Security authentication method and system based on security chip and security chip
A security chip and security certification technology, applied in the field of secure communication, can solve problems affecting and affecting information security, and achieve the effect of improving information security and increasing the cost of cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0051] Example 1
[0052] See figure 1 The security authentication system 1 of the present invention includes a host computer 10 and a security authentication device 11 coupled to the host computer 10; the security authentication device 11 includes a security chip 2 coupled to the host computer 10 and an auxiliary chip 3 coupled to the security chip 2 .
[0053] See figure 2 The security chip 2 includes an MCU core unit 20, a volatile storage unit 21, a non-volatile storage unit 22, an I / O interface 24 and a high-speed hardware algorithm unit; among them, the high-speed hardware algorithm unit includes a high-speed hardware algorithm unit 231, a high-speed hardware algorithm unit Multiple high-speed hardware algorithm units such as the hardware algorithm unit 232 and the high-speed hardware algorithm unit 233. The MCU core unit 20 is mainly used for internal control and operation of the chip, and is usually a general-purpose MCU core such as MSP430 and CORTEX-M0; the volatile sto...
Example Embodiment
[0103] Example 2
[0104] In the description of this embodiment, only the difference between the information processing process of the two chips is exemplarily described, that is, only the difference from the above-mentioned embodiment 1 is explained, and the label of each unit is used in embodiment 1. The label.
[0105] The non-volatile storage unit 32 of the auxiliary chip 3 stores the security key information that has been encrypted, that is, stores the first ciphertext data in Embodiment 1, and is used to decrypt the first ciphertext data. The first decryption key is stored in the nonvolatile storage unit 22 of the security chip 2 in advance.
[0106] That is, in this embodiment, the first ciphertext data is encrypted and generated from the security key data required for security authentication, and the key required for decryption is the aforementioned first decryption key, and the security chip 2 is not required to generate the first random Count and perform symmetric encrypt...
Example Embodiment
[0108] Example 3
[0109] In the description of this embodiment, only the difference between the information processing process of the two chips is exemplarily described, that is, only the difference from the above-mentioned embodiment 1 is explained, and the label of each unit is used in embodiment 1. The label.
[0110] After the auxiliary chip 3 receives the wake-up instruction, it generates a pair of public key and private key based on the asymmetric encryption and decryption algorithm, the private key is stored in the volatile storage unit 31, and the public key is sent to the security chip 2, specifically , The public key can be used as the response information to the wake-up instruction, and the security chip 2 uses the public key to encrypt the first random number using an asymmetric encryption and decryption algorithm to obtain the second ciphertext data and send it to the auxiliary chip 3. The chip uses the private key stored in the volatile storage unit 31 to decrypt, a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap