Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An embedded security encryption chip based on a cloud server

A cloud server, security encryption technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problems of low encryption machine integration, difficult key management, high maintenance costs, etc., to achieve key non-cloning and simple key management , high safety effect

Pending Publication Date: 2019-05-07
佛山芯珠微电子有限公司
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the traditional data encryption and decryption and digital signature technology, the transmission of files is usually limited by the environment and terminals between the two parties. Users need to have terminal encryption equipment to perform data encryption and decryption and user signatures, and the maintenance cost is high.
In the security services provided by the existing cloud servers in the cloud, encryption, decryption and digital signatures are mostly implemented by software or an external encryption machine. not tall
The security of the system is mainly reflected in the security of the key. In the prior art, the key is stored in a non-volatile memory, which is easy to be invaded and the security is not high.
Moreover, if there are a large number of customers, key management will become more and more difficult, the maintenance cost will be high, and more resources will be occupied.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An embedded security encryption chip based on a cloud server
  • An embedded security encryption chip based on a cloud server
  • An embedded security encryption chip based on a cloud server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] In the cloud server-based embedded security encryption chip embodiment of the present invention, the structural diagram of the cloud server-based embedded security encryption chip is as follows figure 1 as shown, figure 2 It is a schematic diagram of the external integrated PCI-E interface based on the embedded security encryption chip of the cloud server in the present embodiment; image 3 It is a flow chart of digital signature, encryption and decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded security encryption chip based on a cloud server. The embedded security encryption chip comprises a CPU, an SM2 asymmetric encryption algorithm module, an SM3 hashalgorithm module, an SM4 symmetric encryption algorithm module, an RSA asymmetric encryption algorithm module, an SHA hash algorithm module, an AES symmetric encryption algorithm module, a true randomnumber generator, a physical unclonable function module and a peripheral interface module which are integrated in the system. the embedded security encryption chip is externally integrated with PCI-Einterface, PCI-E interface connects to on-chip bus through PCI bridge, and the security encryption chip is inserted into the cloud server through the PCI-E interface. The digital signature verification and encryption / decryption speed is high, the secret key cannot be cloned, the security is high, the complexity of secret key management can be greatly reduced, the system resource consumption is reduced, the power consumption is reduced, And the chip is inserted into the cloud server through the PCI-E without changing the hardware architecture of the server, and has a secure API, so that a usercan quickly and conveniently call.

Description

technical field [0001] The invention relates to the field of data security encryption, in particular to an embedded security encryption chip based on a cloud server. Background technique [0002] The Internet of Things is a network system that connects people, things, and servers. It is a network that extends and expands on the basis of the Internet. In recent years, with the popularization of smart terminals and the rapid development of information technology and artificial intelligence, smart devices based on Internet of Things technology have gradually entered people's lives, and smart lights and smart speakers can be seen everywhere. In the near future, tens of billions of smart nodes will be connected to the Internet. However, as the Internet of Things is a huge network, the security challenges it faces cannot be underestimated. Security chips with high security, strong real-time performance and low power consumption can play a key role in the field of information se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/72G06F21/78
Inventor 熊晓明郑欣詹瑞典
Owner 佛山芯珠微电子有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products