Portable security computer architecture based on encrypted hash tag protection
A secure computer and portable technology, applied in the field of network security transmission, can solve the problems of low efficiency and inability to make full use of the convenience of data communication, and achieve the effect of enhancing security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0082] This embodiment provides a portable secure computing architecture based on encrypted hash tag protection, specifically as follows:
[0083] Portable security computer architecture based on cryptographic hash tag protection such as figure 1 As shown, it is implemented by a portable computer with various security control functions. Together with a mobile smart terminal (including a smart phone) running a secure TFTP App (STFTP App), it provides safe processing for the editing, storage, transmission and copying of sensitive files Create a safe computing environment. The portable security computer and the smart terminal are connected by USB CDC, based on the secure TFTP (STFTP) protocol to realize the secure exchange of encrypted sensitive files, and based on the strict isolation of the data block encrypted hash tag security mechanism to defend against network attacks and prevent Data breach of sensitive files.
[0084] The mobile smart terminal installed and running the ...
Embodiment 2
[0097] This embodiment is on the basis of embodiment 1:
[0098] The present embodiment provides the security mechanism realized by the portable security computer framework, specifically as follows:
[0099] The design goal of the portable secure computer architecture is to establish a safe and fully controlled operating environment that is strictly isolated from the mobile Internet to meet the safe application requirements of the production, transmission, copy, storage and editing of sensitive files.
[0100] In order to achieve this security application goal, this embodiment designs a portable secure computing rack based on cryptographic hash tag protection, which realizes strict password isolation between the secure computing environment and the mobile Internet environment. By adopting data block encrypted hash tag mechanism, secure transmission protocol control mechanism, file encryption storage mechanism, file randomization and segmentation encrypted transmission protecti...
Embodiment 3
[0145] This embodiment is on the basis of embodiment 2:
[0146] This embodiment provides the processing workflow of the encrypted hash tag protection module, which is as follows:
[0147] When a PPP (point-to-point) link based on USB CDC connection is established between the portable security computer and the intelligent terminal, different IP addresses of the same network segment are set at both ends, and the working state of the encrypted hash tag protection module is set to the initial state , initialize the serial number control value to 0, initialize the message repetition counter value to 0, and turn off the state reset timer. After the portable security computer reads the USBKey data protection key stored in the hidden file, and reads out the encrypted data of the data block protection key and the encrypted state data of the hash tag key from the USBKey, and decrypts it with the USBKey data protection key, both parties You can use the STFTP protocol for encrypted file...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com