CN205354034U - Secure computer mainboard based on close algorithm of state is encrypted - Google Patents
Secure computer mainboard based on close algorithm of state is encrypted Download PDFInfo
- Publication number
- CN205354034U CN205354034U CN201620089818.XU CN201620089818U CN205354034U CN 205354034 U CN205354034 U CN 205354034U CN 201620089818 U CN201620089818 U CN 201620089818U CN 205354034 U CN205354034 U CN 205354034U
- Authority
- CN
- China
- Prior art keywords
- state
- close
- computer motherboard
- chip
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model provides a secure computer mainboard based on close algorithm of state is encrypted, this secure computer mainboard includes: the computer motherboard for carry out the close chip of black state to the data of computer motherboard, and at least one locate the computer motherboard peripheral and with the close subassembly of black state is carried out with the data to the mainboard to the close chip cooperation of state, wherein, the close chip of state passes through LPC interface or USB interface and computer mainboard connection, close subassembly of state and computer mainboard connection.
Description
Technical field
This utility model relates to a kind of computer motherboard technical field, particularly relates to a kind of fail-safe computer mainboard based on the close algorithm for encryption of state.
Background technology
Secure topical can only be protected by the existing encryption technology such as current UKey, and the rank of data security protecting is relatively low.As: the UKey of Bank of China can only underway state's bank's related service time just can play a protective role.Similarly, during as used prison office of city UKey to operate other business, the effect of protection cannot just be realized.It addition, existing encryption technology is when UKey loses, data safety just cannot be protected.
Utility model content
This utility model solves the technical problem that and is, how to provide the fail-safe computer mainboard based on the close algorithm for encryption of state of a kind of data security levels that can improve computer motherboard.
This utility model solves the technical scheme of above-mentioned technical problem, a kind of fail-safe computer mainboard based on the close algorithm for encryption of state is provided, should include based on the fail-safe computer mainboard of the close algorithm for encryption of state: computer motherboard, the close chip of state for the data of computer motherboard are encrypted, and at least one to be located at computer motherboard peripheral and coordinate, with described state close chip, the state's seal assembly being encrypted with the data to mainboard;Wherein, the close chip of described state is connected with computer motherboard by LPC interface or USB interface, and described state seal assembly is connected with computer motherboard.
Preferably, the close chip of described state is TCM module.
Preferably, described state seal assembly is set to four, and state's seal assembly described in four is respectively as follows: the close code keypad of state, encription algorithms approved by the State Password Administration Committee Office hard disk, the close card reader of the close UKey of state and state;Wherein, the close code keypad of described state is connected with described computer motherboard by UART interface, described encription algorithms approved by the State Password Administration Committee Office hard disk is connected with described computer motherboard by SATA interface, the close UKey of described state is connected with described computer motherboard by USB, the close card reader of described state by SDIO interface by being connected with described computer motherboard.
Preferably, fail-safe computer mainboard based on the close algorithm for encryption of state also includes: when computer motherboard suspension and after repeatedly seeking entry into thrashing or burn the chip of the close chip of described state when the netkey that described computer motherboard is currently networked is inconsistent with the netkey preset and burn module, and described chip burns module and is connected with the control signal outfan of described state close chip.
Preferably, fail-safe computer mainboard based on the close algorithm for encryption of state also includes: fuse module when described computer motherboard suspension and the close chip of described state that fuses after repeatedly seeking entry into thrashing or when the netkey that described computer motherboard is currently networked is inconsistent with the netkey preset are connected the pin of pin with described computer motherboard, and the described pin module that fuses is connected with the control signal outfan of described state close chip.
Preferably, described computer motherboard is X86 computer motherboard.
The fail-safe computer mainboard based on the close algorithm of state that this utility model provides, the close chip of state of this fail-safe computer mainboard is combined at least one state's seal assembly and data is encrypted protection.Due to the encryption key of data be the cipher key logic phase that generated according to its algorithm by state's seal assembly with, to obtain data encryption key.When the key of one of them state's seal assembly does not mate, then login computer motherboard failure, thus improve the level of security of mainboard data.Certainly, the number of state's seal assembly is more many, and protection level improves accordingly.
Accompanying drawing explanation
Fig. 1 is this utility model module map based on the fail-safe computer mainboard first embodiment of the close algorithm for encryption of state;
Fig. 2 is this utility model module map based on fail-safe computer mainboard second embodiment of the close algorithm for encryption of state;
Fig. 3 is this utility model module map based on fail-safe computer mainboard the 3rd embodiment of the close algorithm for encryption of state;
Fig. 4 is this utility model module map based on fail-safe computer mainboard the 4th embodiment of the close algorithm for encryption of state.
The realization of this utility model purpose, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Detailed description of the invention
This utility model is described in further detail in conjunction with accompanying drawing below by detailed description of the invention.
It is this utility model module map based on the fail-safe computer mainboard first embodiment of the close algorithm for encryption of state referring to figs. 1 to 4, Fig. 1;Fig. 2 is this utility model module map based on fail-safe computer mainboard second embodiment of the close algorithm for encryption of state;Fig. 3 is this utility model module map based on fail-safe computer mainboard the 3rd embodiment of the close algorithm for encryption of state;Fig. 4 is this utility model module map based on fail-safe computer mainboard the 4th embodiment of the close algorithm for encryption of state.This utility model one embodiment provides a kind of fail-safe computer mainboard 1 based on the close algorithm for encryption of state, comprising: computer motherboard 1, the close chip of state 2 and at least one state seal assembly 3.Wherein, the close chip 2 of state is connected with computer motherboard 1 by LPC interface or USB interface, and state's seal assembly 3 is connected with computer motherboard 1.
Computer motherboard 1 can be computer motherboard of the prior art.In this embodiment, it is preferred that, computer motherboard 1 is X86 computer motherboard.
The close chip 2 of state is connected with computer motherboard 1 by LPC interface or USB interface.The close chip 2 of this state is for being encrypted the data on computer motherboard 1.In the present embodiment, the close chip 2 of state is TCM module (TrustedCryptographyModule, credible password module).
State's seal assembly 3 is located at the periphery of computer motherboard 1, is attached with the interface of computer motherboard 1.State's seal assembly 3 coordinates with state close chip 2, and the data of computer motherboard 1 are encrypted.It should be noted that, state's seal assembly 3 arranges at least one.In the nature of things, state's seal assembly 3 is set to more many, and its security classification is more high, specifically can select according to being actually needed of user.Relying on multiple states seal assembly 3, initial key can being generated the key of more safety through polyalgorithm, thus improving the level of security of data.In the present embodiment, state's seal assembly 3 is set to four.Wherein, four state's seal assemblies 3 are respectively as follows: the close code keypad of state 31, encription algorithms approved by the State Password Administration Committee Office hard disk 32, the close card reader 34 of the close UKey33 of state and state.Wherein, the close code keypad 31 of state is connected with computer motherboard 1 by UART interface.Encription algorithms approved by the State Password Administration Committee Office hard disk 32 is connected with computer motherboard 1 by SATA interface.The close UKey33 of state is connected with computer motherboard 1 by USB.The close card reader 34 of state passes through SDIO interface by being connected with computer motherboard 1.It should be noted that, the close code keypad of state 31, encription algorithms approved by the State Password Administration Committee Office hard disk 32, the close card reader of the close UKey33 of state and state 34 each generate key according to the close algorithm of respective state.The close code keypad of state 31, encription algorithms approved by the State Password Administration Committee Office hard disk 32, the close card reader 34 of the close UKey33 of state and state cipher key logic phase with, to generate exclusive key, it is achieved multiple protective data safety.When logining computer motherboard 1 system, as long as one of them key does not mate, then login failure, thus improve the level of security of computer motherboard 1 data.
Encrypted work principle based on the fail-safe computer mainboard 1 of the close algorithm for encryption of state is as follows:
Step S10, computer motherboard 1 powers on and starts shooting and judge whether the close chip 2 of state is effectively connected with computer motherboard 1.
In the present embodiment, computer motherboard 1 powers on after start, and first whether the pin of the close chip 2 of detection state is effectively connected with the interface of computer motherboard 1.It should be noted that, this detection mode has multiple, as: judge, by logic circuit, the interface level state etc. that the close chip 2 of computer motherboard 1 and state is connected, specifically do not repeat one by one.
Step S20, when the close chip 2 of state is effectively connected with computer motherboard 1, obtains the ID account of the close chip 2 of state, and when the ID account of the close chip 2 of state is by certification, obtains the key of the close chip 2 of state.
In the present embodiment, the close chip 2 of state enters next step authentication operation after being effectively connected with computer motherboard 1.Specifically, obtain the ID account that state's close chip 2 is current, and current ID account is carried out comparison one by one with the ID account in ID account data storehouse.If current ID account is identical with one of them in ID account data storehouse, then prove that the ID account of the close chip 2 of this state is by certification, enters next step operation obtaining state's close chip 2 key.Otherwise, termination system logs in (i.e. login failure).
Step S30, when the key of the close chip 2 of state is with its key agreement preset, it is judged that whether various countries' seal assembly 3 is effectively connected with computer motherboard 1.
In the present embodiment, the key of close for the state got chip 2 is compared with the key preset, if the current key obtained and the key agreement preset, then enter next step operation: judge that various countries' seal assembly 3 is connected whether effectiveness with computer motherboard 1.If the current key obtained is inconsistent with the key preset, then terminate logging in.It should be noted that state's seal assembly 3 generally arranges multiple, and multiple states seal assembly 3 is all attached with computer motherboard 1.In this step, judge that the level state of computer motherboard 1 interface judges the connection effectiveness of state's seal assembly 3 by logic circuit.The means that these means connect effectiveness with above-mentioned state close chip 2 are identical, do not repeat them here.
Step S40, when various countries' seal assembly 3 is all effectively connected with computer motherboard 1, obtains the key of various countries' seal assembly 3.
In the present embodiment, when various countries' seal assembly 3 is all effectively connected with computer motherboard 1, then can obtain the respective key of various countries' seal assembly 3.Otherwise, only one of which state seal assembly 3 is invalid with computer motherboard 1 to be connected, then log in termination.
Step S50, when all its corresponding preset-key of the key of various countries' seal assembly 3 matches, then mates the combination key of various countries' seal assembly 3 with the preset-key of state close chip 2, if coupling, then enters system.
In the present embodiment, after getting the key of each state's seal assembly 3, by the key of each state's seal assembly 3 and the key phase comparison preset.If all consistent, then enter next step operation.Otherwise log in termination.As: state's seal assembly 3 arranges four, the key comparison that the current key of assembly 1 is preset with assembly 1, the key comparison that the current key of assembly 2 is preset with assembly 2, the key comparison that the current key of assembly 3 is preset with assembly 3, the current key of assembly 4 is compared with the key that assembly 4 is preset.As long as when whole comparisons are adopted unanimously, next step operation just can be carried out.Otherwise log in termination.Next step operation is: the combination key of various countries' seal assembly 3 mated with the preset-key of state close chip 2.It should be noted that, each state's seal assembly 3 generates key according to respective algorithm, finally the cipher key combinations of host country seal assembly 3 is generated exclusive key.It should be noted that, the mode of combination be logic phase with.The key that the close chip 2 of this exclusive key and state is preset is compared.If consistent, then accessing system.Otherwise, terminate logging in.
The fail-safe computer mainboard 1 based on the close algorithm of state that this utility model provides, the close chip 2 of state of this fail-safe computer mainboard 1 is combined at least one state's seal assembly 3 and data is encrypted protection.Due to the encryption key of data be the cipher key logic phase that generated according to its algorithm by state's seal assembly 3 with, to obtain data encryption key.When the key of one of them state's seal assembly 3 does not mate, then login computer motherboard 1 failure, thus improve the level of security of mainboard data.Certainly, the number of state's seal assembly 3 is more many, and protection level improves accordingly.
Further, also include chip based on the fail-safe computer mainboard 1 of the close algorithm of state and burn module 4.After computer motherboard 1 suspension and repeatedly seeking entry into thrashing, or when the netkey that computer motherboard 1 is currently networked is inconsistent with the netkey preset (as: the change of IP address, lower with), chip burns module 4 and then builds high-tension line and burn the close chip 2 of state.Specifically, chip burns module 4 and is connected with the control signal outfan of state close chip 2.It should be noted that, chip burns module 4 is subject to the control of the close chip 2 of state.The close chip 2 of state is controlled by signal output part and outputs control signals to chip and burn module 4, burn module 4 with control chip and build high-tension line, burning the close chip 2 of state, thus avoiding computer motherboard 1 illegally to be logined, improving the data security levels of computer motherboard 1 further.
Further, pin fusing module 5 is also included based on the fail-safe computer mainboard 1 of the close algorithm of state.After computer motherboard 1 suspension and repeatedly seeking entry into thrashing, or when the netkey that computer motherboard 1 is currently networked is inconsistent with the netkey preset, pin fusing module 5 fuses the close chip of the state 2 connection pin with computer motherboard 1.Pin fusing module 5 is connected with the control signal outfan of the close chip 2 of state.Specifically, pin fusing module 5 is connected with the control signal outfan of state close chip 2.It should be noted that, pin fusing module 5 is subject to the control of the close chip 2 of state.The close chip 2 of state is controlled by signal output part and outputs control signals to pin fusing module 5, with control pin fusing module 5 build high-tension line, the connection pin of the close chip 2 of high-voltage fuse state and computer motherboard 1, thus avoiding computer motherboard 1 illegally to be logined, improve the data security levels of computer motherboard 1 further.
Above content is in conjunction with specific embodiment further detailed description of the utility model, it is impossible to assert that of the present utility model being embodied as is confined to these explanations.For this utility model person of an ordinary skill in the technical field, without departing from the concept of the premise utility, it is also possible to make some simple deduction or replace.
Claims (6)
1. the fail-safe computer mainboard based on the close algorithm for encryption of state, it is characterized in that, including: computer motherboard, the close chip of state for the data of computer motherboard are encrypted, and at least one to be located at computer motherboard peripheral and coordinate, with described state close chip, the state's seal assembly being encrypted with the data to mainboard;Wherein, the close chip of described state is connected with computer motherboard by LPC interface or USB interface, and described state seal assembly is connected with computer motherboard.
2. the fail-safe computer mainboard based on the close algorithm for encryption of state as claimed in claim 1, it is characterised in that the close chip of described state is TCM module.
3. the fail-safe computer mainboard based on the close algorithm for encryption of state as claimed in claim 1, it is characterised in that described state seal assembly is set to four, and state's seal assembly described in four is respectively as follows: the close code keypad of state, encription algorithms approved by the State Password Administration Committee Office hard disk, the close card reader of the close UKey of state and state;Wherein, the close code keypad of described state is connected with described computer motherboard by UART interface, described encription algorithms approved by the State Password Administration Committee Office hard disk is connected with described computer motherboard by SATA interface, the close UKey of described state is connected with described computer motherboard by USB, the close card reader of described state by SDIO interface by being connected with described computer motherboard.
4. the fail-safe computer mainboard based on the close algorithm for encryption of state as claimed in claim 1, it is characterized in that, also including: when computer motherboard suspension and after repeatedly seeking entry into thrashing or burn the chip of the close chip of described state when the netkey that described computer motherboard is currently networked is inconsistent with the netkey preset and burn module, described chip burns module and is connected with the control signal outfan of described state close chip.
5. the fail-safe computer mainboard based on the close algorithm for encryption of state as claimed in claim 1, it is characterized in that, also including: fuse module when described computer motherboard suspension and the close chip of described state that fuses after repeatedly seeking entry into thrashing or when the netkey that described computer motherboard is currently networked is inconsistent with the netkey preset are connected the pin of pin with described computer motherboard, the described pin module that fuses is connected with the control signal outfan of described state close chip.
6. the fail-safe computer mainboard based on the close algorithm for encryption of state as described in any one of claim 1 to 5, it is characterised in that described computer motherboard is X86 computer motherboard.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620089818.XU CN205354034U (en) | 2016-01-29 | 2016-01-29 | Secure computer mainboard based on close algorithm of state is encrypted |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620089818.XU CN205354034U (en) | 2016-01-29 | 2016-01-29 | Secure computer mainboard based on close algorithm of state is encrypted |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205354034U true CN205354034U (en) | 2016-06-29 |
Family
ID=56181470
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620089818.XU Expired - Fee Related CN205354034U (en) | 2016-01-29 | 2016-01-29 | Secure computer mainboard based on close algorithm of state is encrypted |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205354034U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550602A (en) * | 2016-01-29 | 2016-05-04 | 深圳市铂盛科技有限公司 | Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method |
CN112287407A (en) * | 2020-10-30 | 2021-01-29 | 芜湖安途智能制造有限公司 | Safety encryption chip |
-
2016
- 2016-01-29 CN CN201620089818.XU patent/CN205354034U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105550602A (en) * | 2016-01-29 | 2016-05-04 | 深圳市铂盛科技有限公司 | Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method |
CN112287407A (en) * | 2020-10-30 | 2021-01-29 | 芜湖安途智能制造有限公司 | Safety encryption chip |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100437618C (en) | Portable information safety device | |
CN101778099B (en) | Architecture accessing trusted network for tolerating untrusted components and access method thereof | |
CN107563213B (en) | Safety secrecy control device for preventing data extraction of storage equipment | |
CN101788959A (en) | Solid state hard disk secure encryption system | |
CN101854243A (en) | Circuit system design encryption circuit and encryption method thereof | |
CN109145562A (en) | A kind of lasting authenticating identity method and its equipment by finger print mouse | |
KR101385929B1 (en) | Certification and storage device with multi connector and finger print sensor | |
CN102799831B (en) | Information safety protection system of application system based on database and information safety protection method | |
JP2012165289A (en) | Communication device and secure module | |
KR102088290B1 (en) | Method of providing trusted service based on security area and apparatus using the same | |
CN106790243B (en) | A kind of password remapping method of safe U disc | |
CN205354034U (en) | Secure computer mainboard based on close algorithm of state is encrypted | |
CN104680055A (en) | Control method for performing management on U disk after access into industrial control system network | |
CN101694683A (en) | Method for preventing Trojans ferrying via movable memories to steal files | |
CN112434270B (en) | Method and system for enhancing data security of computer system | |
CN103870765A (en) | USB (Universal Serial Bus) security lock and method for protecting data by using USB security lock | |
CN105550602A (en) | Secure computer motherboard encrypted based on State-Cryptography-Administration algorithm and encryption method | |
US20170262640A1 (en) | Database operation method and device | |
CN103838997A (en) | Single-chip microcomputer password verification method and device | |
US9262619B2 (en) | Computer system and method for protecting data from external threats | |
CN104915597A (en) | Physical isolation type USB port protection system and method | |
CN103457723A (en) | Encryption method and encryption equipment based on same | |
CN103778388B (en) | A kind of safety strengthens computer system | |
CN202085191U (en) | Data safe storage and transmission system | |
CN104598838A (en) | File storage and editing method for random check and providing of trusted operating environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160629 Termination date: 20180129 |