Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key encrypting and storing method based on tree structure

A key encryption, tree structure technology, applied in key distribution, can solve the problem of not adapting to the requirements of the new era, and achieve the effect of convenient access

Inactive Publication Date: 2009-11-18
GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional symmetric key storage method is no longer suitable for the requirements of the new era

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The present invention describes an efficient key protection and storage method, which combines trusted computing technology and binary tree storage technology, including four parts: binary tree initialization, inserting a data encryption key, deleting a data encryption key, reading Take a data encryption key.

[0093] These four parts can be implemented as subroutines with logic circuit chips or programming languages, and at the same time, provide call interfaces for other applications, including subroutine name, number of call parameters, input parameters and return parameters, etc.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key encrypting and storing method based on a tree structure, which belongs to the technical field of dependable computing. A binary tree layering and encrypting technology is adopted to convert the protection for many data encrypting keys into the protection for a main key and comprises four parts of binary tree initialization, data encrypting key insertion, deletion and reading. A root node of a binary tree represents the main key and is stored in a dependable crypto module, and keys represented by other nodes are stored in an external memory, wherein a leaf node represents the data encrypting keys, and when a non-root node is stored, a father node of an upper layer is always used for encrypting the non-root node, thus when used, the data encrypting keys must be reduced. The method saves the memory space of the dependable crypto module, can store large numbers of keys and can be widely applied to a computer information system of a high safety class.

Description

(1) Technical field [0001] The method for encrypted storage of symmetric keys belongs to the field of trusted computing technology and is one of the core technologies of information security. (2) Background technology [0002] In the field of trusted computing, the safe storage of symmetric keys is a key issue, because if the symmetric key is leaked, the related ciphertext is not safe. [0003] At present, the commonly used storage method is to store the symmetric key in a floppy disk or a flash memory, which is carried by the user or stored in a safe place. However, it is inconvenient to do so. One is that this method requires a large number of floppy disks or flash memory; the other is that this method requires the user to always be at the side of the computer; the third is that this internal and external interaction reduces the running speed of the application. [0004] With the extensive use of cryptography in computer systems and communication systems, applications ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06F21/00G06F12/14G06F17/30G06F21/62
Inventor 沈昌祥刘威鹏张兴胡俊庄俊玺
Owner GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products