Unlock instant, AI-driven research and patent intelligence for your innovation.

Mainboard hardware and upper software encryption-decryption and recognition method based on single-chip microcomputer

An identification method and single-chip technology, applied in computer security devices, instruments, digital data authentication, etc., can solve the problems of hardware change, attack or even destruction, and inability to know whether the remote hardware is trustworthy, and achieve the effect of improving security performance.

Inactive Publication Date: 2018-11-16
深圳市中微信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the design of hardware circuits, discrete components (resistors and capacitors, etc.) cannot be accessed by programs, so in the process of remote communication and interaction, local programs cannot know whether the remote hardware is trustworthy, and hardware changes, attacks or even Destruction is beyond comprehension

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mainboard hardware and upper software encryption-decryption and recognition method based on single-chip microcomputer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0020] see figure 1 , a kind of encryption and decryption and identification method based on the motherboard hardware of the single-chip microcomputer and the upper-layer software provided by the present embodiment, the method is used to judge the credibility of the remote hardware, so as to access the host computer, it includes the following steps:

[0021] 1) Formulate an encryption and decryption algorithm between the main board of the master and the remote hardware of the slave;

[0022] 2) Encrypt the hardware information of the motherboard through an encryption algorithm, and store the encrypted hardware information in the local carrier;

[0023] The hardware information includes various parameters and descriptions of the current hardware. During the verification process, it is necessary to ensure that this part of the hardware information is not tampered with;

[0024] 3) Transmit encrypted motherboard hardware information to remote hardware;

[0025] 4) The remote ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mainboard hardware and upper software encryption-decryption and recognition method based on a single-chip microcomputer, which is used for judging the credibility of remote hardware to access a host. The method comprises the following steps of 1) formulating encryption and decryption algorithms between a mainboard of the host and the remote hardware of a slave; 2) encrypting hardware information of the mainboard through the encryption algorithm, and storing the encrypted hardware information in a local carrier; 3) transmitting the encrypted hardware information of themainboard to the remote hardware; 4) receiving the encrypted hardware information of the mainboard by the remote hardware, decrypting the hardware information through the decryption algorithm, and transmitting decrypted data to the host; and 5) performing comparison and verification on the decrypted data transmitted by the remote hardware and stored data by the host, and judging the credibility of the remote hardware through a verification result. According to the method, the encryption and decryption algorithms are formulated between the host and the slave, and through the transmission and verification of the algorithms, the reliability of the remote hardware is judged, so that the security performance of the host is greatly improved.

Description

technical field [0001] The invention relates to the technical field of electronic circuits, in particular to an encryption, decryption and identification method for motherboard hardware and upper-layer software based on a single-chip microcomputer. Background technique [0002] In the design of hardware circuits, discrete components (resistors and capacitors, etc.) cannot be accessed by programs, so in the process of remote communication and interaction, local programs cannot know whether the remote hardware is trustworthy, and hardware changes, attacks or even Destruction is impossible to understand. At this time, a carrier that is responsible for storing the current hardware information locally is needed, and this information is stored and transmitted in an encrypted manner. Contents of the invention [0003] The purpose of the present invention is to overcome the deficiencies of the prior art, and provide a method for encryption, decryption and identification based on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/57
CPCG06F21/445G06F21/57
Inventor 汪永安
Owner 深圳市中微信息技术有限公司