CN201600685U - File security software protector - Google Patents
File security software protector Download PDFInfo
- Publication number
- CN201600685U CN201600685U CN2009200658769U CN200920065876U CN201600685U CN 201600685 U CN201600685 U CN 201600685U CN 2009200658769 U CN2009200658769 U CN 2009200658769U CN 200920065876 U CN200920065876 U CN 200920065876U CN 201600685 U CN201600685 U CN 201600685U
- Authority
- CN
- China
- Prior art keywords
- eeprom
- elliptic curve
- usb interface
- cpu
- file security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model provides a file security software protector, which is characterized by comprising a CPU, an ROM, an RAM, an EEPROM, a USB interface, a random number generator and an elliptic curve crypto processor. The ROM, the RAM, the EEPROM, the USB interface, the random number generator and the elliptic curve crypto processor are all connected with the CPU. The file security software protector has the advantages of high safety and fast operating speed.
Description
Technical field
The utility model belongs to the electron and information technology field, relates to a kind of CPU memory device, relates in particular to a kind of file security Dongle.
Background technology
At present, UKey is a kind of small intelligent card apparatus that directly links to each other, has cryptographic authorization functions, reliable high speed by USB (USB (universal serial bus)) with computing machine.The small and exquisite exquisiteness of the design of UKey, easy to carry, the memory that UKey is possessed self can be used for storing some personal information or certificate, the CPU of UKey and built-in encryption algorithm can provide safe pipeline for data transmission, and UKey is the security protection product that is applicable to unit or network application.But now general Ukey internal algorithm is more single, and speed can not satisfy user's demand, and it is few to adapt to operating system, and security can't reach user's satisfaction.
The utility model content
Technical matters to be solved of the present utility model provides the file security Dongle, safe, the fast operation of this document fail-safe software protector.
For solving the problems of the technologies described above, the technical scheme that the utility model adopted is:
A kind of file security Dongle is characterized in that, comprises CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography (ECC) processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
The function of each several part is as follows:
CPU------------: processor; Be used for data operation, scheduling and the processing of this protector
ROM-----------: deposit the hardware driving storer;
RAM-----------: metadata cache storer;
EEPROM-----: data-carrier store; Be used to deposit the secure file (as certificate) after the encryption;
The USB-----------:USB interface; Be used for communicating by letter with external unit (as computer);
I/O-------------: input, output interface;
Elliptic curve cryptography processor----: be used for that secure file is carried out elliptic curve cryptography (ECC) and handle;
Randomizer-------: be used for producing random number at ciphering process.
The beneficial effect of utility model:
Owing to adopt the elliptic curve cryptography processor; the encryption level of file security Dongle is higher; thereby security and reliability are higher when making practical again personal information of user and certificate; and this elliptic curve cryptography processor also has the advantage of fast operation, makes the application convenient and efficient more of file security Dongle.
Description of drawings
Fig. 1 is the structural representation of embodiment 1.
Embodiment
The utility model is described in further detail below in conjunction with accompanying drawing.
Embodiment 1:
As shown in Figure 1, a kind of file security Dongle, it is characterized in that, comprise CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
The function of each several part is as follows:
CPU------------: processor; Be used for data operation, scheduling and the processing of this protector
ROM-----------: deposit the hardware driving storer;
RAM-----------: metadata cache storer;
EEPROM-----: data-carrier store; Be used to deposit the secure file (as certificate) after the encryption;
The USB-----------:USB interface; Be used for communicating by letter with external unit (as computer);
I/O-------------: input, output interface;
Elliptic curve cryptography processor-----: be used for that secure file is carried out elliptic curve cryptography (ECC) and handle;
Randomizer--------: be used for producing random number at ciphering process.
Principle of work and process that the presents protector is used for file encryption, signature are as follows:
1, by driving connection device:
The computer utility driver of this equipment at first is installed, then this equipment is connected with the computing machine USB interface, input user name and password, by the CPU process chip, the storage of ROM hardware driving, the storage of RAM metadata cache, whether the verified users login is correct;
2, with the certificate load facility:
Pass through USB interface, equipment is linked to each other with computer, individual valid certificate file (comprising: PKI and private key) is imported ROM, CPU adopts ECC (being elliptic curve encryption algorithm) cryptographic algorithm to encrypt then, and the personal certificate of encrypting is stored in the EEPROM storage, EEPROM has the brute force attack of preventing function.
3, personal certificate is used
Encrypt: pass through USB interface, equipment is linked to each other with computer, after right user and password login, the random number that PKI and randomizer in the EEPROM storage are produced generates unique identification data string key, as encrypting or the key of signature etc., and concrete e-file is carried out corresponding encryption.
Deciphering: pass through USB interface, equipment is linked to each other with computer, after right user and password login, with the private key that obtains in the EEPROM storage, decruption key as signature document or encrypted electronic file, and concrete e-file carried out corresponding decryption processing, thereby realize the encrypted transmission of file.
Claims (1)
1. a file security Dongle is characterized in that, comprises CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009200658769U CN201600685U (en) | 2009-09-11 | 2009-09-11 | File security software protector |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009200658769U CN201600685U (en) | 2009-09-11 | 2009-09-11 | File security software protector |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201600685U true CN201600685U (en) | 2010-10-06 |
Family
ID=42811748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009200658769U Expired - Fee Related CN201600685U (en) | 2009-09-11 | 2009-09-11 | File security software protector |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201600685U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918910A (en) * | 2019-03-14 | 2019-06-21 | 黄策 | A kind of keyboard manager |
-
2009
- 2009-09-11 CN CN2009200658769U patent/CN201600685U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109918910A (en) * | 2019-03-14 | 2019-06-21 | 黄策 | A kind of keyboard manager |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109818745B (en) | Internet of things information security chip | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
CN201054140Y (en) | Information security control chip | |
CN105117658B (en) | A kind of cryptosecurity management method and equipment based on finger print identifying | |
CN102693385A (en) | Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof | |
CN105447394A (en) | Intelligent password key with local data encryption function | |
CN105450419A (en) | Method, device and system | |
CN102694650B (en) | Secret key generating method based on identity encryption | |
CN103780391A (en) | Hand-written electronic signature data protection method based on signature content | |
CN201716734U (en) | Usb safe storage encryption device | |
CN104283673A (en) | Random and dynamic voltage regulation anti-attack method for password circuit system and circuit system | |
CN103746805A (en) | External authentication key generation method and system | |
CN110191136A (en) | A kind of convenient and fast file secure transmission method and equipment | |
CN101383825A (en) | Method, apparatus and terminal implementing computer file ciphering | |
CN100464337C (en) | Method and equipment for carrying out safety communication between USB device and host | |
CN201600685U (en) | File security software protector | |
CN204808325U (en) | Carry out black equipment to data | |
CN103902932A (en) | Data encryption and decryption device and method for USB storage devices | |
CN103593592A (en) | User data encryption and decryption method | |
CN203982391U (en) | A kind of PCI-E encrypted card with network interface | |
CN115694922A (en) | File transmission encryption method and equipment under domestic CPU and OS | |
CN103490875A (en) | Method for protecting large-capacity intelligent card secret key | |
CN202600714U (en) | Embedded terminal based on SD (Secure Digital) trusted computing module | |
CN102270182A (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication | |
CN105426705A (en) | Encryption control system for accounting software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20101006 Termination date: 20130911 |