Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management and recovery method for encrypted digital certificate

A technology of key recovery and encryption certificate, applied in key distribution, can solve the problems of lack of flexibility, taking a long time, and the private key of digital certificate cannot be recovered, and achieves the advantages of simple key management system, simplified implementation, and superiority outstanding effect

Inactive Publication Date: 2011-05-18
WUHAN UNIV OF TECH +1
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] A key management system centrally saves a large number (such as millions, tens of millions) of key pairs of encrypted digital certificates for a long time (such as decades), which is a huge challenge both in terms of management and technology. For example, if the key database storing the private key is damaged, it may cause the private key of millions or tens of millions of digital certificates to be unrecoverable. In addition, when restoring the private key of the certificate, the It may take a long time to find the corresponding private key among tens of millions of key pairs, which is not conducive to online real-time recovery of certificates, and private key recovery can only be recovered by a centralized system, which will cause inconvenience and inconvenience in the use of private key recovery. lack of flexibility etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management and recovery method for encrypted digital certificate
  • Key management and recovery method for encrypted digital certificate
  • Key management and recovery method for encrypted digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0055] The present invention includes ( figure 1 ):

[0056] Certificate user S1: the owner of the encryption certificate and the user of the private key;

[0057] Certificate issuance system (CA system) S2: used to issue user encryption certificates;

[0058] Key pair generation system S3: used to generate user encryption certificate key pairs;

[0059] Key recovery certificate S4 (not including the private key): used to encrypt the private key of the user's encryption certificate;

[0060] User encryption certificate and private key S5: users use it to encrypt and decrypt information;

[0061] Key recovery system (or tool) S6: used to recover the private key of the user's encryption certificate;

[0062] Key recovery certificate and private key S7: used to decrypt the encrypted user certificate private key and private key recovery PIN code;

[0063] E...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key management and recovery method for an encrypted digital certificate. When a certificate issuing system based on the method issues an encrypted certificate of a user, a specific certificate public key recovered by a key is used for encrypting a private key of the user and then the private key encrypted is put into a newly defined private key recovery extension item inthe certificate; when the encrypted private key of the user is damaged or lost, a key recovering system or tool can recover the private key of the encrypted certificate of the user by using a corresponding certificate private key for recovering the certificate and safely send the private key of the encrypted certificate to the user according to necessary private key recovering strategies after necessary user ID confirmation is finished. On the basis of the method, the private key of the user can be recovered in both online and offline manners. Compared with the commonly adopted key managementand recovery method for an encrypted digital certificate currently, the invention does not require a special system to collectively store the private of the encrypted certificate of the user, which greatly lowers the complexity of key management and recovery system and causes the private key recovery to become easy, simple and flexible.

Description

technical field [0001] The invention belongs to the technical field of Public Key Infrastructure (PKI) for information security, in particular to a key management and recovery method for encrypted digital certificates. Background technique [0002] Encryption technology is the core technology of information security. Commonly used encryption algorithms in encryption technology include symmetric key encryption algorithm (symmetric key encryption technology) and asymmetric key encryption algorithm (asymmetric key encryption technology). The asymmetric key encryption algorithm uses a pair of keys to encrypt and decrypt information, one of which is publicly released, called a public key, for information encryption (or digital signature verification), and the other is not publicly released, and is owned by the owner of the key pair. The owner (or entity) is kept safe and can be used for information decryption (or digital signature). This pair of keys is called a public key pair,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 龙毅宏单淼唐志红张海松刘旭殷文刚
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products