Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment

An illegal copying and cipher machine technology, applied in the field of methods and systems and cipher machine equipment, can solve the problems of theft or loss of administrator locks, illegal copying of server cipher machine equipment, etc., and achieve the effect of preventing illegal copying

Active Publication Date: 2020-02-21
北京纬百科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the administrator lock may be stolen or lost, there is an urgent need for a verification method to solve the problem of illegal copying of server cipher machine equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment
  • Method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment
  • Method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0098] Assuming that user A needs to purchase a new cipher device 1, the device provider first generates a user ID for user A, and records the user ID, the device ID of cipher device 1 and its corresponding encryption chip ID to the cloud server .

[0099] Next, user A needs to register the device after purchasing the cipher machine device 1, that is, generate a registration request packet through the encryption module, and send the registration request packet to the cloud server; the cloud server verifies the validity of the registration request packet, Generate a registration command packet after passing the verification, and send the registration command packet to the encryption module; the encryption module verifies the registration command packet, and records the user ID as a key factor into the encryption module to complete the device registration .

[0100] Further, if user A needs to purchase another new cipher device 2, the same as the above process, the device provi...

example 2

[0102] Assuming that user A needs to purchase a new cipher device 1, the device provider first generates a user ID for user A, and records the user ID, the device ID of cipher device 1 and its corresponding encryption chip ID to the cloud server .

[0103] Next, user A needs to register the device after purchasing the cipher machine device 1, that is, generate a registration request packet through the encryption module, and send the registration request packet to the cloud server; the cloud server verifies the validity of the registration request packet, Generate a registration command packet after passing the verification, and send the registration command packet to the encryption module; the encryption module verifies the registration command packet, and records the user ID as a key factor into the encryption module to complete the device registration .

[0104] Further, if user B needs to purchase a new cipher machine device 3, the same as the above process, the device pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for preventing a cipher machine device from illegally copying and the cipher machine device. The method comprises the following steps: obtaining a registration command packet from a cloud server through a management module in first cipher machine equipment, and writing a first user ID corresponding to the first cipher machine equipment in the registration command packet into an encryption module in the first cipher machine equipment; before the second cipher machine device is copied to the first cipher machine device, verifying the first verification data based on the first user ID through the encryption module, allowing copying when the verification result indicates that the first user ID is the same as the second user ID, and otherwise forbidding copying. According to the invention, illegal copying of the cipher machine equipment can be effectively prevented.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for preventing illegal duplication of cipher machine equipment and cipher machine equipment. Background technique [0002] The server cipher device has the functions of data encryption and decryption, signature, signature verification, MAC, and hashing. Therefore, it can solve security issues such as confidentiality, integrity, validity, and non-repudiation of sensitive information for users. During use, the server cipher machine device uses the administrator lock to manage the device, such as administrator identity authentication, or uses the administrator lock to complete operations such as device initialization and key recovery. [0003] Furthermore, in order to meet the needs of business expansion, the server cipher device also supports horizontal expansion, that is, by using an administrator lock, an existing server cipher device can be used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/0869H04L9/3226H04L9/3247H04L63/0428H04L63/0435
Inventor 孙吉平陈文静
Owner 北京纬百科技有限公司