Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password unit creation method and device, data processing method and device and electronic equipment

A cryptographic device and data processing technology, which is applied in the field of computer cryptography, can solve problems such as slowing down the startup speed, affecting the startup speed of cryptographic devices, and increasing the attack surface

Pending Publication Date: 2020-12-08
BEIJING CERTIFICATE AUTHORITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, with the continuous development of the Linux kernel, more and more types of hardware drivers, file systems, scheduling modes, application software, etc. are supported, which makes the Linux kernel and distribution become huge, which reduces the startup speed and increases the attack surface. get bigger
In the cryptographic device, even though the Linux system has undergone a series of cuts, there are still some parts that are closely integrated with the system functional components that cannot be cut, which will affect the startup speed of the cryptographic device and increase the security risk of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password unit creation method and device, data processing method and device and electronic equipment
  • Password unit creation method and device, data processing method and device and electronic equipment
  • Password unit creation method and device, data processing method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] Please refer to image 3 , the embodiment of the present application also provides a cryptographic unit creation method, which can be applied to the above-mentioned development terminal 10, and each step of the method is executed or implemented by the development terminal 10, and the method may include the following steps:

[0048] Step S110, acquiring a cryptographic component for performing cryptographic processing operations;

[0049] Step S120, according to the dependency relationship between the cryptographic component and the dependent component, obtain each type of target dependent component corresponding to the cryptographic component;

[0050] In step S130, the cryptographic component and each type of target dependent component are statically linked and packaged into an image file representing the installation package of the cryptographic unit through the construction tool, and the image file is a file including an operating system.

[0051] In the above embod...

no. 2 example

[0095] Please refer to Figure 5 , the embodiment of the present application also provides a data processing method, which can be applied to the encryption device 20 described above. The cryptographic device 20 stores the image file created through the first embodiment, and the cryptographic device 20 can execute or implement various steps of the method. Wherein, the method may include the following steps:

[0096] Step 310, acquiring a cryptographic processing request and data to be processed corresponding to the cryptographic processing request;

[0097] Step 320: According to the cryptographic operation policy corresponding to the cryptographic processing request, execute the image file to perform cryptographic operation on the data to be processed, and obtain the data to be processed after cryptographic operation.

[0098] In the second embodiment, the cryptographic operation strategy may be, but not limited to, the above-mentioned digital signature, character encryption...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password unit creation method and device, a data processing method and device and electronic equipment. The creation method comprises the steps of obtaining a password component for executing a password processing operation; according to the dependency relationship between the password component and a dependency component, obtaining each type of target dependency componentcorresponding to the password component; and packaging the password component and each type of target dependency component into a mirror image file representing a password unit installation package through a static link by using a construction tool. According to the scheme, the password component and the target dependency component are independent and then packaged into the mirror image file in astatic link mode, and the mirror image file can achieve corresponding password operation during running. Based on this, the capacity of the password unit is small, the number of attack surfaces can be reduced to improve the security of data, and in addition, due to the small capacity, the starting speed and the recycling speed when a password service function is used can be increased.

Description

technical field [0001] The present invention relates to the technical field of computer cryptography, in particular to a cryptographic unit creation method, data processing method, device and electronic equipment. Background technique [0002] In the computer field, in order to improve data security, cryptographic devices are generally required to perform corresponding encryption or decryption operations on transmitted data. Currently, cryptographic devices rely on the Linux system to provide cryptographic functions through dedicated hardware. The degree of coupling between the cryptographic device and the Linux system is high, and the Linux system itself is not used in the cryptographic field. In recent years, with the continuous development of the Linux kernel, more and more types of hardware drivers, file systems, scheduling modes, application software, etc. are supported, which makes the Linux kernel and distribution become huge, which reduces the startup speed and incr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/45
CPCG06F21/45
Inventor 李向锋陈澍郭井龙
Owner BEIJING CERTIFICATE AUTHORITY
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More