Implementation scheme for self-destruction and lossless recovery of secret key

文档序号:1599143 发布日期:2020-01-07 浏览:28次 中文

阅读说明:本技术 一种密钥自毁与无损恢复的实现方案 (Implementation scheme for self-destruction and lossless recovery of secret key ) 是由 李升根 严春荣 杨宝 张春雷 鄢钊 于 2019-10-14 设计创作,主要内容包括:一种密钥自毁与无损恢复的实现方案,包括如下步骤:S1、在主电路板上设置机械开关;S2、在主芯片内设置密钥自毁程序,并将主芯片安装在主电路板上,主芯片实时监测机械开关的状态;S3、将主电路板安装在终端机器外壳内部,机械开关包含A1和A2两种状态;S4、当主芯片检测到机械开关出现S3中的A2状态时,主芯片启动密钥自毁程序,擦除主芯片内存储有密钥的存储区域,以实现密钥的毁灭;S5、当因正常维修产品触发密钥自毁时,将终端机器上的串口与电脑串口连接,在电脑上重新下载密钥并传输至主芯片上,以实现密钥的无损恢复。本发明能实现密钥的自毁和无损恢复,安全,可靠,可维修性好,适于批量生产。(A realization scheme of key self-destruction and lossless recovery comprises the following steps: s1, arranging a mechanical switch on the main circuit board; s2, setting a key self-destruction program in the main chip, installing the main chip on the main circuit board, and monitoring the state of the mechanical switch in real time by the main chip; s3, mounting the main circuit board in the terminal machine shell, wherein the mechanical switch comprises two states of A1 and A2; s4, when the main chip detects that the mechanical switch is in the A2 state in S3, the main chip starts a key self-destruction program and erases a storage area in the main chip, in which the key is stored, so as to destroy the key; and S5, when the key self-destruction is triggered by normal maintenance products, connecting the serial port on the terminal machine with the serial port of the computer, and downloading the key again from the computer and transmitting the key to the main chip to realize the lossless recovery of the key. The invention can realize the self-destruction and lossless recovery of the key, is safe and reliable, has good maintainability and is suitable for batch production.)

1. A realization scheme of key self-destruction and lossless recovery is characterized by comprising the following steps:

s1, arranging a mechanical switch on the main circuit board;

s2, setting a key self-destruction program in the main chip, installing the main chip on the main circuit board, and monitoring the state of the mechanical switch in real time by the main chip;

s3, mounting the main circuit board in the terminal machine shell, wherein the mechanical switch comprises two states of A1 and A2;

a1: when a transmission rod arranged in the mechanical switch is pressed by the shell of the terminal machine, the mechanical switch is in a closed state;

a2: when a transmission rod arranged in the mechanical switch loses the pressure of the terminal machine shell on the transmission rod, the mechanical switch automatically pops open and is in a disconnected state;

s4, when the main chip detects that the mechanical switch is in the A2 state in S3, the main chip starts a key self-destruction program and erases a storage area in the main chip, in which the key is stored, so as to destroy the key;

and S5, when the key self-destruction is triggered by normal maintenance products, connecting the serial port on the terminal machine with the serial port of the computer, and downloading the key again from the computer and transmitting the key to the main chip to realize the lossless recovery of the key.

2. The implementation scheme of self-destruction and lossless recovery of the key as claimed in claim 1, wherein a dual power supply scheme is adopted for the main chip, including a main power supply and a backup power supply.

3. The implementation scheme of self-destruction and lossless recovery of the key is characterized in that the main power supply comprises an external power supply for supplying power to the whole system of the terminal machine and a rechargeable lithium polymer battery; the standby power supply comprises a rechargeable button type lithium ion battery which is specially used for the main chip to carry out key self-destruction, and is charged by a main power supply and maintains a full charging state.

Technical Field

The invention relates to the technical field of key protection, in particular to a scheme for realizing self-destruction and lossless recovery of a key.

Background

In some products with higher security level requirements (such as multi-mode talkback, command communication, financial data, etc.), the data content stored or transmitted needs to be encrypted by using a secret key for communication or data security. The general method is to open up an area in the memory of the main chip for storing the key, and the key can only be called by the internal program of the chip through program setting and cannot be read through an external interface, so as to avoid easy disclosure.

However, a mature chip cracking method is available, that is, a chip is taken and a black plastic package layer on a surface layer is ground, a wafer is exposed, and the contents of a memory in the whole chip are cracked by using some special technical means to form a readable or readable file, so that a secret key is leaked.

Disclosure of Invention

Objects of the invention

In order to solve the technical problems in the background art, the invention provides a key self-destruction and lossless recovery implementation scheme, which can realize the self-destruction and lossless recovery of the key, is safe, reliable and good in maintainability and is suitable for batch production.

(II) technical scheme

In order to solve the above problems, the present invention provides a scheme for implementing key self-destruction and lossless recovery, comprising the following steps:

s1, arranging a mechanical switch on the main circuit board;

s2, setting a key self-destruction program in the main chip, installing the main chip on the main circuit board, and monitoring the state of the mechanical switch in real time by the main chip;

s3, mounting the main circuit board in the terminal machine shell, wherein the mechanical switch comprises two states of A1 and A2;

a1: when a transmission rod arranged in the mechanical switch is pressed by the shell of the terminal machine, the mechanical switch is in a closed state;

a2: when a transmission rod arranged in the mechanical switch loses the pressure of the terminal machine shell on the transmission rod, the mechanical switch automatically pops open and is in a disconnected state;

s4, when the main chip detects that the mechanical switch is in the A2 state in S3, the main chip starts a key self-destruction program and erases a storage area in the main chip, in which the key is stored, so as to destroy the key;

and S5, when the key self-destruction is triggered by normal maintenance products, connecting the serial port on the terminal machine with the serial port of the computer, and downloading the key again from the computer and transmitting the key to the main chip to realize the lossless recovery of the key.

Preferably, a dual power supply scheme is adopted for the main chip, and the dual power supply scheme comprises a main power supply and a standby power supply.

Preferably, the main power supply includes an external power supply for supplying power to the entire system of the terminal machine and a rechargeable lithium polymer battery; the standby power supply comprises a rechargeable button type lithium ion battery which is specially used for the main chip to carry out key self-destruction, and is charged by a main power supply and maintains a full charging state.

The technical scheme of the invention has the following beneficial technical effects: the main circuit board is provided with a mechanical switch, when the terminal machine is normally used, a transmission rod of the mechanical switch is pressed by the shell of the terminal machine to be in a closed state, and a secret key stored in the main chip can be normally used. When someone tries to break the chip, the user needs to take the chip, and needs to disassemble the shell of the terminal machine, at the moment, the mechanical switch loses the pressure of the shell and automatically pops open and is switched to an off state. The main chip detects that the switch on the circuit is in an off state, starts a key self-destruction program, and erases the section of the storage area in the chip, in which the key is stored, so that the key is destroyed. When the terminal machine needs original factory maintenance and the shell is normally disassembled, the key self-destruction function can be triggered, and at the moment, original factory maintenance personnel can download the key through a computer and transmit the key to the terminal machine, so that the key self-destruction scheme is free of physical damage and maintainability is achieved.

Drawings

Fig. 1 is a schematic diagram of a schematic structure of an implementation scheme of key self-destruction and lossless recovery according to the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention.

As shown in fig. 1, the implementation scheme of key self-destruction and lossless recovery proposed by the present invention includes the following steps:

s1, arranging a mechanical switch on the main circuit board;

s2, setting a key self-destruction program in the main chip, installing the main chip on the main circuit board, and monitoring the state of the mechanical switch in real time by the main chip;

s3, mounting the main circuit board in the terminal machine shell, wherein the mechanical switch comprises two states of A1 and A2;

a1: when a transmission rod arranged in the mechanical switch is pressed by the shell of the terminal machine, the mechanical switch is in a closed state;

a2: when a transmission rod arranged in the mechanical switch loses the pressure of the terminal machine shell on the transmission rod, the mechanical switch automatically pops open and is in a disconnected state;

s4, when the main chip detects that the mechanical switch is in the A2 state in S3, the main chip starts a key self-destruction program and erases a storage area in the main chip, in which the key is stored, so as to destroy the key;

and S5, when the key self-destruction is triggered by normal maintenance products, connecting the serial port on the terminal machine with the serial port of the computer, and downloading the key again from the computer and transmitting the key to the main chip to realize the lossless recovery of the key.

In the invention, the main circuit board is provided with the mechanical switch, when the terminal machine is normally used at ordinary times, a transmission rod of the mechanical switch is pressed by the shell of the terminal machine to be in a closed state, and a secret key stored in the main chip can be normally used. When someone tries to break the chip, the user needs to take the chip, and needs to disassemble the shell of the terminal machine, at the moment, the mechanical switch loses the pressure of the shell and automatically pops open and is switched to an off state. The main chip detects that the switch on the circuit is in an off state, starts a key self-destruction program, and erases the section of the storage area in the chip, in which the key is stored, so that the key is destroyed. When the terminal machine needs original factory maintenance and the shell is normally disassembled, the key self-destruction function can be triggered, and at the moment, original factory maintenance personnel can download the key through a computer and transmit the key to the terminal machine, so that the key self-destruction scheme is free of physical damage and maintainability is achieved.

In an alternative embodiment, a dual power supply scheme is used for the main chip, including a main power supply and a standby power supply.

In order to ensure stable power supply when the chip runs the key self-destruction program, a standby power supply is added in the terminal device.

In an alternative embodiment, the main power source includes an external power supply source for supplying power to the entire system of the terminal machine and a rechargeable lithium polymer battery; the standby power supply comprises a rechargeable button type lithium ion battery which is specially used for the main chip to carry out key self-destruction, and is charged by a main power supply and maintains a full charging state.

It should be noted that the rechargeable lithium polymer battery has a capacity of 4000mAh and is responsible for supplying power to the whole system of the terminal machine. The spare power supply adopts a rechargeable button type lithium ion battery which is arranged on a main circuit board, has the capacity of 90mAh and is specially used for the key self-destruction function of a main chip, the spare power supply is charged by a main power supply at ordinary times, so that the spare power supply is maintained in a fully charged state, the electricity of the spare rechargeable button type lithium ion battery is consumed only when the main power supply is used and has no voltage output, the consumed current is 0.2uA, and the spare rechargeable button type lithium ion battery can ensure that a key self-destruction program can be normally started and operated at any time within 5 years after the main power supply is powered off.

It is to be understood that the above-described embodiments of the present invention are merely illustrative of or explaining the principles of the invention and are not to be construed as limiting the invention. Therefore, any modification, equivalent replacement, improvement and the like made without departing from the spirit and scope of the present invention should be included in the protection scope of the present invention. Further, it is intended that the appended claims cover all such variations and modifications as fall within the scope and boundaries of the appended claims or the equivalents of such scope and boundaries.

6页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种远程计算机信息防盗报警装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类