CN112541186A - Password out-of-control resisting system and method based on motion state perception - Google Patents
Password out-of-control resisting system and method based on motion state perception Download PDFInfo
- Publication number
- CN112541186A CN112541186A CN202011518585.8A CN202011518585A CN112541186A CN 112541186 A CN112541186 A CN 112541186A CN 202011518585 A CN202011518585 A CN 202011518585A CN 112541186 A CN112541186 A CN 112541186A
- Authority
- CN
- China
- Prior art keywords
- password
- key data
- encryption equipment
- motion state
- storage unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a password anti-runaway system based on motion state perception, which comprises encryption equipment carried on an airborne/missile-borne platform, wherein the encryption equipment consists of an encryption equipment host and a protection medium, and the encryption equipment host comprises a control unit, an acceleration sensor, a nonvolatile storage unit and a volatile storage unit; the protection medium is used for storing storage protection information; the nonvolatile storage unit is used for storing key data of the protected password; the volatile storage unit is used for storing key data of the plain state password; the acceleration sensor is used for acquiring a motion state; the control unit is used for decrypting the key data of the protected password and storing the decrypted key data into the volatile storage unit; and operating the password instruction according to the motion state and destroying the key data of the plain password. In the scheme of the invention, the nonvolatile memory only stores key data of the protected password, thereby facilitating daily safety management of equipment; the encryption equipment automatically senses the switching condition of the weapon platform at the task stage through a sensor and automatically destroys key data of the internal plain-state password.
Description
Technical Field
The invention relates to the field of passwords, in particular to a password runaway-resistant system and method based on motion state perception.
Background
Encryption equipment deployed in a weapon platform usually solidifies explicit cipher key data PCS such as application keys, application algorithms, algorithm parameters and the like in a nonvolatile storage unit of a cipher machine, and is used for providing encryption protection for information such as communication command or information reconnaissance of the weapon platform, and the weapon platform has the conditions of being trapped and captured by tricks or not exploding missiles, particularly airborne and missile-borne encryption equipment.
The requirements of the current system for the encryption device are as follows:
1) the encryption device can provide encryption service in the task execution process of the weapon platform;
2) after the weapon platform is out of control, the PCS (personal communications system) of the key data of the plain-state password in the encryption equipment can not be acquired by an opponent.
After the weapon platform is out of control, on one hand, the weapon platform is separated from a wireless communication coverage range designed by the system or cannot normally communicate due to electromagnetic interference, and the like, and the password system cannot remotely destroy the clear password key data PCS of the encryption equipment on line by using a wireless communication means; on the other hand, the weapon platform may be in a power-off state after being out of control, the encryption device cannot work, the weapon platform cannot be judged to be in the out-of-control state, and the clear-state password key data PCS of the nonvolatile storage unit cannot be destroyed.
Disclosure of Invention
Aiming at the problems in the prior art, the password runaway-resistant system and method based on motion state perception, which are suitable for airborne and missile-borne platforms, are provided, and are still suitable for encryption equipment of a weapon platform, wherein the task process sequentially comprises a static preparation stage, a dynamic execution stage and a static ending stage.
The technical scheme adopted by the invention is as follows: a password anti-runaway system based on motion state perception comprises encryption equipment carried on an airborne/missile-borne platform, wherein the encryption equipment consists of an encryption equipment host and a protection medium, and the encryption equipment host comprises a control unit, an acceleration sensor, a nonvolatile storage unit and a volatile storage unit; the protection medium is used for storing storage protection information; the nonvolatile storage unit is used for storing key data of the protected password; the volatile storage unit is used for storing key data of the plain state password; the acceleration sensor is used for acquiring a motion state; the control unit is used for decrypting the key data of the protected password and storing the decrypted key data into the volatile storage unit; and operating the password instruction according to the motion state and destroying the key data of the plain password.
Further, the control unit generates a data stream through a hash function by using the storage protection information, decrypts the protected password key data through an exclusive-or mode, acquires the clear password key data, and destroys the storage protection information.
Further, the control unit detects the motion state and the relative position change of the airborne/missile-borne platform in real time through the acceleration sensor, and if the relative position change of the equipment is detected to exceed a set threshold value, the equipment is in a task execution stage and runs a password instruction; the acceleration sensor detects that the airborne/missile-borne platform is in a static state, if the static state holding time exceeds a set threshold value, the encryption equipment judges that the task is finished, and key data of the plain-state password stored in the volatile storage unit are destroyed.
Further, the key data of the plain-state password stored in the volatile storage unit is automatically destroyed when the encryption equipment is powered off.
The invention also provides a password anti-runaway method based on motion state perception, in a task preparation stage of the airborne/missile-borne platform, storage protection information is loaded into encryption equipment, the encryption equipment decrypts the protected password key data CCS and then loads the decrypted data into a volatile storage unit to operate, encryption protection is provided for the communication service of the airborne/missile-borne platform in a task execution stage, and when the encryption equipment detects that the airborne/missile-borne platform is converted from the flight state in the task execution stage to the static state at the end of the task, the clear password key data of the volatile storage unit in the equipment is destroyed.
Further, the specific process of the password runaway prevention method is as follows:
step 1, an encryption device reads storage protection information in a protection medium;
step 2, the encryption equipment decrypts the key data of the protected password by using the storage protection information to obtain the key data of the plain password;
step 3, loading the key data of the plain password into a volatile storage space of the equipment, and destroying the storage protection information at the same time;
step 4, the encryption equipment runs a password instruction; by detecting the motion state and the relative position change of the airborne/missile-borne platform, if the relative position change of the equipment is detected to exceed a set threshold value, the encryption equipment judges that the equipment is in a task execution stage;
step 5, the encryption equipment detects that the airborne/missile-borne platform is in a static state, if the static state holding time exceeds a set threshold value, the encryption equipment judges that the airborne/missile-borne platform is in a task ending stage, and key data of the plain-state password stored in the encryption equipment are destroyed;
furthermore, an acceleration sensor is adopted to detect the motion state of the airborne/missile-borne platform, so that the task stage is judged.
Further, the decryption process of step 2 is: and generating a data stream by using the storage protection information through a hash function, decrypting the key data of the protected password in an exclusive OR mode to obtain the key data of the plain password, and destroying the storage protection information.
Compared with the prior art, the beneficial effects of adopting the technical scheme are as follows:
1) the nonvolatile memory in the encryption equipment only stores the key data CCS of the protected password and does not store the key data PCS of the plain password, so that the daily safety management of the equipment is facilitated;
2) the encryption equipment automatically senses the switching condition of the weapon platform at the task stage through a sensor and automatically destroys the key data PCS of the internal plain-state password; if the encryption equipment is powered off, the clear-state password key data PCS stored in the volatile memory is automatically destroyed, and the risk of password key data leakage caused by the fact that online management cannot be conducted after the encryption equipment is out of control is avoided.
Drawings
Fig. 1 is a schematic diagram of a cryptosystem for resisting runaway based on motion state perception, which is provided by the invention.
Fig. 2 is a flow chart of a password runaway prevention method based on motion state perception, which is provided by the invention.
FIG. 3 is a diagram illustrating encryption of cryptographic resources according to an embodiment of the invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
The problems to be solved by the invention are as follows: how the encryption equipment utilizes the task characteristics of the weapon platform to sense the change of the motion state, and automatically destroys all the internal clear-state password key data PCS to resist the safety risk caused by the out-of-control equipment.
Example 1
As shown in fig. 1, the invention provides a password runaway prevention system based on motion state sensing, which comprises an encryption device carried on an airborne/missile-borne platform, wherein the encryption device is composed of an encryption device host and a protection medium, and the encryption device host comprises a control unit, an acceleration sensor, a nonvolatile storage unit and a volatile storage unit; the protection medium is used for storing storage protection information; the nonvolatile storage unit is used for storing key data of the protected password; the protection medium stores storage protection information; the volatile storage unit is used for storing key data of the plain state password; the acceleration sensor is used for acquiring a motion state; the control unit is used for decrypting the key data of the protected password and storing the decrypted key data into the volatile storage unit; and operating the password instruction according to the motion state and destroying the key data of the plain password. Before the encryption equipment works, the storage protection information SK in the protection medium must be read, and then the encryption equipment can normally work and provide encryption service.
As shown in fig. 3, the protected cipher key data stored in the nonvolatile memory unit is the result of xor protection on the plain cipher key data by using the data stream generated by the hash function using the storage protection information.
During decryption, the control unit generates data stream through a hash function by using the storage protection information, decrypts the protected password key data through an exclusive-or mode, acquires the clear password key data, and destroys the storage protection information.
The control unit detects the motion state and the relative position change of the airborne/missile-borne platform in real time through the acceleration sensor, and if the relative position change of the equipment is detected to exceed a set threshold value, the equipment is in a task execution stage and runs a password instruction; the acceleration sensor detects that the airborne/missile-borne platform is in a static state, if the static state holding time exceeds a set threshold value, the encryption equipment judges that the task is finished, and key data of the plain-state password stored in the volatile storage unit are destroyed.
If the encryption equipment is powered off, the clear-state password key data PCS stored in the volatile memory is automatically destroyed, and the risk of password key data leakage caused by the fact that online management cannot be conducted after the encryption equipment is out of control is avoided.
Example 2
As shown in fig. 2, the invention further provides a password runaway prevention method based on motion state perception, in a task preparation stage of an airborne/missile-borne platform, storage protection information is loaded into an encryption device, the encryption device decrypts critical data CCS of a protected password and loads the decrypted data CCS into a volatile storage unit to operate, encryption protection is provided for communication services of the airborne/missile-borne platform in a task execution stage, and when the encryption device detects that the airborne/missile-borne platform is converted from a flight state in the task execution stage to a static state at the end of a task, clear password critical data of the volatile storage unit in the device are destroyed. In this embodiment, an acceleration sensor is used to detect the motion state of the airborne/missile-borne platform, so as to determine the task stage.
Specifically, the password runaway prevention method comprises the following specific processes:
step 1, an encryption device reads storage protection information in a protection medium;
step 2, the encryption equipment decrypts the key data of the protected password by using the storage protection information to obtain the key data of the plain password;
step 3, loading the key data of the plain password into a volatile storage space of the equipment, and destroying the storage protection information at the same time;
step 4, the encryption equipment runs a password instruction; by detecting the motion state and the relative position change of the airborne/missile-borne platform, if the relative position change of the equipment is detected to exceed a set threshold value, the encryption equipment judges that the equipment is in a task execution stage;
step 5, the encryption equipment detects that the airborne/missile-borne platform is in a static state, if the static state holding time exceeds a set threshold value, the encryption equipment judges that the platform is in a task ending stage (including normal ending and abnormal ending), and key data of the internal stored plain-state password are destroyed;
the decryption process of the step 2 is as follows: and generating a data stream by using the storage protection information through a hash function, decrypting the key data of the protected password in an exclusive OR mode to obtain the key data of the plain password, and destroying the storage protection information.
The technical scheme adopted by the invention has the beneficial effects that:
1) the nonvolatile memory in the encryption equipment only stores the key data CCS of the protected password and does not store the key data PCS of the plain password, so that the daily safety management of the equipment is facilitated;
2) the encryption equipment automatically senses the switching condition of the weapon platform at the task stage through a sensor and automatically destroys the key data PCS of the internal plain-state password; if the encryption equipment is powered off, the clear-state password key data PCS stored in the volatile memory is automatically destroyed, and the risk of password key data leakage caused by the fact that online management cannot be conducted after the encryption equipment is out of control is avoided.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed. Those skilled in the art to which the invention pertains will appreciate that insubstantial changes or modifications can be made without departing from the spirit of the invention as defined by the appended claims.
All of the features disclosed in this specification, or all of the steps in any method or process so disclosed, may be combined in any combination, except combinations of features and/or steps that are mutually exclusive.
Claims (8)
1. A password anti-runaway system based on motion state perception is characterized by comprising encryption equipment carried on an airborne/missile-borne platform, wherein the encryption equipment consists of an encryption equipment host and a protection medium, and the encryption equipment host comprises a control unit, an acceleration sensor, a nonvolatile storage unit and a volatile storage unit; the protection medium is used for storing storage protection information; the nonvolatile storage unit is used for storing key data of the protected password; the volatile storage unit is used for storing key data of the plain state password; the acceleration sensor is used for acquiring a motion state; the control unit is used for decrypting the key data of the protected password and storing the decrypted key data into the volatile storage unit; and operating the password instruction according to the motion state and destroying the key data of the plain password.
2. The password runaway resistant system based on motion state perception of claim 1, wherein the control unit generates a data stream through a hash function using the storage protection information, decrypts the protected password key data through an exclusive-or manner to obtain the clear password key data, and destroys the storage protection information at the same time.
3. The password runaway prevention system based on motion state perception according to claim 2, wherein the control unit detects the motion state and relative position change of the airborne/missile-borne platform in real time through the acceleration sensor, and if the detected relative position change of the equipment exceeds a set threshold, the password command is executed when the equipment is in a task execution stage; the acceleration sensor detects that the airborne/missile-borne platform is in a static state, if the static state holding time exceeds a set threshold value, the encryption equipment judges that the task is finished, and key data of the plain-state password stored in the volatile storage unit are destroyed.
4. The password runaway resistant system based on motion state perception according to claim 3, wherein the clear password key data stored in the volatile storage unit is automatically destroyed when the encryption device is powered off.
5. A password anti-runaway method based on motion state perception is characterized in that storage protection information is loaded into encryption equipment in a task preparation stage of an airborne/missile-borne platform, the encryption equipment decrypts protected password key data CCS and then loads the decrypted protected password key data CCS into a volatile storage unit to run so as to provide encryption protection for communication services of the airborne/missile-borne platform in a task execution stage, and when the encryption equipment detects that the airborne/missile-borne platform is converted from a flight state in the task execution stage to a static state at the end of a task, bright password key data of the volatile storage unit in the equipment are destroyed.
6. The password runaway prevention method based on motion state perception according to claim 5, wherein the specific process of the password runaway prevention method is as follows:
step 1, an encryption device reads storage protection information in a protection medium;
step 2, the encryption equipment decrypts the key data of the protected password by using the storage protection information to obtain the key data of the plain password;
step 3, loading the key data of the plain password into a volatile storage space of the equipment, and destroying the storage protection information at the same time;
step 4, the encryption equipment runs a password instruction; by detecting the motion state and the relative position change of the airborne/missile-borne platform, if the relative position change of the equipment is detected to exceed a set threshold value, the encryption equipment judges that the equipment is in a task execution stage;
and 5, detecting that the airborne/missile-borne platform is in a static state by the encryption equipment, if the static state holding time exceeds a set threshold, judging that the encryption equipment is in a task ending stage, and destroying the key data of the plain-state password stored in the encryption equipment.
7. The password runaway prevention method based on motion state perception according to claim 5 or 6, wherein an acceleration sensor is adopted to detect the motion state of the airborne/missile-borne platform so as to judge the task stage.
8. The cryptographic runaway prevention method based on motion state awareness of claim 7, wherein the decryption process of the step 2 is as follows: and generating a data stream by using the storage protection information through a hash function, decrypting the key data of the protected password in an exclusive OR mode to obtain the key data of the plain password, and destroying the storage protection information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011518585.8A CN112541186B (en) | 2020-12-21 | 2020-12-21 | Password out-of-control resisting system and method based on motion state perception |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011518585.8A CN112541186B (en) | 2020-12-21 | 2020-12-21 | Password out-of-control resisting system and method based on motion state perception |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112541186A true CN112541186A (en) | 2021-03-23 |
CN112541186B CN112541186B (en) | 2022-03-18 |
Family
ID=75019261
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011518585.8A Active CN112541186B (en) | 2020-12-21 | 2020-12-21 | Password out-of-control resisting system and method based on motion state perception |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112541186B (en) |
Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05108186A (en) * | 1991-10-11 | 1993-04-30 | Toshiba Corp | Computer system |
WO2000019322A1 (en) * | 1998-09-25 | 2000-04-06 | Hughes Electronics Corporation | Method and apparatus for controlling access to confidential data |
CN1593033A (en) * | 2002-02-01 | 2005-03-09 | 思科技术公司 | Method and system for securely storing and transmitting data by applying a one-time pad |
CN1641174A (en) * | 2004-01-06 | 2005-07-20 | 戴瑞·杰·凯迪 | Lock control system for electronic equipment and anti-theft method thereof |
CN101261663A (en) * | 2007-03-06 | 2008-09-10 | 国际商业机器公司 | Method and system for protection of secure electronic modules against attacks |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
US20110072279A1 (en) * | 2009-09-22 | 2011-03-24 | Bbn Technologies Corp. | Device and method for securely storing data |
US20110271344A1 (en) * | 2009-02-16 | 2011-11-03 | Yuji Unagami | Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method |
US20130219188A1 (en) * | 2012-02-16 | 2013-08-22 | Samsung Electronics Co. Ltd. | Apparatus and method for reproducing contents in electronic device |
US20140033299A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Protecting data on a mobile device |
CN103996009A (en) * | 2014-05-23 | 2014-08-20 | 中国人民解放军国防科学技术大学 | Confidence breach preventing USB disk system having data destruction function based on dynamic password and timed confirmation |
CN104078074A (en) * | 2014-06-25 | 2014-10-01 | 北京福莱达斯科技有限公司 | Portable type light disk safe storage device |
TW201445042A (en) * | 2013-05-30 | 2014-12-01 | Hon Hai Prec Ind Co Ltd | Electronic device and method of prevention of burglary for electronic device |
CN104239820A (en) * | 2013-06-13 | 2014-12-24 | 普天信息技术研究院有限公司 | Secure storage device |
CN105184196A (en) * | 2015-09-02 | 2015-12-23 | 四川九洲电器集团有限责任公司 | Electronic system information security protection system and method |
CN106102110A (en) * | 2016-06-21 | 2016-11-09 | 北京小米移动软件有限公司 | The method of switching control power and control terminal |
CN106445065A (en) * | 2015-08-11 | 2017-02-22 | 三星电子株式会社 | Method for controlling according to state and electronic device thereof |
CN107743600A (en) * | 2015-04-13 | 2018-02-27 | 马里奥·施魏格尔 | Remote maintenance system with mobile remote maintenance unit and configuration method |
CN107995617A (en) * | 2017-12-21 | 2018-05-04 | 鸿秦(北京)科技有限公司 | A kind of solid storage device for supporting telesecurity to destroy design |
CN108965124A (en) * | 2018-07-31 | 2018-12-07 | 合肥职业技术学院 | A kind of unmanned aerial vehicle control system |
CN109643285A (en) * | 2016-09-15 | 2019-04-16 | 美商纳兹控股有限责任公司 | The user data transmission and storage of encryption |
CN110049487A (en) * | 2019-03-27 | 2019-07-23 | 山东超越数控电子股份有限公司 | A kind of high safety encryption storage remote destroying management system and its working method based on Beidou |
CN111149141A (en) * | 2017-09-04 | 2020-05-12 | Nng软件开发和商业有限责任公司 | Method and apparatus for collecting and using sensor data from a vehicle |
CN111709848A (en) * | 2020-06-21 | 2020-09-25 | 刘文祥 | Intelligent factory controlled by Internet |
CN112100694A (en) * | 2020-10-21 | 2020-12-18 | 西安奇维科技有限公司 | Wearable display control terminal and software and hardware self-destruction method thereof |
-
2020
- 2020-12-21 CN CN202011518585.8A patent/CN112541186B/en active Active
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH05108186A (en) * | 1991-10-11 | 1993-04-30 | Toshiba Corp | Computer system |
WO2000019322A1 (en) * | 1998-09-25 | 2000-04-06 | Hughes Electronics Corporation | Method and apparatus for controlling access to confidential data |
CN1593033A (en) * | 2002-02-01 | 2005-03-09 | 思科技术公司 | Method and system for securely storing and transmitting data by applying a one-time pad |
CN1641174A (en) * | 2004-01-06 | 2005-07-20 | 戴瑞·杰·凯迪 | Lock control system for electronic equipment and anti-theft method thereof |
CN101261663A (en) * | 2007-03-06 | 2008-09-10 | 国际商业机器公司 | Method and system for protection of secure electronic modules against attacks |
US20110271344A1 (en) * | 2009-02-16 | 2011-11-03 | Yuji Unagami | Illegal module identifying device, information processing device, illegal module identifying method, illegal module identifying program, integrated circuit, illegal module disabling system, and illegal module disabling method |
US20110072279A1 (en) * | 2009-09-22 | 2011-03-24 | Bbn Technologies Corp. | Device and method for securely storing data |
CN101782951A (en) * | 2009-11-10 | 2010-07-21 | 徐欣 | Hard disc remote destroying antitheft system and method |
US20130219188A1 (en) * | 2012-02-16 | 2013-08-22 | Samsung Electronics Co. Ltd. | Apparatus and method for reproducing contents in electronic device |
US20140033299A1 (en) * | 2012-07-26 | 2014-01-30 | International Business Machines Corporation | Protecting data on a mobile device |
TW201445042A (en) * | 2013-05-30 | 2014-12-01 | Hon Hai Prec Ind Co Ltd | Electronic device and method of prevention of burglary for electronic device |
CN104239820A (en) * | 2013-06-13 | 2014-12-24 | 普天信息技术研究院有限公司 | Secure storage device |
CN103996009A (en) * | 2014-05-23 | 2014-08-20 | 中国人民解放军国防科学技术大学 | Confidence breach preventing USB disk system having data destruction function based on dynamic password and timed confirmation |
CN104078074A (en) * | 2014-06-25 | 2014-10-01 | 北京福莱达斯科技有限公司 | Portable type light disk safe storage device |
CN107743600A (en) * | 2015-04-13 | 2018-02-27 | 马里奥·施魏格尔 | Remote maintenance system with mobile remote maintenance unit and configuration method |
CN106445065A (en) * | 2015-08-11 | 2017-02-22 | 三星电子株式会社 | Method for controlling according to state and electronic device thereof |
CN105184196A (en) * | 2015-09-02 | 2015-12-23 | 四川九洲电器集团有限责任公司 | Electronic system information security protection system and method |
CN106102110A (en) * | 2016-06-21 | 2016-11-09 | 北京小米移动软件有限公司 | The method of switching control power and control terminal |
CN109643285A (en) * | 2016-09-15 | 2019-04-16 | 美商纳兹控股有限责任公司 | The user data transmission and storage of encryption |
CN111149141A (en) * | 2017-09-04 | 2020-05-12 | Nng软件开发和商业有限责任公司 | Method and apparatus for collecting and using sensor data from a vehicle |
CN107995617A (en) * | 2017-12-21 | 2018-05-04 | 鸿秦(北京)科技有限公司 | A kind of solid storage device for supporting telesecurity to destroy design |
CN108965124A (en) * | 2018-07-31 | 2018-12-07 | 合肥职业技术学院 | A kind of unmanned aerial vehicle control system |
CN110049487A (en) * | 2019-03-27 | 2019-07-23 | 山东超越数控电子股份有限公司 | A kind of high safety encryption storage remote destroying management system and its working method based on Beidou |
CN111709848A (en) * | 2020-06-21 | 2020-09-25 | 刘文祥 | Intelligent factory controlled by Internet |
CN112100694A (en) * | 2020-10-21 | 2020-12-18 | 西安奇维科技有限公司 | Wearable display control terminal and software and hardware self-destruction method thereof |
Non-Patent Citations (7)
Title |
---|
BENXIAO TANG: "Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference", 《WIRELESS COMMUNICATIONS AND MOBILE COMPUTING》 * |
成彬: "密码算法中的循环移位"异或"运算实质性研究", 《技术与方法》 * |
曾勇: "LTE/SAE密钥管理技术研究", 《通信技术》 * |
李兆勇: "让您的机密文件能自动销毁", 《办公自动化》 * |
杨璐等: "云服务环境下的密钥管理问题和挑战", 《计算机科学》 * |
熊金波: "基于密码学的云数据确定性删除研究进展", 《通信学报》 * |
顾勇: "一种新型抗功耗分析的电流平坦化电路有效性研究", 《密码学报》 * |
Also Published As
Publication number | Publication date |
---|---|
CN112541186B (en) | 2022-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7131036B2 (en) | Method of detecting malicious code | |
CN101079882B (en) | Posture-based data protection | |
CN101783801B (en) | Software protection method based on network, client side and server | |
US8135135B2 (en) | Secure data protection during disasters | |
EP1407339B1 (en) | Firmware validation | |
CN111819561B (en) | Integrated circuit data protection | |
US20120066515A1 (en) | Electronic device, key generation program, recording medium, and key generation method | |
US20070005974A1 (en) | Method for transferring encrypted data and information processing system | |
AU2001266228A1 (en) | Method of detecting malicious code | |
CN102968595A (en) | Method and device for protecting virtual machine system | |
KR101828600B1 (en) | Context-aware ransomware detection | |
CN112511494A (en) | Safety protection system and method suitable for electric intelligent terminal equipment | |
CN101770559A (en) | Data protecting device and data protecting method | |
CN114528602B (en) | Security chip operation method and device based on attack detection behavior | |
CN112541186B (en) | Password out-of-control resisting system and method based on motion state perception | |
US11018846B2 (en) | Methods and apparatuses for achieving a security function, in particular in the environment of a device and/or installation controller | |
CN101930523B (en) | document protection system and method | |
CN117149521A (en) | Network-connected automobile data backup method and system | |
US20140157004A1 (en) | Apparatus and method for encryption in virtualized environment using auxiliary medium | |
CN114692097A (en) | Off-line software use authorization method | |
CN105095766B (en) | Method for processing software functions in a control device | |
US11036846B2 (en) | Control device | |
US10796007B2 (en) | Method for operating semiconductor device, capable of dumping a memory with security | |
KR20060134771A (en) | Portable electronic device and method for outputting data in portable electronic device | |
CN112948808B (en) | Authorization management method and system, authorization management device and embedded device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |