Data encryption method and device and data decryption method and device

A data encryption and data decryption technology, applied in the field of data security, can solve problems such as non-sharing, and achieve the effect of data isolation

Inactive Publication Date: 2021-01-12
NANJING SEMIDRIVE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, the encrypted information on a certain chip has the risk of being decrypted by other chips, and the encryption of different software entities on the chip also has the risk of being decrypted by other different software entities; Different software entities have their own sensitive data, and these sensitive data cannot be shared with this chip or chips other than this software entity. Or software entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method and device and data decryption method and device
  • Data encryption method and device and data decryption method and device
  • Data encryption method and device and data decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solution of the present disclosure will be described in detail below in conjunction with the accompanying drawings. In the description of the present disclosure, it should be understood that the terms "first", "second", and "third" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly indicating the indicated The number of technical characteristics is only used to distinguish different components.

[0038] figure 1 It is a flow chart of the disclosed encryption method, such as figure 1 As shown, 100: The device unique key is concatenated with the software identity and then hashed to obtain the encapsulation key. The encapsulation key is the hash value obtained by concatenating the unique key of the device and the software identity and hashing it, which is not less than 256 bits.

[0039] The device unique key is used to uniquely identify the device. For example, each chip has its ow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data encryption method and device, and a data decryption method and device, relates to the technical field of data security, and solves the technical problem that sensitive data between chips or software entities cannot be completely isolated.According to the technical scheme, a packaging key is obtained by combining an equipment unique key with a software identity; The equipment unique secret key is a unique identifier for identifying the equipment, and software entities with different software identities are identified by the software identities, so that data isolation among different chips, different CPUs, different security states on the same CPU, different privilege levels, different supported virtual machines and different processes can be achieved, and normal service processing is not influenced.

Description

technical field [0001] The present disclosure relates to the technical field of data security, and in particular, to a data encryption method, device, and data decryption method and device. Background technique [0002] The current SOC (System on Chip, system-on-chip) usually contains multiple CPUs and runs a lot of software. These software generally have their own sensitive information that needs to be protected. Sensitive information does not want to be accessed by other software running on the SOC at the same time. . Similarly, different SOCs also need to isolate sensitive information from each other. Modern cryptography provides methods for protecting sensitive information, such as using the AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm to encrypt information, which can provide sufficient security; and MAC (Message authentication code, message authentication code) can Provide a reliable way to authenticate information; currently, most of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209
Inventor 樊崇斌
Owner NANJING SEMIDRIVE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products