Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A high-security encryption and decryption operation ability expansion method and system

A technology of computing capability and expansion method, which is applied in the field of high-security encryption and decryption computing capability expansion methods and systems, and can solve the problems of low security chip encryption and decryption computing capabilities, insufficient security protection capabilities, and inability to effectively expand high-security encryption and decryption computing capabilities, etc. question

Active Publication Date: 2019-01-22
网御安全技术(深圳)有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] That is to say, in the prior art, there is a problem that the encryption and decryption computing capability of the security chip itself is low, and at the same time, the operating environment of the traditional security chip cannot effectively expand the high security encryption and decryption computing capability due to insufficient security protection capabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A high-security encryption and decryption operation ability expansion method and system
  • A high-security encryption and decryption operation ability expansion method and system
  • A high-security encryption and decryption operation ability expansion method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The high-security encryption and decryption computing capability expansion method described in the preferred embodiment of the present invention, such as image 3 As shown, the method for expanding the high-security encryption and decryption computing capability includes the following steps:

[0046] Step S10, the main processor transmits the data to be encrypted and decrypted and the program call of the encryption and decryption operation to the FPGA main controller through the system communication, and the FPGA main controller receives and caches the relevant data.

[0047] Spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a high-security encryption and decryption operation ability expansion method and a system. The method comprises the following steps: a main processor transmits the data to be encrypted and decrypted and the program call of the encryption and decryption operation to a FPGA main controller through system communication; the FPGA main controller receives the relevant data and caches the data; the FPGA main controller decomposes the program call into a series of sub-procedures, and generates the corresponding command call sequence and data packet for the operations involvingthe security chip. The FPGA main controller sends corresponding command calls and related data to a plurality of security chips, and each security chip feeds back the operation results to the FPGA master. The FPGA main controller aggregates the results from all the security chips and sends the final results to the main processor. The FPGA main controller comprises a high-security application program, a micro-kernel operating system and a multi-core CPU. The invention greatly improves the security protection capability against the security chip.

Description

technical field [0001] The invention relates to the technical field of security chips, in particular to a method and system for expanding high-security encryption and decryption computing capabilities. Background technique [0002] A security chip refers to an integrated circuit chip that implements one or more cryptographic algorithms and uses cryptographic techniques directly or indirectly to protect keys and sensitive information. As the bottom-level security guarantee of smart terminals, the application of security chips can effectively prevent hacker attacks and cracks, improve the security of smart terminals, and protect users' personal information and application data security. At present, security chips are increasingly being used in smart terminals to provide reliable protection for financial payment and online identity authentication. The security chip is a trusted platform module. It is a device that can independently generate keys and encrypt and decrypt. It has...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/76
CPCG06F21/76
Inventor 罗禹铭罗禹城
Owner 网御安全技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products