Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Portable Secure Computer System Based on Cryptographic Hash Tag Protection

A secure computer and portable technology, which is applied in the field of network security transmission, can solve the problems of low efficiency and inability to make full use of the convenience of data communication, and achieve the effect of ensuring storage security, preventing the disclosure of plaintext sensitive data, and ensuring security and storage

Active Publication Date: 2022-03-18
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various unknown network security threats emerge one after another, and network security incidents occur frequently, forcing portable computers that process sensitive information to never be allowed to access the public Internet. The transmission of sensitive files is greatly restricted, or must rely on VPN encryption The protection of mobile phones is either carried by reliable personnel or delivered in confidential ways, and cannot make full use of the convenience of data communication brought by the mobile Internet that is available everywhere. Objectively, it has formed the status quo of ensuring the security of sensitive files at the cost of inefficient work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Portable Secure Computer System Based on Cryptographic Hash Tag Protection
  • A Portable Secure Computer System Based on Cryptographic Hash Tag Protection
  • A Portable Secure Computer System Based on Cryptographic Hash Tag Protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] This embodiment provides a portable secure computing architecture based on encrypted hash tag protection, specifically as follows:

[0083] Portable secure computer systems based on cryptographic hash tag protection such as figure 1 As shown, it is implemented by a portable computer with various security control functions. Together with a mobile smart terminal (including a smart phone) running a secure TFTP App (STFTP App), it provides safe processing for the editing, storage, transmission and copying of sensitive files Create a safe computing environment. The portable security computer and the smart terminal are connected by USB CDC, based on the secure TFTP (STFTP) protocol to realize the secure exchange of encrypted sensitive files, and based on the strict isolation of the data block encrypted hash tag security mechanism to defend against network attacks and prevent Data breach of sensitive files.

[0084] The mobile smart terminal installed and running the secure ...

Embodiment 2

[0097] This embodiment is on the basis of embodiment 1:

[0098] The present embodiment provides the security mechanism that portable security computer system realizes, specifically as follows:

[0099] The design goal of the portable security computer system is to establish a safe and fully controlled operating environment that is strictly isolated from the mobile Internet to meet the security application requirements of the production, transmission, copy, storage and editing of sensitive files.

[0100] In order to achieve this security application goal, this embodiment designs a portable secure computing rack based on encrypted hash tag protection, which realizes strict password isolation between the secure computing environment and the mobile Internet environment. By adopting data block encryption hash tag mechanism, secure transmission protocol control mechanism, file encryption storage mechanism, file randomization and segmentation encrypted transmission protection mecha...

Embodiment 3

[0145] This embodiment is on the basis of embodiment 2:

[0146] This embodiment provides the processing workflow of the encrypted hash tag protection module, which is as follows:

[0147] When a PPP (point-to-point) link based on USB CDC connection is established between the portable security computer and the intelligent terminal, different IP addresses of the same network segment are set at both ends, and the working state of the encrypted hash tag protection module is set to the initial state , initialize the serial number control value to 0, initialize the message repetition counter value to 0, and turn off the state reset timer. After the portable security computer reads the USBKey data protection key stored in the hidden file, and reads out the encrypted data of the data block protection key and the encrypted state data of the hash tag key from the USBKey, and decrypts it with the USBKey data protection key, both parties You can use the STFTP protocol for encrypted file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a portable security computer system based on encrypted hash tag protection. The portable security computer implements security isolation from the Internet based on a data block encrypted hash tag protection mechanism, and adopts a secure TFTP protocol to realize communication with mobile intelligence. The secure exchange of confidential files between terminals implements a single device function restriction on the USB HID interface to prevent attacks from the interface. The present invention adopts data block encryption hash tag protection mechanism, secure transmission protocol control mechanism and USB HID interface single device function restriction mechanism, etc. These security mechanisms together provide strict security isolation protection for the operating environment of the portable computer, which can not only provide All processing links involving sensitive files provide a secure computing environment that is also resistant to various possible malicious attacks.

Description

technical field [0001] The invention relates to the technical field of network security transmission, in particular to a portable security computer system based on encrypted hash tag protection. Background technique [0002] In the existing portable computer architecture, the adversary may invade the computer software system and steal important sensitive information by using any security loopholes in the Internet protocol, file transfer and copy, and USB interface. Various unknown network security threats emerge one after another, and network security incidents occur frequently, forcing portable computers that process sensitive information to never be allowed to access the public Internet. The transmission of sensitive files is greatly restricted, or must rely on VPN encryption The protection of mobile phones is either carried by reliable personnel or delivered in confidential ways, and cannot make full use of the convenience of data communication brought by the mobile Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L67/06
CPCH04L9/0643H04L9/0869H04L9/0877H04L9/3236H04L9/3247H04L67/06
Inventor 李大双张文政曹云飞吴开均于飞
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products