Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, security chip, and computer readable storage medium

A data encryption and security chip technology, applied in the field of information security, can solve the problems of easy decryption of encrypted data, achieve the effect of increasing the difficulty of cracking, facilitating decryption, and ensuring information security

Inactive Publication Date: 2017-11-17
GD MIDEA AIR-CONDITIONING EQUIP CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a data encryption method, which aims to solve the technical problem in the prior art that the encrypted data is easy to decipher due to the fixed length of the packet and the well-known encryption processing data bits.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, security chip, and computer readable storage medium
  • Data encryption method, security chip, and computer readable storage medium
  • Data encryption method, security chip, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] Such as figure 1 as shown, figure 1 It is a schematic diagram of the security chip component modules of the hardware operating environment involved in the solution of the embodiment of the present invention.

[0044] The security chip may include: a processor module 1001 , such as a CPU, a storage module 1002 , and a data monitoring module 1003 . Among them, the data monitoring module 1003 is used to monitor the situation of data transmission, and feed back the data transmission situation to the processor module 1001, and trigger the processor module 1001 to make corresponding instructions, and the data monitoring module 1003 can also call the storage module 1002 to call or / and storage operations, the data monitoring module 1003 may include a counter, or other elements that can realize the above functions. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method. The method includes steps of acquiring a user key preset in a security chip and valid data bits in the user key when to-be-encrypted data is detected; determining an embedding rule for embedding the valid data bits in the to-be-encrypted data according to the structure attribute of the user key or a received customized instruction; embedding the valid data bits in corresponding positions of a data bit sequence of the to-be-encrypted data according to the embedding rule; using the embedded positions of the valid data bits as check data, and loading the check data onto the data sequence in which the valid data bits are embedded in order to generate encrypted data. The invention also discloses a security chip and a computer readable storage medium. The data encryption method can increase the cracking difficulty of encrypted data.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data encryption method, a security chip and a computer-readable storage medium. Background technique [0002] With the development of wireless communication technology, people pay more and more attention to information security. Encrypting data is the main means to ensure information security. At present, most wifi communication devices often use WPA (Wi-Fi Protected Access) for encryption, and the commonly used AES (Advanced Encryption Standard) encryption algorithm. [0003] However, these algorithms encrypt fixed packet lengths such as 128, 192, and 256-bit data. The encrypted data bits are widely known. If hackers and other intruders collect enough data and encrypted data frames sent by the device, the encrypted The analysis of the data frame will eventually draw the encryption rules, crack the login password of the wifi device, invade the wifi communication d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0618H04L9/088H04L9/0894
Inventor 毕晓猛冯宇翔
Owner GD MIDEA AIR-CONDITIONING EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products