SATA bridging real-time transmission encryption system and method based on a domestic cryptographic algorithm

A technology of domestic cipher and encryption system, applied in the field of SATA bridge real-time transmission encryption system based on domestic cipher algorithm, can solve the problems of poor data security, inability to realize data ciphertext transmission, etc., and achieve the effect of ensuring data security

Inactive Publication Date: 2019-04-19
郑州中科集成电路与信息系统产业创新研究院
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing technology cannot realize data ciphertext transmission, and the data security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SATA bridging real-time transmission encryption system and method based on a domestic cryptographic algorithm
  • SATA bridging real-time transmission encryption system and method based on a domestic cryptographic algorithm
  • SATA bridging real-time transmission encryption system and method based on a domestic cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 as shown, figure 1 It is an overall architecture diagram of the SATA bridging real-time transmission encryption system based on the domestic cryptographic algorithm, including the security storage control chip, SATA DEVICE IP core, SATA HOSTIP core and hard disk of the desktop system of the computer connected in sequence, and also includes the USB HOST IP core. To authenticate the storage device U_KEY on the external USB port of the secure storage control chip inserted into the desktop system, the simple data management protocol SM1 module and SM4 module for data encryption and decryption are connected to the SATA DEVICE IP core and SATA HOST IP core respectively.

[0061] Among them, the USB HOST IP or 7816 interface is mainly used to complete the verification work and realize the identity authentication function; the communication between the desktop system and the SATA DEVICE IP, and the communication between the SATA HOST IP and the hard disk are co...

Embodiment 2

[0066] The present invention also provides an encryption method of a SATA bridging real-time transmission encryption system based on a domestic cryptographic algorithm. According to the working process, the present invention is divided into two parts: one is an identity authentication process, and the other is a data encryption and decryption process.

[0067] Identity authentication is a very important part of the design. When the user inserts the U_KEY into the external U port of the chip board, the identity authentication firmware will complete the identity authentication interaction with the U_KEY. The specific interaction process is as follows:

[0068] After the user's computer is started, the user inserts the U-KEY; reads the signature certificate information from the U_KEY through the USB HOST IP; before U_KEY sends the signature certificate, it first uses the SM3 module of U_KEY to hash the signature digital certificate, and then uses the user's private key to hash ag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an SATA bridging real-time transmission encryption system and method based on a domestic cryptographic algorithm. The system comprises a desktop system security storage control chip which is sequentially connected, The invention discloses an SATA DEVICE IP core. The invention discloses an SATA HOST IP core and a hard disk. The device also comprises a USB HOST IP core. Themethod is used for performing identity authentication on a storage device U _ KEY which is inserted into an external USB port of a secure storage control chip of a desktop system. A simple data management protocol SM1 module and an SM4 module which are used for data encryption and decryption are connected with the SATA DEVICE IP core and the SATA HOST IP core respectively. Data transmission is completed by using a register to control two tables according to a command protocol in an FIS region.

Description

technical field [0001] The invention relates to a SATA bridging encryption technology, in particular to a SATA bridging real-time transmission encryption system and method based on a domestic encryption algorithm. Background technique [0002] Commercial ciphers refer to technologies that can implement functions such as encryption, decryption, and authentication of commercial cipher algorithms. (Including encryption algorithm programming technology and implementation technology of encryption algorithm chip, encryption card, etc.). Commercial cryptography is the core of commercial cryptography. The state has listed commercial cryptography as a state secret, and any unit or individual has the responsibility and obligation to protect the secrets of commercial cryptography. [0003] Commercial ciphers are used in a wide range of fields, and are mainly used to encrypt and protect sensitive internal information, administrative affairs information, economic information, etc. that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/72G06F21/79G06F21/64
CPCG06F21/64G06F21/72G06F21/79
Inventor 于哲
Owner 郑州中科集成电路与信息系统产业创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products