CN113901529A - Equipment safety management method based on encryption hardware - Google Patents

Equipment safety management method based on encryption hardware Download PDF

Info

Publication number
CN113901529A
CN113901529A CN202111177236.9A CN202111177236A CN113901529A CN 113901529 A CN113901529 A CN 113901529A CN 202111177236 A CN202111177236 A CN 202111177236A CN 113901529 A CN113901529 A CN 113901529A
Authority
CN
China
Prior art keywords
information
hardware
sec
equipment
sdcard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111177236.9A
Other languages
Chinese (zh)
Other versions
CN113901529B (en
Inventor
江定卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Basewin Intelligent Technology Co ltd
Original Assignee
Shanghai Basewin Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Basewin Intelligent Technology Co ltd filed Critical Shanghai Basewin Intelligent Technology Co ltd
Priority to CN202111177236.9A priority Critical patent/CN113901529B/en
Publication of CN113901529A publication Critical patent/CN113901529A/en
Application granted granted Critical
Publication of CN113901529B publication Critical patent/CN113901529B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a device security management method based on encryption hardware, which comprises the following steps: s1, detecting whether DEVICE _ ID information of a unique DEVICE identifier exists in encryption hardware, and detecting whether SDCARD _ ID information of the unique DEVICE identifier exists in a sec-ID partition of the DEVICE; s2, if the DEVICE _ ID information and the SDCARD _ ID information do not exist, binding the encrypted hardware and the equipment, and continuing to start the equipment after binding; s3, if the DEVICE _ ID information or the SDCARD _ ID information does not exist, or the DEVICE _ ID information and the SDCARD _ ID information both exist but the information is not matched, the encryption hardware and the equipment cannot be matched, the equipment is shut down, and if the information is matched, the equipment is continuously started. The invention reconstructs the starting process of the equipment based on the hardware encryption hardware, realizes one-to-one binding of the encryption hardware and the equipment, and can normally start the system under the condition that the encryption hardware held by a user is matched with the equipment, thereby effectively improving the safety of the starting process of the equipment.

Description

Equipment safety management method based on encryption hardware
Technical Field
The invention relates to the technical field of computers, in particular to an equipment safety management method based on encryption hardware.
Background
Along with the popularization of intelligent equipment, the safety of an intelligent equipment system becomes more and more important, the universal equipment management in the prior art is not bound with other hardware, other people can normally start up after taking the equipment, and if the password entering the system is broken through, the system can enter the system to steal important information.
Therefore, how to provide a device security management method based on encrypted hardware is a problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
In view of this, the present invention provides an apparatus security management method based on encrypted hardware, which can effectively improve the security of the apparatus starting process.
In order to achieve the purpose, the invention adopts the following technical scheme:
a device security management method based on encryption hardware comprises the following steps:
s1, detecting whether DEVICE _ ID information of a unique DEVICE identifier exists in encryption hardware, and detecting whether SDCARD _ ID information of the unique DEVICE identifier exists in a sec-ID partition of the DEVICE;
s2, if the DEVICE _ ID information and the SDCARD _ ID information do not exist, binding the encrypted hardware and the equipment, and continuing to start the equipment after binding;
s3, if the DEVICE _ ID information or the SDCARD _ ID information does not exist, or the DEVICE _ ID information and the SDCARD _ ID information both exist but the information is not matched, the encryption hardware and the equipment cannot be matched, the equipment is shut down, and if the information is matched, the equipment is continuously started.
Preferably, the specific contents of binding the encryption hardware and the device in S2 include:
s21, the encryption hardware generates a random number as a KEY, and the random number is stored in the encryption hardware;
s22, reading the SDCARD _ ID information, encrypting by using encryption hardware, generating an encrypted first encryption hardware identifier SDCARD _ ID _ SEC, and storing the SDCARD _ ID _ SEC into the device SEC-ID partition;
s23, reading the DEVICE _ ID information, encrypting by using encryption hardware, generating an encrypted first DEVICE identifier DEVICE _ ID _ SEC, and storing the DEVICE _ ID _ SEC in a user storage area of the encryption hardware.
Preferably, the specific content of information matching in S3 includes:
s31, reading the SDCARD _ ID, encrypting by using encryption hardware, and generating an encrypted second encryption hardware identifier SDCARD _ ID _ SEC _ 1;
s32, reading the SDCARD _ ID _ SEC stored in the equipment;
s33, comparing the SDCARD _ ID _ SEC _1 with the SDCARD _ ID _ SEC;
s34, reading the DEVICE _ ID, encrypting by using encryption hardware, and generating an encrypted second DEVICE identifier, namely DEVICE _ ID _ SEC _ 1;
s35, reading the DEVICE _ ID _ SEC stored in the encryption hardware;
s36, comparing the DEVICE _ ID _ SEC _1 with the DEVICE _ ID _ SEC.
Preferably, before proceeding to S1, the following is also included:
when the equipment is started, firstly detecting whether encryption hardware exists; if not, prompting that the encryption hardware does not exist and closing the equipment.
Preferably, the encryption hardware is an encryption T card.
According to the technical scheme, compared with the prior art, the equipment safety management method based on the encryption hardware is disclosed in the invention, the starting process of the equipment is reconstructed based on the hardware encryption hardware, one-to-one binding of the encryption hardware and the equipment is realized, the system can be normally started only under the condition that the encryption hardware held by a user is matched with the equipment, and the safety of the equipment starting process is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of a device security management method based on encrypted hardware according to the present invention;
FIG. 2 is a KEY KEY provided in an embodiment of a method for secure management of devices based on cryptographic hardware according to the present invention;
fig. 3 is a diagram illustrating sdcad _ ID information provided in an embodiment of a device security management method based on encrypted hardware according to the present invention;
fig. 4 is a diagram illustrating an encrypted first encrypted hardware identifier sdcad _ ID _ SEC provided in an embodiment of a method for secure management of a device based on encrypted hardware according to the present invention;
FIG. 5 is a diagram illustrating DEVICE _ ID information provided in an embodiment of a hardware encryption-based DEVICE security management method according to the present invention;
fig. 6 is a diagram of encrypted first DEVICE identification DEVICE _ ID _ SEC provided in an embodiment of a DEVICE security management method based on encrypted hardware according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an equipment safety management method based on encrypted hardware, which comprises the following steps:
s1, detecting whether DEVICE _ ID information of a unique DEVICE identifier exists in encryption hardware, and detecting whether SDCARD _ ID information of the unique DEVICE identifier exists in a sec-ID partition of the DEVICE;
s2, if both the DEVICE _ ID information and the SDCARD _ ID information do not exist, binding the encrypted hardware and the equipment, and continuing to start the equipment after binding;
and S3, if the DEVICE _ ID information or the SDCARD _ ID information does not exist, or the DEVICE _ ID information and the SDCARD _ ID information both exist but are not matched, the encryption hardware cannot be matched with the equipment, the equipment is shut down, and if the information is matched, the equipment is continuously started.
In order to further implement the above technical solution, the specific content of binding the encryption hardware and the device in S2 includes:
s21, the encryption hardware generates a random number as a KEY, and the random number is stored in the encryption hardware;
s22, reading SDCARD _ ID information, encrypting by using encryption hardware, generating an encrypted first encryption hardware identifier SDCARD _ ID _ SEC, and storing the SDCARD _ ID _ SEC into a device SEC-ID partition;
s23, reading the DEVICE _ ID information, encrypting by using encryption hardware, generating an encrypted first DEVICE identifier, namely, DEVICE _ ID _ SEC, and storing the DEVICE _ ID _ SEC in a user storage area of the encryption hardware.
In order to further implement the above technical solution, the specific content of information matching in S3 includes:
s31, reading the SDCARD _ ID, encrypting by using encryption hardware, and generating an encrypted second encryption hardware identifier SDCARD _ ID _ SEC _ 1;
s32, reading SDCARD _ ID _ SEC stored in the equipment;
s33, comparing the SDCARD _ ID _ SEC _1 with the SDCARD _ ID _ SEC;
s34, reading the DEVICE _ ID, encrypting by using encryption hardware, and generating an encrypted second DEVICE identifier, namely DEVICE _ ID _ SEC _ 1;
s35, reading DEVICE _ ID _ SEC stored in the encryption hardware;
s36, compare DEVICE _ ID _ SEC _1 with DEVICE _ ID _ SEC.
In order to further implement the above technical solution, the following is also included before performing S1:
when the equipment is started, firstly detecting whether encryption hardware exists; if not, prompting that the encryption hardware does not exist and closing the equipment.
In this embodiment, the encryption hardware is an encryption T card, the random number generated by the encryption T card is 24Bytes, the KEY is as shown in fig. 2, the sdcd _ ID information is 03C 5F 26B 97C 05B 73, as shown in fig. 3, the encrypted first encryption hardware identifier sdcd _ ID _ SEC is 8E F2 AA 2D D67C 1E 9a 369 A6A FB 75533561, as shown in fig. 4, the DEVICE _ ID information is 87F 09 a 48, as shown in fig. 5, the encrypted first DEVICE identifier DEVICE _ ID _ SEC is a 97C CF 9 FF a06A 79, as shown in fig. 6.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (5)

1. A device security management method based on encrypted hardware is characterized by comprising the following steps:
s1, detecting whether DEVICE _ ID information of a unique DEVICE identifier exists in encryption hardware, and detecting whether SDCARD _ ID information of the unique DEVICE identifier exists in a sec-ID partition of the DEVICE;
s2, if the DEVICE _ ID information and the SDCARD _ ID information do not exist, binding the encrypted hardware and the equipment, and continuing to start the equipment after binding;
s3, if the DEVICE _ ID information or the SDCARD _ ID information does not exist, or the DEVICE _ ID information and the SDCARD _ ID information both exist but the information is not matched, the encryption hardware and the equipment cannot be matched, the equipment is shut down, and if the information is matched, the equipment is continuously started.
2. The method for device security management based on cryptographic hardware of claim 1, wherein the specific content of binding the cryptographic hardware and the device in S2 includes:
s21, the encryption hardware generates a random number as a KEY, and the random number is stored in the encryption hardware;
s22, reading the SDCARD _ ID information, encrypting by using encryption hardware, generating an encrypted first encryption hardware identifier SDCARD _ ID _ SEC, and storing the SDCARD _ ID _ SEC into the device SEC-ID partition;
s23, reading the DEVICE _ ID information, encrypting by using encryption hardware, generating an encrypted first DEVICE identifier DEVICE _ ID _ SEC, and storing the DEVICE _ ID _ SEC in a user storage area of the encryption hardware.
3. The method for device security management based on cryptographic hardware as claimed in claim 2, wherein the specific content of information matching in S3 includes:
s31, reading the SDCARD _ ID, encrypting by using encryption hardware, and generating an encrypted second encryption hardware identifier SDCARD _ ID _ SEC _ 1;
s32, reading the SDCARD _ ID _ SEC stored in the equipment;
s33, comparing the SDCARD _ ID _ SEC _1 with the SDCARD _ ID _ SEC;
s34, reading the DEVICE _ ID, encrypting by using encryption hardware, and generating an encrypted second DEVICE identifier, namely DEVICE _ ID _ SEC _ 1;
s35, reading the DEVICE _ ID _ SEC stored in the encryption hardware;
s36, comparing the DEVICE _ ID _ SEC _1 with the DEVICE _ ID _ SEC.
4. The method for device security management based on cryptographic hardware of claim 1, further comprising the following steps before proceeding to S1:
when the equipment is started, firstly detecting whether encryption hardware exists; if not, prompting that the encryption hardware does not exist and closing the equipment.
5. A device security management method based on encryption hardware as claimed in any one of claims 1 to 4, characterized in that the encryption hardware is an encryption T card.
CN202111177236.9A 2021-10-09 2021-10-09 Equipment safety management method based on encryption hardware Active CN113901529B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111177236.9A CN113901529B (en) 2021-10-09 2021-10-09 Equipment safety management method based on encryption hardware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111177236.9A CN113901529B (en) 2021-10-09 2021-10-09 Equipment safety management method based on encryption hardware

Publications (2)

Publication Number Publication Date
CN113901529A true CN113901529A (en) 2022-01-07
CN113901529B CN113901529B (en) 2023-03-24

Family

ID=79190793

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111177236.9A Active CN113901529B (en) 2021-10-09 2021-10-09 Equipment safety management method based on encryption hardware

Country Status (1)

Country Link
CN (1) CN113901529B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959982A (en) * 2018-07-06 2018-12-07 江苏北弓智能科技有限公司 A kind of mobile terminal document encrypting and deciphering system and method based on hardware encryption TF card
CN111901095A (en) * 2020-07-23 2020-11-06 上海世麦智能科技有限公司 Safe starting method and system based on hardware encryption
CN112383914A (en) * 2020-11-13 2021-02-19 广东工业大学 Password management method based on secure hardware

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959982A (en) * 2018-07-06 2018-12-07 江苏北弓智能科技有限公司 A kind of mobile terminal document encrypting and deciphering system and method based on hardware encryption TF card
CN111901095A (en) * 2020-07-23 2020-11-06 上海世麦智能科技有限公司 Safe starting method and system based on hardware encryption
CN112383914A (en) * 2020-11-13 2021-02-19 广东工业大学 Password management method based on secure hardware

Also Published As

Publication number Publication date
CN113901529B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN110706379B (en) Access control method and device based on block chain
CN107864124B (en) Terminal information security protection method, terminal and Bluetooth lock
CN106452770B (en) Data encryption method, data decryption method, device and system
CN106911476B (en) Encryption and decryption device and method
HUE025028T2 (en) Method and system for automatically logging in client
WO2008024559A2 (en) Method and apparatus for authenticating applications to secure services
CN111163044B (en) Battery management method, equipment, server and system
CN102833068B (en) Method for bidirectional authentication of terminal and smart card, protocol and smart card
WO2013178154A1 (en) Method for implementing encryption in storage card, and decryption method and device
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN101815292B (en) Device and method for protecting data of mobile terminal
CN101770552A (en) Method for clearing computer password, computer and system for clearing computer password
CA2686801C (en) Authetication using stored biometric data
CN104333544A (en) Encryption method for data file based on mobile terminal
CN105631298B (en) A kind of ciphering and deciphering device and method
CN108173926A (en) One-key start automobile method, system and user terminal and T-box terminals
CN112738052B (en) Authentication method between devices, storage medium and electronic device
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN104363093A (en) Method for encrypting file data by dynamic authorization code
CN102833067B (en) Trilateral authentication method and system and authentication state management method of terminal equipment
US20160055339A1 (en) Encryption Processing Method and Device for Application, and Terminal
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN113901529A (en) Equipment safety management method based on encryption hardware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A Device Security Management Method Based on Encryption Hardware

Effective date of registration: 20230912

Granted publication date: 20230324

Pledgee: Agricultural Bank of China Co.,Ltd. Shanghai Xuhui Sub branch

Pledgor: SHANGHAI BASEWIN INTELLIGENT TECHNOLOGY CO.,LTD.

Registration number: Y2023310000538

PE01 Entry into force of the registration of the contract for pledge of patent right