Sensitive information protection method and device and a readable storage medium

A sensitive information, hash algorithm technology, applied in the field of information security, can solve problems such as side channel attacks, key tampering, information leakage, etc., and achieve the effect of improving the success rate

Active Publication Date: 2019-04-12
SHANGHAI AISINOCHIP ELECTRONICS TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the keys used in identity authentication may have been tampered with, and sensitive information such as keys may be subject to external side-channel attacks when copying keys, resulting in eventual information disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive information protection method and device and a readable storage medium
  • Sensitive information protection method and device and a readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Please refer to figure 1 , a sensitive information protection method. Before the sensitive information is used, the original sensitive information has been stored in the security chip. When the sensitive information is used, it is checked whether the sensitive information to be used is correct and valid according to the following judgment process:

[0041] S1: copy the sensitive information to be used, and copy the sensitive information to be used from the data source address to the target address;

[0042] S2: Determine whether the copied sensitive information to be used is the same as the original sensitive information: if they are the same, that is, the sensitive information to be used has been securely copied, then jump to step S5;

[0043] S3: Copy the sensitive information to be used again; if the copied sensitive information to be used is different from the original sensitive information, it is considered that the sensitive information copying process may be subj...

Embodiment 2

[0053] Please refer to figure 2 , which is a protection method for sensitive information as a key. Before the key is used, the original key and the original hash value have been stored in the security chip. When using the key, check whether the key to be used is correct and valid according to the following judgment process:

[0054] S1: Copy the key to be used, and copy the key to be used from the data source address to the target address;

[0055]S2: Determine whether the copied key to be used is the same as the original key: if they are the same, that is, the key to be used has been securely copied, then jump to step S5;

[0056] S3: Copy the key to be used again; if the copied key to be used is different from the original key, it is considered that the key copying process may be subjected to a side-channel attack, and the key to be used at the target address is untrusted Data, therefore, by providing the opportunity to copy the key to be used again to reconfirm the corre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sensitive information protection method and device and a readable storage medium. The original sensitive information is stored in the security chip, and when the sensitive information is used, the problem that the sensitive information cannot be used due to bypass attack or sensitive information tampering in the sensitive information copying process is solved by providingthe opportunity of copying the sensitive information twice. The method can be used for protecting the safe operation of the sensitive information in the Internet of Things device so as to improve thesafety of the sensitive information in the Internet of Things device.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a sensitive information protection method, device and readable storage medium. Background technique [0002] As an important part of the new generation of information technology, the Internet of Things has rapidly developed to facilitate people's work and life. People can remotely control and view Internet of Things devices connected to the network through mobile devices. However, due to the low maturity of the Internet of Things at present, there are still some defects in the security of the Internet of Things devices, resulting in frequent information leakage incidents. Therefore, how to ensure the security of IoT devices is crucial to promote the development of IoT. [0003] Now, IoT devices have also added some security measures to prevent leaks, such as using security chips on the device side, performing identity authentication, and encrypting transmitted data....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/77G06F21/34
CPCG06F21/34G06F21/602G06F21/77
Inventor 杨军平周玉洁谭永伟
Owner SHANGHAI AISINOCHIP ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products