System and method for resisting physical attacks of printer

A physical attack and printer technology, applied in the field of information security, can solve problems such as data leakage, low security, illegal memory and interface data, etc., and achieve the effects of reducing performance impact, comprehensive protection range, and improving encryption efficiency

Active Publication Date: 2018-04-13
XIDIAN UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 3. Modify the bus information: the attacker modifies the data on the bus, causing illegal data in the memory and interface, and destroying the normal operation of the printer
[0007] 4. Replay data: The attacker intercepts legitimate bus data and rewrites the intercepted bus data to the bus at the moment of attack. This will not only increase the workload of the printer, but more importantly, affect the workflow of the printer. May cause data leakage before
[0008] The interface security protection method in the printer system, for example, the application publication number is CN101795271A, and the patent application titled "Network Security Printing System and Printing Method" discloses a network security printing system and printing method. The invention consists of a network printing driver, The embedded firewall platform and the client driver are composed of three parts. The embedded firewall platform is mainly used for data decryption. This method ensures the security of data transmission on the network. However, since the embedded firewall platform and the printer directly use plaintext data transmission, Therefore, the data security from the embedded firewall platform to the printer cannot be guaranteed, causing hidden dangers to the printer system and data security
[0009] The storage security protection method in the printer system, for example, TSLehman et al published a paper titled "PoisonIvy: Safespeculation for secure memory" (2016:1-13) at the conference "IEEE / ACM International Symposium on Microarchitecture". In terms of protection, the current memory protection scheme that widely uses master-slave counters is used. Its structure adopts a similar segment page management method. One master counter in a storage page corresponds to multiple block counters. When the counter overflows, only the The re-encryption of storage blocks, which greatly reduces the amount of re-encrypted data, but still requires re-encryption of multiple storage blocks in a storage page, the delay is also high, and because of its fixed structure, it will cause Large storage resource overhead; for example, the application publication number is CN102629236A, and the patent application titled "Memory Protection Method Based on Unequal Length Counters" discloses a memory protection method based on unequal length counters. The method is based on memory access The frequency is used to dynamically adjust the length of the counter. Although a longer counter can reduce overflow, re-encryption of data in the hot zone will cause a large delay when overflow occurs, and the migration of data pages between the hot zone and the non-hot zone will also be delayed. The process of re-encryption will cause some overhead
[0010] To sum up, the current existing technology can only achieve separate protection for interfaces or storage, and cannot monitor and warn of physical attacks, resulting in low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for resisting physical attacks of printer
  • System and method for resisting physical attacks of printer
  • System and method for resisting physical attacks of printer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0069] refer to figure 1 , a system that resists physical attacks on printers, including a main control module, an interface security module, a storage security module, a behavioral security module, and a security and trustworthy module. By using the hard isolation architecture of TrustZone technology, the system environment is divided into common execution environment and There are two parts of the trusted execution environment. In the common execution environment, process control functions are mainly performed, while sensitive data is processed and run in the trusted execution environment. figure 2 As shown, the general execution environment application layer includes the main control module of the printing system, and the trusted execution environment application layer includes the security and trust module, the storage security mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and method for resisting physical attacks of a printer. By encrypting and verifying plaintext data of a printer storage and an interface and monitoring behaviors of theprinter in real time to achieve early warning on the potential attack behaviors, the purpose of improving the security of the printer is achieved; a main control module achieves a security protectionfunction on the printer storage through a storage security module, achieves a security protection function on the interface through an interface security module and conducts monitoring and early warning on the physical attacks through a behavior security module; and a security trusted module is used for managing encryption keys, decryption keys and verification values which are used in the storage security module and the interface security module and conducting encryption, decryption and integrity verification on used data. According to the system and method, the physical attacks such as tapping, counterfeiting and resetting for the interface and the storage of the printer system are effectively resisted, the security of the printer is improved, the encryption efficiency of the printer storage is high, and the system and method can be applied to the printer system requiring high confidentiality.

Description

technical field [0001] The invention belongs to the field of information security, and relates to a system and method for resisting physical attacks of printers, which are used for printer systems with high confidentiality requirements. Background technique [0002] As one of the most widely used office equipment, printers provide people with great convenience. However, printers, as the source of important data output, can easily cause information leakage and virus infection. Security incidents due to printer vulnerabilities continue to occur. Printer devices Resources are limited, and traditional security protocols cannot be directly applied to them; and many devices are deployed in an open environment, and attackers have enough time and ability to launch physical attacks on them, causing key data in the system to be stolen or tampered with, and physical attacks can bypass protection software and are therefore more difficult to defend against. [0003] The physical attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N1/00H04N1/44H04L29/06
CPCH04L63/0428H04L63/123H04L63/1416H04N1/00233H04N1/4486
Inventor 王泉杨鹏飞米鑫
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products