Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security encryption method, encryption machine and terminal device

A technology of security encryption and encryption machine, applied in the field of information security, can solve the problems of high equipment, unable to meet the requirements of software development and operation and maintenance management, etc., and achieve the effect of satisfying stability, strong security encryption function, and ensuring security

Active Publication Date: 2018-10-09
PAX COMP TECH SHENZHEN
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides a secure encryption method, encryption machine and terminal equipment to solve the problems in the prior art that cannot meet the higher requirements of software development and operation and maintenance management and the higher stability and security of equipment work. issues of sex and reliability requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security encryption method, encryption machine and terminal device
  • Security encryption method, encryption machine and terminal device
  • Security encryption method, encryption machine and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In the following description, for the purpose of illustration rather than limitation, specific details such as a specific system structure and technology are proposed for a thorough understanding of the embodiments of the present invention. However, it should be clear to those skilled in the art that the present invention can also be implemented in other embodiments without these specific details. In other cases, detailed descriptions of well-known systems, devices, circuits, and methods are omitted to avoid unnecessary details from obstructing the description of the present invention.

[0046] In order to illustrate the technical solution of the present invention, specific embodiments are used for description below.

[0047] See figure 1 , Is a schematic diagram of the implementation process of the encryption machine firmware security detection method provided by the embodiment of the present invention. The method is applied to an encryption machine. The encryption machine ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is applicable to the technical field of information security, and provides a security encryption method, an encryption machine, and a terminal device. The security encryption method is applied to the encryption machine, and the encryption machine comprises a security processor CPU, a sensor, a battery backup area BBL Area, and a rigger circuit. The security encryption methodcomprises an encryption machine firmware security detection method. The encryption machine firmware security detection method comprises: detecting the internal and external condition of the security processor CPU by using the sensor; if the abnormality is detected, issuing an early warning signal; and directly notifying or through the trigger circuit, notifying the BBL Area of the early warning signal so as to destroy the content of the backup area. The security encryption method further comprises: a software secure startup method and a key secure storage method. According to the technical scheme of the present invention, low-cost hardware and structure design is realized, and the machine purchase cost is saved; and a hierarchical software model is provided, a secure startup control mode is provided, and full-cycle key security management is realized.

Description

Technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security encryption method, encryption machine and terminal equipment. Background technique [0002] With the continuous development of information technology and the prevalence of the Internet, more and more data needs to be transmitted on the network, including interactive information, emails, identity information, transaction information, and business data. However, at present, illegal activities such as illegal monitoring, stealing, and tampering of data are increasing, so the security of data is getting more and more attention. [0003] The use of cryptographic algorithms to encrypt data before transmission is an effective means to ensure data security and data integrity. Therefore, many IT manufacturers have developed many encryption devices or encryption software. The encryption device or software generates encryption keys to achieve Encrypt plaintext ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72
CPCG06F21/72
Inventor 李坚强郑任持刘绍海
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products