System verification method based on two-card-three-code technology
A system verification and technology technology, applied in the field of system verification, can solve the problems of low ciphertext protection, difficulty in ensuring key security, and low speed, and achieve perfect security, good application prospects, high confidentiality and security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] combine figure 1 , the system verification method of the present invention based on two cards and three codes technology comprises the following steps:
[0048] The first step is to encrypt the original plaintext through the encryption system, read the original file in the original drive, select the encryption algorithm, encrypt the file, generate ciphertext and master key after encryption, and store the ciphertext and its signature file to the target card , the master key is RSA encrypted to generate a working key, and the working key is digitally signed. At this time, the RSA private key S0 is encrypted, and finally these results are stored in the unlocking card, such as figure 2 The encryption system flow is shown, and the detailed steps are as follows:
[0049](1) The user inserts the original file disk, automatically retrieves the original data file to be encrypted (defined as OF), and then selects the encryption algorithm. All encryption algorithms are stored i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 