Mainboard hardware and upper software encryption-decryption and recognition method based on single-chip microcomputer
An identification method and single-chip technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of hardware change, attack or even destruction, and inability to know whether the remote hardware is trustworthy, and achieve the effect of improving security performance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0020] see figure 1 , a kind of encryption and decryption and identification method based on the motherboard hardware of the single-chip microcomputer and the upper-layer software provided by the present embodiment, the method is used to judge the credibility of the remote hardware, so as to access the host computer, it includes the following steps:
[0021] 1) Formulate an encryption and decryption algorithm between the main board of the master and the remote hardware of the slave;
[0022] 2) Encrypt the hardware information of the motherboard through an encryption algorithm, and store the encrypted hardware information in the local carrier;
[0023] The hardware information includes various parameters and descriptions of the current hardware. During the verification process, it is necessary to ensure that this part of the hardware information is not tampered with;
[0024] 3) Transmit encrypted motherboard hardware information to remote hardware;
[0025] 4) The remote ha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
