CN104700028A - Security-sandbox-based USB key cryptographic algorithm detecting system - Google Patents

Security-sandbox-based USB key cryptographic algorithm detecting system Download PDF

Info

Publication number
CN104700028A
CN104700028A CN201510133311.XA CN201510133311A CN104700028A CN 104700028 A CN104700028 A CN 104700028A CN 201510133311 A CN201510133311 A CN 201510133311A CN 104700028 A CN104700028 A CN 104700028A
Authority
CN
China
Prior art keywords
cryptographic algorithm
layer
usb key
interface layer
test case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510133311.XA
Other languages
Chinese (zh)
Other versions
CN104700028B (en
Inventor
李建华
刘雨辰
张爱新
朱桦
周志洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CN201510133311.XA priority Critical patent/CN104700028B/en
Publication of CN104700028A publication Critical patent/CN104700028A/en
Application granted granted Critical
Publication of CN104700028B publication Critical patent/CN104700028B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a security-sandbox-based USB key cryptographic algorithm detecting system. The security-sandbox-based USB key cryptographic algorithm detecting system comprises a USB key equipment hardware layer, a USB key equipment driving layer, a cryptographic algorithm interface layer, a cryptographic algorithm detection engine layer and a user interface layer. The USB key equipment hardware layer is used for supplying hardware support to the USB key equipment driving layer. The USB key equipment driving layer is used for supplying driving support to the cryptographic algorithm interface layer. The cryptographic algorithm interface layer is used for implementing a cryptographic algorithm computing function according to a test case. The cryptographic algorithm detection engine layer is used for generating test case data and analyzing computation results. The user interface layer is used for inputting detection parameters, outputting detection results and providing operation tips for a detector. The security-sandbox-based USB key cryptographic algorithm detecting system has the advantages of high stability, robustness and detection degree and the like, and the problems that a traditional detecting system is fixed in test case, long in consumed period and hard to adapt to scene evidence obtaining and crime scene analysis are solved.

Description

A kind of intelligent code key cryptographic algorithm detection system based on security sandbox mechanism
Technical field
What the present invention relates to is a kind of method of field of information security technology, the specifically cryptographic algorithm accordance detection system of a kind of intelligent code key based on security sandbox mechanism (USB Key).
Background technology
Along with the enforcement of Golden Card Program in 1993, the application of intelligent code key (USB Key), progressively from groping to move towards specification, obtains extensive utilization in fields such as E-Government, ecommerce, communications and transportation, police law execution, social security, tax tax revenue and hygiene medical treatments.USB Key uses USB (universal serial bus) (USB) interfacing, built-in single-chip microcomputer or intelligent card chip, there is certain storage space, private key and the digital certificate of user can be stored, utilize the built-in cryptographic algorithm of USB Key can realize the encryption to business information and the certification to user identity.The widespread use of USB Key facilitates intellectuality that business carries out, facilitation, modernization and safe, has greatly promoted social informatization process, has improve social operational paradigm, facilitated people's life.
For safeguarding commercial cipher industry development order, China reports commercial encryption product employing unification, the requirement of unified management, and has promulgated " Business Code Regulations " in October, 1999 by State Council.China " 12 " planning clearly proposes the thinking strengthening commercial encryption products innovation and management.Need for protecting the security of information assets of the close user of business, specification commercial encryption product market and state functionaries's supervision; forensics analysis must be carried out, so that have something to base on, in order controllable management to the production of the cipher type equipment such as intelligent code key, usage behavior.
The intelligent code key new product of various form, interface emerges in an endless stream in recent years, also all difference is very large for technical parameter, from various different intelligent cipher key and other USB storage device (USB flash disk etc.) cannot be distinguished in appearance, cause the predicament of product supervision.Product exists in a large number in the Misuse situation of market circulation and qualified products in violation of rules and regulations, therefore uses technology and the product of supervision aspect in the urgent need to intelligent code key, to strengthen forensics analysis dynamics, improves the efficiency of management and level.
Through finding the literature search of prior art:
In May, 2007, Password Management office of country has put into effect " intellective IC card and intelligent code key password inspection criterion " (trying), define intellective IC card and intelligent code key password Detection of content, test item, qualification determination criterion, and enforcement password detects the pre-processing requirements proposed intellective IC card and intelligent code key.Due to the time that the realization of most of detection platform is promulgated early than this specification, there is quite a few strictly not follow this specification, and have the following disadvantages in actual applications:
1) test case is fixed, and can predict Detection of content.The test case of tradition USB Key cryptographic algorithm detection platform has prestored in a database, and lawless person can obtain test case with comparalive ease, and underproof USB Key product only needs to add a small amount of code namely by test.In addition, the renewal in test case data storehouse is generally manually carry out, and the update cycle is long.
2) calling interface is packed, and transparency is low.Tradition USB Key cryptographic algorithm detection platform only calls the interface that manufacturer provides, and this class interface is compiled into dynamically or static link library by manufacturer, and inside realizes opaque, and manufacturer may modify to its interface, evades test normal flow.
3) test sample book is little, does not meet national Password Management office specification." intellective IC card and the intelligent code key password monitoring specification " of promulgating in May, 2007 clearly contains compliance test specification, conformance testing specifications etc. about symmetry algorithm, asymmetric arithmetic, hash algorithm.Existing most of test platform is promulgated early than specification, cannot be up to standard.
4) interface is simple and crude, complex operation.Tradition USB Key cryptographic algorithm detection platform uses Microsoft Foundation class libraries MFC (Microsoft Foundation Classes) mostly, even only has interactive console, interface is simple and crude or do not have interface, sense of the times is poor, loaded down with trivial details, operating process is complicated unintelligible alternately, brings the difficulty of use to basic unit testing staff.
The cycle is expended long for above-mentioned traditional intelligence cipher key, be difficult to the problem adapting to scene evidence taking, on-the site analysis, the intelligent code key cryptographic algorithm detection system based on security sandbox mechanism of the present invention's exploitation can find the cryptographic algorithm that intelligent code key uses fast, and carry out scene evidence taking, be applicable to lower management department and carry out on-site law-enforcing.
Summary of the invention
The object of the invention is the deficiency for existing detection platform, provides a kind of intelligent code key cryptographic algorithm detection system based on security sandbox mechanism, to tackle the deficiency of traditional detection platform in security, robustness, simplification.
Goal of the invention of the present invention is achieved through the following technical solutions:
Based on an intelligent code key cryptographic algorithm detection system for security sandbox mechanism, comprise successively from bottom to up: USB Key device hardware layer, USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer and user interface layer;
Described USB Key device hardware layer is used for providing hardware support for USB Key device drive layer;
Described USB Key device drive layer includes the driver of USB Key to be measured, upwards supports for cryptographic algorithm interface layer provides to drive;
The test case that described cryptographic algorithm interface layer produces for accepting cryptographic algorithm detecting and alarm layer, and complete cryptographic algorithm computing function according to test case result of calculation is returned cryptographic algorithm detecting and alarm layer;
Described cryptographic algorithm detecting and alarm layer is for generation of test case data, and the test case data of generation passes to the interface of cryptographic algorithm interface layer, and analyzes the result of calculation that cryptographic algorithm interface layer returns, and judges that whether tested USB Key equipment is qualified; Described test case is produced at random by cryptographic algorithm detecting and alarm layer or is produced by detection side by manual input of user interface layer or produced according to calling test case data storehouse preset in intelligent code key cryptographic algorithm detection system.
Described user interface layer is used for for detection side provides input detected parameters, output detections result and operation indicating.
According to above-mentioned feature, described USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer and user interface layer are placed in security sandbox, and described security sandbox adopts virtual platform technology, professional sand table software or application program field technique to realize.
According to above-mentioned feature, described USB Key device hardware layer by intelligent card chip and storage unit integrated on surface-mounted integrated circuit.
According to above-mentioned feature, described cryptographic algorithm interface layer, comprise two class interfaces, one class is the USBKey enciphering and deciphering algorithm interface that USB Key manufacturer provides, another kind of is CSP and DLL (dynamic link library) CryptoAPI, and described cryptographic algorithm interface layer also carries out cryptographic algorithm calculating respectively by USB Key enciphering and deciphering algorithm interface and CSP and DLL (dynamic link library) CryptoAPI respectively from cryptographic algorithm detecting and alarm layer acceptance test use-case;
Described cryptographic algorithm detecting and alarm layer is analyzed according to the result of calculation of USB Key enciphering and deciphering algorithm interface and CSP and DLL (dynamic link library) CryptoAPI, judges that whether tested USB Key equipment is qualified.
According to above-mentioned feature, the described test case produced at random by cryptographic algorithm detecting and alarm layer is divided into three can select level estimate according to the high low degree of degree of randomness, is respectively senior automatic test, common automatic test and rudimentary automatic test.
Compared with traditional USB Key cryptographic algorithm detection platform, the intelligent code key cryptographic algorithm detection system based on security sandbox mechanism of the present invention has following innovative point:
(1) traditional USB Key cryptographic algorithm detection platform only solely calls the packaged cryptographic algorithm interface of manufacturer, the present invention adds CSP and DLL (dynamic link library) CryptoAPI as standard interface at cryptographic algorithm interface layer, plays supervisory role to USB Key enciphering and deciphering algorithm interface result of calculation.
(2) test case that traditional USB Key cryptographic algorithm detection platform uses is fixing, and places in advance in a database.The described intelligent code key cryptographic algorithm detection system based on security sandbox mechanism provides three kinds of Test cases technology functions.First, it preserves the preset test case of traditional USB Key cryptographic algorithm detection platform, use under certain circumstances.Secondly, it can produce test case by the input of testing staff, and the result of test case cannot be predicted before detection, is calculated, obtain test case standard results after generation test case by CSP and DLL (dynamic link library) CryptoAPI; This test case is also calculated by USB Key enciphering and deciphering algorithm interface simultaneously.Cryptographic algorithm detecting and alarm layer, by judging that whether USB Key enciphering and deciphering algorithm interface result of calculation is consistent with the standard results that CSP and DLL (dynamic link library) CryptoAPI calculates, provides USB Key cryptographic algorithm Function detection result.Finally, it can in strict accordance with " intellective IC card and intelligent code key password inspection criterion ", the test case that random generation is a large amount of, by calling standard C SP and DLL (dynamic link library) CryptoAPI, obtain test case standard results, the result of test case also cannot be predicted before detection.This test case randomization production method is the main method that the present invention produces test case data.The test case production method single relative to traditional USB Key cryptographic algorithm detection platform, test case production method of the present invention is various, and test case standard results cannot be known in advance, substantially increases inspecting force and detecting reliability.
(3) traditional USB Key cryptographic algorithm detection platform usually runs into driving collision problem, present invention employs security sandbox technology, the described intelligent code key cryptographic algorithm detection system based on security sandbox mechanism is utilized to detect, after detection, security sandbox can not install by recovering mode " flash back " to the system of snapshot the state that intelligent code key drives, and to avoid loading driver conflict, unloading drives complete and cause the situation of deadlock.
Accompanying drawing explanation
Fig. 1 modularization hierarchical Design figure of the present invention;
Fig. 2 is the symmetric cryptographic algorithm that obtains Haitai USB Key to be measured in embodiment and support and hash algorithm list;
Fig. 3 a selects test mode to be the user interface of the MD5 algorithm of the Haitai USB Key of manual test in embodiment;
Fig. 3 b is the user interface of manual input testing data in embodiment;
Fig. 3 c is the result of calculation for input data in embodiment;
Accompanying drawing 3d is the detection analysis report for manual test MD5 algorithm in embodiment;
Accompanying drawing 4a is the testing result of the DES-CBC algorithm of test Haitai USB Key automatically in embodiment,
Accompanying drawing 4b is the detection analysis report of the DES-CBC algorithm of test Haitai USB Key automatically in embodiment.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
The present invention adopts stratification modular design, is followed successively by from bottom to up: USB Key device hardware layer, USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer and user interface layer.In addition, the present invention also comprises some prepositioned test cases, in particular cases for subsequent use.Other each layers except USB Key device hardware layer are placed in security sandbox all in advance, and to avoid loading driver conflict, unloading drives complete and cause situation about crashing.
Described USB Key device hardware layer be hardware manufacturer by intelligent card chip and storage unit integrated on surface-mounted integrated circuit after, according to the USB Key equipment that national Password Management office obtains for the visual requirements design of USB Key equipment.This layer is provided by the hardware manufacturer of USB Key equipment to be measured, for the USB Key device drive layer on upper strata provides hardware support.
Described USB Key device drive layer includes the driver of USB Key to be measured, upwards supports for cryptographic algorithm interface layer provides to drive.
Described cryptographic algorithm interface layer mainly completes cryptographic algorithm computing function, comprise the interface that two classes are different, the USB Key enciphering and deciphering algorithm interface that one Lei Shi USBKey manufacturer provides, another kind of is CSP (CSP) and the DLL (dynamic link library) CryptoAPI (application programming interface) of Microsoft, and two group interfaces are parallel to be existed.
Described USB Key enciphering and deciphering algorithm interface is the enciphering and deciphering algorithm interface provided by USB Key manufacturer, is main detected object of the present invention.
Described CSP and DLL (dynamic link library) CryptoAPI is a kind of cryptographic services system provided by Microsoft, utilizes the unified application programming interface provided, and what shield bottom encryption realizes details, for application program provides the service such as data encryption, data signature.In the present invention, CSP and DLL (dynamic link library) CryptoAPI as the standard interface of cryptographic algorithms' implementation, for USB Key enciphering and deciphering algorithm interface provides supervisory role.
Cryptographic algorithm interface layer accepts the test case data of its upper strata cryptographic algorithm detecting and alarm layer, CSP and DLL (dynamic link library) CryptoAPI and USB Key enciphering and deciphering algorithm interface carry out cryptographic calculations to test case data respectively and result of calculation are returned to cryptographic algorithm detecting and alarm layer separately, carry out subsequent detection for cryptographic algorithm detecting and alarm layer.
Described cryptographic algorithm detecting and alarm layer is under the prerequisite strictly following " intellective IC card and intelligent code key password inspection criterion ", on the one hand, according to algorithm types to be measured and the test mode of the input of upper-layer user interface, produce random test use-case data, or from preset test case data and manual appointment of tester obtain test case, pass to lower floor's cryptographic algorithm interface layer and calculate; On the other hand, cryptographic algorithm detecting and alarm layer accepts its lower floor CSP and DLL (dynamic link library) CryptoAPI and USB Key enciphering and deciphering algorithm interface to the result of calculation of test case data, and these two groups of data are compared, if result of calculation is identical, then test is passed through, and derives test result to user interface layer.
Described user interface layer provides input, output interface and operation indicating for detection side, specifically comprise cryptographic algorithm Category List that USB Key to be measured supports, tester select testing algorithm type, test mode (manual, automatically) input option, test result report analysis.
Described USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer, user interface layer are placed in security sandbox all in advance.Described security sandbox can adopt virtual platform technology, professional sand table software or application program field technique to realize.First USB Key to be measured is inserted card reader by the present invention, utilizes the described intelligent code key cryptographic algorithm detection system based on security sandbox mechanism to detect; After detection, security sandbox can not install by recovering mode " flash back " to the system of snapshot the state that intelligent code key drives, and to avoid loading driver conflict, unloading drives complete and cause the situation of deadlock.
The present embodiment is product to be measured with the USB Key product Haitai USB Key of Haitai company, test the symmetric cryptographic algorithm that it provides, comprise: DES-CBC (data encryption standards-cipher block chaining mode), DES-ECB (the close the manner of data encryption standards-electronics), 3DES-CBC (data encryption standards-cipher block chaining modes of three kinds of key lengths), 3DES-ECB (the close the manner of data encryption standards-electronics of three kinds of key lengths), and hash algorithm, comprise: SHA-1 (secure hash function-1) and MD5 (Message Digest Algorithm 5) algorithm realize correctness and compliance.
First, according to adopted security sandbox technology, configuration intelligent code key cryptographic algorithm detection system environment.Security sandbox can adopt virtual platform technology, professional sand table software or application program field technique to realize.Realize security sandbox according to virtual platform technology, then .Net 4 environment is installed in virtual machine sandbox, the intelligent code key cryptographic algorithm detection system that the present invention realizes is placed therein; According to professional sand table software simulating security sandbox function, then the detection system that the present invention realizes is configured in acquiescence sand table; Realize security sandbox according to application program field technique, then first create a neofield, perform detection system of the present invention in this domain.
Secondly, Haitai USB Key is inserted in card reader, enters Haitai USB Key cryptographic algorithm testing process.Testing process is as follows:
(1) obtain by user interface layer the cryptographic algorithm list that Haitai USB Key supports.Click " acquisition algorithm " button in user interface, occur the cryptographic algorithm list that Haitai USB Key supports, as shown in Figure 2.When obtaining cryptographic algorithm list, " starting algorithm accordance to detect " button gray, can not carry out algorithm and detect operation; After algorithm list display, " starting algorithm accordance to detect " button does not stop flicker, and prompting tester continues to start algorithm and detects, and carries out relevant setting.
(2) test of heuristics method is set.As shown in Figure 3 a, click " starting algorithm accordance to detect " button, first enter " algorithm detect arrange " page (as shown in Figure 3 b), manual test, rudimentary automatic test (automatically testing (low) in corresponding diagram), common automatic test (automatically test in corresponding diagram (in) can be selected), senior automatic test (automatically testing (height) in corresponding diagram) four kinds of options.Wherein manual test is by the manual input test example of tester, automatically test class is then by system stochastic generation test case, rudimentary automatic test, common automatic test, the difference of senior automatic test is that number of rounds of tests is different, rudimentary automatic test number of rounds of tests is 100 to take turns, common automatic test test 1000 is taken turns, senior automatic test is then tested 10000 and is taken turns, wherein, senior automatic test is simultaneously for ensureing that degree of randomness is higher, in the hash algorithm of random length input, the generation of tested object length is also random number, three kinds of test grades are different on the high low degree of degree of randomness.
The present embodiment is with manual test MD5 hash algorithm, and rudimentary automatic test DES-CBC algorithm is example, illustrates based on cryptographic algorithm testing process of the present invention.
(3) testing result is obtained.After completing " algorithm detects and arranges ", MD5 algorithm and DES-CBC algorithm is selected respectively in USB Key cryptographic algorithm support list, click " starting algorithm accordance to detect " button, cryptographic algorithm detecting and alarm layer produces random test use-case data according to the input of upper-layer user's contact bed and passes to lower floor's cryptographic algorithm interface layer calculating, the CSP of cryptographic algorithm interface layer and DLL (dynamic link library) CryptoAPI and USB Key enciphering and deciphering algorithm interface are to the result of calculation of test case data, and these two groups of data are compared, if result of calculation is identical, then test is passed through, and derive test result to user interface layer.User interface layer automatic spring testing result interface (as shown in Fig. 3 c, Fig. 4 a).Detection algorithm type, method of testing type, number of rounds of tests, the result that manual inputs testing data, call standard results that CSP and CryptoAPI interface obtains and the acquisition of tested object Haitai USB Key equipment interface is listed in testing result interface.
(4) testing result is analyzed.Click " analysis " button in " testing result " interface, eject Analysis of test results report (as Fig. 3 d, Fig. 4 b).Detection algorithm type, method of testing type, the wheel number passing through test and test result is listed in Analysis of test results report.
In the present embodiment, adopt the main flow of manual test MD5 hash algorithm as shown in accompanying drawing 3a, 3b, 3c, 3d, the main flow of rudimentary automatic test DES-CBC algorithm is as shown in accompanying drawing 4a, 4b.
According to the Analysis of test results report returned, can reach a conclusion: the symmetric cryptographic algorithm realized in Haitai USB Key and hash algorithm are by test.
The intelligent code key cryptographic algorithm detection system based on security sandbox mechanism that the present invention realizes is based on stratification modularity, and each functions of modules is concentrated, dispose flexibly, be convenient to maintenance; Adopt security sandbox technology to achieve intelligent code key driving isolation, improve system stability

Claims (5)

1. the intelligent code key cryptographic algorithm detection system based on security sandbox mechanism, comprise successively from bottom to up: USB Key device hardware layer, USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer and user interface layer, is characterized in that:
Described USB Key device hardware layer is used for providing hardware support for USB Key device drive layer;
Described USB Key device drive layer includes the driver of USB Key to be measured, upwards supports for cryptographic algorithm interface layer provides to drive;
The test case that described cryptographic algorithm interface layer produces for accepting cryptographic algorithm detecting and alarm layer, and complete cryptographic algorithm computing function according to test case result of calculation is returned cryptographic algorithm detecting and alarm layer;
Described cryptographic algorithm detecting and alarm layer is for generation of test case data, and the test case data of generation passes to the interface of cryptographic algorithm interface layer, and analyzes the result of calculation that cryptographic algorithm interface layer returns, and judges that whether tested USB Key equipment is qualified; Described test case is produced at random by cryptographic algorithm detecting and alarm layer or is produced by detection side by manual input of user interface layer or produced according to calling test case data storehouse preset in intelligent code key cryptographic algorithm detection system;
Described user interface layer is used for for detection side provides input detected parameters, output detections result and operation indicating.
2. intelligent code key cryptographic algorithm detection system according to claim 1, it is characterized in that described USB Key device drive layer, cryptographic algorithm interface layer, cryptographic algorithm detecting and alarm layer and user interface layer are placed in security sandbox, described security sandbox adopts virtual platform technology, professional sand table software or application program field technique to realize.
3. intelligent code key cryptographic algorithm detection system according to claim 1, it is characterized in that described USB Key device hardware layer by intelligent card chip and storage unit integrated on surface-mounted integrated circuit.
4. intelligent code key cryptographic algorithm detection system according to claim 1, it is characterized in that described cryptographic algorithm interface layer, comprise two class interfaces, one class is the USB Key enciphering and deciphering algorithm interface that USB Key manufacturer provides, another kind of is CSP and DLL (dynamic link library) CryptoAPI, and described cryptographic algorithm interface layer also carries out cryptographic algorithm calculating respectively by USB Key enciphering and deciphering algorithm interface and CSP and DLL (dynamic link library) CryptoAPI respectively from cryptographic algorithm detecting and alarm layer acceptance test use-case;
Described cryptographic algorithm detecting and alarm layer is analyzed according to the result of calculation of USB Key enciphering and deciphering algorithm interface and CSP and DLL (dynamic link library) CryptoAPI, judges that whether tested USB Key equipment is qualified.
5. intelligent code key cryptographic algorithm detection system according to claim 1, it is characterized in that the described test case produced at random by cryptographic algorithm detecting and alarm layer is divided into three can select level estimate according to the high low degree of degree of randomness, be respectively senior automatic test, common automatic test and rudimentary automatic test.
CN201510133311.XA 2015-03-25 2015-03-25 A kind of intelligent code key cryptographic algorithm detecting system based on security sandbox mechanism Expired - Fee Related CN104700028B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510133311.XA CN104700028B (en) 2015-03-25 2015-03-25 A kind of intelligent code key cryptographic algorithm detecting system based on security sandbox mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510133311.XA CN104700028B (en) 2015-03-25 2015-03-25 A kind of intelligent code key cryptographic algorithm detecting system based on security sandbox mechanism

Publications (2)

Publication Number Publication Date
CN104700028A true CN104700028A (en) 2015-06-10
CN104700028B CN104700028B (en) 2017-12-15

Family

ID=53347130

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510133311.XA Expired - Fee Related CN104700028B (en) 2015-03-25 2015-03-25 A kind of intelligent code key cryptographic algorithm detecting system based on security sandbox mechanism

Country Status (1)

Country Link
CN (1) CN104700028B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315610A (en) * 2017-06-21 2017-11-03 深圳白骑士大数据有限公司 Realize method, device and the computer-readable recording medium of cryptographic function
CN114285584A (en) * 2021-12-22 2022-04-05 北京正奇盾数据安全技术有限公司 Encryption algorithm experimental system
CN114567469A (en) * 2022-02-21 2022-05-31 北京创原天地科技有限公司 Application password type detection method and platform based on B/S mode

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汪圣莅 等: "智能密码钥匙合规性检测系统的实现", 《信息安全与通信保密》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315610A (en) * 2017-06-21 2017-11-03 深圳白骑士大数据有限公司 Realize method, device and the computer-readable recording medium of cryptographic function
CN107315610B (en) * 2017-06-21 2020-06-23 深圳白骑士大数据有限公司 Method, device and computer readable storage medium for realizing password function
CN114285584A (en) * 2021-12-22 2022-04-05 北京正奇盾数据安全技术有限公司 Encryption algorithm experimental system
CN114285584B (en) * 2021-12-22 2024-01-16 北京正奇盾数据安全技术有限公司 Encryption algorithm experiment system
CN114567469A (en) * 2022-02-21 2022-05-31 北京创原天地科技有限公司 Application password type detection method and platform based on B/S mode
CN114567469B (en) * 2022-02-21 2024-05-28 北京创原天地科技有限公司 Application password type detection method and platform based on B/S mode

Also Published As

Publication number Publication date
CN104700028B (en) 2017-12-15

Similar Documents

Publication Publication Date Title
Phan et al. Quantifying information leaks using reliability analysis
CN103164643B (en) A kind of method and apparatus that anti-debug is carried out by hardware
CN109376078B (en) Mobile application testing method, terminal equipment and medium
US20210248058A1 (en) Feature-based deployment pipelines
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
CN110245004A (en) Command executing method, device, equipment and computer readable storage medium
CN104700028A (en) Security-sandbox-based USB key cryptographic algorithm detecting system
CN105637516A (en) Method for verifying integrity of dynamic code using hash
CN110414246B (en) Shared file security management method, device, terminal and storage medium
Desnitsky et al. Expert knowledge based design and verification of secure systems with embedded devices
CN106411635A (en) Formal analysis and verification method for real-time protocol
Kara Review on common criteria as a secure software development model
CN115222410A (en) Block chain based transaction uplink method and device, electronic equipment and storage medium
CN110516472A (en) Emulation mode and device
Fenz et al. FORISK: Formalizing information security risk and compliance management
Nguyen et al. Model-driven security with a system of aspect-oriented security design patterns
CN106502887A (en) A kind of stability test method, test controller and system
CN108765786A (en) Quick Response Code withdrawal safe verification method and its system, computer storage media
CN111814181B (en) System authority authorization method and device, electronic equipment and storage medium
US11720462B2 (en) Physical execution monitor
Gao et al. Effective test generation for combinatorial decision coverage
CN111161052A (en) Bank operation data processing method and device
CN111222181A (en) AI model supervision method, system, server and storage medium
Singh et al. Demand based test case generation for object oriented system
CN110348984B (en) Automatic credit card data input method and related equipment under different transaction channels

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171215

Termination date: 20200325

CF01 Termination of patent right due to non-payment of annual fee