Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for storing random key based on encryption file capable of storing softdog

A technology of random keys and encrypted files, applied in the field of information security, can solve problems such as hidden dangers and inability to verify whether information has been tampered with, and achieve the effect of improving security

Active Publication Date: 2013-02-13
FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using the technical scheme of encrypting the information in the storage area of ​​the dongle outside the dongle, since the key can be obtained through a certain algorithm, there are certain security risks, and it is impossible to verify whether the information has been tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing random key based on encryption file capable of storing softdog
  • Method for storing random key based on encryption file capable of storing softdog
  • Method for storing random key based on encryption file capable of storing softdog

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A kind of random key preservation method based on the encrypted file of dongle of the present invention, at first open up certain space in the storage area of ​​dongle for storing random key, we call it key area, the remaining space It is used to save the ciphertext, which is called the ciphertext area.

[0019] Such as figure 1 As shown, the key area includes the checksum storage area, the key index storage area (the key index storage area refers to the location of the key area where the key is located), the key slice (key 1-key n) and Redundant data composition. Among them, the checksum storage area, key index storage area and key slice cannot overlap, and the checksum storage area must be before the key index storage area and key slice, so that the key and ciphertext can be verified ; Since the length of the key is not fixed, the key index has an end mark; the key index composed of each key slice refers to the location of the corresponding key slice. figure 2 is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for storing a random key based on an encryption file capable of storing a softdog. The key is generated in the softdog, is a random number and is separated and randomly distributed; meanwhile, a check mechanism is added for checking whether information is distorted. The method improves the encryption security, the key concealment and the softdog generality.

Description

【Technical field】 [0001] The invention relates to the field of information security, in particular to a method for storing random keys based on encrypted files that can store dongles. 【Background technique】 [0002] At present, the decryption and cracking work of the dongle mainly focuses on the communication interception between the application program and the encrypted dynamic library. Traditional storage areas that can store dongles can be used to store important information, which is generally encrypted. When in use, the agreed (fixed or obtained through a certain algorithm) key is generally used to encrypt or decrypt the data in the storage area. This encryption method is to obtain a key outside the dongle, and then encrypt or decrypt the storage area information of the dongle. Using the technical scheme of encrypting the information in the storage area of ​​the dongle outside the dongle, since the key can be obtained through a certain algorithm, there are certain sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/14H04L29/06
Inventor 郑子凤李捷林仁文
Owner FUJIAN STAR NET EVIDEO INFORMATION SYST CO LTD