Unlock instant, AI-driven research and patent intelligence for your innovation.

System verification method based on two-card-three-code technology

A system verification and technology technology, applied in the field of system verification, can solve the problems of low ciphertext protection, difficulty in ensuring key security, and low speed, and achieve perfect security, good application prospects, high confidentiality and security Effect

Active Publication Date: 2015-11-25
江苏杰瑞信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The single-item hash algorithm is an irreversible function that compresses messages of any length to a fixed length, such as the Hash algorithm, which is mainly used for digital signatures and message integrity detection, but has less protection for ciphertext; public key algorithms Also known as an asymmetric algorithm, the key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated based on the encryption key. For example, the RSA algorithm is limited in that the encryption form is single and the speed is relatively low; symmetric The encryption key of the algorithm is the same as the decryption key, such as the DES algorithm, so the security of the encryption depends entirely on the security of the key, not the secrecy of the algorithm
Each algorithm has its own limitations, especially the encryption form is single and it is difficult to ensure the security of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System verification method based on two-card-three-code technology
  • System verification method based on two-card-three-code technology
  • System verification method based on two-card-three-code technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] combine figure 1 , the system verification method of the present invention based on two cards and three codes technology comprises the following steps:

[0048] The first step is to encrypt the original plaintext through the encryption system, read the original file in the original drive, select the encryption algorithm, encrypt the file, generate ciphertext and master key after encryption, and store the ciphertext and its signature file to the target card , the master key is RSA encrypted to generate a working key, and the working key is digitally signed. At this time, the RSA private key S0 is encrypted, and finally these results are stored in the unlocking card, such as figure 2 The encryption system flow is shown, and the detailed steps are as follows:

[0049](1) The user inserts the original file disk, automatically retrieves the original data file to be encrypted (defined as OF), and then selects the encryption algorithm. All encryption algorithms are stored i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system validation method based on the two-card three-password technique. The method includes: reading an original file from an original driver by the aid of an encryption system, selecting an encryption algorithm for file encryption, generating a ciphertext and a master secret key after encryption, storing the ciphertext and a signature file of the ciphertext to a target card, using the master secret key for RSA encryption to generate a working secret key, performing digital signing for the working secret key, encrypting a private key S0 of RSA, and storing the results to a unlocking card; decrypting a plaintext out by the aid of a decryption system, decrypting the private key S0 out according to a critical secret key and the secret key pair set serial number, decrypting the master secret key out according to the private key S0 and the working secret key, and decrypting the plaintext out according to the master secret key, the ciphertext and the encryption algorithm serial number; and performing password protection mechanism design and verification and validation. By combining the two-stage secret key management systems and multiple algorithms, the system validation method is extremely high in secrecy and security, and enciphered data files and secret key files are stored in different media and can be transmitted and stored separately, so that security of the enciphered files is guaranteed.

Description

technical field [0001] The invention relates to a system verification method, in particular to a system verification method based on two-card-three-code technology. Background technique [0002] In the field of important data security, many industries have taken certain protective measures. The current popular data encryption algorithms are divided into three categories: single hash algorithm, public key algorithm, and symmetric algorithm. The single-item hash algorithm is an irreversible function that compresses messages of any length to a fixed length, such as the Hash algorithm, which is mainly used for digital signatures and message integrity detection, but has less protection for ciphertext; public key algorithms Also known as an asymmetric algorithm, the key used for encryption is different from the key used for decryption, and the decryption key cannot be calculated based on the encryption key. For example, the RSA algorithm is limited in that the encryption form is s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06H04L9/08
Inventor 刘宝华田亚丽陈端迎张桂平吴茂传刘烨许永正胡昌平董奇
Owner 江苏杰瑞信息科技有限公司