Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CSP (chip scale package) module of TSPI (telephony service provider interface) based on TSM (tivoli storage manager) and CSP implementation method

A technology of interface and connection interface, which is applied in the direction of instrumentation, calculation, electrical digital data processing, etc., and can solve problems such as resource consumption by application manufacturers and resistance to TCM application promotion.

Active Publication Date: 2012-12-26
NATIONZ TECH INC
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When developers of traditional security applications turn to application development based on TCM cryptographic service functions, they need to relearn the TCM Cryptographic Service Invocation Interface System (TSPI). In addition, what’s more, to port traditional security applications to TCM, all Redevelopment brings resource consumption to application manufacturers, which brings great resistance to TCM application promotion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CSP (chip scale package) module of TSPI (telephony service provider interface) based on TSM (tivoli storage manager) and CSP implementation method
  • CSP (chip scale package) module of TSPI (telephony service provider interface) based on TSM (tivoli storage manager) and CSP implementation method
  • CSP (chip scale package) module of TSPI (telephony service provider interface) based on TSM (tivoli storage manager) and CSP implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0073] Such as figure 1 As shown, the CSP cryptographic service system based on the TSPI interface of TSM of the present invention, on the basis of the TSM of the TCM module, utilizes the TCM service call interface TSPI to develop a new set of CSP interface, through this CSP interface, program developers develop The application program can directly utilize the CryptoSPI of Microsoft Corporation to use the encryption service of the CSP provided by the present invention. Program developers do not need to re-learn the TCM cryptographic service call interface system (TSPI), and traditional security applications can be directly transplanted to the TCM module without code modification. It saves a lot of program developme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a CSP (chip scale package) module of a TSPI (telephony service provider interface) based on a TSM (tivoli storage manager) and a CSP implementation method. The CSP module mainly comprises a CSP connection interface created by the TSPI on the basis of the TSM, a CSP key generating and exchange interface, a CSP encryption and decryption interface and a CSP hash and digital signature interface; the CSP connection interface is used for obtaining and cleaning a CSP key container, setting and obtaining container parameters and releasing the CSP key container; the CSP key generating and exchange interface is used for generating and destroying a key object by CSP, leading in and out the key object, loading the key object, obtaining and setting the key object parameters and generating a random number; the CSP encryption and decryption interface is used for carrying out CSP encryption and decryption; the CSP hash and digital signature interface is used for generating and destroying a hash object, obtaining and setting hash object parameters, signing and checking the signature. The interfaces are encapsulated on the TSPI of a TSM interface, therefore, an application developer can conveniently and safely develop TCM (terminal-to-computer multiplexer) application, and the traditional application is fast transplanted in the TCM conveniently at the same time.

Description

technical field [0001] The present invention relates to the field of trusted computing, in particular to the application of trusted computing technology to implement Microsoft CryptoAPI (an application programming interface provided by Microsoft Corporation, which provides a set of functions that allow applications to provide protection for sensitive private key data of users. A system and method for encrypting or digitally signing data in a flexible manner) encryption standard CSP (Cryptographic Service Provider, encryption service provider). Background technique [0002] Trusted Cryptography Module (Trusted Cryptography Module, TCM) is an essential key basic component of a trusted computing cryptographic support platform, which provides independent cryptographic algorithm computing functions and supports the establishment of a trusted computing platform functional system. [0003] TCM builds a subsystem with storage protection and execution protection, which establishes th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22
Inventor 艾俊
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products