CN102064942A - Credible integrated security processing platform - Google Patents

Credible integrated security processing platform Download PDF

Info

Publication number
CN102064942A
CN102064942A CN2010105651034A CN201010565103A CN102064942A CN 102064942 A CN102064942 A CN 102064942A CN 2010105651034 A CN2010105651034 A CN 2010105651034A CN 201010565103 A CN201010565103 A CN 201010565103A CN 102064942 A CN102064942 A CN 102064942A
Authority
CN
China
Prior art keywords
information
communication
fpga
user
gate array
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105651034A
Other languages
Chinese (zh)
Inventor
张功萱
王平立
宋斌
王玲
赵洋
张容
王维聘
温冬伟
朱昭萌
陈瀚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Science and Technology
Original Assignee
Nanjing University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Science and Technology filed Critical Nanjing University of Science and Technology
Priority to CN2010105651034A priority Critical patent/CN102064942A/en
Publication of CN102064942A publication Critical patent/CN102064942A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a credible integrated security processing platform, which is an integrated (chip) device comprising a central processing unit, an interface circuit, an encryption module, a communication encoder, a data storage, a program storage, a download interface, and the like. The processing platform can complete the functions of data collecting, data processing, data encrypting, communication encoding, and on the like in a chip. The data encryption module and the communication encoder can be realized by programmable digital logic (PLD) hardware. Meanwhile, encryption algorithm and communication encoding scheme can be updated at any time according to user needs. Because the processing programs of the central processing unit are completely developed by users, the generality of the system can be improved, and the security of the entire processing system can be obviously improved.

Description

A kind of believable integrated security processing platform
Technical field
The invention belongs to computer and information security field, relate to technology such as computer communication, parallel computation, information security, particularly a kind of believable integrated security processing platform that is used for the security information transmission between the moving target group.
Background technology
Moving targets such as vehicle are more and more, it is essential that information between them transmits, the information category that transmits is numerous and diverse and contain much information, message transmission has only radio at present, and just mean all open by wireless radio transmission, the somebody of institute can both receive, and also might send error message to target.At this moment the information security of the communication between the target complex is just mentioned very important position.The scheme that extensively adopts is to information encryption at present, and the principle of encryption can be represented that just all modules among the figure are all realized by individual chips by Fig. 1.Generally believe that at present believable encrypting module must be finished by separate hardware enciphering/deciphering logic, just can reach the fail safe and the enciphering rate requirement of encryption.
There are the several cuttings point that may be attacked by the adversary in this scheme:
(1) because encrypting module is to be finished by separate hardware chips, and the link of the exploitation of chip, design, manufacturing, production is a lot, the personnel that relate to are a lot, as long as any one link is out of joint therein, only just might there be the back door in chip, safety is produced hidden danger, or reveal the cryptographic algorithm of chip internal.
(2) because encrypting module is realized that by hardware chip independently its information input and output must realize by external pin, and obviously input be expressly, output be ciphertext.The adversary can use high performance Digital Logic analyzer to obtain simultaneously expressly and ciphertext, and this is very strong to deciphering.
(3) since encrypting module realize by hardware chip independently, inevitable a large amount of production of chip, a large amount of use just do not guaranteed as long as one of them encryption chip has been carried out cracking this fail safe of using a collection of encryption chip equipment.
(4) both use the public encryption algorithm, and also had report to say and to have deciphered.
Summary of the invention
The object of the present invention is to provide a kind of believable integrated security processing platform.
The technical solution that realizes the object of the invention is: a kind of believable integrated security processing platform includes in an integrated circuit (IC) chip:
A central processing unit is used for process information;
One group of interface circuits is used for being connected with sensor external or controller, realizes the multi-path digital of outside or the collection of analog signal, and external equipment is sent control signal;
An encrypting module that is made of FPGA (Field Programmable Gate Array) PLD is realized communication information is carried out the hardware enciphering/deciphering, can upgrade cryptographic algorithm voluntarily by the user simultaneously;
A communication coding device that is made of FPGA (Field Programmable Gate Array) PLD is realized communication information is carried out hardware encoding, can upgrade encoding scheme voluntarily by the user simultaneously;
A data memory and a program storage are used for the user storage handling procedure and provide process information needed memory space;
A download interface, the program that is used for the user is downloaded, and FPGA (Field Programmable Gate Array) is carried out logic download;
Described central processing unit is connected with a group of interface circuits, encrypting module, program storage and data storage respectively, encrypting module links to each other with the communication coding device, outside primary signal is seen off after the information via communication coding device after the encryption is delivered to radio transmission apparatus by on the external sensor access interface circuit; The needed handling procedure of central processing unit is stored in the program storage, and the needed memory space of these program running is provided by data storage.
The present invention compared with prior art, its remarkable advantage: (1) improves the grade of security information.Information gathering, processing, encryption, communication coding are integrated in the chip.Can not obtain the plaintext and the ciphertext of communication so simultaneously, because here information is from the input of raw sensor, in general input information is disorderly and unsystematic the needs just can obtain valid data after the central processing unit processing, the angle that cracks from information is if the valid data that obtain determining from raw sensory information also are suitable difficulties, and actual identical input information also not necessarily can obtain identical data through identical routine processes.Need filtering, sampling, segmentation, compression just can obtain effective voice data as voice messaging, under the situation of having known handling procedure, also be difficult to obtain identical valid data from input information.Meanwhile valid data are not exported away in the present invention, but valid data (encrypting module is called expressly) are directly encrypted at chip, radio transmission apparatus is just given in coding back (encrypting module is called ciphertext).For the cryptographic algorithm of a compliant, if 1% difference is expressly arranged, then ciphertext can not find similitude substantially.Therefore, in theory, under the condition of not knowing the intermediate treatment process, the contact that only wants to find out from the ciphertext of the raw information of input and output them is impossible.
(2) the present invention adopts the hardware of FPGA (Field Programmable Gate Array) to realize encrypting module, at first is to adopt hardware encipher/deciphering, and encrypt/decrypt speed is fast, is difficult for cracking; Next adopts FPGA (Field Programmable Gate Array) to realize, can formulate cryptographic algorithm as required voluntarily by the user; Each user adopts separately independently cryptographic algorithm on same platform, also is safe between each user; The user can regularly or aperiodically upgrade cryptographic algorithm according to the security needs of self; Key also adopts former principle of secrecy to generate and manage simultaneously.Further increased the difficulty that cracks.
(3) the present invention adopts the hardware of FPGA (Field Programmable Gate Array) to realize encrypting module and communication coding device, the user can design cryptographic algorithm and communication coding scheme voluntarily, and write FPGA (Field Programmable Gate Array) and download is very easily, and the personnel that relate to like this can be seldom, and safety has also just improved comparatively speaking.
(4) the present invention is integrated into a plurality of individual chips in the original system in the chip, can prevent from like this to obtain intermediate data by the lead-in wire of chip chamber, strengthens and cracks difficulty.The analytical method of sheet also can only obtain the circuit of hard logic even employing rubs, and FPGA (Field Programmable Gate Array) partly is to adopt charge storage mode to realize logic, and electric charge disappears behind the sheet that rubs, and also just can't obtain circuit.
(5) the present invention is integrated into a plurality of individual chips in the original system in the chip, can significantly reduce volume, the weight of system like this; The more important thing is the line that has reduced between the chip, reduced the solder joint raising reliability that can reduce cost.Construction cycle is short, uses flexibly.
Description of drawings
Accompanying drawing is the structural representation of a kind of believable integrated security processing platform of the present invention.
Embodiment
Below in conjunction with accompanying drawing the present invention is described in further detail.
The present invention is integrated in all modules among Fig. 1 in the integrated circuit, and encrypting module and coding module are to be realized by FPGA (Field Programmable Gate Array) (PLD), can improve the fail safe of information so greatly, encrypting module is to realize that by hardware the algorithm of Jia Miing can upgrade according to user's needs simultaneously fully.This platform can be described as general, can provide the disposal ability of information processing, the various algorithms of enciphering/deciphering for numerous moving target (vehicle, mobile phone etc.), for communication coding provides various schemes.All use the system of this platform to have independently message handling program separately, encryption/decryption algorithm, and the communication coding scheme also is safe each other.In this platform process of use, be cracked if suspect the cryptographic algorithm of oneself, then can upgrade the cryptographic algorithm of oneself at any time, or the renewal cryptographic algorithm on regular (irregularly) ground, do not need to change simultaneously any hardware.Here said credible to be based on all message handling programs be that user oneself writes, and cryptographic algorithm is also by user oneself definition in the chip, and the communication coding scheme also is that user oneself works out, and does not exist by other people and leaves the back door possibility.
In conjunction with Fig. 1, a kind of believable integrated security processing platform of the present invention comprises:
A central processing unit 3 is used for process information, can be programmed voluntarily by the user;
A group of interface circuits 2 is used for being connected with sensor external or controller; The collection of realization information and to the control of equipment;
An encrypting module 4 that is made of FPGA is realized the hardware encipher to information, can allow the user upgrade cryptographic algorithm voluntarily simultaneously;
A communication coding device 5 that is made of FPGA is realized communication information is carried out hardware encoding, can allow the user upgrade encoding scheme voluntarily simultaneously;
A program storage 7 and a data memory 6 are used for the user storage handling procedure and provide process information needed memory space;
A download interface 8, the program that is used for the user is downloaded, and FPGA (Field Programmable Gate Array) is carried out logic download.
Central processing unit 3 is centers of safe handling platform of the present invention, and central processing unit is connected with interface circuit 2 by one group of I/O interface; Central processing unit is connected with data storage 7 with program storage 6 by internal bus; Central processing unit links to each other with encrypting module by inner Avalon bus.Encrypting module 4 links to each other with communication coding device 5 by FPGA (Field Programmable Gate Array).
Security platform of the present invention is the center with central processing unit 3, link to each other with circuit such as a group of interface circuits 2, encrypting module 4, program storage 6, data storage 7, download interface 8 respectively, outside original primary signal by external sensor in the interface circuit access platform, after in platform, handling by the 3 pairs of raw informations of central processing unit, valid data being encrypted, is at last it to be carried out communication coding to deliver to behind the radio transmission apparatus to see off again.Central processing unit 3 needed handling procedures with powerful information processing capability are stored in the program storage 6, are provided by data storage 7 at the needed memory space of these program running.The present invention is to be to be integrated in the very lagre scale integrated circuit (VLSIC) with central processing unit, encrypting module, communication coding device, program storage, data storage, I/O interface.Reduce the number of chip, reduced the line between the chip, also just stopped the possibility that intermediate data is stolen.Be that CPLD etc. are hard-wired by FPGA (Field Programmable Gate Array) such as FPGA with encrypting module, communication coding module simultaneously.Can guarantee that so on the one hand cryptographic algorithm and encoding scheme finished by hardware fully; But the user upgrades cryptographic algorithm and encoding scheme according to requirement programming voluntarily on the other hand.The user is write handling procedure by process information, is downloaded in the program storage 6 by download interface 8; The user is downloaded in the encrypting module 4 by download interface 8 for encrypting the cryptographic algorithm FPGA (Field Programmable Gate Array) of design; The user is downloaded in the communication coding module 7 by download interface 8 for the encoding scheme secure programmable logic of communication coding modular design.
It is own credible the present invention is based on the handling procedure that the user independently writes, the cryptographic algorithm of autonomous Design, the communication coding scheme of autonomous Design.
The present invention does not carry out any change to original key generation, key management mechanism, can not be lower than the security intensity of original system so at least.
A kind of believable integrated security processing platform using method of the present invention is as follows:
Concerning design a complete moving target the information processing communication system, can design as usual, analyze all possible input information, output information, communication information, because the disposal ability of platform of the present invention is powerful, all (or user think necessary) information all may be connected on the platform by the input/output interface of this platform, and not according to only the information relevant with communication being connected with platform in the original system.That is to say that the information of access platform not only has the information relevant with communication, also have and the irrelevant information of communication; As everyone knows, input information is many more, complicated more, uncertain more with the relation of communication, and is also just big more for the difficulty that cracks like this.
After input, the output output information of system are determined, just these information are handled, the user is according to the actual needs coding on central processing unit independently of oneself, the method of coding is the same with the programming of other processor, the general high-level language (as C) that adopts is write, in case of necessity also can be with collecting.Information to input, output is analyzed, is handled, and can adopt some unique mode to carry out on processing mode, with tightening security property.Not all here input, output information are all relevant with radio communication, central processing unit can provide disposal ability for the information processing of moving target inside, can reduce the quantity of processor so on the one hand, with the irrelevant information adding of communication, also increased the difficulty that the assailant cracks more on the other hand.The user can definite voluntarily as required which information will carry out communication, after the information via processing that needs communication, just delivers to encrypting module as valid data.
In general the information of outside input is directly to utilize, all must handle and just can become valid data through central processing unit, and information is various property, processing method also is a diversity, the present invention will handle all information of input by the programming of user's row by the central processing unit of inside, if so assailant's all information of having obtained input also can't generate just the same valid data; And these valid data also and indefinite a needs all see off by RTTY, have only the valid data that will send just need deliver in the encrypting module, as long as the assailant does not obtain the program in the processor, only starting with from input raw information is to obtain valid data to be encrypted (being called expressly at this).Plaintext attack is the most effective aspect security attack, and one of emphasis of the present invention just is to allow the assailant can't obtain expressly, and its method is expressly to transmit by the chip internal bus.
The cryptographic algorithm that designing user is own, be generated as the JEDEC file of standard after describing by hardware description language (as VHDL etc.), download in the respective modules through download interface, at this moment encrypting module, communication coding module have just generated automatically to hardware logic and have finished encryption function and communication coding function again.When the design cryptographic algorithm, can adopt DES, aes algorithm, or its improvement algorithm, because DES, aes algorithm are to adopt the method for displacement, wheel, bit box to encrypt, this method is very easily for adopting hardware logic to realize, takies logic gate number and few.This method of while needs only carries out a bit changing just can generating a different algorithm easily to data in the position of replacing, the bit box, and security intensity can not destroy yet.Certainly for asymmetric key cipher algorithm (RSA, Rabin, E1Gamal, ECC etc.), because its complexity adopts hardware to realize acquiring a certain degree of difficulty, and it is more to take logic gate number, has also required higher mathematical ability during improvement.Can believe that along with development of integrated circuits it also is feasible adopting the low-cost realization of FPGA (Field Programmable Gate Array) RSA Algorithm.Even if one of emphasis of the present invention just is the assailant and adopts the chip anatomy also can't obtain cryptographic algorithm, because programmable logic device (GAL) inside is whether to store electric charge in the employing floating gate to decide logical relation, as long as chip is opened electric charge will disappear, the assailant can't obtain inner logical relation.
Designing user is formulated the communication coding scheme voluntarily, be generated as the JEDEC file of standard after describing by hardware description language (as VHDL etc.), download in the respective modules through download interface again, at this moment the communication coding module has just generated automatically to hardware logic and has finished the communication coding function, goes out through radio transmitting at last.
Any security password is safe in a period of time just, and cryptographic algorithm is also being updated and developed, and the encrypting module of this platform can carry out according to user's needs regularly or aperiodically upgrading cryptographic algorithm, does not need to upgrade hardware unit.
Safe handling platform of the present invention is general, as long as there is the colony of processing and encryption communication demand all can use, each communication colony formulates oneself independently information processing method, encryption, decipherment algorithm, communication coding scheme separately, each comfortable this platform coding, write logic, finish the communication of having only own colony inside to carry out.Be to maintain secrecy mutually between each colony.
Provide a simple example below processing procedure of the present invention is described, and its security advantages.
The design of the secure voice intercom system of a moving target supposes that this system has only an input---voice-input device microphone, an output---voice-output device loud speaker, a communication information transmitted---voice messaging.When setting up system input, output are connected with the interface of platform of the present invention, the voice signal that receives and send can be analog quantity, also can be digital quantity, if analog quantity can adopt the A/D converter in the sheet to become digital quantity.The course of work and the security advantages of platform of the present invention are described for the sake of simplicity, here only describe by phonetic entry and go out to encrypting back radio transmitting.The first, the numeral that obtains voice from input interface is an information; Second, the user has central processing unit to programme voluntarily, to the voice signal of input sample, filtering, compression, for tightening security property may adopt unique processing mode, select uncurrent frequency as sample frequency, formulate filtering, compression scheme according to the actual requirements; The 3rd, the user designs cryptographic algorithm voluntarily, by downloading in the FPGA (Field Programmable Gate Array) of this platform after hardware description language (as the VHDL etc.) programming, realizes hardware encipher; The 4th, the user formulates the communication coding scheme voluntarily, by downloading in the FPGA (Field Programmable Gate Array) of this platform after hardware description language (as the VHDL etc.) programming, realizes the hardware communication coding; The 5th, with final encryption coded message send on the outer radio transmission apparatus of this platform, send.Analyze the fail safe of native system below, possibility 1, the assailant can only obtain RI radio intelligence, in this case as long as the cryptographic algorithm that the user designs voluntarily reaches the requirement safety of regulation, compare with the system that does not adopt platform of the present invention, can not be lower than its security intensity; Possibility 2, the assailant has obtained original speech information and RI radio intelligence (just a plain code is attacked) simultaneously, because this platform is from the original speech information to the RI radio intelligence, sampling, filtering, compression, encryption, a plurality of links of coding have been passed through, and each link all is that the user defines voluntarily, also can't crack under the prior art condition; Compare with the system that does not adopt platform of the present invention, each link of original system partly or entirely is disclosed, theoretically necessarily than original system high safety.Possibility 3, the assailant has obtained complete system and has repeatedly specified plaintext attack, because this platform is a plurality of links that will handle to be integrated in and can't to obtain intermediate data in the chip, at this moment attack and be equal to plaintext attack, and the sampling of this platform, filtering, speech processes is to define voluntarily because the randomness in handling, data after same plaintext (raw tone) is handled also are not necessarily just the same, 1% difference (people's ear can't be differentiated) is arranged in this way through overcompression, must there be similitude after the encryption, just repeatedly specify plaintext attack can not obtain identical ciphertext, this attack can not be successful.Possibility 4, the assailant has obtained complete system and has carried out destructive dissection and analysis, the present sheet that rubs is dissected the hard logic that can obtain chip internal, also can get plug-in, because programming device is to rely on the electric charge in the floating gate to determine logic, electric charge just disappears in case chip is opened, and is to restore original logic therefore.Even there is higher technology dissection and analysis to go out logic later on, also just can only crack this, the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Possibility 5, the assailant has obtained complete system and has gone forward side by side to commit theft and listen, and platform is general, and each customer group is the Design Treatment process voluntarily, and the design cryptographic algorithm is formulated encoding scheme.Each platform also only intercepts the information of this group, and the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Possibility 6 spy occurred among the personnel of participation design system, and platform is general, and each customer group is the Design Treatment process voluntarily, and the design cryptographic algorithm is formulated encoding scheme.The spy has to the present stage information of this group, and the user can solve by regularly can irregularly upgrading cryptographic algorithm.And original system can only be changed hardware and could solve.Here not considering the problem of secret key safety, mainly is all to have identical problem in all safety systems, solution to safety system all the same.

Claims (3)

1. believable integrated security processing platform is characterized in that: include in an integrated circuit (IC) chip:
A central processing unit (3) is used for process information;
One group of interface circuits (2) is used for being connected with sensor external or controller, realizes the multi-path digital of outside or the collection of analog signal, and external equipment is sent control signal;
An encrypting module that is made of FPGA (Field Programmable Gate Array) PLD (4) is realized communication information is carried out the hardware enciphering/deciphering, can upgrade cryptographic algorithm voluntarily by the user simultaneously;
A communication coding device (5) that is made of FPGA (Field Programmable Gate Array) PLD is realized communication information is carried out hardware encoding, can upgrade encoding scheme voluntarily by the user simultaneously;
A data memory (7) and a program storage (6) are used for the user storage handling procedure and provide process information needed memory space;
A download interface (8), the program that is used for the user is downloaded, and FPGA (Field Programmable Gate Array) is carried out logic download;
Described central processing unit (3) is connected with a group of interface circuits (2), encrypting module (4), program storage (6) and data storage (7) respectively, encrypting module (4) links to each other with communication coding device (5), outside primary signal is seen off after the information via communication coding device (5) after the encryption is delivered to radio transmission apparatus by on the external sensor access interface circuit (2); The needed handling procedure of central processing unit (3) is stored in the program storage (6), and the needed memory space of these program running is provided by data storage (7).
2. according to the believable integrated security processing platform described in the claim 1, it is characterized in that: encrypting module (4) is hard-wired by FPGA (Field Programmable Gate Array), and cryptographic algorithm is defined voluntarily by the user, downloads in the FPGA (Field Programmable Gate Array) by download interface.
3. according to the believable integrated security processing platform described in the claim 1, it is characterized in that: communication coding device (5) is to be realized by FPGA (Field Programmable Gate Array) hardware, the communication coding scheme is formulated voluntarily by the user, downloads in the FPGA (Field Programmable Gate Array) after being written as logic, finishes communication coding by hardware.
CN2010105651034A 2010-11-30 2010-11-30 Credible integrated security processing platform Pending CN102064942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105651034A CN102064942A (en) 2010-11-30 2010-11-30 Credible integrated security processing platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105651034A CN102064942A (en) 2010-11-30 2010-11-30 Credible integrated security processing platform

Publications (1)

Publication Number Publication Date
CN102064942A true CN102064942A (en) 2011-05-18

Family

ID=44000055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105651034A Pending CN102064942A (en) 2010-11-30 2010-11-30 Credible integrated security processing platform

Country Status (1)

Country Link
CN (1) CN102064942A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521166A (en) * 2011-12-05 2012-06-27 苏州希图视鼎微电子有限公司 Information safety coprocessor and method for managing internal storage space in information safety coprocessor
CN102542213A (en) * 2011-12-05 2012-07-04 苏州希图视鼎微电子有限公司 Information security processor and method for realizing secrecy of context information in process of operating
CN106789054A (en) * 2016-12-23 2017-05-31 携程旅游网络技术(上海)有限公司 The update method and system of dynamic encryption and decryption algorithm
CN107769917A (en) * 2016-08-22 2018-03-06 普天信息技术有限公司 A kind of credible platform and method for wireless terminal
CN108470129A (en) * 2018-03-13 2018-08-31 杭州电子科技大学 A kind of data protection special chip
CN108965292A (en) * 2018-07-12 2018-12-07 江苏慧学堂系统工程有限公司 A kind of Computer Data Security Transmission system
CN109150789A (en) * 2017-06-15 2019-01-04 沈阳高精数控智能技术股份有限公司 It is a kind of for digitizing the Hybrid Encryption communication means of workshop information security
CN110826085A (en) * 2019-10-31 2020-02-21 浪潮金融信息技术有限公司 Data encryption system and method for realizing ARM platform

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598475A (en) * 2003-09-15 2005-03-23 中国兵器工业系统总体部 Controller of digital electronic detonator
CN101014923A (en) * 2004-09-10 2007-08-08 国际商业机器公司 An integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardware

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598475A (en) * 2003-09-15 2005-03-23 中国兵器工业系统总体部 Controller of digital electronic detonator
CN101014923A (en) * 2004-09-10 2007-08-08 国际商业机器公司 An integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardware

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521166A (en) * 2011-12-05 2012-06-27 苏州希图视鼎微电子有限公司 Information safety coprocessor and method for managing internal storage space in information safety coprocessor
CN102542213A (en) * 2011-12-05 2012-07-04 苏州希图视鼎微电子有限公司 Information security processor and method for realizing secrecy of context information in process of operating
CN102521166B (en) * 2011-12-05 2015-02-11 晶门科技(深圳)有限公司 Information safety coprocessor and method for managing internal storage space in information safety coprocessor
CN107769917A (en) * 2016-08-22 2018-03-06 普天信息技术有限公司 A kind of credible platform and method for wireless terminal
CN106789054A (en) * 2016-12-23 2017-05-31 携程旅游网络技术(上海)有限公司 The update method and system of dynamic encryption and decryption algorithm
CN109150789A (en) * 2017-06-15 2019-01-04 沈阳高精数控智能技术股份有限公司 It is a kind of for digitizing the Hybrid Encryption communication means of workshop information security
CN108470129A (en) * 2018-03-13 2018-08-31 杭州电子科技大学 A kind of data protection special chip
CN108965292A (en) * 2018-07-12 2018-12-07 江苏慧学堂系统工程有限公司 A kind of Computer Data Security Transmission system
CN110826085A (en) * 2019-10-31 2020-02-21 浪潮金融信息技术有限公司 Data encryption system and method for realizing ARM platform
CN110826085B (en) * 2019-10-31 2022-08-09 浪潮金融信息技术有限公司 Data encryption system for realizing ARM platform

Similar Documents

Publication Publication Date Title
CN102064942A (en) Credible integrated security processing platform
CN105051750B (en) System and method for encrypted file system layer
CN102750233B (en) Encryption and storage confidential data
CN107612683B (en) Encryption and decryption method, device, system, equipment and storage medium
US20120195425A1 (en) Security video transmission apparatus, video data reception apparatus, and key generation method thereof
CN1319294A (en) Adapter having secure function and computer secure system using it
CN102017676A (en) System and method for electronic data security
CN101539977B (en) Method for protecting computer software
CN109450648A (en) Key generating device, data processing equipment and stream compression system
CN105235642B (en) Control instruction executes safely method and main machine for car theft-proof device
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN111556004A (en) Hybrid dual network encryption system
KR101413427B1 (en) Apparatas and method for security message transmission and reception of vehicle network
CN104915583A (en) Interface decryption processing method and mobile terminal
CN107872315A (en) Data processing method and intelligent terminal
CN112887085B (en) Method, device and system for generating security key of SSD (solid State disk) main control chip
CN106022158A (en) A takeout management system for file datas
CN101030239A (en) Account management system and method with secret function
CN1318934C (en) Data encrypting and deciphering method of data storing device with laminated storing structure
CN100379241C (en) Data processing system, storage device and computer program
CN101539978B (en) Software protection method based on space
CN111125788A (en) Encryption calculation method, computer equipment and storage medium
CN104392182B (en) A kind of method and apparatus of shredding documents
CN113158203A (en) SOC chip, circuit and external data reading and writing method of SOC chip
CN101951471A (en) Fingerprint locking technology based on display system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Zhang Gongxuan

Inventor after: Fu Anmin

Inventor after: Song Bin

Inventor after: Wang Ling

Inventor after: Zhao Yang

Inventor after: Wang Tianshu

Inventor after: Zhu Zhaomeng

Inventor after: Guo Jian

Inventor after: He Dinglong

Inventor before: Zhang Gongxuan

Inventor before: Chen Han

Inventor before: Wang Pingli

Inventor before: Song Bin

Inventor before: Wang Ling

Inventor before: Zhao Yang

Inventor before: Zhang Rong

Inventor before: Wang Weipin

Inventor before: Wen Dongwei

Inventor before: Zhu Zhaomeng

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: ZHANG GONGXUAN WANG PINGLI SONG BIN WANG LING ZHAO YANG ZHANG RONG WANG WEIPIN WEN DONGWEI ZHU ZHAOMENG CHEN HAN TO: ZHANG GONGXUAN FU ANMIN SONG BIN WANG LING ZHAO YANG WANG TIANSHU ZHU ZHAOMENG GUO JIAN HE DINGLONG

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110518