Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cipher machine with secret key destroying function and secret key destroying method

A cipher machine and key technology, applied in the field of information security, can solve problems such as the inability to guarantee the timeliness of key destruction, key security risks, etc., to prevent violent opening or cracking, protect key security, and have a high success rate Effect

Pending Publication Date: 2020-06-23
中安云科科技发展(山东)有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional cipher key destruction is generally based on programs or systems. When key destruction is required, the key destruction program is controlled to execute the key destruction function. However, the program or system needs a start-up time, so key destruction cannot be guaranteed. timeliness, there is a certain risk to key security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher machine with secret key destroying function and secret key destroying method
  • Cipher machine with secret key destroying function and secret key destroying method
  • Cipher machine with secret key destroying function and secret key destroying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.

[0024] figure 1 For a schematic structural diagram of a cryptographic machine with key destruction provided in the embodiment of this application, see figure 1 , the cipher machine with key destruction in this embodiment includes a cipher machine housing 1 and a cover plate 2, the cipher machine housing 1 and the cover plate 2 are movably connected, and the cipher machine housing 1 is provided with A cipher card 3, the cipher card 3 is configured to trigger key destruction at a low level, a first control switch 4 is arranged on the cipher machine housing 1, and the cipher machine housing 1 is packaged with the cover plate 2 A second control switch 5 is arranged at the place, and the first control switch 4 and the second control switch 5 are electrically connected with the password card 3 through a connecting wire, and control the first control switch ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cipher machine with a secret key destroying function and a secret key destroying method. Wherein the cipher machine shell is movably connected with the cover plate; a password card is arranged in the password machine shell; the cipher card is configured to trigger key destruction at a low level. A first control switch is arranged on the cipher machine shell, a second control switch is arranged at the packaging position of the cipher machine shell and the cover plate, the first control switch and the second control switch are electrically connected with the cipher cardthrough connecting wires, and the first control switch and / or the second control switch are / is controlled to control on-off of the cipher card. When a secret key needs to be destroyed or the cipher machine is illegally destroyed, the cipher machine is opened; a password card in the password machine is powered off; the high-level signal is switched into the low-level signal, automatic secret key destruction is directly triggered, an external program or system is not needed, the success rate of secret key destruction is high, the secret key can be rapidly destroyed in millisecond-level time, the cipher machine is prevented from being violently opened or violently cracked, and the safety of the secret key in the cipher machine is protected to the maximum extent.

Description

technical field [0001] This application relates to the technical field of information security, in particular to a cipher machine with key destruction and a key destruction method. Background technique [0002] Information security is a multi-level, multi-factor, and comprehensive dynamic process. Information security requires comprehensive thinking and unified planning of information systems and organizational systems. Information security must also pay attention to changes in the internal and external environments of the monitoring system. Information security is likely to be Security flaws on the system will pose a threat to the entire system organization. Therefore, information security is a multi-level, multi-factor, and comprehensive dynamic process. It is a continuous development process of information security that needs to be guaranteed by the system. [0003] The cipher machine is the basic core cryptographic device in the field of information security. The secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0891H04L9/0897
Inventor 于传江刘磊王谨旗郭家喜滕靖国郑海森
Owner 中安云科科技发展(山东)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products