Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key protection module

A key protection and key technology, applied in key distribution, can solve the problems of undecryptable communication information, no hardware storage location, loss of private key, etc., to achieve the effect of protecting keys, simple modules, and improving utilization

Inactive Publication Date: 2016-07-06
GUANGZHOU KINGTELLER TECHNOLOGY CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some problems in the current asymmetric key encryption. The reason is that the key of the information receiver is usually stored in the cache location of the information receiver, and there is no separate hardware storage location. Electricity will lead to the loss of the private key, communication information cannot be decrypted, resulting in information loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection module
  • Key protection module
  • Key protection module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Such as figure 1 and figure 2 As shown, a key protection module includes: a key storage circuit, which stores the key information sent by the front-end circuit; an anti-demolition circuit, which detects that the key storage circuit moves and automatically erases the key information in the key storage circuit ; An external power supply to supply power to the key storage circuit. The invention utilizes an external power supply to directly supply power to the key storage circuit, and the key information is stored in the key protection circuit, so that the key information will not be lost even if the system is accidentally powered off. However, since the external power supply is used to directly supply power to the module, the external power supply needs to match the operating voltage of the circuit. When the external power supply voltage does not match the operating voltage of the circuit, the key protection module cannot work, and the module has a narrow application ran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key protection module comprising a key storage circuit used for storing key information sent by a front-end circuit, an anti-disassembly circuit including an anti-disassembly device and an anti-removal device and used for automatically erasing the key information in the key storage circuit when detecting that the key storage circuit moves, and an external power supply or charger-discharger used for supplying power to the key storage circuit. By separately setting the key storage circuit and supplying power to the key storage circuit, keys are not lost when the system is powered off. The anti-disassembly circuit is arranged to prevent criminals from trying to get the key information by disassembling the key storage circuit. The module can be powered in two modes, the implementation methods are simple and diverse, the selectivity is high, and the module is of high portability. Independent key protection hardware is set in order to protect the key information. A key protection module which can store keys separately, protect keys and avoid loss of key information in the case of power failure of the system is truly provided.

Description

technical field [0001] The invention relates to a key protection module. Background technique [0002] With the development of information technology, online transactions and network operations have increasingly penetrated into people's lives. In order to ensure the security of network information, people began to use ciphertext transmission to ensure information security. At present, the commonly used information encryption methods are divided into symmetric key encryption and asymmetric key encryption. Although the symmetric key encryption / decryption speed is fast, but because the key is difficult to manage, it cannot truly protect information security. Asymmetric key encryption replaced. [0003] Asymmetric key encryption is also known as public key encryption. It needs to use different keys to complete the encryption and decryption operations respectively. One is released publicly, that is, the public key is also called the public key, and the other is kept secretly by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/08
Inventor 刘理学杨文斌黎国俊
Owner GUANGZHOU KINGTELLER TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products