Security enhancement processing method for embedded security module

A security module and processing method technology, applied in the direction of electrical digital data processing, computer security devices, instruments, etc., can solve problems affecting the security of transmitted data, user experience, data leakage, etc., to reduce the probability and traceability of abnormal situations strong effect

Pending Publication Date: 2022-03-25
GUIZHOU POWER GRID CO LTD +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the above-mentioned shortcomings existing in the prior art, the present invention provides a security-enhancing processing method for an embedded security module, which solves the problem that a malicious attacker obtains information stored in a computer by directly reading and writing these hardware devices, resulting in an error in the data transmission process. Data leaks in the network, or intrusions carry viruses to complete the transmission, which affects the security of the user's data transmission and user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security enhancement processing method for embedded security module
  • Security enhancement processing method for embedded security module
  • Security enhancement processing method for embedded security module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A security enhancement processing method of an embedded security module in this embodiment, such as figure 1 shown, including the following steps:

[0047] Step1: Determine whether there is a transmission medium in the data transmission process, obtain the data receiving path, and analyze the security of the data sending source;

[0048] Step2: When the data transmission adopts the medium transmission method, establish the data receiving storage space, and when the device enters the network state, check the data received in the storage space;

[0049] Step3: Establish a sensitive thesaurus, compare the content recorded in the sensitive thesaurus with the content of the received data, and perform a pre-browsing of the received data;

[0050] Step4: When the detection result matches the sensitive lexicon, refuse to receive the data received in the storage space; when the detection structure does not match the sensitive lexicon, the received data is released, and the devi...

Embodiment 2

[0064] At the level of specific implementation, the present invention provides a security enhancement processing method for the use state of an embedded security module, comprising the following steps:

[0065] S1: Establish a data transmission channel, obtain data packet attributes, and analyze the data packet attributes;

[0066] S2: When the data transmission channel is transmitted by a medium, the transmission environment of the equipment is safe, and the data received by the target starts to transmit through the medium;

[0067] S3: When the data transmission channel is transmitted by a medium, and there are loopholes or viruses in the transmission environment of the equipment used, the loopholes of the equipment used are repaired and the virus is checked and killed before transmission;

[0068] S4: Determine the time required for data storage and the receiving and storing method according to the attributes of the transmitted data package;

[0069] S5: Set up the data tr...

Embodiment 3

[0080] Such as image 3 , 4 and 5, with Figure 5 It can be obtained that there is no Zip format file in the transfer target A, and the transfer target B contains the Zip format file. During the transfer process of both, the transfer rate is abnormal, because there is no Zip format file in A, and the file in B contains For files in Zip format, it can be preliminarily determined that the abnormal rate in B may be caused by the impact of the Zip file, so the abnormal rate in A can be confirmed as abnormal.

[0081] To sum up, the present invention provides a more targeted security enhancement processing method for the use of embedded security modules. This method can distinguish the methods used in the data storage process, and the transmission with medium transmission and without medium transmission is highly secure. It has strong traceability for abnormal situations in transmission without medium, and compared with the transmission with medium, it has enhanced security prote...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of intelligent equipment, in particular to a security enhancement processing method of an embedded security module, which comprises the following steps: Step 1: judging whether a transmission medium exists in a data transmission process, acquiring a data receiving path, and analyzing the security of a data sending source point; step 2, when the data transmission adopts a medium transmission mode, establishing a data receiving storage space, and when the equipment enters a networking state, checking the data received by the storage space; 3, establishing a sensitive word bank, comparing the content recorded by the sensitive word bank with the content of the received data, and pre-browsing the received data; according to the method, a more targeted security enhancement processing method is provided for use of the embedded security module, the data storage process adopting modes can be distinguished, the transmission security is high through medium transmission and medium-free transmission, the traceability of abnormal conditions in the medium-free transmission is high, and the security of the embedded security module is improved. And compared with the prior art, security enhancement and prevention during medium transmission do not exist.

Description

technical field [0001] The invention relates to the technical field of smart devices, in particular to a security enhancement processing method for an embedded security module. Background technique [0002] In the existing computer system architecture, access to any standard device is open, such as floppy disk drive, hard disk drive, PCI device, and USB device. The reading and writing methods and communication protocols of these devices are public, which allows any user to directly access these devices and read information directly from these devices. Because of this open architecture, it is possible for some malicious attackers to obtain information stored in the computer by directly reading and writing these hardware devices, or destroy the information. For example, an attacker can directly operate the hard disk drive through the underlying program and read data directly from the hard disk sector. In this way, the data of the entire hard disk can be read, analyzed, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57G06F21/60
CPCG06F21/56G06F21/577G06F21/606
Inventor 董天强胡厚鹏欧家祥陈泽瑞邓玥丹李航峰高正浩吴欣何沛林吴才远余云昊肖艳红母天石赖宇阳吴昊王依云邓建锋张丽娟李慧娟徐宏伟
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products