Terminal authentication information generation method and system based on national cryptographic algorithm
A technology of terminal authentication and national secret algorithm, applied in the field of authentication information generation, it can solve the problems of single source of authentication information data, unable to protect software, short length of authentication information, etc. The effect of protecting safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] This embodiment provides a method for generating terminal authentication information based on a national secret algorithm;
[0028] Such as figure 1 As shown, the terminal authentication information generation method based on the national secret algorithm includes:
[0029] S104: Read and decrypt the serial number from the hardware fingerprint information; read and decrypt the verification information from the hardware fingerprint information; read and decrypt the data segment data from the hardware fingerprint information;
[0030] Calculate and verify the check value of the data segment, verify whether the calculated check value is consistent with the stored check value, if yes, go to the next step, if not, write the error message to the file, and end;
[0031] S105: Decrypt the data segment, extract the serial number, hardware fingerprint information, information generation time and CPU information from the file; perform data consistency verification, if the calcula...
Embodiment 2
[0232] This embodiment provides a system for generating terminal authentication information based on a national secret algorithm;
[0233] The terminal authentication information generation system based on the national secret algorithm, including:
[0234] The reading module is configured to: read and decrypt the serial number from the hardware fingerprint information; read and decrypt the verification information from the hardware fingerprint information; read and decrypt the data segment data from the hardware fingerprint information; calculate the data segment Check the value and verify it, verify whether the calculated check value is consistent with the stored check value, if yes, go to the next step, if not, write the error message to the file, and end;
[0235] The verification module is configured to: decrypt the data segment, extract the serial number, hardware fingerprint information, information generation time and CPU information from the file; perform data consiste...
Embodiment 3
[0241] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.
[0242] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com