CN211630171U - Hard implementation equipment for SM4 encryption algorithm - Google Patents

Hard implementation equipment for SM4 encryption algorithm Download PDF

Info

Publication number
CN211630171U
CN211630171U CN202020471709.0U CN202020471709U CN211630171U CN 211630171 U CN211630171 U CN 211630171U CN 202020471709 U CN202020471709 U CN 202020471709U CN 211630171 U CN211630171 U CN 211630171U
Authority
CN
China
Prior art keywords
unit
storage unit
root key
algorithm
encryption algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202020471709.0U
Other languages
Chinese (zh)
Inventor
李天敏
何程
孙潍
宋秋平
宗倩雯
余争光
关竹仙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Zhaoxun Technology Co ltd
Original Assignee
Yunnan Zhaoxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Zhaoxun Technology Co ltd filed Critical Yunnan Zhaoxun Technology Co ltd
Priority to CN202020471709.0U priority Critical patent/CN211630171U/en
Application granted granted Critical
Publication of CN211630171U publication Critical patent/CN211630171U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model relates to a hard equipment of realizing of SM4 encryption algorithm belongs to hardware encryption technical field. The device comprises a communication power supply unit, a processing unit, a safety unit, a root key storage unit and an algorithm storage unit; the safety unit is respectively connected with the processing unit, the root key storage unit and the algorithm storage unit; the processing unit is also connected with the communication power supply unit; the processing unit reads input data from the communication power supply unit, calls an SM4 encryption algorithm of the algorithm storage unit and a root key of the root key storage unit after detecting the input data as a legal signal through an open box probe of the safety unit, and obtains output data after processing; when the box opening probe of the security unit detects an illegal invasion optical signal, deleting the contents in the root key storage unit and the algorithm storage unit; the communication power supply unit is also used for supplying power to the processing unit. The utility model discloses equipment structure is novel, can guarantee root key and encryption algorithm's security simultaneously, has important using value and promotes the meaning.

Description

Hard implementation equipment for SM4 encryption algorithm
Technical Field
The utility model belongs to the technical field of the hardware encryption, concretely relates to SM4 encryption algorithm hard implementation equipment.
Background
The SM4 algorithm is currently a packet algorithm for wireless local area network products. The SM4 algorithm is officially approved by the State password administration in 2012, and the first commercial password algorithm for the wireless local area network in China has the characteristics of simplicity, safety and quickness. The packet length of the algorithm is 128 bits and the symmetric key length is 128 bits. Both the encryption algorithm and the key expansion algorithm adopt 32-round nonlinear iteration structures. The decryption algorithm has the same structure as the encryption algorithm, but the use sequence of the round keys is opposite, and the decryption round keys are the reverse sequence of the encryption round keys.
Currently, the SM4 encryption algorithm has the following disadvantages in use: the SM4 encryption algorithm is usually implemented in soft, and cannot guarantee the security of the root key and the encryption algorithm at the same time, and cannot manage the encryption authority, which brings many inconveniences to users and managers. Or, the SM4 encryption algorithm is placed in an embedded hardware system, but a security unit is not provided, so that the security of the root key cannot be guaranteed, and the encryption authority cannot be managed, which brings many inconveniences to users and managers.
Aiming at the problem of the application of the SM4 encryption algorithm, the currently adopted implementation modes mainly include the following: the SM4 encryption algorithm is used for a wireless local area network product through soft implementation, and is used for encrypting and decrypting communication contents in a local area network to ensure the security of transmission data. Secondly, the SM4 algorithm is placed in an embedded hardware system, and aiming at the characteristics of small memory space and limited execution capacity of a single chip microcomputer, the SM4 algorithm is subjected to performance analysis, compared with other algorithms and applied to a data transmission system, so that the safe communication of a sending end and a receiving end is ensured. Implementation results on the system show that the SM4 algorithm can run on STM32 and meet the requirements of small systems for data security assurance.
However, the above improved method has some disadvantages: the SM4 encryption algorithm is usually implemented in soft, and cannot guarantee the security of the root key and the encryption algorithm at the same time, and cannot manage the encryption authority, which brings many inconveniences to users and managers. Or, the SM4 encryption algorithm is placed in an embedded hardware system, but a security unit is not provided, so that the security of the root key and the encryption algorithm cannot be guaranteed at the same time, and the encryption authority cannot be managed, which brings great inconvenience to users and managers. Therefore, how to overcome the defects of the prior art is a problem which needs to be solved in the technical field of hardware encryption at present.
SUMMERY OF THE UTILITY MODEL
The utility model aims at solving prior art's not enough, provide a hard equipment of realizing of SM4 encryption algorithm, this equipment novel structure, convenient to use has guaranteed root key and encryption algorithm's security, easily popularizes and applies.
In order to achieve the above object, the utility model adopts the following technical scheme:
an SM4 encryption algorithm hard implementation device comprises a communication power supply unit, a processing unit, a safety unit, a root key storage unit and an algorithm storage unit;
the safety unit is respectively connected with the processing unit, the root key storage unit and the algorithm storage unit;
the processing unit is also connected with the communication power supply unit;
the processing unit reads 128-bit input data from the communication power supply unit, calls an SM4 encryption algorithm of the algorithm storage unit and a 128-bit root key of the root key storage unit after detecting the input data as a legal signal through an open box probe of the safety unit, and obtains 128-bit output data after processing; when the box opening probe of the security unit detects an illegal invasion optical signal, deleting the contents in the root key storage unit and the algorithm storage unit; the communication power supply unit is also used for supplying power to the processing unit.
Further, it is preferable that the communication power supply unit includes a USB interface.
Further, the processing unit is preferably an integrated circuit chip STC89C52RC-40I-LQFP44, powered by direct current 5V, the main frequency is 72MHz, the processor is cortex-m3, the Flash is 64KB, the SRAM is 64KB, and the pins are 44.
Further, it is preferable that the safety unit includes a box opening probe, an automatic deleting device, and a button battery;
the button battery is respectively connected with the box opening probe and the automatic deleting device and used for supplying power to the box opening probe and the automatic deleting device;
the box opening probe is also connected with an automatic deleting device, and when the box opening probe detects an illegal invasion optical signal, the automatic deleting device is started to delete the contents in the root key storage unit and the algorithm storage unit.
Further, it is preferable that the button cell has a size of CR1220, a diameter of 12.5mm and a height of 2.0 mm.
Further, it is preferable that the open-box probe is a photosensor.
Further, it is preferable that, if the external device performs an illegal reading operation of the algorithm and the root key on the SM4 encryption algorithm hard implementation device through the communication power supply unit, the processing unit sends an intrusion signal to the security unit, and the security unit starts the automatic deleting device to delete the contents in the root key storage unit and the algorithm storage unit.
The utility model discloses equipment adopts a communication power supply unit based on the USB interface to supply power for whole equipment to carry out USB wired communication with other equipment. The utility model discloses 128bit input data (also called the plaintext) are received to the processing unit of equipment, can call the SM4 encryption algorithm of algorithm memory cell and the 128bit root key of root key memory cell, through calculating, obtain 128bit output data (also called the ciphertext). Under the condition of not passing through the security authentication, other equipment are to the unit the utility model discloses SM4 encryption algorithm realizes equipment hard and carries out the algorithm, the root key reads the operation, processing unit can send intrusion signal and give the security unit, perhaps when disassembling algorithm memory cell and root key memory cell by force and carrying out illegal reading, the probe of unpacking detects illegal invasion light signal, the security unit will start automatic deletion device, root key and encryption algorithm in deletion algorithm memory cell and the root key memory cell, can't recover, can guarantee root key and encryption algorithm's security simultaneously. Therefore, the utility model discloses SM4 encryption algorithm realizes equipment has important using value to promote the meaning hard.
SM4 encryption algorithm etc. be current algorithm, the utility model discloses do not do any improvement to it.
Compared with the prior art, the utility model, its beneficial effect does:
the SM4 encryption algorithm hard implementation equipment provided by the utility model has novel structure and convenient use, adopts the USB interface for communication and power supply, can be hot-plugged, has uniform standard, and is convenient for the connection and communication of various equipment such as personal computers and the like;
the utility model discloses equipment is put SM4 encryption algorithm in embedded hardware system to set up the security unit, can guarantee root key and encryption algorithm's security simultaneously, manage encrypting the authority.
The built-in probe of unpacking of security unit, automatic deletion device and button cell, under the condition of not passing through safety certification, other equipment are right the utility model discloses equipment carries out the algorithm, root key read operation, and processing unit can send intrusion signal and give security unit, perhaps when disassembling algorithm memory cell and root key memory cell by force and illegally reading, the probe of unpacking detects illegal invasion light signal, and security unit utilizes button cell's electric quantity, starts automatic deletion device, deletes memory cell's root key and encryption algorithm, can't resume, guarantees root key and encryption algorithm's security.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of a hard implementation device for SM4 encryption algorithm of the present invention;
FIG. 2 is a schematic diagram of a security unit;
wherein, 1, a communication power supply unit; 2. a processing unit; 3. a security unit; 31. opening the probe; 32. an automatic deleting device; 33. a button cell; 4. a root key storage unit; 5. and an algorithm storage unit.
Detailed Description
The present invention will be described in further detail with reference to examples.
It will be appreciated by those skilled in the art that the following examples are illustrative of the invention only and should not be taken as limiting the scope of the invention. The specific techniques, connections, conditions, or the like, which are not specified in the examples, are performed according to the techniques, connections, conditions, or the like described in the literature in the art or according to the product specification. The materials, instruments or equipment are not indicated by manufacturers, and all the materials, instruments or equipment are conventional products which can be obtained by purchasing.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. Further, "connected" as used herein may include wirelessly connected.
In the description of the present invention, "a plurality" means two or more unless otherwise specified. The terms "inner," "upper," "lower," and the like, refer to an orientation or a state relationship based on that shown in the drawings, which is for convenience of description and simplicity of description, and do not indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present invention.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "mounted", "connected" and "provided" are to be interpreted broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; may be directly connected or indirectly connected through an intermediate. To those of ordinary skill in the art, the specific meaning of the above terms in the present invention is understood according to the specific situation.
It can be understood by those skilled in the art that the related units and functions thereof according to the present invention are implemented by loading conventional computer software programs or related protocols on the modified hardware and devices, devices or systems formed by the hardware and devices, devices or systems, and are not modified computer software programs or related protocols in the prior art. For example, the improved computer hardware system can still realize the specific functions of the hardware system by loading the existing software operating system. It can be understood, therefore, that the innovation of the present invention lies in the improvement of the hardware units and the connection combination relationship thereof in the prior art, rather than the improvement of the software or protocol installed in the hardware units for realizing the related functions.
As will be understood by those skilled in the art, the relevant units mentioned in the present disclosure are hardware devices for performing one or more of the operations, methods, steps in the flows, measures, solutions described in the present application. The hardware devices may be specially designed and constructed for the required purposes, or they may be of the kind well known in the general purpose computers or other hardware devices known. The general purpose computer has a program stored therein that is selectively activated or reconfigured.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
As shown in fig. 1, an SM4 encryption algorithm hard implementation device includes a communication power supply unit 1, a processing unit 2, a security unit 3, a root key storage unit 4 and an algorithm storage unit 5;
the safety unit 3 is respectively connected with the processing unit 2, the root key storage unit 4 and the algorithm storage unit 5;
the processing unit 2 is also connected with the communication power supply unit 1;
the processing unit 2 reads 128-bit input data (also called plaintext) from the communication power supply unit 1, and after a legal signal (namely that the light intensity is not changed and is always in a black box state) is detected by an open-box probe of the security unit 3, an SM4 encryption algorithm of the algorithm storage unit 5 and a 128-bit root key of the root key storage unit 4 are called, and 128-bit output data (also called ciphertext) are obtained after processing; if the external device performs the illegal reading operation of the algorithm and the root key on the SM4 encryption algorithm hard implementation device through the communication power supply unit 1, the processing unit 2 sends an intrusion signal to the security unit 3, the security unit 3 starts the automatic deleting device 32, deletes the contents in the root key storage unit 4 and the algorithm storage unit 5, and cannot recover, thereby ensuring the security of the root key and the encryption algorithm; when the box-opening probe of the security unit 3 detects an illegal invasion optical signal (namely, when the box-opening probe is forcibly detached, the light intensity is changed), the contents in the root key storage unit 4 and the algorithm storage unit 5 are deleted; the communication power supply unit 1 is also used to supply power to the processing unit 2.
Preferably, the communication power supply unit 1 includes a USB interface.
Preferably, the processing unit 2 is an integrated circuit chip STC89C52RC-40I-LQFP44, which is powered by direct current 5V and has a main frequency of 72MHz, a processor core-m 3, 64KB for Flash, 64KB for SRAM and 44 pins.
Preferably, the safety unit 3 comprises an open box probe 31, an automatic deleting device 32 and a button battery 33;
the button battery 33 is respectively connected with the box opening probe 31 and the automatic deleting device 32 and is used for supplying power to the box opening probe 31 and the automatic deleting device 32;
the open box probe 31 is further connected to an automatic deleting device 32, which is activated to delete the contents of the root key storage unit 4 and the algorithm storage unit 5 when the open box probe 31 detects an illegal intrusion optical signal.
Preferably, the button cell 33 is of the type CR1220, 12.5mm in diameter and 2.0mm in height.
The utility model discloses well processing unit 2 reads 128bit input data (also called the plaintext) from communication power supply unit 1, and the SM4 encryption algorithm of calling algorithm memory cell 5 and the 128bit root key of root key memory cell 4 are handled, obtain 128bit output data (also called the ciphertext). Under the condition of not passing through the security authentication, when other devices perform algorithm and root key reading operations on the SM4 encryption algorithm hard implementation device, or forcibly disassemble the algorithm storage unit 5 and the root key storage unit 4 for illegal reading, the security unit 3 will start the automatic deleting device 32, delete the contents in the root key storage unit 4 and the algorithm storage unit 5, and cannot recover, thereby ensuring the security of the root key and the encryption algorithm. The communication power supply unit 1 supplies power to the whole equipment, ensures the normal operation of the equipment, and carries out USB wired communication with other equipment.
The communication power supply unit 1 is based on a USB interface, adopts a HW-106 module of Shenzhen Shanghai Ruixing technology Limited company, inputs any DC voltage of 0.9V-5V, and can stably output the DC voltage of 5V. The preferred 4 lines in total, two powers, two signals, but hot plug, the standard is unified, is convenient for multiple equipment such as personal computer to connect and communicate.
The processing unit 2 is an integrated circuit chip STC89C52RC-40I-LQFP44 with functions of a central processing unit CPU, a random access memory RAM, a read-only memory ROM, a plurality of I/O ports, an interrupt system, a timer/counter and the like, which has data processing capacity, adopts direct current 5V power supply, dominant frequency 72MHz, processor core-m 3, Flash 64KB, SRAM 64KB and pins of 44, and meets the requirements of the processing unit of the utility model. The embodiment of the utility model provides an integrated circuit chip STC89C52RC-40I-LQFP44 of preferred use Shenzhen City Futian district heaven alliance electronic business.
The safety unit 3 is internally provided with an open box probe 31, an automatic deleting device 32 and a button battery 33, the type of the button battery 33 is CR1220, the output voltage is 3.0V, the diameter is 12.5mm, and the height is 2.0 mm. Under the condition of not passing through the security authentication, when other devices perform algorithm and root key reading operations on the SM4 encryption algorithm hard implementation device or forcibly disassemble the algorithm storage unit 5 and the root key storage unit 4 for illegal reading, the unpacking probe 31 detects an illegal intrusion optical signal, the security unit 3 starts the automatic deleting device 32 by using the electric quantity of the button battery 33, deletes the contents in the root key storage unit 4 and the algorithm storage unit 5, cannot be recovered, and ensures the security of the root key and the encryption algorithm. The box opening probe 31 in the security unit 3 adopts a photosensitive sensor (natural light photosensitive) EZD550 of Shenzhen Shenzhongda science and technology limited, and the automatic deletion device 32 adopts an STM32F051K8U6 module of Shenzhen Shenshu science and technology limited, wherein the power supply range is 2V-3.6V, the dominant frequency is 48MHz, the SRAM is 64B, and the pins are 32.
The root key storage unit 4 is used for storing a 128-bit root key. Preferably, when the processing unit 2 initializes the root key storage unit 4, the processing unit 2 sends the initialization command and the 128-bit root key to the root key storage unit 4 through the authentication of the security unit 3, locks the root key storage unit 4, and changes the root key storage unit 4 into a readable and non-writable state, thereby ensuring that the root key is not changed at will.
The algorithm storage unit 5 is used for storing formulated SM4 encryption calculation. Preferably, when the processing unit 2 initializes the algorithm storage unit 5, the processing unit 2 sends the initialization command and the established SM4 encryption algorithm to the algorithm storage unit 5 through the authentication of the security unit 3, and locks the algorithm storage unit 5 to change the algorithm storage unit 5 into a readable and non-writable state, so as to ensure that the SM4 encryption algorithm is not changed randomly.
Without loss of generality, the contents of the present invention will be further described by taking the example that the SM4 encryption algorithm hard implementation device performs encryption communication with the personal computer upper computer software.
After the USB interface of the SM4 encryption algorithm hard implementation equipment is plugged into a personal computer, the personal computer transmits a 5V direct current power supply to the communication power supply unit 1 through the USB interface to supply power to the SM4 encryption algorithm hard implementation equipment. Open personal computer host computer software, send 128bit plaintext for through the USB interface the utility model discloses the communication power supply unit 1 of equipment, processing unit 2 is given with 128bit plaintext transmission to communication power supply unit 1, processing unit 2 passes through the authentication of safety unit 3, the SM4 encryption algorithm of algorithm memory cell 5 and the 128bit root key of root key memory cell 4, through calculating, obtain 128bit ciphertext, return communication power supply unit 1 again, communication power supply unit 1 is again through the USB interface, return 128bit ciphertext for the personal computer host computer.
Preferably, when the personal computer upper computer software performs an illegal reading operation of the algorithm and the root key on the SM4 encryption algorithm hard implementation device through the USB interface (that is, 128bit input data is normally transmitted, but an illegal reading operation is not), the processing unit 2 sends an intrusion signal to the security unit 3, the security unit 3 starts the automatic deleting device 32, deletes contents in the root key storage unit 4 and the algorithm storage unit 5, and cannot recover, thereby ensuring the security of the root key and the encryption algorithm.
When lawless persons disassemble by force the utility model discloses SM4 encryption algorithm realizes equipment firmly, open SM4 encryption algorithm and realize equipment shell firmly, expose the circuit of equipment, when wanting to carry out illegal reading to algorithm memory cell and root key memory cell, security unit 3's unpacking probe 31 detects illegal invasion light signal, security unit 3 utilizes button cell 32's electric quantity, start automatic deletion device, delete the content in root key memory cell 4 and the algorithm memory cell 5, can't resume, guarantee root key and encryption algorithm's security.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the above embodiments, and that the foregoing embodiments and descriptions are provided only to illustrate the principles of the present invention without departing from the spirit and scope of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. An SM4 encryption algorithm hard implementation device is characterized by comprising a communication power supply unit, a processing unit, a security unit, a root key storage unit and an algorithm storage unit;
the safety unit is respectively connected with the processing unit, the root key storage unit and the algorithm storage unit;
the processing unit is also connected with the communication power supply unit;
the processing unit reads 128-bit input data from the communication power supply unit, calls an SM4 encryption algorithm of the algorithm storage unit and a 128-bit root key of the root key storage unit after detecting the input data as a legal signal through an open box probe of the safety unit, and obtains 128-bit output data after processing; when the box opening probe of the security unit detects an illegal invasion optical signal, deleting the contents in the root key storage unit and the algorithm storage unit; the communication power supply unit is also used for supplying power to the processing unit.
2. The SM4 encryption algorithm hard implementation device of claim 1, wherein the communication power supply unit contains a USB interface.
3. The SM4 encryption algorithm hard implementation device of claim 1, wherein the processing unit is an integrated circuit chip STC89C52RC-40I-LQFP44, powered by DC 5V, with a master frequency of 72MHz, a processor core-m 3, a Flash of 64KB, an SRAM of 64KB, and 44 pins.
4. The SM4 encryption algorithm hard implementation device of claim 1, wherein the security unit comprises an out-of-box probe, an automatic deletion device, and a button cell;
the button battery is respectively connected with the box opening probe and the automatic deleting device and used for supplying power to the box opening probe and the automatic deleting device;
the box opening probe is also connected with an automatic deleting device, and when the box opening probe detects an illegal invasion optical signal, the automatic deleting device is started to delete the contents in the root key storage unit and the algorithm storage unit.
5. The SM4 encryption algorithm hard implementation device of claim 4, wherein the button cell is model CR1220, 12.5mm in diameter and 2.0mm in height.
6. The SM4 encryption algorithm hard implementation device of claim 1 or 4, wherein the box-opening probe is a light-sensitive sensor.
7. The SM4 encryption algorithm hard implementation device of claim 1, wherein if an external device performs an illegal reading operation of the algorithm and the root key on the SM4 encryption algorithm hard implementation device through the communication power supply unit, the processing unit will send an intrusion signal to the security unit, and the security unit will start the automatic deleting unit to delete the contents of the root key storage unit and the algorithm storage unit.
CN202020471709.0U 2020-04-03 2020-04-03 Hard implementation equipment for SM4 encryption algorithm Active CN211630171U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202020471709.0U CN211630171U (en) 2020-04-03 2020-04-03 Hard implementation equipment for SM4 encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202020471709.0U CN211630171U (en) 2020-04-03 2020-04-03 Hard implementation equipment for SM4 encryption algorithm

Publications (1)

Publication Number Publication Date
CN211630171U true CN211630171U (en) 2020-10-02

Family

ID=72620484

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202020471709.0U Active CN211630171U (en) 2020-04-03 2020-04-03 Hard implementation equipment for SM4 encryption algorithm

Country Status (1)

Country Link
CN (1) CN211630171U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272083A (en) * 2020-10-22 2021-01-26 北京智慧云测信息技术有限公司 Internet of things terminal safety protection device and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112272083A (en) * 2020-10-22 2021-01-26 北京智慧云测信息技术有限公司 Internet of things terminal safety protection device and method

Similar Documents

Publication Publication Date Title
KR101176692B1 (en) Mass storage device with near field communications
US20160261601A1 (en) Wireless router, fast access control method and authentication connection method of wireless routers
US20070226497A1 (en) Communication protocol for device authentication
WO2014010928A1 (en) Portable storage device using fingerprint recognition and method for controlling same
CN103246839B (en) A kind of method of work of intelligent cipher key equipment
CN110188564B (en) Mobile data storage terminal based on quantum key encryption
CN105184179A (en) Embedded encrypted mobile storage device and operation method thereof
TW200825830A (en) Monitoring device for host of computer system, computer system capable of connecting remote control device with host, and method of monitoring host of computer system
KR20070106426A (en) System and method for managing multiple smart card sessions
JP2007149101A (en) Work system with automatic operating system login function and method for using the same
TW201608408A (en) Wireless authentication system and method for USB storage device
CN211630171U (en) Hard implementation equipment for SM4 encryption algorithm
CN103259664A (en) Nfc dynamic password chip and working method thereof
CN105743853A (en) Fingerprint USB KEY and fingerprint center server for identity authentication, and system and method
US20080199057A1 (en) Portable storage device with fingerprint identification function
CN211015521U (en) Information security computer
CN206058319U (en) The light-controlled antitheft lock system of smart mobile phone flash lamp control
CN114153280B (en) Computer main board
CN206322182U (en) A kind of fingerprint identification device
CN210377589U (en) Intelligent lock capable of being unlocked through electronic key
CN212322266U (en) Storage device, authentication end and encryption storage equipment
TW200811682A (en) Centralized transmission restriction management device and method of a computer via remote cipher handling
CN210244452U (en) ID card intelligence lock of testimony of a witness unification
CN101639883B (en) Method for checking PIN code and intelligent key equipment
WO2019085560A1 (en) Communication processing method applied to bluetooth shield and bluetooth shield

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant