Safety device and anti-attack method thereof thereof

A security device and anti-attack technology, which is applied in the field of information security, can solve problems such as poor protection performance, and achieve good anti-attack, protection ability, good security, and good information security.

Pending Publication Date: 2019-01-15
NATIONZ TECH INC
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a security device and its anti-attack method to solve the problem that the existing security device uses an anti-attack strategy set based on a single attack mode to resist external attacks, resulting in poor protection performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety device and anti-attack method thereof thereof
  • Safety device and anti-attack method thereof thereof
  • Safety device and anti-attack method thereof thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051]The security device anti-attack method provided in this embodiment first sets the corresponding relationship between the comprehensive attack strength threshold and the anti-attack strategy in advance. During the setting, different levels of anti-attack strategies can be set for different comprehensive attack strength thresholds, that is, different comprehensive attack strengths. . Then at least two detection items of the security equipment are monitored respectively to obtain the current number of attacks on each detection item; determine the current comprehensive attack strength value of the security equipment according to the current number of attacks on each detection item detected; and then according to the current comprehensive The attack strength value and the preset comprehensive attack strength threshold correspond to the anti-attack strategy, select the anti-attack strategy that matches the current comprehensive attack strength value as the target anti-attack st...

no. 2 example

[0077] This embodiment provides a security device, see Figure 4 shown, including:

[0078] The monitoring module 41 is configured to monitor at least two detection items of the safety equipment respectively.

[0079] A detection item of a security device may correspond to one type of attack, or may correspond to multiple types of attack. When the at least two detection items of the safety equipment are monitored separately, the safety equipment may be monitored in real time, or may be monitored according to a preset time rule.

[0080] It should be understood that in this embodiment, all detection items of the security device (that is, all items that may be attacked) may be monitored, and at least two of the detection items of the security device may be selectively monitored. Specific testing items can be flexibly set according to actual needs. For example, one of the implementation methods can detect all detection items, and set the corresponding weight value of each dete...

no. 3 example

[0102] In order to better understand the present invention, this embodiment is described in conjunction with a specific security device structure as an example.

[0103] see Image 6 As shown, the monitoring module 61 of the security device in this embodiment includes n monitoring units, namely monitoring unit 1...monitoring unit n; the statistical module 62 includes n counting units, namely counting unit 1...counting unit n; The weighted calculation unit of the processing module 63 comprises n weighting units, i.e. weighting unit 1 ... weighting unit n; its integrated processing unit comprises n primary judging units, i.e. primary judging unit 1 ... primary judging unit n, also includes a comprehensive Calculation unit; matching module 64 and execution module 65 have m anti-attack strategies, namely, anti-attack strategy 1 . . . anti-attack strategy m. The value of n in this embodiment can be determined according to the actual number of items detected by the security device;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safety device and an anti-attack method thereof. Firstly, a corresponding relationship between a comprehensive attack strength threshold and an anti-attack strategy is preset,and anti-attack strategies of different grades can be correspondingly set according to different comprehensive attack strength thresholds. Then at least two kinds of detection items of the safety equipment are monitored respectively to obtain the current attack times of each detection item. A comprehensive attack strength value of a security device currently attacked is determined according to the detected current attacked times of each detection item; Then, according to the relationship between the current comprehensive attack strength value and the preset comprehensive attack strength threshold and the anti-attack strategy, the anti-attack strategy matching the current comprehensive attack strength value is selected as the target anti-attack strategy, and the target anti-attack strategyis adopted to protect the security equipment. Thus, the invention can synthesize the attack strength of the current multiple attacks on the security device and call out the corresponding level anti-attack strategy to protect the security device, thereby better protecting the information security of the user.

Description

technical field [0001] The invention relates to the field of information security, in particular to a security device and an anti-attack method thereof. Background technique [0002] With the development of electronic information technology, more and more cryptographic security chips, embedded software and their security devices have been applied in fields such as finance, government affairs, and tax control. Since these security devices contain sensitive information or information related to user accounts, permissions, funds, etc., and are easily exposed to attackers, they have become vulnerable targets. In order to achieve their goals, attackers usually use a variety of attack methods, such as side channel attacks, fault injection attacks, software logic attacks, and physical intrusion attacks; taking fault injection attacks as an example, attackers usually have voltage manipulation, electromagnetic injection attacks, etc. , laser attack and many other attack implementati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 王宇建陈少伟
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products