Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key-destroying circuit structure

A circuit structure and key destruction technology, applied in the field of security encryption, can solve the problems of ineffective protection measures and information security, and achieve the effect of solving key destruction and ensuring security.

Pending Publication Date: 2018-11-23
TAIZHOU YUNYONG ELECTRONICS
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the general device private key is stored in non-volatile memory, but there is no effective protection measure, once it is illegally stolen, it will cause serious information security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key-destroying circuit structure
  • Key-destroying circuit structure
  • Key-destroying circuit structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as figure 1 As shown, a key destroying circuit structure is mainly used in information security equipment. The chassis of the information security equipment is a 1U standard structure with a square shape, which is used to prevent the key stored in it from being illegally stolen. Including PCB substrate, said PCB substrate is installed in the case of information security equipment, said PCB substrate is equipped with 4 micro switches (U34, U35, U33, U87), battery holder J8, button battery and storage key Module U26.

[0023] The model of the button battery is CR2032, the voltage is 3.3V, it is directly installed on the battery holder J8, and is used to provide working power for the storage key module U26. Specifically: the button battery is connected to the pin 3 of the micro switch U87 through the current limiting resistor R141 through the pin 1 of the battery holder J8, the pin 2 of the micro switch U87 is connected to the pin 3 of the micro switch U33, and the m...

Embodiment 2

[0026] In the first embodiment above, four micro switches (U34, U35, U33, U87) are used to automatically detect whether there is an external action of opening the cover. Once an action of opening the cover is detected, the storage key module U26 is triggered to destroy the key. However, the machine cover is generally tightly installed on the chassis with screws, so that if an outsider needs to open the cover, all the screws must be unscrewed before the machine cover can be opened. In this way, the key cannot be destroyed quickly. It is also inconvenient and needs to be equipped with corresponding tools. Therefore, the technical solution of the first embodiment above is optimized so that the operator can quickly and conveniently destroy the key. Such as figure 2 As shown, the difference from the first embodiment above is that the present invention also includes a self-locking push-button key-killing switch S1, the model of which is TS-22A, and the self-locking push-button key...

Embodiment 3

[0028] Although the technical solution of the above-mentioned embodiment 2 can realize active, fast and convenient destruction of keys, since the self-locking push-button key destroying switch S1 is installed on the chassis, it is easy for external operators to accidentally misuse the self-locking push-button destroying key Switch S1, for example, if you accidentally touch the self-locking key-type destroying switch S1, the storage key module U26 will also destroy the key immediately, that is, there is a technical problem that the key is destroyed due to misoperation. In order to solve this problem, this embodiment three has carried out technical optimization on the basis of the technical solution of embodiment two, such as image 3 As shown, that is, a large capacitance storage charge C311 is provided between the self-locking push-button key destroying switch S1 and the storage key module U26 circuit. That is, the pin 2 of the self-locking push-button key destroying switch S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key-destroying circuit structure which comprises a PCB mounted in a housing; wherein the PCB substrate is provided with a microswitch, a battery base, a battery and a secretkey storage module. The battery is installed on the battery base and used for providing a working power source to the secret key storage module, the secret key storage module is used for storing secret key information; and the input end of the microswitch is connected with a machine cover and is used for detecting the action of an external cover opening. Once the machine cover is opened, the microswitch is immediately triggered and disconnected. After the microswitch is disconnected, the battery is automatically triggered to stop supplying a working power source to the secret key storage module, and the secret key information is lost after the secret key storage module is powered off, so that the secret key is destroyed.

Description

technical field [0001] The invention belongs to the technical field of security ciphers, in particular to a circuit structure for destroying keys. Background technique [0002] Key management refers to the security and confidentiality management implemented for the whole process of the life cycle of the key used. In modern cryptography research, encryption and decryption algorithms are generally public. When the encryption algorithm is determined, the degree of secrecy of the cryptosystem depends entirely on the degree of secrecy of the key. Therefore, key management is an important aspect of data encryption and decryption technology. One link, which occupies an important position in the entire security system. If the key is not properly protected and managed, no matter how sophisticated and complex the algorithm design is, the security system is also fragile. The purpose of key management is to ensure the security of the key. Security, that is, the authenticity and validit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0894
Inventor 颜环宇高渊姜金良刘杨范迎迎
Owner TAIZHOU YUNYONG ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products