Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity recognition method and system based on a national cryptographic algorithm

A national secret algorithm and identification technology, applied in the field of identification methods and systems based on the national secret algorithm, can solve the problems of low security protection level and low user experience.

Active Publication Date: 2019-04-05
上海芯钛信息科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an identity recognition method and system based on a national secret algorithm, which is used to overcome the defects of low security protection level and low user experience in the prior art, and improve the security protection level and user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity recognition method and system based on a national cryptographic algorithm
  • An identity recognition method and system based on a national cryptographic algorithm
  • An identity recognition method and system based on a national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Please refer to Figure 1 to Figure 3 , the present invention provides a kind of identification method based on national secret algorithm, comprises the following steps:

[0031] Step 1, transmit program and store data through debug interface 1, described store data comprises public key, private key and signature, and described program comprises main program; Debug interface 1 is JTAG communication interface for example;

[0032] Step 2, the hash of the public key is stored in the OTP module 3 after being encrypted by the national secret algorithm, and the private key and signature, and other keys are stored in the eFLASH module 4 together with the main program after being encrypted by the national secret algorithm;

[0033] National secret algorithms such as SM2, SM3, SM4, etc. The public key and private key can choose different specific algorithms according to the system configuration;

[0034] In a preferred embodiment of the present invention, the public key in ste...

Embodiment 2

[0061] see figure 1 , Figure 4 , the embodiment of the present invention is also an identity recognition system based on a national secret algorithm, including a chip, and the chip is internally integrated with: a debugging interface 1, a national secret module 2, an otp module 3, and an eflash module 4, wherein:

[0062] The debugging interface 1 is used to access the otp module and the eflash module according to the control instructions of the control logic module;

[0063] The national secret module 2 is used to encrypt and decrypt the data through the debugging interface;

[0064] The otp module 3 is used to store the public key hash encrypted by the national secret module, control related data and other manufacturer information, etc.;

[0065] The eflash module 4 is used to store the main program and the public key encrypted by the national secret module, related function keys, private keys and signatures;

[0066] The control process is to execute some initialization...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity recognition method and system based on a national cryptographic algorithm, and the method comprises the steps: transmitting a program and storage data through a debugging interface, the storage data comprising a public key, a private key, a program, a signature, and the like, and the program comprising a main program; Public key Hash is encrypted through a national cryptographic algorithm and then stored in an OTP module, and a private key, a signature and the like are encrypted through the national cryptographic algorithm and then stored in an eFLASH moduletogether with a main program. Comparing a public key hash of the OTP module with a result obtained by performing hash operation on a public key in the eFLASH module to verify the public key, and considering that the public key is legal when the comparison result is consistent; When the public key is legal, the private key is compared with the signature according to the sequence obtained by executing the main program to verify the private key, and when the comparison result is consistent, it is considered that the private key is legal and passes through the signature. According to the scheme,the problems of low security level and the like in the prior art are solved, and the security level is improved through multi-level encryption.

Description

technical field [0001] The invention relates to the technical field of vehicle system identification, in particular to an identification method and system based on a national secret algorithm. Background technique [0002] With the development of the economy and the improvement of the quality of life, vehicles have become daily necessities for families. The improvement of consumption power is also driving the pursuit of vehicle performance. Consumers will also have higher requirements in terms of safety for high-performance vehicles bought at high prices. [0003] In the existing vehicle-mounted system, the identification technology generally adopts cryptographic technology (especially public-key cryptographic technology) to design a high-security protocol. The working mode is generally a password mode and a marking mode. The password formula is easy to remember, difficult to guess, and difficult to analyze. Password management is solved by a single function, that is, no ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/34
CPCG06F21/31G06F21/34
Inventor 李佐高攀蒋晓倩冯华李澜涛林宗芳钟伟熊民权赵宗盛
Owner 上海芯钛信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products