An identity recognition method and system based on a national cryptographic algorithm

A national secret algorithm and identification technology, applied in the field of identification methods and systems based on the national secret algorithm, can solve the problems of low security protection level and low user experience.

Active Publication Date: 2019-04-05
上海芯钛信息科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an identity recognition method and system based on a national secret algorithm, which is used to overcome th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity recognition method and system based on a national cryptographic algorithm
  • An identity recognition method and system based on a national cryptographic algorithm
  • An identity recognition method and system based on a national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] Example one

[0030] Please refer to Figure 1 to Figure 3 , The present invention provides an identity recognition method based on the national secret algorithm, which includes the following steps:

[0031] Step 1. Transmit the program and store data via the debug interface 1. The stored data includes a public key, a private key and a signature. The program includes a main program; the debug interface 1 is, for example, a JTAG communication interface;

[0032] Step 2: The hash of the public key is encrypted by the national secret algorithm and stored in the OTP module 3. The private key, signature, and other keys are encrypted by the national secret algorithm and stored in the eFLASH module 4 together with the main program;

[0033] National secret algorithms such as SM2, SM3, SM4, etc. The public key and private key can be selected according to the system configuration.

[0034] In a preferred embodiment of the present invention, the public key in the step 2 is encrypted and d...

Example Embodiment

[0060] Example two

[0061] See figure 1 , Figure 4 The embodiment of the present invention also provides an identity recognition system based on the national secret algorithm, which includes a chip. The chip is integrated with: a debugging interface 1, a national secret module 2, an otp module 3, and an eflash module 4.

[0062] The debugging interface 1 is used to access the otp module and the eflash module according to the control instructions of the control logic module;

[0063] The national secret module 2 is used to encrypt and decrypt the data after the debugging interface;

[0064] The otp module 3 is used to store the public key hash encrypted by the national secret module, control-related data and other manufacturer information, etc.;

[0065] The eflash module 4 is used to store the main program and the public key encrypted by the national secret module, related function keys, private keys and signatures;

[0066] The control process is to execute some initialization work an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity recognition method and system based on a national cryptographic algorithm, and the method comprises the steps: transmitting a program and storage data through a debugging interface, the storage data comprising a public key, a private key, a program, a signature, and the like, and the program comprising a main program; Public key Hash is encrypted through a national cryptographic algorithm and then stored in an OTP module, and a private key, a signature and the like are encrypted through the national cryptographic algorithm and then stored in an eFLASH moduletogether with a main program. Comparing a public key hash of the OTP module with a result obtained by performing hash operation on a public key in the eFLASH module to verify the public key, and considering that the public key is legal when the comparison result is consistent; When the public key is legal, the private key is compared with the signature according to the sequence obtained by executing the main program to verify the private key, and when the comparison result is consistent, it is considered that the private key is legal and passes through the signature. According to the scheme,the problems of low security level and the like in the prior art are solved, and the security level is improved through multi-level encryption.

Description

technical field [0001] The invention relates to the technical field of vehicle system identification, in particular to an identification method and system based on a national secret algorithm. Background technique [0002] With the development of the economy and the improvement of the quality of life, vehicles have become daily necessities for families. The improvement of consumption power is also driving the pursuit of vehicle performance. Consumers will also have higher requirements in terms of safety for high-performance vehicles bought at high prices. [0003] In the existing vehicle-mounted system, the identification technology generally adopts cryptographic technology (especially public-key cryptographic technology) to design a high-security protocol. The working mode is generally a password mode and a marking mode. The password formula is easy to remember, difficult to guess, and difficult to analyze. Password management is solved by a single function, that is, no ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/34
CPCG06F21/31G06F21/34
Inventor 李佐高攀蒋晓倩冯华李澜涛林宗芳钟伟熊民权赵宗盛
Owner 上海芯钛信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products