Supercharge Your Innovation With Domain-Expert AI Agents!

A data processing method and device for a trusted security terminal

A technology for data processing devices and security terminals, which is applied in the fields of electrical digital data processing, computer security devices, digital data protection, etc., and can solve problems such as potential safety hazards, information theft of USB peripherals, etc.

Active Publication Date: 2021-09-14
百信信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most domestically-made trusted computers still use foreign chips for their underlying key chips and north-south bridges. In this way, all instructions issued by domestic CPUs must be processed by foreign bridges. The connected network ports, hard disk interfaces, Peripheral information such as the USB interface may be stolen, bringing great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and device for a trusted security terminal
  • A data processing method and device for a trusted security terminal
  • A data processing method and device for a trusted security terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 A schematic flowchart of a data processing method for a trusted security terminal provided in Embodiment 1 of the present invention; such as figure 1 As shown, a data processing method for a trusted security terminal provided by this embodiment may include:

[0039] Make the control unit of the mainboard work before the BIOS; perform credible measurement on the BIOS, when the measurement result is normal, run the BIOS normally and start the operating system; otherwise, make the mainboard enter the alarm mode or shutdown mode from the standby state; read the data to be processed And the security key, according to the algorithm of the security key, the data to be processed is encrypted and decrypted.

[0040] figure 2 A schematic structural diagram of a data processing device for a trusted security terminal provided in Embodiment 1 of the present invention; such as figure 2 As shown, a data processing device for a trusted security terminal provided by this e...

Embodiment 2

[0044]On the basis of Embodiment 1, this embodiment provides a data processing method for a trusted security terminal. The BIOS is credible measurement. When the measurement result is normal, the operating system is started after running the BIOS normally. Otherwise, the motherboard Entering the alarm mode or shutdown mode from the standby state specifically includes: performing credible measurement on the BIOS; receiving the measurement result, and converting the measurement result into a signal for controlling the state of the mainboard; the signal for controlling the state of the mainboard includes: causing the mainboard to enter from the standby state BIOS system, or make the main board enter the shutdown mode from the standby state; or make the main board enter the alarm mode from the standby state.

[0045] image 3 A schematic structural diagram of a data processing device for a trusted security terminal provided in Embodiment 2 of the present invention, such as image...

Embodiment 3

[0053] On the basis of the first embodiment, this embodiment provides a data processing method for a trusted security terminal, wherein the data to be processed and the security key are read, and the data to be processed is added according to the algorithm of the security key. Decryption operations, which may include:

[0054] Acquire the data to be processed; perform protocol conversion on the data to be processed, cache and store it; read the security key; perform encryption and decryption operations on the data to be processed according to the encryption and decryption algorithm in the security key.

[0055] Image 6 A schematic structural diagram of a data processing device for a trusted security terminal provided in Embodiment 3 of the present invention, such as Image 6 As shown, this embodiment provides a data processing device for a trusted security terminal. On the basis of Embodiment 1, the trusted processing unit 30 may include: an obtaining unit 301 for obtaining ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The data processing method and device of a trusted security terminal provided by the present invention include: making the control unit of the motherboard work before the BIOS; performing credible measurement on the BIOS, and when the measurement result is normal, start the operating system after normally running the BIOS; otherwise , so that the main board enters the alarm mode or shutdown mode from the standby state; reads the data to be processed and the security key, and performs encryption and decryption operations on the data to be processed according to the algorithm of the security key; All operations can establish a trusted connection, which greatly improves the security of user data operations and is suitable for the field of data security.

Description

technical field [0001] The present invention relates to the technical field of trusted computers, in particular to a data processing method and device of a trusted security terminal. Background technique [0002] With the development of Internet technology and information technology, the importance of information security is self-evident, and people put forward higher requirements for computer security. [0003] At present, most domestic trusted computers still use foreign chips for their underlying key chips and north and south bridges. Since then, all instructions issued by domestic CPUs must be processed by foreign bridge chips. The connected network port, hard disk interface, Peripheral information such as USB interfaces may be stolen, which brings great security risks. SUMMARY OF THE INVENTION [0004] Aiming at the deficiencies in the related art, the technical problem to be solved by the present invention is to provide a data processing method and device for a trus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/60G06F9/445G06F21/87
CPCG06F9/44505G06F21/575G06F21/602G06F21/87
Inventor 唐道光庄杰张川川
Owner 百信信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More