Identity authentication method and protection method for ensuring security of encryption device

An encryption device and identity authentication technology, applied in digital data authentication, internal/peripheral computer component protection, etc., can solve the problems of high failure rate of encryption device and low safety factor, achieve low power consumption, low equipment failure rate, easy The effect of installation

Active Publication Date: 2021-01-22
河北素数信息安全有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide an identity authentication method and a protection method for ensuring the security of encryption devices, so as t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and protection method for ensuring security of encryption device
  • Identity authentication method and protection method for ensuring security of encryption device
  • Identity authentication method and protection method for ensuring security of encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0067] A miniature transmission encryption device based on embedded technology, combined with Figure 5 to Figure 8 Shown, including Encryption Guard hardware part and Encryption Guard software part.

[0068] Encryption Guard is developed on a low-power ARM platform. It uses a hardware security chip as a module for key management and cryptographic operations. It supports dual gigabit network interfaces and has functions such as temperature and humidity sensors, local management, and remote management.

[0069] The encryption guard hardware part includes: business control chip, security control chip, noise source, algorithm coordination processor, multi-mode positioning module, temperature and humidity sensor, smart password key, DDR3 memory, eMMC Flash, reset button, indicator light and SPI Flash.

[0070] Business control chip, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and a protection method for ensuring the security of an encryption device, and the protection method for ensuring the security of the encryption device comprises the following steps: S10, constructing three layers of secret key systems, and setting a protection relation between the secret key systems; s20, setting a security state conversion method of the encryption device, wherein the safety state comprises a delivery state, a ready state, a management state and a working state; s30, initially installing the encryption device accordingto the key system constructed in the step S1; and S40, carrying out identity authentication on the intelligent password key. The security coefficient of the encryption guard is effectively improved,the equipment failure rate is low, the security of the encryption guard is effectively improved by setting the key system into three layers, and the impact resistance of the system is effectively improved by adopting a method of carrying out identity authentication on the intelligent password key.

Description

technical field [0001] The invention relates to the technical field of data transmission encryption, and more specifically relates to an identity authentication method and a protection method for ensuring the security of an encryption device. Background technique [0002] In the era of rapid development of data communication, more and more messages, information and other digital data are transmitted in bits and bytes through cables and air, and at the same time, the requirements of digital data owners to protect digital data are also increasing. The construction of the network transmission encryption system must strictly follow the relevant rules and regulations of the "Cryptography Law of the People's Republic of China". Operations used by peacekeeping. [0003] In order to ensure that the encryption device meets the relevant requirements of the second-level security level in GM / T0028-2014 "Security Technical Requirements for Cryptographic Modules" and GM / T0039-2015 "Secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/72G06F21/34
CPCG06F21/72G06F21/34
Inventor 李耀龙朱剑王建承刘琦
Owner 河北素数信息安全有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products