Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Portable high-speed stream encryption hardware device and method

A hardware device and stream encryption technology, applied in computer security devices, computer parts, internal/peripheral computer component protection, etc., can solve the problems of single function, large size, high cost, etc., to ensure security, improve data security, The effect of ensuring fluency

Pending Publication Date: 2020-05-15
TIH MICROELECTRONIC TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current network virus protection technology, intrusion detection technology and security scanning technology cannot fully guarantee the security of PCs in the network
[0004] The inventors found that traditional hardware cryptographic devices have problems such as high cost and large size, and cannot be well applied to the encryption and decryption operations of personal files; With corresponding hidden functions, it is easy to be cracked by criminals; in addition, after the key is written into the hardware encryption device, once it is lost, the key of the encryption module is easy to be exported and cracked, resulting in the loss of the original hardware password. Device loses its encryption capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable high-speed stream encryption hardware device and method
  • Portable high-speed stream encryption hardware device and method
  • Portable high-speed stream encryption hardware device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] In a typical implementation of the present application, such as figure 1 As shown, a portable high-speed stream encryption hardware device is proposed.

[0037] This application is mainly used for file encryption, decryption and storage on the PC side. The stream encryption hardware device is only the size of an ordinary U disk and is easy to carry. Use the USB interface to connect with the PC (host side), which can be plug-and-play. The encrypted ciphertext files and ciphertext data are automatically stored in the hidden partition of the hardware device by the host computer. The hidden partition is invisible on the PC side and must be accessed using a dedicated file system to ensure the security of files stored in the hidden partition.

[0038] The stream encryption hardware device has an encryption function, a decryption function and a common storage function, wherein the encryption and decryption functions use a national secret symmetric algorithm (SM4 algorithm, E...

Embodiment 2

[0048] In another typical embodiment of the present application, such as Figure 2-Figure 4 As shown, a high-speed stream encryption method is provided.

[0049] The encryption method utilizes the stream encryption hardware device disclosed in Embodiment 1, comprising the following steps:

[0050] When the device is started, the PC sends private commands and data to the device;

[0051] The device receives the private command and judges whether the operation address is greater than the total capacity of the storage area. If it is greater than the total capacity of the storage area, the stream encryption and decryption function will be activated; if the data is written into the Flash of the device, if it is less than the total capacity of the storage area, the normal storage read and write function will be activated;

[0052] Determine whether the private command is a write command or a read command. If it is a write command, use the SM4 algorithm ECB mode to encrypt and dec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a portable high-speed stream encryption hardware device and method. The method comprises the following steps of storing an encrypted ciphertext file and data into a hidden partition of encryption hardware equipment; wherein the hidden partition is invisible at the host end, so that the security of files stored in the hidden partition is ensured, matching the special file system with an encryption module and a decryption module to realize the process of stream encryption and stream decryption, the encryption capability of the hardware cryptographic equipment to data is improved, and the security of file data is improved.

Description

technical field [0001] The present application relates to a portable high-speed stream encryption hardware device and method. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art. [0003] In recent years, with the popularization of computers and the rapid development of network technology, various industries and individuals rely more and more on computers and networks, and the subsequent problems of network security and information security have gradually become prominent. Information security is also gradually being valued by everyone. The current network virus protection technology, intrusion detection technology and security scanning technology cannot fully guarantee the security of PCs in the network. [0004] The inventors found that traditional hardware cryptographic devices have problems such as high cost and large size, and cannot be well ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/74G06F21/60G06F21/34G06K19/077
CPCG06F21/74G06F21/602G06F21/34G06K19/07732
Inventor 吴书胜李冠张鹏
Owner TIH MICROELECTRONIC TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products