Safe and efficient industrial hardware encryption method
A hardware encryption and high-efficiency technology, which is applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as conflicts, communication interface transmission speed and complexity of encoding methods, sub-module random actions, etc., to achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0023] Such as figure 1 Shown, the overall system diagram of the hardware module of a kind of embodiment that the method of the present invention is applied, figure 2 It is a flow chart of the method of the present invention, the method is used in an application scenario including a main controller and various hardware sub-modules, and the encryption method includes:
[0024] First, the access frequency and access authority requirements are set through the embedded software of the hardware sub-module to monitor and record malicious access behaviors;
[0025] The random number generated by the random number generator RNG of the microprocessor and the hardware address code pass through the encryption algorithm to generate the hidden address code, public key and private key, and the hardware sub-module only sends the public key to the master when it is powered on and initialized. MCU. Encryption methods include but are not limited to the RSA asymmetric algorithm. The hardware...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

