Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and device for special password of terminal equipment

A technology of terminal equipment and encryption method, applied in the field of information security, can solve the problems of high cost ratio, small running memory, low processing efficiency of cryptographic hardware modules, etc., and achieve the effect of reducing implementation cost and enhancing security.

Pending Publication Date: 2021-10-22
CHENGDU TD TECH LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The password cards in the industry usually cost several hundred yuan, which is a very high cost increase compared with most mobile terminals.
[0006] 2. The introduction of the cryptographic hardware module requires terminal equipment to supply power for it, which will greatly increase the power consumption of the terminal, especially the external cryptographic hardware module
Since terminal equipment using cryptographic hardware modules is usually used for mobile office of industry customers, these customers have high requirements for the sustainable use time of terminal equipment, and the above-mentioned increase in power consumption will lead to a significant decrease in the sustainable use time of the terminal, thus Unable to meet the needs of the above-mentioned long continuous use time
[0007] 3. The existing cryptographic hardware modules, no matter what form they are implemented in, generally have very low chip computing power and small operating memory. In this way, the limited computing power will lead to low processing efficiency of the cryptographic hardware modules, and often It becomes the performance bottleneck of the entire service, and cannot meet some services with high performance requirements, such as video services, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device for special password of terminal equipment
  • Encryption method and device for special password of terminal equipment
  • Encryption method and device for special password of terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0029] In this application, the secure execution environment in the terminal device will be considered to ensure the security of the private password encryption.

[0030] Secure Execution Environment (Trusted Executing Environment, TEE), essentially a secure operating system (OS), it is a streamlined real-time operating system, its main purpose is to create a trusted execution environment under the Android (Android) platform to save User Confidential Data.

[0031] The secure OS is implemented based on ARM's TrustZone technology. TrustZone technology protects peripherals such as secure memory, encrypted blocks, keyboards and screens in hardware, ensuring they are safe from software attacks. TrustZone technology is an extension of the AR...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a special password encryption method and device for terminal equipment, and the method comprises the steps that: a password operation instruction is transmitted to a TEE client when the terminal equipment detects the password operation instruction of an application layer; the TEE client sends the password operation instruction to a trusted application TA used for processing the password operation instruction in a TEE system; and the TA analyzes the password operation instruction, executes the password operation instruction by calling a corresponding algorithm in a special password algorithm library in the TEE system according to an analysis result, and feeds back an execution result to the application layer through the TEE client. By applying the technical scheme disclosed by the invention, the calling security of the special cryptographic algorithm is ensured by utilizing the TEE system, and the implementation cost can be reduced, the power consumption can be reduced and the overall performance of the terminal equipment can be improved on the premise of ensuring the security strength by utilizing the special cryptographic algorithm.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a dedicated password encryption method and device for terminal equipment. Background technique [0002] At present, in order to meet the needs of some customers with high information security requirements, many terminal devices use a dedicated password encryption method, which is approved by a third-party authority to ensure the strength of terminal information security. [0003] In order to ensure the security of the encryption method, the encryption method of the existing special password is usually implemented by adding hardware modules. Specifically, the encryption method of the dedicated password is preset in a dedicated password hardware module (such as TF password card, simkey, film card, etc.), and the password hardware module adapts the terminal driver and integrates the password service provided by the password card manufacturer Provide the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31
CPCG06F21/45G06F21/31
Inventor 冯小兵蒋兴张鹏
Owner CHENGDU TD TECH LTD