Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer system cipher module detection method and device and a storage medium

A technology for computer systems and cryptographic modules, applied in computer security devices, detection of faulty computer hardware, protection of internal/peripheral computer components, etc. Solve the effect that effective detection cannot be obtained and improve detection efficiency

Pending Publication Date: 2021-11-16
CHINA FINANCIAL CERTIFICATION AUTHORITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional, internationally accepted testing methods for the whole machine and operating system are no longer suitable for the above-mentioned computer systems with discrete distribution of cryptographic modules.
Simultaneously, in the prior art, the test of CPU cryptographic module and bus cryptographic equipment (comprising bus cryptographic machine and bus cryptographic module) of the computer system of cryptographic module discrete distribution can only rely on the software realization of operating system, and can't directly CPU cryptographic module and bus cryptographic devices for detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system cipher module detection method and device and a storage medium
  • Computer system cipher module detection method and device and a storage medium
  • Computer system cipher module detection method and device and a storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. It should be understood that the embodiments described in this specification are only some of the embodiments provided by the present invention to facilitate a clear understanding of the solutions and comply with legal requirements, but not all embodiments of the present invention can be realized. Based on the embodiments disclosed in this specification, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0032] Image 6 It is a flow chart showing the detection method of the cryptographic module of the computer system according to the present invention.

[0033] Such as Image 6 As shown, the method 200 for detecting a cryptographic module of a computer system of the present invention calls and detects the cryptograph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a computer system cipher module detection method and device and a storage medium, and the method comprises the following steps: calling a basic hardware cipher module, and detecting the basic hardware cipher module according to the encryption and decryption results of the basic hardware cipher module on a verification file; calling an operating system cryptographic module to detect the operating system cryptographic module according to encryption and decryption results of the operating system cryptographic module on the verification file; calling a middleware password module, so as to detect the middleware password module according to encryption and decryption results of the middleware password module on the verification file; and calling the application layer cryptographic module to detect the application layer cryptographic module according to the encryption and decryption results of the verification file by the application layer cryptographic module. According to the technical scheme, the problem that the discretely distributed cryptographic modules in the computer system cannot be effectively detected is effectively solved. Meanwhile, the detection efficiency is effectively improved.

Description

technical field [0001] The present invention relates generally to the field of computer security. More specifically, the present invention relates to a detection method, device and storage medium of a cloud operating system encryption module. Background technique [0002] In traditional computer systems, since there is no encryption module inside the CPU, the main storage, bus, and input and output devices cannot be fully encrypted and protected during hot running. The framework of the computer system is as figure 1 shown. [0003] As the situation of information security becomes more and more severe, our country proposes a scheme of embedding the cryptographic module into the CPU to encrypt the whole bus data set. A cryptographic module is added between the CPU bus and the input / output interface of the computer system, so that the data of the hardware device below the operating system layer is protected by the cryptographic module. A typical CPU framework with a cryptog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/22G06F21/60G06F21/72G06F9/50
CPCG06F11/2205G06F11/2236G06F21/602G06F21/72G06F9/505Y02D10/00
Inventor 马瑶瑶张大健彭大千崔颖超石宗育姚乾夏立宁赵红骆炜纪崇廉曹中全李华英王晓影方兴园王恩奇孙思桐宋鑫磊郭哲丁衍许盛晨曹博远李军庞帅刘莘王波沈敏鑫刘哲王宏铭
Owner CHINA FINANCIAL CERTIFICATION AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products