Equipment security management method based on encryption hardware

A technology for encrypting hardware and security management, applied in the computer field, can solve problems such as theft, device management is not bound with other hardware, etc., and achieve the effect of improving security

Active Publication Date: 2022-01-07
上海盛本智能科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularity of smart devices, the security of smart device systems is becoming more and more important. The general device management in the prior art is not bound to other hardware, and others take After arriving at the device, it can be turned on normally. If the password to enter the system is broken, you can enter the system to steal important information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment security management method based on encryption hardware
  • Equipment security management method based on encryption hardware
  • Equipment security management method based on encryption hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The embodiment of the present invention discloses a device security management method based on encryption hardware, including the following steps:

[0034] S1. Detect whether there is device unique identifier DEVICE_ID information in the encryption hardware, and detect whether there is encryption hardware unique identifier SDCARD_ID information in the device sec-id partition;

[0035] S2. If neither the DEVICE_ID information nor the SDCARD_ID informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment security management method based on encryption hardware, which comprises the following steps of: S1, detecting whether equipment unique identification DEVICE_ID information is stored in the encryption hardware or not, and detecting whether encryption hardware unique identification SDCARD_ID information is stored in a sec-id partition of the equipment or not; S2, if neither the DEVICE_ID information nor the SDCARD_ID information exists, binding the encryption hardware with equipment, and continuing to start the equipment after binding; and S3, if the DEVICE_ID information or the SDCARD_ID information does not exist, or both the DEVICE_ID information and the SDCARD_ID information exist but the information is not matched, indicating that the encryption hardware cannot be matched with the equipment, shunting down the equipment, and if the information is matched, continuing to start the equipment. According to the equipment security management method, the starting process of the equipment is reconstructed based on t e hardware encryption hardware, one-to-one binding of the encryption hardware and the equipment is realized, the system can be normally started under the condition that the encryption hardware held by the user is matched with the equipment, and the safety of the starting process of the equipment is effectively improved.

Description

technical field [0001] The present invention relates to the technical field of computers, and more specifically relates to a device security management method based on encryption hardware. Background technique [0002] With the popularization of smart devices, the security of smart device systems has become more and more important. The general device management in the prior art is not bound to other hardware. Others can start the device normally after getting it. If the password to enter the system is broken, You can enter the system to steal important information. [0003] Therefore, how to provide a device security management method based on encryption hardware is an urgent problem to be solved by those skilled in the art. Contents of the invention [0004] In view of this, the present invention provides a device security management method based on encryption hardware, which can effectively improve the security of the device startup process. [0005] In order to achiev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71
CPCG06F21/71
Inventor 江定卿
Owner 上海盛本智能科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products