Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Portable security computer architecture based on encrypted hash tag protection

A secure computer and portable technology, applied in the field of network security transmission, can solve the problems of low efficiency and inability to make full use of the convenience of data communication, and achieve the effect of enhancing security

Active Publication Date: 2020-12-15
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Various unknown network security threats emerge one after another, and network security incidents occur frequently, forcing portable computers that process sensitive information to never be allowed to access the public Internet. The transmission of sensitive files is greatly restricted, or must rely on VPN encryption The protection of mobile phones is either carried by reliable personnel or delivered in confidential ways, and cannot make full use of the convenience of data communication brought by the mobile Internet that is available everywhere. Objectively, it has formed the status quo of ensuring the security of sensitive files at the cost of inefficient work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable security computer architecture based on encrypted hash tag protection
  • Portable security computer architecture based on encrypted hash tag protection
  • Portable security computer architecture based on encrypted hash tag protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] This embodiment provides a portable secure computing architecture based on encrypted hash tag protection, specifically as follows:

[0083] Portable security computer architecture based on cryptographic hash tag protection such as figure 1 As shown, it is implemented by a portable computer with various security control functions. Together with a mobile smart terminal (including a smart phone) running a secure TFTP App (STFTP App), it provides safe processing for the editing, storage, transmission and copying of sensitive files Create a safe computing environment. The portable security computer and the smart terminal are connected by USB CDC, based on the secure TFTP (STFTP) protocol to realize the secure exchange of encrypted sensitive files, and based on the strict isolation of the data block encrypted hash tag security mechanism to defend against network attacks and prevent Data breach of sensitive files.

[0084] The mobile smart terminal installed and running the ...

Embodiment 2

[0097] This embodiment is on the basis of embodiment 1:

[0098] The present embodiment provides the security mechanism realized by the portable security computer framework, specifically as follows:

[0099] The design goal of the portable secure computer architecture is to establish a safe and fully controlled operating environment that is strictly isolated from the mobile Internet to meet the safe application requirements of the production, transmission, copy, storage and editing of sensitive files.

[0100] In order to achieve this security application goal, this embodiment designs a portable secure computing rack based on cryptographic hash tag protection, which realizes strict password isolation between the secure computing environment and the mobile Internet environment. By adopting data block encrypted hash tag mechanism, secure transmission protocol control mechanism, file encryption storage mechanism, file randomization and segmentation encrypted transmission protecti...

Embodiment 3

[0145] This embodiment is on the basis of embodiment 2:

[0146] This embodiment provides the processing workflow of the encrypted hash tag protection module, which is as follows:

[0147] When a PPP (point-to-point) link based on USB CDC connection is established between the portable security computer and the intelligent terminal, different IP addresses of the same network segment are set at both ends, and the working state of the encrypted hash tag protection module is set to the initial state , initialize the serial number control value to 0, initialize the message repetition counter value to 0, and turn off the state reset timer. After the portable security computer reads the USBKey data protection key stored in the hidden file, and reads out the encrypted data of the data block protection key and the encrypted state data of the hash tag key from the USBKey, and decrypts it with the USBKey data protection key, both parties You can use the STFTP protocol for encrypted file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a portable security computer architecture based on encrypted hash tag protection, which is characterized in that a portable security computer realizes security isolation with the Internet based on a data block encrypted hash tag protection mechanism, adopts a security TFTP protocol to realize security exchange of encrypted files with a mobile intelligent terminal, and implements single device function limitation on a USB HID interface to defend against attacks from the interface. According to the portable security computer architecture, the data block encrypted hash tagprotection mechanism, a secure transmission protocol control mechanism, a USB HID interface single equipment function limiting mechanism and the like are adopted, and the security mechanisms providestrict security isolation protection for the operation environment of the portable computer together, thus a safe operation environment can be provided for all processing links related to sensitive files, and meanwhile various possible malicious attacks can be resisted.

Description

technical field [0001] The invention relates to the technical field of network security transmission, in particular to a portable security computer architecture based on encrypted hash tag protection. Background technique [0002] In the existing portable computer architecture, the adversary may invade the computer software system and steal important sensitive information by using any security loopholes in the Internet protocol, file transfer and copy, and USB interface. Various unknown network security threats emerge one after another, and network security incidents occur frequently, forcing portable computers that process sensitive information to never be allowed to access the public Internet. The transmission of sensitive files is greatly restricted, or must rely on VPN encryption The protection of mobile phones is either carried by reliable personnel or delivered in confidential ways, and cannot make full use of the convenience of data communication brought by the mobile...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/08
CPCH04L9/0643H04L9/0869H04L9/0877H04L9/3236H04L9/3247H04L67/06
Inventor 李大双张文政曹云飞吴开均于飞
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products