Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Combined secret key dynamic security management system

A technology for managing systems and combining keys, which is applied in transmission systems, digital transmission systems, public keys for secure communications, etc. It can solve the problems of hardware-dependent key systems and achieve the effect of improving security and hierarchical management.

Inactive Publication Date: 2011-08-31
BEIJING HUFU TECH
View PDF2 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention solves the shortcomings of the traditional security management system being inflexible and the combination key system completely dependent on hardware, and provides a combination key dynamic security management system, which is characterized by the unique identification number SN of the client device managed by the manufacturer, and the background main service The synchronization factor SF managed by the system, the personal password PIN managed by the user and the additional code AC managed by the service system are based on the combined key structure, and the business private key is protected by the dynamic protection key KP generated by SN, SF, PIN and AC operations SK, the combined key architecture refers to the use of ECC elliptic curve encryption algorithm to operate on multiple random numbers or specific data to generate several pairs of different private keys and public keys under the same operation model, which are placed in the private key matrix and the public key respectively. In the public key matrix, the unique identification number SN of the user is used for abstract mapping, that is, the abstract value is converted into several position coordinates, and the new private key and the corresponding The new public key composed of multiple public key points taken from the same position in the same position in the public key matrix is ​​still a pair of public key pairs. The public key matrix and public key calculation algorithm are public, and the private key matrix is ​​kept secret by the issuer. The private key is stored by secure hardware or kept secretly by the user. The user calculates the public key of the other party through the unique identification number SN of the other party, sends information to the other party safely, and verifies the signature of the other party. The user uses his private key to Decipher the encrypted data and sign the data guaranteed by yourself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment 1 (mobile electronic payment system)

[0033] The mobile electronic payment system of the present invention is characterized in that it adopts a combined key dynamic security management system, adopts the encoding of the real identification RID and its verification method, the public key of the combined identification can be easily generated, and its corresponding private key will be provided by the overall system The issuer encrypts with the public key of the user's main ID and sends it to the issuing department of the sub-identity. After being approved by the sub-identity issuing department, it is sent to the user. Since it is encrypted with the public key of the user's main ID, only the private key of the user's main ID can Unlock, so the issuer of the sub-identity has management rights, but cannot see the user's private key, which ensures the security of the private key. In this way, the application of each sub-identity is guaranteed to be independent of ...

Embodiment 2

[0034] Embodiment 2 (encrypted mail system)

[0035] The encrypted mail system of the present invention is characterized in that it adopts a combined key dynamic security management system, which is equivalent to the user's mailbox account, that is, the public key. In order to ensure the security of mail and office applications on the network, the user's main identification and key Stored and used in secure hardware. Since the public key of the combined identity can be easily generated, the user's multiple email accounts and device unique identification numbers can be combined as sub-identities and the user's main identity to form a new business identity, and the corresponding private key will be dynamically encrypted by the background service system. The key-protected ciphertext form is sent to the user. On the one hand, PCs or devices that can be connected to security hardware ensure application security through end-to-end hardware encryption. At the same time, users log in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a combined secret key dynamic security management system, which consists of a client device unique identification number SN, a synchronous factor (SF) which is managed by a background main service system, a personal identification number (PIN) which is managed by users themselves, and an additional code (AC) which is managed by a service system. A dynamic protection secretkey KP which is generated by computing the SN, the SF, the PIN and the AC is used for protecting a business private key SK, and by an unique identification number SN of an other person involved, a public key of the other person involved is calculated, a message is safely sent to the other person involved and a signature of the other person involved is verified; and by the private key of the user,encrypted data sent is decrypted and data which is ensured by the user is signed. The user identity and the safety of business application are verified hierarchically by adopting a system of a dynamic factor and the combined secret key system.

Description

technical field [0001] The invention relates to a safety authentication and management system which can realize the safety authentication and management system independent of the safety storage hardware through the combination of the dynamic factor and the combination key system. Background technique [0002] Dedicated secure storage hardware has always been the model that the security industry relies on for end-to-end encryption. If the advantages of networked devices can be combined with dynamic factors and combined key systems to solve the problems of massive users and hierarchical security management, this will make the mobile communication industry The business has greater development, and it is convenient for users to use. Contents of the invention [0003] The invention solves the shortcomings of the traditional security management system being inflexible and the combination key system completely dependent on hardware, and provides a combination key dynamic security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L12/24
Inventor 许丰
Owner BEIJING HUFU TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products