Unlock instant, AI-driven research and patent intelligence for your innovation.

Random detection security method and device

A security device and security technology, applied in random number generators, internal/peripheral computer component protection, instruments, etc., can solve problems such as attacking equipment, cracking, stealing sensitive information, etc., to avoid attacks and damage.

Inactive Publication Date: 2018-11-23
福建超瑞创原信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to technical defects or power consumption limitations, some common security devices are detected according to one or several fixed detection devices, and only one order is used to detect peripheral attacks
With the development of technology, there are more and more attack methods. If the detection method is relatively single, it is easy to be directly cracked by the attacker, and the serialization of multiple detection methods may produce periodicity, so that the attacker can find the Attack your device in a time gap way, when the device or a certain detection method is in a resting state or stopped, attack the device and steal sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random detection security method and device
  • Random detection security method and device
  • Random detection security method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0022] see figure 1 , is a flow chart of a security method for random detection in the present invention, including the following steps, S100 presets the work sequence loop of the detection work, S102 generates a random number through a random number generator, and determines the first detection work to be performed according to the generated random number , S104 executes the detection work sequentially according to the arrangement on the sequence ring, until all the detection work is completely executed. The detection work here is the detection of the security state of the chip, such as figure 2 As shown in , the detection job includes the following patterns:

[0023] Current detection is to judge the attack state by comparing whe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a random detection security method and a device. The random detection security method comprises the following steps of: presetting a working sequence loop of detection work ,generating a random number through a random number generator, determining the first execution detection work according to the generated random number, and executing the detection work in sequence onthe sequence ring until all detection work is completed. According to the random detection security method and device, the problem that the security monitoring of the fixed mode is broken through illegal attacks can be prevented.

Description

technical field [0001] The invention relates to a method and device for protecting safety equipment with multiple detection processes and relatively random detection. Background technique [0002] Today, the role in daily transactions is becoming more and more important. POS machines or other financial devices and electronic devices store confidential information of countless people. Due to technical defects or power consumption limitations, some common security devices are detected by one or several fixed detection devices, and detect peripheral attacks only in one order. With the development of technology, there are more and more attack methods. If the detection method is relatively single, it is easy to be directly cracked by the attacker, and the serialization of multiple detection methods may produce periodicity, so that the attacker can find the When the device or a certain detection method is in a resting state or stopped, attack the device and steal sensitive inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/71G06F21/55G06F7/58
CPCG06F7/588G06F21/55G06F21/71
Inventor 熊卫明王法翔汪孝晃熊良勇
Owner 福建超瑞创原信息技术有限公司