Touch keyword using national cipher SM1 encryption chip and encryption method thereof

An encryption chip, touch keyboard technology, applied in the input/output of user/computer interaction, user identity/authority verification, protection of internal/peripheral computer components, etc., can solve problems such as encryption products that have not yet appeared, and achieve resistance to data replay The effect of attacking, avoiding leakage, and ensuring security

Inactive Publication Date: 2014-06-11
GUANGDONG HUADA INTERNET CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] But at present, in the touch keyboard, there is no encryption product using the national secret SM1 algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Touch keyword using national cipher SM1 encryption chip and encryption method thereof
  • Touch keyword using national cipher SM1 encryption chip and encryption method thereof
  • Touch keyword using national cipher SM1 encryption chip and encryption method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to fully understand the technical content of the present invention, the technical solutions of the present invention will be further introduced and illustrated below in conjunction with specific examples, but not limited thereto.

[0042] Such as Figure 1-Figure 2 The present invention shown is a touch keyboard using a national secret SM1 encryption chip, including a touch chip 10, a main control MCU 20 and a data wire for connecting the main control MCU 20 and the touch chip 10, and the data wire is a two-wire serial bus The I2C bus, the I2C bus is also connected with the national secret SM1 encryption chip 30. The touch chip 10 is also connected with a key sensor pad 40 . Wherein, the collection data packet collected by the touch chip 10 is encrypted by the encryption chip 30 to generate a ciphertext data packet, which is transmitted to the main control MCU 20, and the ciphertext data packet received by the main control MCU is decrypted by the encryption ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a touch keyword using a national cipher SM1 encryption chip and an encryption method thereof. The touch keyword using the national cipher SM1 encryption chip comprises a touch chip, a master control MCU (Microprogrammed Control Unit) and a data guide wire which is used for connecting the master control MCU and the touch chip; the data guide wire is an I2C bus of a two-wire serial bus; and the I2C bus is also connected with the national cipher SM1 encryption chip. By using a hardcore type national cipher SM1 encryption chip, a collection data packet collected by the touch chip is encrypted, transmitted to the master control MCU and then decrypted again, so that the touch keyword using the national cipher SM1 encryption chip is capable of ensuring that touch sensing information is not stolen in the transmission process and guaranteeing safety of data application; and the touch keyword using the national cipher SM1 encryption chip is especially applicable to a payment terminal of financial products.

Description

technical field [0001] The invention relates to a keyboard structure for encrypted transmission, more specifically a touch keyboard using a national secret SM1 encryption chip and an encryption method thereof. Background technique [0002] In today's market, there are many alternative algorithms to deal with the data security crisis. Facing the importance of data encryption security, the relevant national management departments have strengthened the management of government and enterprise data security systems, requiring the security of major departments The system encryption algorithm uses the national secret algorithm - the national commercial password (SM). The national commercial encryption algorithm is formulated and managed by the State Encryption Management Committee. The algorithm is a state secret, and the information is not disclosed. Here, the combination of the I2C bus protocol and the national secret SM1 algorithm is used in the touch keyboard, especially to br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/02G06F21/83H04L9/32
Inventor 张亚军欧阳俊丘祖国
Owner GUANGDONG HUADA INTERNET CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products