Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Cryptographic hardware" patented technology

Hardware-Bonded Credential Manager Method and System

ActiveUS20090259838A1Improve authentication methodReduce chanceSecuring communicationThe InternetUser authentication
An internet data exchange authentication method that can provide much of the user authentication assurance and capability of dedicated computer security cryptographic hardware, without requiring that the user actually have such hardware. This method allows users with computerized devices to communicate securely with secure servers by creating customized challenge-response authentication objects (pockets) where both the challenge and the response is based partially on the hardware identity of the user's computerized device, and partially on a secret (such as a random number) known only by the secure server. The secure server receives the device's hardware identity, generates the secret, creates the pocket, encrypts the pocket, and sends the encrypted pocket back to the user's device. The secure server, or a third trusted credential server, then sends the decryption key for the encrypted pocket back to the user using a different, “out of band” communications modality, thus reducing the chances of interception.
Owner:AUTHENEX

Signature method and device for generating SM2 algorithm through mutual coordination, and storage medium

The invention discloses a signature method and device for generating an SM2 algorithm through mutual coordination, and a storage medium, and solves the problem that a user private key is easily stolenin the prior art under the condition of no cryptographic hardware. The signature method implemented by a first participant includes the steps: receiving intermediate information determined by a second participant according to a signature output party identifier; determining a participant of the complete signature of the to-be-signed message based on the signature output party identifier; generating a second partial signature of the to-be-signed message by using a first sub-private key and the intermediate information if the first participant outputs the complete signature, and outputting thecomplete signature consisting of the first partial signature and the second partial signature carried in the intermediate information; generating a first intermediate signature through the first sub-private key and the intermediate information of the second participant outputs the complete signature, and sends the first intermediate signature to the second participant, so that the second participant can generate a second partial signature of the to-be-signed message by using a second sub-private key and the first intermediate signature, so as to determine the complete signature.
Owner:北京信安世纪科技股份有限公司

Data processing method and device based on national password, storage medium and electronic equipment

The invention relates to the technical field of network security, and provides a data processing method and device based on national secret, a storage medium and electronic equipment. The method comprises the steps of converting a data structure of to-be-processed data sent by a target program through an engine interface from a data outgoing standard structure specified by the target program intoa standard structure which can be analyzed by national cryptographic hardware cryptographic equipment to obtain first converted data; sending the first converted data to the national cryptographic hardware cryptographic equipment; converting the data structure of the processed data returned by the national cryptographic hardware cryptographic equipment from the data outgoing standard structure specified by the national cryptographic hardware cryptographic equipment into a standard structure which can be analyzed by the target program to obtain second converted data; and sending the second converted data to the target program through the engine interface, so that the target program performs a subsequent encryption communication process based on the second converted data. According to the method, the cryptographic hardware cryptographic equipment can be added into the target program through an engine mechanism, and core codes of the program do not need to be modified.
Owner:BEIJING TOPSEC NETWORK SECURITY TECH +2

Encryption method and device

A method and a device are disclosed for the low-cost implementation even of high-performance encryption functions in an encryptor. The encryptor may be composed merely of PC software or the like, or of any other terminal/information system with integrated Vernam cipher which does not need to be supported by expensive crypto-hardware for the actual encryption process. The crypto-hardware is made either of a chipcard or a multifunctional PC interface adapter (e.g., PCMCIA module) with built-in special crypto-hardware. The encryptor, on the other hand, is a conventional personal computer, software or another terminal which, however, with the exception of the very simple Vernam cipher (e.g., EXOR), needs no further crypto-technology even for broad-band applications in software. The external crypto-modules contain all the complex crypto-functions which generate the Vernam key in reserve, the reserves being temporarily stored in an intermediate storage until they are gradually used up by the encryption process through logic operations of the method. The storage may be installed either in the PC or terminal, or also in the crypto-module. The encryptor always operates with the same Vernam cipher, even if the external crypto- or PCMCIA modules use different symmetrical and asymmetrical ciphers. External crypto-modules in the form of chipcards or PCMCIA modules are inexpensive to manufacture. All the complex crypto-functions are located outside of the encryptor. They are interchangeable by module and can be implemented in the proposed low-cost and somewhat lower-speed external crypto-modules.
Owner:DEUTSCHE TELEKOM AG

Distributed network node authentication method based on chip

The technical scheme of the invention discloses a distributed network node authentication method based on an encryption chip. The method comprises the following steps: a first node and a second node respectively generate a public and private key pair and a random number; the first node and the second node exchange random numbers and public key information with each other; the first node receives the second random number, processes the second random number by using the first private key and the second public key to obtain a first encrypted signature and transmits the first encrypted signature to the second node; the first node receives the second encrypted signature by using the first private key and the second public key to decrypt and obtain verification information; and if the verification results of the first node and the second node are consistent, the encrypted hardware number of the current node is bound with the current node to complete node verification. According to the distributed network node authentication method and system based on the chip provided by the invention, a hardware random number and information encryption combined method is adopted, so that the security ofidentity authentication information between different nodes in a distributed network is greatly improved.
Owner:上海朝夕网络技术有限公司

Software security and software validity period verification method and system

The invention discloses a software security and validity period verification method and system, and the method comprises the steps: obtaining hardware data of a host when software runs; encrypting the hardware data by adopting an encryption algorithm to obtain a first identification code and a first verification code corresponding to the first identification code; judging whether the first verification code is successfully matched with a pre-obtained target verification code or not; if yes, verification is passed, otherwise, dates D are traversed in a date set, the first identification code and the dates D are processed and then encrypted, a second verification code corresponding to each date D is obtained, D belongs to [D1, D2], D is a positive integer, D2 is larger than or equal to D1, D1 is the current date of the system, and D2 is the expiration date of the validity period of the software; judging whether a second verification code matched with the target verification code exists or not; if yes, determining that the verification is passed, and if not, determining that the verification fails. According to the method, additional encryption hardware is not needed, the cost is reduced, the period is short, and verification of software in environments such as medical scenes which cannot be connected with an external network is facilitated.
Owner:合肥泽康电子科技有限公司

Equipment security management method based on encryption hardware

The invention discloses an equipment security management method based on encryption hardware, which comprises the following steps of: S1, detecting whether equipment unique identification DEVICE_ID information is stored in the encryption hardware or not, and detecting whether encryption hardware unique identification SDCARD_ID information is stored in a sec-id partition of the equipment or not; S2, if neither the DEVICE_ID information nor the SDCARD_ID information exists, binding the encryption hardware with equipment, and continuing to start the equipment after binding; and S3, if the DEVICE_ID information or the SDCARD_ID information does not exist, or both the DEVICE_ID information and the SDCARD_ID information exist but the information is not matched, indicating that the encryption hardware cannot be matched with the equipment, shunting down the equipment, and if the information is matched, continuing to start the equipment. According to the equipment security management method, the starting process of the equipment is reconstructed based on t e hardware encryption hardware, one-to-one binding of the encryption hardware and the equipment is realized, the system can be normally started under the condition that the encryption hardware held by the user is matched with the equipment, and the safety of the starting process of the equipment is effectively improved.
Owner:上海盛本智能科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products