CN103164655A - Trusted cryptographic module and trusted cryptographic system - Google Patents

Trusted cryptographic module and trusted cryptographic system Download PDF

Info

Publication number
CN103164655A
CN103164655A CN201110408572XA CN201110408572A CN103164655A CN 103164655 A CN103164655 A CN 103164655A CN 201110408572X A CN201110408572X A CN 201110408572XA CN 201110408572 A CN201110408572 A CN 201110408572A CN 103164655 A CN103164655 A CN 103164655A
Authority
CN
China
Prior art keywords
module
control module
distance
apart
credible password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110408572XA
Other languages
Chinese (zh)
Inventor
陈山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nationz Technologies Inc
Original Assignee
Nationz Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nationz Technologies Inc filed Critical Nationz Technologies Inc
Priority to CN201110408572XA priority Critical patent/CN103164655A/en
Publication of CN103164655A publication Critical patent/CN103164655A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a trusted cryptographic module and a trusted cryptographic system. The trusted cryptographic module comprises a first distance control module. The first distance control module comprises a detection sub-module and a first control sub-module, wherein the detection sub-module is used for detecting the distance between a second distance control module and the first distance control module, and the first control sub-module is used for controlling the power-up and the power-down of the trusted cryptographic module according to distance detecting results of the detection sub-module. The trusted cryptographic system comprises the trusted cryptographic module and the second distance control module, wherein the second distance control module is used for controlling the distance between the first distance control module and the first distance control module. The trusted cryptographic module and the trusted cryptographic system effectively reduce the safety risk that malicious software can freely visit the trusted cryptographic module (TCM), and improves the safety of the TCM.

Description

Credible password module and credible cryptographic system
Technical field
The present invention relates to the communications field, relate in particular to a kind of credible password module and a kind of credible cryptographic system.
Background technology
Credible calculating is with TCM(Trust Cryptography Module, credible password module) chip is core, and aspect PC (personal computer) security protection, the TCM chip is realized three major functions: the one,, the function that defend against computer virus is attacked is come defensive attack by a kind of chain-of-trust; The 2nd,, set up a believable identity, the platform of identification personation; The 3rd,, the data protection of high security can be sealed in a very safe zone data.
In current design architecture, after PC powered on, the TCM chip just was in the powered operation state always.This just makes the legal software of operating system and Malware can both access the TCM chip, causes potential safety hazard to system.
Summary of the invention
Technical matters to be solved by this invention is to provide a kind of credible password module and credible cryptographic system, improves the security of credible password module.
For solving the problems of the technologies described above, the present invention proposes a kind of credible password module, comprise first apart from control module, described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
Further, above-mentioned credible password module also can have following characteristics, and described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
Further, above-mentioned credible password module also can have following characteristics, and described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible password module, comprise first apart from control module, described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
Further, above-mentioned credible password module also can have following characteristics, and described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
Further, above-mentioned credible password module also can have following characteristics, and described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible cryptographic system, comprise credible password module and second distance control module, described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
Further, above-mentioned credible cryptographic system also can have following characteristics, and described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
For solving the problems of the technologies described above, the invention allows for a kind of credible cryptographic system, comprise credible password module and second distance control module, described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
Further, above-mentioned credible cryptographic system also can have following characteristics, and described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
Credible password module of the present invention and credible cryptographic system, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention and credible cryptographic system have reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Description of drawings
Fig. 1 is a kind of structured flowchart of credible password module in the embodiment of the present invention;
Fig. 2 is a kind of structured flowchart of detection sub-module 110 in Fig. 1;
Fig. 3 is a kind of structured flowchart of the first control submodule 120 in Fig. 1;
Fig. 4 is the another kind of structured flowchart of credible password module in the embodiment of the present invention;
Fig. 5 is a kind of structured flowchart of the second control submodule 140 in Fig. 4;
Fig. 6 is a kind of structured flowchart of credible cryptographic system in the embodiment of the present invention;
Fig. 7 is the another kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, principle of the present invention and feature are described, example only is used for explaining the present invention, is not be used to limiting scope of the present invention.
Fig. 1 is a kind of structured flowchart of credible password module in the embodiment of the present invention.As shown in Figure 1, in the present embodiment, the first credible password module 10A comprises first apart from control module A.Wherein, first comprises detection sub-module 110 and the first control submodule 120 apart from control module A.Detection sub-module 110 is for detection of the second distance control module and the first distance apart from control module A that are placed in the first credible password module 10A outside.First controls submodule 120 for power supply and power down apart from testing result control the first credible password module 10A according to detection sub-module 110.The user can change second distance control module and first apart from the distance between control module A by mobile second distance control module, is also the distance between second distance control module and the first credible password module 10A.
Wherein, detection sub-module 110 can adopt and anyly detect second distance control module and the first distance apart from control module A apart from detection mode.For example, detection sub-module 110 can adopt and followingly detect distance apart from detection mode: the second distance control module to first apart from the constant radiofrequency signal of control module A transmitted power, detection sub-module 110 receives this radiofrequency signal, determines distance according to the field intensity value of the radiofrequency signal that receives and the comparative result of default field intensity threshold value.When the field intensity value of the radiofrequency signal that detection sub-module 110 receives equals predetermined threshold value, illustrate that second distance control module and first equals the predeterminable range threshold value apart from the distance between control module A; The field intensity value of the radiofrequency signal that detection sub-module 110 receives is during greater than default field intensity threshold value, illustrate second distance control module and first apart from the distance between control module A in the predeterminable range scope; The field intensity value of the radiofrequency signal that detection sub-module 110 receives is during less than default field intensity threshold value, illustrate second distance control module and first apart from the distance between control module A outside the predeterminable range scope.
When detection sub-module 110 adopt above-mentioned apart from detection mode detect apart from the time, the structure of detection sub-module 110 can be as shown in Figure 2.Fig. 2 is a kind of structured flowchart of detection sub-module 110 in Fig. 1.As shown in Figure 2, detection sub-module 110 can comprise rf receiver unit 111 and comparing unit 112.Rf receiver unit 111 is used for receiving the radiofrequency signal that the second distance control module is sent.Intensity and predetermined threshold value that comparing unit 112 is used for radiofrequency signal that rf receiver unit 111 is received compare, with judge second distance control module and first apart from the distance of control module A whether in the distance range of presetting.For example, if the intensity of this radiofrequency signal is greater than predetermined threshold value, apart from testing result be second distance control module and first apart from the distance of control module A in default distance range, otherwise, if the intensity of this radiofrequency signal is less than predetermined threshold value, so apart from testing result be second distance control module and first apart from the distance of control module A outside default distance range.
Fig. 3 is a kind of structured flowchart of the first control submodule 120 in Fig. 1.As shown in Figure 3, the first control submodule 120 can comprise the first supply control unit 121 and the first power down control module 122.The first supply control unit 121 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A in the time, make the first credible password module 10A be in power supply state.The first power down control module 122, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A outside the time, make the first credible password module 10A be in power-down state.
The credible password module of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention has reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Fig. 4 is the another kind of structured flowchart of credible password module in the embodiment of the present invention.As shown in Figure 4, in the present embodiment, the second credible password module 10B comprises first apart from control module B.Wherein, first comprises detection sub-module 110, authentication sub module 130 and the second control submodule 140 apart from control module B.Detection sub-module 110 is for detection of second distance control module and the first distance apart from control module B.Authentication sub module 130 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in the time, further verify the legitimacy of second distance control module.Second controls submodule 140 is used for power supply and power down apart from the legitimate verification output control second credible password module 10B of testing result and authentication sub module 130 according to detection sub-module 110.
Wherein, detection sub-module 110 can adopt and anyly detect second distance control module and the first distance apart from control module B apart from detection mode.The structure of detection sub-module 110 can be as shown in Figure 2.
Wherein, authentication sub module 130 can adopt the legitimacy of any authentication mode checking second distance control module.For example, authentication sub module 130 can be verified the legitimacy of second distance control module in the following way:
Authentication sub module 130 sends authentication requesting information to the second distance control module;
After the second distance control module is received authentication requesting information, send the identity key of second distance control module to authentication sub module 130;
Whether the identity key of authentication sub module 130 verification second distance control modules is correct, if correct, think that the second distance control module is legal, otherwise thinks that the second distance control module is illegal;
Authentication sub module 130 sends to the second distance control module after can also further the identity key check results being encrypted.
Fig. 5 is a kind of structured flowchart of the second control submodule 140 in Fig. 4.As shown in Figure 5, the second control submodule 140 can comprise the second supply control unit 141 and the second power down control module 142.The second supply control unit 141, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in and the legitimate verification result of authentication sub module 130 when being legal, make the second credible password module 10B be in power supply state; The second power down control module 142, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B outside the time, perhaps detection sub-module 110 apart from testing result be second distance control module and first apart from the distance of control module B in default distance range but the legitimate verification result of authentication sub module 130 when being illegal makes the second credible password module 10B be in power-down state.
The credible password module of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible password module of the embodiment of the present invention has effectively reduced Malware and has arbitrarily accessed the potential safety hazard that credible password module TCM causes, and has improved the security of credible password module TCM.And, the credible password module of the embodiment of the present invention, can also carry out authentication to the second distance control module, prevent that illegal second distance control module is by controlling within distance with credible password module TCM enters default distance range, so that credible password module TCM is in power supply state and suffers the attack of Malware, further improved the security of credible password module TCM.
Fig. 6 is a kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.As shown in Figure 6, in the present embodiment, the first credible cryptographic system comprises the first credible password module 10A and second distance control module 20, the first credible password module 10A comprises first apart from control module A, wherein, second distance control module 20 is used for controlling this second distance control module 20 and the first distance apart from control module A.First comprises detection sub-module 110 and the first control submodule 120 apart from control module A.Detection sub-module 110 is for detection of second distance control module 20 and the first distance apart from control module A.First controls submodule 120 for power supply and power down apart from testing result control the first credible password module 10A according to detection sub-module 110.
Wherein, the first structure of controlling submodule 120 can be as shown in Figure 3.First controls submodule 120 can comprise the first supply control unit 121 and the first power down control module 122.The first supply control unit 121 be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A in the time, make the first credible password module 10A be in power supply state.The first power down control module 122, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module A outside the time, make the first credible password module 10A be in power-down state.
The credible cryptographic system of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible cryptographic system of the embodiment of the present invention has reduced the potential safety hazard that Malware is arbitrarily accessed credible password module TCM, the security that has improved credible password module TCM effectively.
Fig. 7 is the another kind of structured flowchart of credible cryptographic system in the embodiment of the present invention.As shown in Figure 7, in the present embodiment, the second credible cryptographic system comprises that the second credible password module 10B and second distance control module 20, the second credible password module 10B comprise first apart from control module B.Wherein, second distance control module 20 is used for controlling this second distance control module 20 and the first distance apart from control module B.First comprises detection sub-module 110, authentication sub module 130 and the second control submodule 140 apart from control module B.Detection sub-module 110 is for detection of second distance control module 20 and the first distance apart from control module B.Authentication sub module 130 be used for detection sub-module 110 be second distance control module 20 apart from testing result with the first distance range of presetting apart from the distance of control module B in the time, further verify the legitimacy of second distance control module 20.Second controls submodule 140 is used for power supply and power down apart from the legitimate verification output control second credible password module 10B of testing result and authentication sub module 130 according to detection sub-module 110.
Wherein, the second structure of controlling submodule 140 can be as shown in Figure 5.Second controls submodule 140 can comprise the second supply control unit 141 and the second power down control module 142.The second supply control unit 141, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B in and the legitimate verification result of authentication sub module 130 when being legal, make the second credible password module 10B be in power supply state; The second power down control module 142, be used for detection sub-module 110 be the second distance control module apart from testing result with the first distance range of presetting apart from the distance of control module B outside the time, perhaps detection sub-module 110 apart from testing result be second distance control module and first apart from the distance of control module B in default distance range but the legitimate verification result of authentication sub module 130 when being illegal makes the second credible password module 10B be in power-down state.
The credible cryptographic system of the embodiment of the present invention, when needs use credible password module TCM, within the second distance control module is placed on default distance range, this moment, credible password module TCM was in power supply state, can normally access credible password module TCM with the application program on main frame that credible password module TCM is connected; When not needing credible password module TCM, the second distance control module is placed on outside default distance range, this moment, credible password module TCM was in off-position, and the application program on main frame can't be accessed credible password module TCM.Therefore, the credible cryptographic system of the embodiment of the present invention has effectively reduced Malware and has arbitrarily accessed the potential safety hazard that credible password module TCM causes, and has improved the security of credible password module TCM.And, the credible cryptographic system of the embodiment of the present invention, can also carry out authentication to the second distance control module, prevent that illegal second distance control module is by controlling within distance with credible password module TCM enters default distance range, so that credible password module TCM is in power supply state and suffers the attack of Malware, further improved the security of credible password module TCM.
The above is only preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, is equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a credible password module, is characterized in that, comprises first apart from control module, and described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
2. credible password module according to claim 1, is characterized in that, described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
3. credible password module according to claim 1, is characterized in that, described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
4. a credible password module, is characterized in that, comprises first apart from control module, and described first comprises apart from control module:
Detection sub-module is for detection of second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
5. credible password module according to claim 4, is characterized in that, described detection sub-module comprises:
Rf receiver unit is used for receiving the radiofrequency signal that described second distance control module is sent;
Comparing unit, the intensity and the predetermined threshold value that are used for radiofrequency signal that described rf receiver unit is received compare, with judge described second distance control module and described first apart from the distance of control module whether in the distance range of presetting.
6. credible password module according to claim 4, is characterized in that, described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
7. a credible cryptographic system, is characterized in that, comprises credible password module and second distance control module, and described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
First controls submodule, is used for power supply and power down apart from testing result control credible password module according to described detection sub-module.
8. credible cryptographic system according to claim 7, is characterized in that, described first controls submodule comprises:
The first supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, make credible password module be in power supply state;
The first power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, make credible password module be in power-down state.
9. a credible cryptographic system, is characterized in that, comprises credible password module and second distance control module, and described credible password module comprises first apart from control module, wherein:
The second distance control module is used for controlling this second distance control module and the described first distance apart from control module;
Described first comprises apart from control module:
Detection sub-module is for detection of described second distance control module and the described first distance apart from control module;
Authentication sub module, be used for described detection sub-module be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in the time, further verify the legitimacy of described second distance control module;
Second controls submodule, is used for power supply and power down apart from the legitimate verification output control credible password module of testing result and described authentication sub module according to described detection sub-module.
10. credible cryptographic system according to claim 9, is characterized in that, described second controls submodule comprises:
The second supply control unit, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module in and described legitimate verification result when being legal, make credible password module be in power supply state;
The second power down control module, be used for described be the second distance control module apart from testing result with the described first distance range of presetting apart from the distance of control module outside the time, perhaps described apart from testing result be second distance control module and described first apart from the distance of control module in default distance range but described legitimate verification result when being illegal makes credible password module be in power-down state.
CN201110408572XA 2011-12-09 2011-12-09 Trusted cryptographic module and trusted cryptographic system Pending CN103164655A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110408572XA CN103164655A (en) 2011-12-09 2011-12-09 Trusted cryptographic module and trusted cryptographic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110408572XA CN103164655A (en) 2011-12-09 2011-12-09 Trusted cryptographic module and trusted cryptographic system

Publications (1)

Publication Number Publication Date
CN103164655A true CN103164655A (en) 2013-06-19

Family

ID=48587733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110408572XA Pending CN103164655A (en) 2011-12-09 2011-12-09 Trusted cryptographic module and trusted cryptographic system

Country Status (1)

Country Link
CN (1) CN103164655A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227209A (en) * 2008-01-25 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Method and theftproof system of mobile terminal based on blue tooth submachine
CN101661541A (en) * 2009-09-11 2010-03-03 深圳顶海电子有限公司 Method and system for locking I/O interfaces of computer
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
US8042027B1 (en) * 2007-01-16 2011-10-18 Marvell International Ltd. BM/LLR computation for multi-dimensional TCM/BCM

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8042027B1 (en) * 2007-01-16 2011-10-18 Marvell International Ltd. BM/LLR computation for multi-dimensional TCM/BCM
CN101227209A (en) * 2008-01-25 2008-07-23 宇龙计算机通信科技(深圳)有限公司 Method and theftproof system of mobile terminal based on blue tooth submachine
CN101661541A (en) * 2009-09-11 2010-03-03 深圳顶海电子有限公司 Method and system for locking I/O interfaces of computer
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication

Similar Documents

Publication Publication Date Title
US10856148B2 (en) Methods and apparatus for user authentication and human intent verification in mobile devices
CN103079200B (en) The authentication method of a kind of wireless access, system and wireless router
US20160125180A1 (en) Near Field Communication Authentication Mechanism
US8954747B2 (en) Protecting keystrokes received from a keyboard in a platform containing embedded controllers
US11222116B2 (en) Heartbeat signal verification
WO2019050741A9 (en) Environmental condition verification and user authentication in a security coprocessor
US11520859B2 (en) Display of protected content using trusted execution environment
CN105812338B (en) Data access control method and network management equipment
CN107357407B (en) Control method, electronic equipment and storage medium
US10572675B2 (en) Protecting and monitoring internal bus transactions
US9536078B2 (en) Integrated circuit for cyber security processing
KR101318668B1 (en) Portable memory card having information security function
CN107317925B (en) Mobile terminal
KR101308152B1 (en) Registration method for mobile otp device by smart device
CN103164655A (en) Trusted cryptographic module and trusted cryptographic system
CN104598838A (en) File storage and editing method for random check and providing of trusted operating environments
KR102078920B1 (en) Universal second factor authentication method and system based on sealing and remote attestation
KR20140112837A (en) Embedded system, authentication system comprising the same, method of authenticating the system
CN102393886A (en) Safety control method of mobile terminal, device and system
CN105550602A (en) Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method
KR101775515B1 (en) Apparatus and method for security check
CN114491481B (en) Safety calculation method and device based on FPGA
KR101296402B1 (en) Registration method for mobile otp device using encrypted seed
KR20190131498A (en) Method and system for network security
US20230394897A1 (en) Access control architecture for detecting secure data copied between devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130619

RJ01 Rejection of invention patent application after publication