Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication encryption method and device of SE chip and storage medium

An encryption method and chip technology, applied in the field of Internet of Things, can solve problems such as loss of corporate and national interests, and achieve the effects of enhancing security, occupying less resources, and increasing the difficulty of deciphering

Active Publication Date: 2022-08-05
ALLYSTAR TECH SHENZHEN CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the level of communication transmission, the use of SE chips does improve the security of data, but with the development of technology, criminals crack the communication interface data of SE chips and tamper with the content of interactive data between hosts and terminals, which brings great harm to enterprises and the country. huge profit loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption method and device of SE chip and storage medium
  • Communication encryption method and device of SE chip and storage medium
  • Communication encryption method and device of SE chip and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] see figure 2 , figure 2 It is a schematic flowchart of an embodiment of the communication encryption method of the SE chip of the present invention. like figure 2 As shown, the method includes the steps:

[0034] S11: Write the basic key of the XXTEA algorithm to the main control module and the SE chip respectively;

[0035] In step S11, the SE chip is set on the IoT terminal device.

[0036] Preferably, before the product leaves the factory, the basic key is written into the main control module and the SE chip respectively. That is to say, only the manufacturer of the terminal device knows the basic key, and other personnel cannot know the basic key.

[0037] S12: when the main control module communicates with the SE chip, use the XXTEA algorithm and the basic key to encrypt the plaintext data sent by the communication sender to obtain a first ciphertext data;

[0038] In step S12, since the XXTEA algorithm encrypts the 64-bit data block as a unit, the plainte...

Embodiment 2

[0050] see Figure 4 , Figure 4 It is a schematic flowchart of an embodiment of the communication encryption method of the SE chip of the present invention. like Figure 4 As shown, steps S21 to S23 of the method are the same as figure 2 Steps S11~S13 are the same, and step S25 is the same as figure 2 is the same as step S14, the method is the same as figure 2 The difference is that there are also steps:

[0051] S24: Perform an exclusive OR operation on the second ciphertext data, and convert the second ciphertext data into third ciphertext data.

[0052] In step S24, the method of performing the XOR operation on the second ciphertext data may be: Next, taking the example of the first embodiment as an example, the data of the second ciphertext data with a length of 16 bytes is denoted as A 1 B 1 A 2 B 2 A 3 B 3 A 4 B 4 A 5 B 5 A 6 B 6 A 7 B 7 A 8 B 8 , the A 1 and B 1 XOR the A 1 and B 1 The XORed value is placed in B 1 position, the B 1 and A ...

Embodiment 3

[0056] see Figure 5 , Figure 5 It is a schematic flowchart of another embodiment of the communication encryption method of the SE chip of the present invention. like Figure 5 As shown, steps S31 to S34 of the method are the same as figure 2 The steps S11~S14 are the same, the method is the same as figure 2 The difference is that there are also steps:

[0057] S35: Decrypt the second ciphertext data at the communication receiver;

[0058] In step S35, it can be understood that the communication receiver has the basic key of the XXTEA algorithm, so the second ciphertext data can be decrypted at the communication receiver to obtain plaintext data.

[0059] S36: If the decryption fails, count the number of decryption failures;

[0060] In step S36, if the second ciphertext data is tampered with other forms of data due to human intervention, the data decrypted in step S35 does not conform to the format of plaintext data, or the second ciphertext data cannot be obtained b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication encryption method and device of an SE chip and a storage medium, the SE chip is arranged on an Internet of Things terminal device, and the method comprises the following steps: respectively writing a basic key of an XXTEA algorithm into a main control module and the SE chip; when the main control module communicates with the SE chip, encrypting plaintext data sent by a communication sender by using the XXTEA algorithm and the basic key to obtain first ciphertext data; generating a random number, and adding the random number into the first ciphertext data according to a preset rule to obtain second ciphertext data; and sending the second ciphertext data to a communication receiver. According to the invention, the communication data between the SE chip and the main control module is encrypted, even if an illegal intruder obtains the communication data, the illegal intruder cannot obtain the plaintext data content of the communication data because the communication data is in a ciphertext form, so that the data security of the Internet of Things terminal equipment is protected.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a communication encryption method, device and storage medium of an SE chip. Background technique [0002] TEA Algorithm: Originally designed in 1994 by David Wheeler and Roger Needham of the Cambridge Computer Laboratory. The algorithm uses a 128-bit key to encrypt a 64-bit block of information, and it requires 64 iterations. The XXTEA algorithm is the latest variant of the TEA algorithm. It was proposed in 1998. It is an encryption algorithm with fast computing speed and small resource consumption, which is very suitable for application in small IoT equipment products with limited resources. [0003] In large-scale IoT applications, data security has always been the focus of attention. like figure 1 As shown, the current IoT terminal equipment generally includes an SE chip, a main control module, and a communication module. In general applications, the communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40G06F21/60
CPCH04L9/0877H04L63/0428H04L63/0478G06F21/602
Inventor 崔新亮孙中亮
Owner ALLYSTAR TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products