CN103001769B - High-confidentiality high-security data scrambler - Google Patents

High-confidentiality high-security data scrambler Download PDF

Info

Publication number
CN103001769B
CN103001769B CN201210312098.5A CN201210312098A CN103001769B CN 103001769 B CN103001769 B CN 103001769B CN 201210312098 A CN201210312098 A CN 201210312098A CN 103001769 B CN103001769 B CN 103001769B
Authority
CN
China
Prior art keywords
data
data confidentiality
confidentiality device
confidentiality
external reference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210312098.5A
Other languages
Chinese (zh)
Other versions
CN103001769A (en
Inventor
李建秋
李�荣
张中南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Jiuzhou ATC Technology Co Ltd
Original Assignee
Sichuan Jiuzhou ATC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuzhou ATC Technology Co Ltd filed Critical Sichuan Jiuzhou ATC Technology Co Ltd
Priority to CN201210312098.5A priority Critical patent/CN103001769B/en
Publication of CN103001769A publication Critical patent/CN103001769A/en
Application granted granted Critical
Publication of CN103001769B publication Critical patent/CN103001769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention aims to improve data access authority security and enhance confidentiality in real-time handling of data storage by means of multi-encryption, and aims to improve data access control authority security and data storage confidentiality. A data scrambler reliably manages stored data and is applicable to military data storage and encryption systems with high requirements for high confidentiality. Identification codes varying with time factor are used as authorization codes for accessible operation of the data scrambler. The effective authorization codes are used to grant data operation authority. After data writing is complete, the data scrambler operates to encrypt the stored data by using time information and key data as parameter factors. Even if the stored data are read illegally, the original stored data can be stored only by the time factor, key factor and decryption algorithm. Therefore, confidentiality and security of the data are guaranteed. In addition, when the data scrambler is opened illegally, all the stored data are erased, which functionally increases effectiveness, security and reliability in data storage.

Description

The data confidentiality device of a kind of high security energy and high safety performance
Technical field
The present invention relates to data security communication technology, the data confidentiality device of especially a kind of high security energy and high safety performance.
Background technology
It is one of important means of Modern Information based battlefield military confrontation that enemy and we identify, it can strengthen the harmony between the accuracy of operational commanding and control and each combat unit greatly, significant quickening system response speed, reduces and accidentally injures probability, is particularly suitable for many arm of the services combined operation and uses.Along with the unprecedented raising of weapon attack precision in modern war and the continuous enhancing of destructive power, the military of various countries more and more payes attention to the development of novel encryption mode identification of friend or foe.
In existing identification of friend or foe, there is security performance difference, to be easily utilized and the defect such as deception in data confidentiality, is unfavorable for that my army occupies favourable situation in modern war.
Summary of the invention
The object of the invention is to the design of the data confidentiality device proposing a kind of high security energy and high safety performance, the fail safe of data confidentiality device from data processing and the treatment mechanism of confidentiality, Multiple recognition and decision mechanism (handshake communication and identification code matching judgment mechanism) are adopted to the rights of using of outside accessor, and encryption be have employed to the data that need store, and to the storage chip that the encrypt data after process stores and power down is lost, all storage data are removed to the operation of illegally opening data confidentiality device, effectively enhance security performance and the security performance of data storage and inquire.Effectively overcome the duplicity of data access and storage, improve operating efficiency.
In order to realize the technical solution adopted in the present invention be: the data confidentiality device of a kind of high security energy and high safety performance, its feature comprises following working method:
After the access of external reference device also successfully wakes data confidentiality device up, according to the first group of handshake communication data received, data confidentiality device judges whether that the match is successful with arranging communication format.If after first group of Data Matching failure, be in the state of wait-receiving mode handshake communication data.If it fails to match for continuous three groups of handshake data, then data confidentiality device enters disable access state.If also need access, then external reference device is needed to reawake data confidentiality device;
When after external reference device and the success of data confidentiality device handshake communication, data confidentiality device is in wait second group of data mode.After data access device sends the second group identification code data, whether data confidentiality device mates with current effective identification code according to the identification code of input.If coupling, then data confidentiality device is in addressable state, otherwise data confidentiality device is in disable access state.If also need access, then external reference device is needed to reawake data confidentiality device;
When data confidentiality device enters addressable state, wait control command message that is that pending data writes or that read.If receive data message for write memory command, then data confidentiality device stores respectively by input data type; If receiving data message is sense data order, then data confidentiality device sends storage data respectively by sense data type;
After external write data storage completes, according to key data and the storage data of input, application encipher algorithm is encrypted calculation process, and the clear operation of the storage completed encrypt data and former write data;
When external reference device request sense data, according to the request format of sense data, complete the extraction from respective storage areas data, group bag and output function;
When data confidentiality device receives write operation, and message respective field is when having a request of opening data confidentiality device structure, then now opens data confidentiality device and do not remove storage data, if without this request, when illegally opening data confidentiality device structure, then can automatically remove storage data.
Further optimization as to this programme: when external reference device need write data scrambler and sense data operates, front two groups of data messages that external reference device sends must meet the condition that the authentication of data confidentiality device and authority are opened.Wherein authentication condition comprise first group of data message that external reference device sends must with could access entitlements Qualify Phase during handshake communication Data Matching in data confidentiality device; Authority unlocking condition comprises the identification code that provides in second group of data message that external reference device sends and must mate with the current effective identification code in data confidentiality device just can enter and write or read operation request.Effective identification code wherein in data confidentiality device is the algorithm by arranging with communicating pair, and generate 12 groups of effective identification codes according to precise time and leave in identification code memory, and this memory has the feature of power failure data information dropout, the effective period of every group identification code is 1 hour.This kind of security mechanisms efficiently avoid illegal solicit operation, and when not meeting access consideration, data confidentiality device enters forbids operating state.
Further optimization as to this programme: the power supply in data confidentiality device is by rechargeable battery powered, in order to extend the useful life of battery, the operational mode of low power dissipation design taked by data confidentiality device, when there being external reference, data confidentiality device needs to wake up, is in that the data confidentiality device power consumption of wake-up states is maximum is no more than 5 watts; When with external treatment after, data confidentiality device treating depth sleep state, now the data confidentiality device power consumption of deep sleep is for being no more than 0.03 watt.
According to different use needs, this programme can also do further improvement:
When outside accessor and data confidentiality device carry out authentication, various ways can be adopted, physiological characteristic RM (such as fingerprint identification technology etc.), the generation algorithm of effective identification code can adopt complicated randomness algorithm to produce, and the effective period of identification code can be shortened, improve the security performance of data confidentiality device access mechanism further.
Storage data in data confidentiality device are encrypt datas, the generation key of ciphertext is inputted by outside, cryptographic algorithm is also that both sides arrange, wherein cryptographic algorithm can with more complicated algorithm, and can be encrypted further the key of outside input, to the key after encryption as key required in cryptographic algorithm, which can further improve the security performance of data processing.
Data storage capacity in data confidentiality device can design by user's request, and this mode has greater flexibility.
The beneficial effect of this programme can be learnt according to describing of such scheme, because external reference device needs by connecting with data confidentiality device after carrying out shake communication Data Matching and effective identification code coupling in this scenario; Data confidentiality device store with the data sent be all by cryptographic calculation after encrypt data; When illegally opening data confidentiality device structure without request of opening, data confidentiality device can remove the data stored automatically; The operational mode of low power dissipation design taked by data confidentiality device, and when there being external reference, data confidentiality device needs to wake up, is in that the data confidentiality device power consumption of wake-up states is maximum is no more than 5 watts; When with external treatment after, data confidentiality device treating depth sleep state, now the data confidentiality device power consumption of deep sleep is for being no more than 0.03 watt.
As can be seen here, the present invention compared with prior art, improve the security performance of data access authority and the security performance storing data, improve the reliability of data management, be specially adapted in data storage and inquire, have the military enemy and we of high security energy demand to identify encryption system, have substantive distinguishing features and progress, its beneficial effect implemented also is apparent.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the data confidentiality device data processing that the invention provides a kind of high security energy and high safety performance;
Fig. 2 is the detailed process schematic diagram of 101 links in Fig. 1;
Fig. 3 is the detailed process schematic diagram of 102 links in Fig. 1;
Fig. 4 is the detailed process schematic diagram of 103 links in Fig. 1;
Fig. 5 is the detailed process schematic diagram of 104 links in Fig. 1;
Fig. 6 is the detailed process schematic diagram of 105 links in Fig. 1;
Fig. 7 is the detailed process schematic diagram of 106 links in Fig. 1;
Fig. 8 is the functional unit detailed process schematic diagram in Fig. 9 in ARM flush bonding processor unit 902;
Fig. 9 is the hardware configuration schematic diagram of the data confidentiality device of a kind of high security energy of the present invention and high safety performance.
Embodiment
Below by accompanying drawing, technical scheme of the present invention is described in further detail.
Fig. 1 is the schematic flow sheet of the data confidentiality device data processing that the invention provides a kind of high security energy and high safety performance, as shown in Figure 1, comprises the following steps:
Step 101, when the access of external reference device and after successfully waking data confidentiality device up, according to the first group of handshake communication data received, data confidentiality device judges whether that the match is successful with arranging communication format.If after first group of Data Matching failure, be in the state of wait-receiving mode handshake communication data.If it fails to match for continuous three groups of handshake data, then data confidentiality device enters disable access state.If also need access, then external reference device is needed to reawake data confidentiality device;
Step 102, when external reference device and data confidentiality device handshake communication success after, data confidentiality device is in wait second group of data mode.After data access device sends the second group identification code data, whether data confidentiality device mates with current effective identification code according to the identification code of input.If coupling, then data confidentiality device is in addressable state, otherwise data confidentiality device is in disable access state.If also need access, then external reference device is needed to reawake data confidentiality device;
Step 103, when effective identification code that external reference device and data confidentiality device are current is mated, data confidentiality device, according to the request of data message of input, completes write or reads and the poke of different types of data or read operation;
Step 104, after external write data storage completes, according to the key data of input with store data, application encipher algorithm is encrypted calculation process, and the clear operation of the storage completed encrypt data and former write data;
Step 105, data confidentiality device, according to the result of step 103, when external reference device request sense data, according to the request format of sense data, complete the extraction from respective storage areas data, group bag and output function;
Step 106, data confidentiality device, according to the result of step 103, when data confidentiality device structure is opened in the request of external reference device, according to the request format of sense data, complete and open data confidentiality device structure and the operation of not removing all storage data; Otherwise the operation of all storage data removed by data confidentiality device.
This function mainly prevents the illegal operation obtaining data in data scrambler;
Fig. 2 is the detailed process schematic diagram of 101 links in Fig. 1, as shown in Figure 2, comprises the following steps:
Step 201, after the communication interface of external reference device access data scrambler, now communication interface provides the wake-up signal of arm processor in data confidentiality device, operating voltage and input data;
Normally whether step 202, data confidentiality device judge to power on, if normally, then data confidentiality device enters reception data mode; Otherwise data confidentiality device enters disable access state;
Step 203, data are in reception data mode, the handshake form judging to input data according to external reference device first group of data whether with agreement format match, if coupling, then enter step 204; Otherwise, enter step 206;
Step 204, judge whether the form of handshake communication form mates, if coupling, then data confidentiality device enters step 209, otherwise enters step 205;
Step 205, accumulation calculating is carried out to the frequency of failure i of handshake communication, and the statistics of i is delivered to step 206;
Step 206, judge frequency of failure i, if be less than 3, then data confidentiality device enters reception data mode, otherwise enters disable access state;
Step 207, data confidentiality device are in disable access state;
Step 208, power on to the data confidentiality device being in disable access state reboot operation, and this operation makes data confidentiality device enter step 202 power-on self-test state;
Step 209, data confidentiality device have entered the accepting state of wait second group identification code message by handshake communication.
Fig. 3 is the detailed process schematic diagram of 102 links in Fig. 1, as shown in Figure 3, comprises the following steps:
Step 301, data confidentiality device are in reception data mode, when second group of data message input, extract corresponding identification code and enter step 302;
Step 302, data confidentiality device enter identification code matching judgment.Data confidentiality device carries out matching judgment to the identification code of write and current effective identification code; If the match is successful enters step 303 for identification code, if it fails to match for identification code, enter step 304;
Step 303, after when identification code, the match is successful, the input of the 3rd group of data message waited for by data confidentiality device, is in reception wait state;
Step 304, after when identification code, it fails to match, data confidentiality device enters disable access state.
Step 305, data access device send the second group identification code data to data scrambler and carry out identification code coupling.
Fig. 4 is the detailed process schematic diagram of 103 links in Fig. 1, as shown in Figure 4, comprises the following steps:
Step 401, data confidentiality device are in reception data mode, and judge that the command field of the 3rd group of incoming message is write operation request or sense data operation requests;
Write or sense data operation requests are decision making by step 402, data confidentiality device; If write operation request, then enter step 403, if read operation request, enter step 410;
Step 403, data confidentiality device receive data message, and different classes of according to write request data, carry out judgement and corresponding memory;
Step 404, judged result according to step 403, if receive key data, enter step 405, otherwise enter step 408;
Step 405, data confidentiality device are in and store data and controlled state, key data stored in the key storage district in memory;
Step 406, data confidentiality device enter data and write the judgement whether input terminate, if write operation terminates, then enter step 407, otherwise enter step 403 and continue to receive data mode;
If step 407 write operation terminates, data confidentiality device enters holding state;
Step 408, data confidentiality device are in and store data and controlled state, write data stored in the general memory area in memory;
Step 409, judged result according to step 402, data confidentiality device is in the state of sending datagram.
Step 410, request format according to sense data, complete the extraction from respective storage areas data, group bag and output function.
Fig. 5 is the detailed process schematic diagram of 104 links in Fig. 1, as shown in Figure 5, comprises the following steps:
Step 501, when data confidentiality device complete write data operation after, enter encryption standby condition;
Step 502, data confidentiality device enter data management state, read key data from crypto key memory, from write data storage sense data, and transfer cryptographic algorithm;
Step 503, data confidentiality device get out key data;
Step 504, data confidentiality device get out the scheduling of cryptographic algorithm;
Step 505, data confidentiality device get out the write data received;
Step 506, data confidentiality device are in cryptographic calculation state;
Whether step 507, data encryption computing terminate, if cryptographic calculation terminates, enter step 508; Otherwise enter step 506 and continue cryptographic calculation state;
Step 508, data confidentiality device are in the storage management states of encrypt data, carry out storage administration to encrypt data;
Whether step 509, data confidentiality device enter judgement state, terminate to judge to ciphertext storage operation, if ciphertext storage operation terminates, then data confidentiality device enters holding state, otherwise enter the storage administration that step 508 proceeds ciphertext;
Step 510, data confidentiality device enter holding state, if now external reference device still needs access, then need to reawake data confidentiality device.
Fig. 6 is the detailed process schematic diagram of 105 links in Fig. 1, as shown in Figure 6, comprises the following steps:
Step 601, when external reference device and data confidentiality device complete handshake communication and identification code effective mate after, data confidentiality device enters the continuation accepting state of data;
Step 602, after data confidentiality device receives the 3rd group of data message, carry out judgement external reference device the need of sense data request;
Step 603, after sense data request judged by data confidentiality device, the type of sense data to be judged further;
If when step 604 external reference device needs to read key data, data confidentiality device conducts interviews to key data memory;
If when step 605 external reference device needs to read encrypt data, data confidentiality device conducts interviews to encrypt data memory;
Step 606, data confidentiality device are in transmission state, comprise and packaging and transmission to needs data;
Step 607, after data are sent, data confidentiality device continues to enter data receiving state;
Step 608, be in the data confidentiality device of data receiving state, whether real-time detection has outside solicit operation, if there is external request, then enters step 609; Otherwise enter step 610;
Step 609, data confidentiality device carry out judgement to the request format of outside and judge and treatment state;
If step 610 without request duration of external reference device more than 3 minutes, data confidentiality device penetration depth sleep state, now data confidentiality device enters the state of low-power consumption;
If step 611 data confidentiality device is in deep sleep, now external reference device needs visit data scrambler, now needs to wake data confidentiality device up, forwards step 609 to after data confidentiality device wakes up.
Fig. 7 is the detailed process schematic diagram of 106 links in Fig. 1, when main response external accessor has a request of opening data confidentiality device structure, keeps storing data.As shown in Figure 7, comprise the following steps:
Step 701, when external reference device and data confidentiality device are by handshake communication, and when feature identification code and current effective identification code match, data confidentiality device is in the accepting state of data;
Step 702, the solicit operation of data confidentiality device to outside accessor judge, if data writing operation request, then enter step 703; Otherwise enter step 701 to continue to receive data;
Step 703, data confidentiality device are in data type and judge state, judge the data type in write request;
Step 704, data confidentiality device determine external reference device when having a request of opening data confidentiality device structure, enter step 705; Otherwise enter step 706;
Step 705, data confidentiality device are in data processing state, and realization is opened data confidentiality device structure and do not remove the function of all data in memory;
Step 706, data confidentiality device are in maintenance and clear data function, if now illegally open data confidentiality device structure, remove all data in memory.
Fig. 8 is the handling process schematic diagram of all functions unit in Fig. 9 in ARM flush bonding processor unit 902, and as shown in Figure 8, detailed process is as follows:
Step 801, wake up and sleep interface control unit.The request of this unit mainly data confidentiality device response external accessor, and change corresponding state;
Step 802, handshake communication judging unit.This unit mainly judges first group of handshake communication request of external reference device and judges the handshake communication frequency of failure and add up;
Step 803, write and reading judging unit.This unit judges it is write or read operation request to the request of outside accessor;
Step 804, identification code matching judgment unit, when this unit mainly judges the second group identification code communication request of external reference device, carry out the matching judgment with effective identification code;
Step 805, effectively identification code calculate and produce and storage control unit.This unit mainly completes two functions, first function is without external reference device and data confidentiality device is in the Job readiness stage, effective identification code generating algorithm of the temporal information (year, month, day, hour, min, second) that data confidentiality device inputs according to temporal information administrative unit and both sides' agreement, generate 12 groups of effective identification codes, the term of validity of every group identification code is 1 hour; Second function is when whether data confidentiality device needs the identification code of outside input to mate with current effective identification code, reads current effective identification code, assist identification code matching judgment from authentication code memory unit;
Step 806, write DCU data control unit.This unit mainly completes and judges the non-key data of outside write, manage and store;
Step 807, cipher controlled unit.This unit mainly completes the storage and management to key data, and the key data received is sent into crypto key memory unit;
Step 808, data encryption arithmetic element.This unit mainly completes the cryptographic calculation to external write data, and cryptographic calculation needs the data of key data and write;
Step 809, temporal information administrative unit.This unit manages the time data that time management unit in Fig. 8 803 inputs, and temporal information is sent into generation and the memory cell 805 of effective identification code;
Step 810, power information administrative unit.This unit manages the information about power that Power Management Unit in Fig. 8 804 inputs, and the information about power of battery is delivered to power information display unit.
Fig. 9 is the hardware configuration schematic diagram of the data confidentiality device of a kind of high security energy of the present invention and high safety performance
The technical scheme taked is core based on ARM flush bonding processor, with low-power consumption, high reliability for design concept, completes enciphering/deciphering function and the storage of data in conjunction with the time dependent factor, is realized control and the management of access rights by multi-enciphering mechanism.
Mainly comprise data transmission interface unit 901, ARM flush bonding processor unit 902, time management unit 903, Power Management Unit 904, rechargeable cell 905, battery charging inlet unit 906, battery level information management and display unit 907, encrypt data memory cell 908, crypto key memory unit 909 and effective identification code memory cell 910.
Its main operational of data confidentiality device and control unit are ARM flush bonding processor unit 902, and this unit collaborative work is in other each unit, and the function of each unit is described below:
Data transmission interface unit 901: this unit belongs to the interface between external reference equipment, after the connector of external reference device accesses this interface, except being supplied to the matching bus of ARM flush bonding processor unit 902, the wake-up signal of ARM flush bonding processor unit 902 also will be provided, because ARM flush bonding processor unit 902 is when being in " deep sleep " without when external reference, the working method of this low-power consumption significantly reduces powered battery amount.
ARM flush bonding processor unit 902: this unit is the core cell of the Data Control of data confidentiality device, computing and management.Mainly complete judgement that handshake communication between external reference device mate with judgement, effectively identification code, data write and read control, cryptographic calculation and storage administration and the data processing between time management unit 903 and Power Management Unit 904 write according to external reference device or read and ask, complete the Read-write Catrol function to encrypt data memory cell 908, crypto key memory unit 909 and effective identification code memory cell 910.The time data particularly exported with time management unit 903 application identification code generating algorithm produces every 1 hour effective 12 groups of effective identification codes, and 12 group identification codes stored in effective identification code memory cell 910.
Time management unit 903: this unit is with I 2c bus mode provide accurate year, month, day, hour, min, second Equal-time Data.The use term of validity due to every group identification code is 1 hour, and ARM flush bonding processor unit 902 judges whether outside identification code effectively must calculate in strict accordance with temporal information and judge.
Power Management Unit 904: this unit is management and the switching center of data confidentiality device power-supply system, be supplied to the different voltages needed for each functional unit, complete the real-time detection of battery level information, and information about power is delivered to battery level information management and display unit 907 in real time.
Rechargeable cell 905: this unit is the electric power system of data confidentiality device.
Battery charging inlet unit 906: this unit completes the charge function to rechargeable cell 905.
Battery level information management and display unit 907: this unit completes the Presentation Function of battery level information, is used to indicate rechargeable cell 905 the need of charging.
Encrypt data memory cell 908: the data that outside writes by this unit, the encrypt data after cryptographic calculation is stored in this unit.And this memory has the feature of power down obliterated data.
Crypto key memory unit 909: the key data that outside writes by this unit, is stored in this unit.And this memory has the feature of power down obliterated data.
Effective identification code memory cell 910: 12 groups of effective identification codes that the computing of ARM flush bonding processor unit 902 produces by this unit store, and this memory has the feature of power down obliterated data.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (4)

1. a data confidentiality device for high security energy and high safety performance, include the external reference device with the communication of data confidentiality device, its feature comprises following working method:
After the access of external reference device also successfully wakes data confidentiality device up, according to the first group of handshake communication data received, data confidentiality device judges whether that the match is successful with arranging communication format; If after first group of Data Matching failure, data confidentiality device is in the state of wait-receiving mode handshake communication data; If it fails to match for continuous three groups of handshake data, then data confidentiality device enters disable access state; If also need access, then external reference device is needed to reawake data confidentiality device;
When after external reference device and the success of data confidentiality device handshake communication, data confidentiality device is in wait second group of data mode; After data access device sends the second group identification code data, whether data confidentiality device mates with current effective identification code according to the identification code of input; If coupling, then data confidentiality device is in addressable state, otherwise data confidentiality device is in disable access state; If also need access, then external reference device is needed to reawake data confidentiality device;
When the pending datas such as data confidentiality device enters addressable state, data confidentiality device write or read control command message; If receive data message for write memory command, then data confidentiality device stores respectively by input data type; If receiving data message is sense data order, then data confidentiality device sends storage data respectively by sense data type;
After external write data storage completes, according to key data and the storage data of input, application encipher algorithm is encrypted calculation process, and the clear operation of the storage completed encrypt data and former write data;
When external reference device request sense data, according to the request format of sense data, complete the extraction from respective storage areas data, group bag and output function;
When data confidentiality device receives write operation, and message respective field is when having a request of opening data confidentiality device structure, then now opens data confidentiality device and do not remove storage data, if without this request, when illegally opening data confidentiality device structure, then can automatically remove storage data.
2. the data confidentiality device of a kind of high security energy according to claim 1 and high safety performance, is characterized in that:
When external reference device need write data scrambler and sense data operates, front two groups of data messages that external reference device sends must meet the condition that the authentication of data confidentiality device and authority are opened; Wherein authentication condition comprise first group of data message that external reference device sends must with could access entitlements Qualify Phase during handshake communication Data Matching in data confidentiality device; Authority unlocking condition comprises the identification code that provides in second group of data message that external reference device sends and must mate with the current effective identification code in data confidentiality device just can enter and write or read operation request; Effective identification code wherein in data confidentiality device is the algorithm by arranging with communicating pair, and generate 12 groups of effective identification codes according to the time and leave in identification code memory, and this memory has the feature of power failure data information dropout, the effective period of every group identification code is 1 hour.
3. the data confidentiality device of a kind of high security energy according to claim 1 and high safety performance, it is characterized in that: the storage data in data confidentiality device are encrypt datas, the generation key of ciphertext is inputted by outside, cryptographic algorithm is also that both sides arrange, clear data can be recovered by key data and corresponding decipherment algorithm after external reference device reads encrypt data, even if after external reference device obtains encrypt data by security verification, do not know that cryptographic algorithm also cannot solve clear data, thus ensure that the confidentiality of data.
4. the data confidentiality device of a kind of high security energy according to claim 1 and high safety performance, it is characterized in that: the power supply in data confidentiality device is by rechargeable battery powered, in order to extend the useful life of battery, the operational mode of low power dissipation design taked by data confidentiality device, when there being external reference, data confidentiality device needs to wake up; When with external treatment after, data confidentiality device treating depth sleep state.
CN201210312098.5A 2012-08-29 2012-08-29 High-confidentiality high-security data scrambler Active CN103001769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210312098.5A CN103001769B (en) 2012-08-29 2012-08-29 High-confidentiality high-security data scrambler

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210312098.5A CN103001769B (en) 2012-08-29 2012-08-29 High-confidentiality high-security data scrambler

Publications (2)

Publication Number Publication Date
CN103001769A CN103001769A (en) 2013-03-27
CN103001769B true CN103001769B (en) 2015-06-17

Family

ID=47929933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210312098.5A Active CN103001769B (en) 2012-08-29 2012-08-29 High-confidentiality high-security data scrambler

Country Status (1)

Country Link
CN (1) CN103001769B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069327A (en) * 2015-08-25 2015-11-18 武汉丰天信息网络有限公司 Method for preventing software or data from being pirated

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1224214A (en) * 1998-01-20 1999-07-28 富士通株式会社 Data storage device and control method therefor
CN1274127A (en) * 1999-04-28 2000-11-22 卡西欧计算机株式会社 Security administive system, data distributing equipment and portable terminal device
CN1346195A (en) * 2000-09-29 2002-04-24 索尼公司 Memory equipment and memory access limiting method
JP2003248627A (en) * 2002-02-25 2003-09-05 Nippon Telegr & Teleph Corp <Ntt> File access control method, program, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1224214A (en) * 1998-01-20 1999-07-28 富士通株式会社 Data storage device and control method therefor
CN1274127A (en) * 1999-04-28 2000-11-22 卡西欧计算机株式会社 Security administive system, data distributing equipment and portable terminal device
CN1346195A (en) * 2000-09-29 2002-04-24 索尼公司 Memory equipment and memory access limiting method
JP2003248627A (en) * 2002-02-25 2003-09-05 Nippon Telegr & Teleph Corp <Ntt> File access control method, program, and storage medium

Also Published As

Publication number Publication date
CN103001769A (en) 2013-03-27

Similar Documents

Publication Publication Date Title
CN106789875B (en) A kind of block chain service unit, block chain service system and its communication means
CN101593389B (en) Key management method and key management system for POS terminal
CN107995617A (en) A kind of solid storage device for supporting telesecurity to destroy design
CN103116720B (en) A kind of USB Key device and account management thereof and checking using method
CN203520493U (en) Intelligent lock cylinder, intelligent lock and intelligent key
CN110188564B (en) Mobile data storage terminal based on quantum key encryption
CN201387642Y (en) Single-phase electronic type multi-rate prepayment electric energy meter
CN104487913A (en) Mechanism for facilitating efficient operations paths for storage devices in computing systems
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN101403993B (en) Data security safekeeping equipment and method
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN102063612A (en) Smart card based fingerprint comparison method
CN102096967A (en) Off-line payment method and consumption terminal for electronic purse
CN114884649A (en) Intelligent gas meter and system
CN103001769B (en) High-confidentiality high-security data scrambler
CN101132276A (en) Method and system for symmetrical encryption of terminal data by SAM card
CN111009056A (en) Electric intelligent lock control method and system based on double-interface RFID technology
CN103473512A (en) Mobile storage medium management method and mobile storage medium management device
CN203301499U (en) SAM (Secure Access Module) encryption dog for oilfield data communication
CN203606828U (en) Software dongle with time-limited management control function
CN103021052A (en) Biological recognition optical signal transmitting device as well as electricity-saving method and encryption method thereof
CN110310108B (en) Novel self-destruction hardware wallet with dismantling machine
CN201130947Y (en) Hardware token
US20230345252A1 (en) Proximity-based and multi-time-based deactivation and/or activation related to a token
CN101833822B (en) Security protection method for electric power prepaid system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant