A method for identifying multi-block encrypted cards
An identification method and encryption card technology, applied in the field of board card identification, can solve problems such as poor flexibility and increased cost, and achieve the effect of avoiding misoperation of the encryption card and having strong technical flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Such as Figure 1-3 As shown, a method for identifying multiple encryption cards, the encryption card is determined and identified when the device is turned on, the encryption card is detected at the first time when the device is turned on, and the encryption card is operated, specifically Proceed as follows:
[0029] (1) Add a pull-up and pull-down judgment on the FPGA of the encryption card, the FPGA adopts the XC7Z015-1CLG485C chip, and the pull-up and pull-down judgment corresponds to the signal SDI_SEL. In a default state, the signal SDI_SEL is connected to a 22Ω resistor R2 to VCC, and at this time, the signal SDI_SEL is at a high level, with a value of 1. When the signal SDI_SEL is 1, the encryption card sets the value of the first register inside the FPGA to 1.
[0030] Use a jumper cap to short-circuit the 2P pin J1 of the encryption card that needs to be distinguished and identified, so that the signal SDI_SEL is connected to the 4.7K resistor R1 to GND; at ...
Embodiment 2
[0034] The difference from the first embodiment above is that, if Figure 4 As shown, the encryption card is determined and identified during the operation of the device, and the specific steps are as follows:
[0035] S1: By writing different values to each encryption card in the internal second register, the device performs key storage operation and encryption on the encryption card by judging the value in the second register operation or decryption operation.
[0036] The specific method is:
[0037] The device automatically scans out all encryption cards in the device, and writes different values to the second register of each encryption card by polling. For example, there are 3 encryption cards, and the first encryption card is written in sequence Write 001 into the second memory, write 002 into the second memory of the second encryption card, and write 003 into the second memory of the third encryption card. After different values are written into the second reg...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


