Digital cryptographic key protection method

A digital key and key technology, which is applied in the transmission system, electrical components, etc., can solve the problems that key security cannot be guaranteed, key update is difficult, key management is cumbersome, etc.

Inactive Publication Date: 2008-01-23
ZTE CORP
View PDF2 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Key management is cumbersome
In some application scenarios where a large number of files need to be encrypted, the negotiation of many keys and algorithms or email transmission will greatly consume system resources and manpower;
[0006] 2. It is difficult to update the key
In some cases, such as the key being cracked, it is necessary to replace the key in a timely and effective manner, and the above method is difficult to achieve
[0007] 3. Whether it is negotiating the key or the email transmission itself, there are still security issues. If hackers or intermediaries leak, the security of the key is still not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital cryptographic key protection method
  • Digital cryptographic key protection method
  • Digital cryptographic key protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention provides a digital key protection method, which can be applied to the technical field of network communication security, and improves the security issues of related key input, storage, output and update. Specific embodiments are described in detail below, but not as a limitation to the present invention.

[0040] A kind of digital key processing method of the present invention is described below in conjunction with accompanying drawing and embodiment, the digital certificate described here refers to the digital certificate that conforms to the X.509 specification standard; The corresponding private key file; the key mentioned here refers to the key in the string format that needs to be transmitted.

[0041] As shown in Figure 1, the key processing method in Embodiment 1 of the present invention involves two logical entities:

[0042] The sender 101, the sender 101 sends an algorithm negotiation request and a key import request to the receiver 102 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a digital cryptographic key protecting method, which comprises that a server encrypts to the original cryptographic key with a receiver public cryptographic key according to the encryption algorithm, to span the encryption cryptographic key messages, a data packet is formed with the encryption cryptographic key messages and other cryptographic key related messages, a signing operation to the data packet is performed with a server private cryptographic key to span the signing messages, the data packet and the signing messages is sent to the receiver, the receiver processes the other related messages of the cryptographic key in the data packet according to the first message-digest Algorithm, to span a message-digest value which acts as a scrambling cryptographic key to encrypt to the original cryptographic key, thus a storage encryption cryptographic key is obtained, and the storage encryption cryptographic key, the related messages of the original cryptographic key and the scrambling algorithm are stored in a data base, the client end sends a cryptographic key requirement to the receiver, the receiver encrypts again to the storage cryptographic key after the storage cryptographic key is taken out, and sends the results to the client end and takes out the messages in the data base regularly, and update the scrambling algorithm and the message-digest and the storage encryption cryptographic key. The present invention improves the security of the cryptographic key input, storage, output and updating on the cryptographic key management convenience guaranteeing.

Description

technical field [0001] The invention relates to the field of file encryption, in particular to a protection method in the whole life cycle of inputting, storing, outputting and updating encryption keys. Background technique [0002] With the development of broadband Internet technology and the continuous improvement of information security requirements, there is an urgent need for key security processing technology, including key transmission, storage and update processing methods. These technologies can effectively prevent malicious attacks by hackers or middlemen, thereby reducing the possibility of key leakage and protecting the rights and interests of users. [0003] In order to be able to decrypt the data correctly, there are currently two common methods: first, before sending the key, the sender and the receiver negotiate the relevant parameters, the sender uses the key to encrypt the file and then sends the encrypted file to the receiver, and the receiver The party u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 何康许军宁吕吉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products