当前位置:网站首页>Introduction to super dongle scheme
Introduction to super dongle scheme
2022-06-29 01:32:00 【CNSINDA_ HK】

In recent years , Computer and Internet applications have been popularized and developed in China , Has penetrated into every corner of society , The government , economic , military , social , Culture and people's life are increasingly dependent on computers and networks , E-government , Paperless office 、MIS、ERP、OA And other systems are also widely used in enterprises and institutions . In the highly competitive electronic and information technology products industry , Products that many companies have worked hard to develop , It was cracked by competitors soon after it was put on the market , The time and cost of product cracking are getting lower and lower , In many industries, there are more imitations than products with their own property rights , Seriously damaged the rights and interests of product developers . At present, the most effective way to protect software and hardware products is to bind encryption chips , It can effectively prevent unauthorized access or copying of on-chip programs , It can also prevent unauthorized use of abnormal means to copy PCB, The of the product PCB Copy completely .
Chapter two Current situation of encryption chip Common types of encryption chips The principle of encryption chip is usually divided into the following : 1) Put data inside the chip , By comparing whether the data are the same shortcoming : Easily simulated 2) The board and the encryption chip place the key at the same time ( It can be the same , Or the same after special data operation ), Encrypt random numbers at the same time ( It will not be reused ), Determine whether it is a legal chip according to the result advantage : Will not be simulated shortcoming : If the board program is broken , The encryption chip will fail 3) Some programs of the board are transplanted into the encryption chip , Call the encryption chip function when necessary advantage : Will not be simulated ; The board program is broken and the encryption chip is not broken , Will not affect program security shortcoming : The high cost , User workload increases , Users need to develop security chip programs , In mass production, it is necessary to build a download program environment . There are still problems Through the encryption chip , Although it can reduce... To some extent PCB The risk of being copied , But the performance is low 、 Slow speed 、 Small storage space is a big problem , Can't protect AI Algorithm and other core modules . It is impossible to put all the business logic codes into the encryption chip to run .
The third chapter CBS Encryption chip enhancement module
1.CBS Overview of encryption chip enhancement module Shenxinda CBS Encryption chip enhancement module uses encryption chip ID、 Keys and algorithms , With the help of business system CPU Computing power of , Through container technology , Amplify the processing capacity of the encryption chip , Let all the logical code of business programs and their algorithms run in a protected secure container , Implement the security of the algorithm, its code and executable module , Not only the anti copy board , It can also prevent decompilation and cracking , It is also resistant to tampering and hacker attacks . CBS Security operation diagram of encryption chip enhancement module inner container CBS The encryption chip enhancement module amplifies the processing capacity of the encryption chip , The core functions are : Encryption container 、 Trusted system 、 Scene white list 、 Data protection and key management of the original encryption chip .
2.CBS Main functions of encryption chip enhancement module CBS-S Encryption chip enhancement module through container technology , Use the key of the encryption chip product to generate a unique password in the system 、 Encrypted container , Let the business system run in the container , The data is stored in a container , The container is isolated from the outside , Internally trusted , Data encryption , Ensure system security , Prevent being copied and reverse analyzed .
1) Encryption container When the system starts, the key of the encryption chip is used , Encryption generation container , And let the business program run in the container , Business data is stored in containers , The container is isolated from the outside , The program files and data files in the container are not accessible from the outside . Cannot touch executable entities , Naturally, there is no reverse analysis , The container key comes from the encryption chip , Can't copy and copy board .
2) Trusted system The container is signed at the kernel level CA Calibration Technology , Sign and authenticate the system application in the container , Implement unsigned processes or processes with inconsistent signatures ( Forgery process ) Unable to run , Eliminate viruses , The operation of the Trojan horse , Make sure OS Layer security .
3) Scene white list The container is set through the white list , Form a program 、 Whitelist scenarios associated with files , All operations outside the scene are prohibited , Even system administrator privileges , The same strict restrictions .
4) File protection Design according to the principle of minimizing permissions , Read and write the data in the container 、 modify 、 Storage is strictly encrypted and authenticated , Only the specified business application is allowed to read / Write the specified file , Ensure file security .
5) Efficient encryption algorithm High efficiency encryption algorithm based on encryption chip is provided in the container , The operation of encryption algorithm is completely with the help of the system master CPU Conduct , Efficient , instant .
3. Use CBS Benefits of encryption chip enhancement module CBS-S The container generation of the encryption chip enhancement module depends on the key generation of the encryption chip , With non replicable characteristics , It has the following advantages :
1) Encryption container uniqueness The container is generated by the encryption chip key , Have uniqueness , Do not copy .
2) All business processes run in an encrypted container The container is an external isolation , Secure and confidential computing environment , Business program all business logic code can run in the container .
3) There is no need to modify the business logic code After the business program development is completed , No code changes required , No need to transplant , No need for additional development , Just put it directly into the container .
4) Speed and efficiency Because the program in the container is with the help of the main CPU The ability to process , So the speed is very efficient .
5) Overall anti reverse engineering Because the business logic and algorithm program are in the container , The container is isolated from the outside , There is no external access to business program entity files and business data , Therefore, it is impossible to reverse analyze .
Chapter four About shenxinda
Shenxinda is a high-tech enterprise focusing on research and development in the field of information security , In information leakage prevention , Active defense, etc , International leading level . The company has a development team composed of the country's top security experts , In data confidentiality , Active defense, etc , A series of research results with independent intellectual property rights have been obtained . Shenxinda products are oriented to R & D enterprises and institutions , Launch from R & D 、 compile 、 debugging 、 To product launch 、 operating , A comprehensive and three-dimensional data security solution covering all stages . We are based on years of research and development experience in the field of information security , For the domestic government 、 telecom 、 Finance 、 manufacture 、 energy 、 Customers in education and other industries provide information security solutions and risk assessment 、 Consulting and other services . At present, the main products of the company are : SDC Sandbox : The system adopts the third generation transparent encryption technology -- Kernel level defense in depth architecture , Advanced technology , Confidentiality in place , In the confidential market of R & D source code , Obvious advantages , It has successively successfully worked for several large enterprises in China (1000 Above terminal ) And state secret related organs (500 Above terminal ) The data security scheme has been implemented . MCK Mainframe reinforcement : It is specially designed for the data security risk of the server 、 Through kernel level hardening of the operating system , Can be effectively lower than the virus invasion , Hackers tamper with and hijack , Make sure the service is safe . CBS Encryption chip enhancement module ( amplifier ): It is an intelligent terminal device for security protection , Provide efficient and enhanced encryption chip function modules , Processing efficiency can be improved 1000 More than times .
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption
The purpose is to prevent extortion virus , Mainframe reinforcement , System reinforcement , Industrial control security server anti-virus , Business system anti-virus , Server intrusion prevention , Production line anti-virus , Industrial computer encryption , Industrial computer reinforcement , Server data security , Industrial control system host safety , Device encryption , Industrial computer anti-virus , Industrial computer encryption , Algorithm encryption , Program encryption anti copy , Super dongle , Device anti cracking , Equipment authorization management , Device antivirus , Industrial computer authorization management , Smart device encryption

边栏推荐
- 独家分析 | 关于简历和面试
- Pat grade a real problem 1165
- QT基于RFID管理系统(可应用于大多数RFID管理系统)
- SAP ui5 beginner tutorial 24 - how to use OData data model
- Easycvr service private What should I do if the PEM file is emptied and cannot be started normally?
- The metadata request parsing principle of OData XML format applied by SAP ui5 is based on domparser
- 机构加密资产产品上周流出4.23亿美元资金,创历史新高
- Three tips from small video app source code developers on small video platforms
- [image detection] recognition of the front and back of a coin based on texture features with matlab code attached
- [TS] type alias
猜你喜欢

统计学习方法(3/22)K近邻法

Analysis of sending principle of OData metadata request for SAP ui5 application

DO280分配持久性存储

月薪过万的测试员,是一种什么样的生活状态?

TypeScript(4)接口

【火灾检测】基于matlab GUI森林火灾检测系统(带面板)【含Matlab源码 1921期】

ASP. Net based on LAN

Stm32l4xx serial port log configuration analysis

The function of Schottky diode in preventing reverse connection of power supply

GUI Graphical user interface programming example - color selection box
随机推荐
Interviewer: with the for loop, why do you need foreach??
Teach you how to understand the test environment project deployment
Advanced installer architect authoring tool
[js practice every m days] JS export object analysis based on libcef application (steam)
Do280 allocating persistent storage
分享自己平时使用的socket多客户端通信的代码技术点和软件使用
Test a CSDN free download software
PHP hospital network reservation management system source code, hospital consultation reservation registration OA system (commercial or graduation design)
Learning notes of Lichuang EDA: Copper laying dead zone? isolated island? Dead copper?
Analysis of parsing principle of OData metadata request response in SAP ui5 application
Research on VB multi-layer firewall technology - state detection
PR FAQ: how to retrieve accidentally deleted video and audio in PR?
华泰证券安全吗
[temperature detection] thermal infrared image temperature detection system based on Matlab GUI [including Matlab source code 1920]
The function of Schottky diode in preventing reverse connection of power supply
Similarities and differences between SRAM and DRAM
What kind of life is a tester with a monthly salary of over 10000?
ASP. Design and implementation of net+sql online alumni list
[Fire Detection] forest fire detection system based on Matlab GUI (with panel) [including Matlab source code phase 1921]
be based on. NETCORE development blog project starblog - (13) add friendship link function