHIP SEMICON