CN201600685U - File security software protector - Google Patents

File security software protector Download PDF

Info

Publication number
CN201600685U
CN201600685U CN2009200658769U CN200920065876U CN201600685U CN 201600685 U CN201600685 U CN 201600685U CN 2009200658769 U CN2009200658769 U CN 2009200658769U CN 200920065876 U CN200920065876 U CN 200920065876U CN 201600685 U CN201600685 U CN 201600685U
Authority
CN
China
Prior art keywords
eeprom
elliptic curve
usb interface
cpu
file security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009200658769U
Other languages
Chinese (zh)
Inventor
许向阳
武坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2009200658769U priority Critical patent/CN201600685U/en
Application granted granted Critical
Publication of CN201600685U publication Critical patent/CN201600685U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model provides a file security software protector, which is characterized by comprising a CPU, an ROM, an RAM, an EEPROM, a USB interface, a random number generator and an elliptic curve crypto processor. The ROM, the RAM, the EEPROM, the USB interface, the random number generator and the elliptic curve crypto processor are all connected with the CPU. The file security software protector has the advantages of high safety and fast operating speed.

Description

The file security Dongle
Technical field
The utility model belongs to the electron and information technology field, relates to a kind of CPU memory device, relates in particular to a kind of file security Dongle.
Background technology
At present, UKey is a kind of small intelligent card apparatus that directly links to each other, has cryptographic authorization functions, reliable high speed by USB (USB (universal serial bus)) with computing machine.The small and exquisite exquisiteness of the design of UKey, easy to carry, the memory that UKey is possessed self can be used for storing some personal information or certificate, the CPU of UKey and built-in encryption algorithm can provide safe pipeline for data transmission, and UKey is the security protection product that is applicable to unit or network application.But now general Ukey internal algorithm is more single, and speed can not satisfy user's demand, and it is few to adapt to operating system, and security can't reach user's satisfaction.
The utility model content
Technical matters to be solved of the present utility model provides the file security Dongle, safe, the fast operation of this document fail-safe software protector.
For solving the problems of the technologies described above, the technical scheme that the utility model adopted is:
A kind of file security Dongle is characterized in that, comprises CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography (ECC) processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
The function of each several part is as follows:
CPU------------: processor; Be used for data operation, scheduling and the processing of this protector
ROM-----------: deposit the hardware driving storer;
RAM-----------: metadata cache storer;
EEPROM-----: data-carrier store; Be used to deposit the secure file (as certificate) after the encryption;
The USB-----------:USB interface; Be used for communicating by letter with external unit (as computer);
I/O-------------: input, output interface;
Elliptic curve cryptography processor----: be used for that secure file is carried out elliptic curve cryptography (ECC) and handle;
Randomizer-------: be used for producing random number at ciphering process.
The beneficial effect of utility model:
Owing to adopt the elliptic curve cryptography processor; the encryption level of file security Dongle is higher; thereby security and reliability are higher when making practical again personal information of user and certificate; and this elliptic curve cryptography processor also has the advantage of fast operation, makes the application convenient and efficient more of file security Dongle.
Description of drawings
Fig. 1 is the structural representation of embodiment 1.
Embodiment
The utility model is described in further detail below in conjunction with accompanying drawing.
Embodiment 1:
As shown in Figure 1, a kind of file security Dongle, it is characterized in that, comprise CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
The function of each several part is as follows:
CPU------------: processor; Be used for data operation, scheduling and the processing of this protector
ROM-----------: deposit the hardware driving storer;
RAM-----------: metadata cache storer;
EEPROM-----: data-carrier store; Be used to deposit the secure file (as certificate) after the encryption;
The USB-----------:USB interface; Be used for communicating by letter with external unit (as computer);
I/O-------------: input, output interface;
Elliptic curve cryptography processor-----: be used for that secure file is carried out elliptic curve cryptography (ECC) and handle;
Randomizer--------: be used for producing random number at ciphering process.
Principle of work and process that the presents protector is used for file encryption, signature are as follows:
1, by driving connection device:
The computer utility driver of this equipment at first is installed, then this equipment is connected with the computing machine USB interface, input user name and password, by the CPU process chip, the storage of ROM hardware driving, the storage of RAM metadata cache, whether the verified users login is correct;
2, with the certificate load facility:
Pass through USB interface, equipment is linked to each other with computer, individual valid certificate file (comprising: PKI and private key) is imported ROM, CPU adopts ECC (being elliptic curve encryption algorithm) cryptographic algorithm to encrypt then, and the personal certificate of encrypting is stored in the EEPROM storage, EEPROM has the brute force attack of preventing function.
3, personal certificate is used
Encrypt: pass through USB interface, equipment is linked to each other with computer, after right user and password login, the random number that PKI and randomizer in the EEPROM storage are produced generates unique identification data string key, as encrypting or the key of signature etc., and concrete e-file is carried out corresponding encryption.
Deciphering: pass through USB interface, equipment is linked to each other with computer, after right user and password login, with the private key that obtains in the EEPROM storage, decruption key as signature document or encrypted electronic file, and concrete e-file carried out corresponding decryption processing, thereby realize the encrypted transmission of file.

Claims (1)

1. a file security Dongle is characterized in that, comprises CPU, ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor; Described ROM, RAM, EEPROM, USB interface, randomizer and elliptic curve cryptography processor all are connected with described CPU.
CN2009200658769U 2009-09-11 2009-09-11 File security software protector Expired - Fee Related CN201600685U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009200658769U CN201600685U (en) 2009-09-11 2009-09-11 File security software protector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009200658769U CN201600685U (en) 2009-09-11 2009-09-11 File security software protector

Publications (1)

Publication Number Publication Date
CN201600685U true CN201600685U (en) 2010-10-06

Family

ID=42811748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009200658769U Expired - Fee Related CN201600685U (en) 2009-09-11 2009-09-11 File security software protector

Country Status (1)

Country Link
CN (1) CN201600685U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918910A (en) * 2019-03-14 2019-06-21 黄策 A kind of keyboard manager

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918910A (en) * 2019-03-14 2019-06-21 黄策 A kind of keyboard manager

Similar Documents

Publication Publication Date Title
CN109818745B (en) Internet of things information security chip
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN201054140Y (en) Information security control chip
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN105447394A (en) Intelligent password key with local data encryption function
CN105450419A (en) Method, device and system
CN102694650B (en) Secret key generating method based on identity encryption
CN103780391A (en) Hand-written electronic signature data protection method based on signature content
CN201716734U (en) Usb safe storage encryption device
CN104283673A (en) Random and dynamic voltage regulation anti-attack method for password circuit system and circuit system
CN103746805A (en) External authentication key generation method and system
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
CN100464337C (en) Method and equipment for carrying out safety communication between USB device and host
CN201600685U (en) File security software protector
CN204808325U (en) Carry out black equipment to data
CN103902932A (en) Data encryption and decryption device and method for USB storage devices
CN103593592A (en) User data encryption and decryption method
CN203982391U (en) A kind of PCI-E encrypted card with network interface
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
CN103490875A (en) Method for protecting large-capacity intelligent card secret key
CN202600714U (en) Embedded terminal based on SD (Secure Digital) trusted computing module
CN102270182A (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN105426705A (en) Encryption control system for accounting software

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20101006

Termination date: 20130911