Credible encryption system and method

An encryption system and reliable technology, applied in the field of encryption to achieve the effect of ensuring security and ensuring security

Active Publication Date: 2019-08-30
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the defects existing in the prior art, the purpose of the present invention is to provide a trusted encryption system and method, which can solve various technical problems existing in traditional encryption software systems in terms of active immunization, trusted environment guarantee, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible encryption system and method
  • Credible encryption system and method
  • Credible encryption system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0136] The trusted encryption method mainly includes a startup process and an encryption and decryption process.

[0137] Startup process:

[0138] The start-up process is the pre-process of the encryption and decryption process. By restarting the computer and using the U-Key trust root to measure the credibility of the initial state environment of the system and applications, a trust chain is established to ensure that the next stage of trusted software base and explicit / Implicitly encrypts the security of software applications.

[0139] The startup process is to insert the root of trust->start the computer->root of trust boot measurement->trusted software base startup measurement environment->explicit / implicit encryption software startup.

[0140] Encryption and decryption process:

[0141] The encryption and decryption process is the main process of encryption, which involves the mutual cooperation of multiple processes such as U-Key trust root, trusted software base, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credible encryption system and method. The credible encryption system comprises a credible computing platform and a U-Key type trust root, the U-Key type trust root serves asa trust chain starting point of the credible computing platform and is used for supporting the credibility measurement work and the encryption and decryption work of the credible computing platform,and the trusted computing platform comprises a trusted software base and an encryption software. According to the credible encryption system and method provided by the invention, the security of dataduring the encryption and decryption process is ensured by adopting an active immune mechanism; the working security of the encryption software can be ensured; the security policy can be stored in theU-key type trust root, the U-key type trust root provides a secure storage area for secure storage, and the security protection of the virtual disk is provided for the encrypted plaintext, so that the security of the data during the encryption and decryption process can be ensured.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a trusted encryption system and method. Background technique [0002] At present, traditional encryption software systems have various problems in various aspects: [0003] (1) In terms of active immunization, traditional encryption software systems only consider the encryption link and the security of the encryption itself, but do not consider the interference and destruction of the encryption and decryption program by viruses and Trojan horses during the encryption and decryption process, and do not have an active immunization mechanism. [0004] (2) In terms of trusted environment guarantee, first, when performing encryption and decryption, it is impossible to determine the integrity of its own program and the security of the environment it relies on, and it also lacks protection measures for the system environment and the program itself; It does not run when it is not wor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/57G06F21/34G06F21/31
CPCG06F21/31G06F21/34G06F21/57G06F21/602
Inventor 孙瑜洪宇王涛杨成刚
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products