Combined secret key dynamic security management system
A technology for managing systems and combining keys, which is applied in transmission systems, digital transmission systems, public keys for secure communications, etc. It can solve the problems of hardware-dependent key systems and achieve the effect of improving security and hierarchical management.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0032] Embodiment 1 (mobile electronic payment system)
[0033] The mobile electronic payment system of the present invention is characterized in that it adopts a combined key dynamic security management system, adopts the encoding of the real identification RID and its verification method, the public key of the combined identification can be easily generated, and its corresponding private key will be provided by the overall system The issuer encrypts with the public key of the user's main ID and sends it to the issuing department of the sub-identity. After being approved by the sub-identity issuing department, it is sent to the user. Since it is encrypted with the public key of the user's main ID, only the private key of the user's main ID can Unlock, so the issuer of the sub-identity has management rights, but cannot see the user's private key, which ensures the security of the private key. In this way, the application of each sub-identity is guaranteed to be independent of ...
Embodiment 2
[0034] Embodiment 2 (encrypted mail system)
[0035] The encrypted mail system of the present invention is characterized in that it adopts a combined key dynamic security management system, which is equivalent to the user's mailbox account, that is, the public key. In order to ensure the security of mail and office applications on the network, the user's main identification and key Stored and used in secure hardware. Since the public key of the combined identity can be easily generated, the user's multiple email accounts and device unique identification numbers can be combined as sub-identities and the user's main identity to form a new business identity, and the corresponding private key will be dynamically encrypted by the background service system. The key-protected ciphertext form is sent to the user. On the one hand, PCs or devices that can be connected to security hardware ensure application security through end-to-end hardware encryption. At the same time, users log in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com