Unlock instant, AI-driven research and patent intelligence for your innovation.

A private key protection method and system for end users

A technology for end-user and system protection, applied in the field of end-user private key protection methods and systems, can solve the problems of storage security and access security vulnerability, and achieve the effect of preventing attacks and ensuring security

Active Publication Date: 2017-03-08
卓望数码技术(深圳)有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical problem to be solved by the present invention is to provide a method for protecting the private key of the terminal user, so that the private key is not easy to be stolen, to crack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A private key protection method and system for end users
  • A private key protection method and system for end users
  • A private key protection method and system for end users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Such as figure 1 As shown, in the flow chart of Embodiment 1 of the end user's private key protection method of the present invention, the private key protection method includes:

[0051] A. initialization steps; and

[0052] B. Access steps where,

[0053] Step A further includes:

[0054] A1. The terminal generates a key pair according to the terminal identification, the PIN code entered by the user, and the generated random number. The key pair includes a private key and a public key, and the public key, the terminal identification, and the PIN code are And the random number is sent to the server. In this step, it should be noted that during initialization, the terminal can first obtain the terminal identity, such as the IMSI number or IMEI number, then randomly generate a random number for the user, and finally prompt the user Enter the PIN code, and after confirmation by the user, the terminal generates a key pair according to the obtained terminal identificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key protection method and a private key protection system for a terminal user. The private key protection method for the terminal user comprises an initializing step and an accessing step, wherein the initializing step comprises that a terminal generates a key pair according to terminal identification, a PIN code and a random number and sends a public key, the terminal identification, the PIN code and the random number to a server side; the accessing step comprises that the terminal requests for the server side a graph identifying code and a random number, the server side inquires the corresponding PIN code and random number, extracts one graph identifying code and an answer of the graph identifying code, then encrypted the inquired random number and returns to the terminal the graph identifying code and the encrypted random number, the terminal decrypted the random number and generates a key pair, the terminal signs on the transaction data and sends to the server side the terminal identification, the answer of the graph identifying code and the signed data, and the server side verifies the answer of the graph identifying code and the signed data. Due to the implementation of the technical scheme of the invention, a private key is unlikely to be stolen or broken.

Description

technical field [0001] The invention relates to the field of Internet information security, in particular to a method and system for protecting a terminal user's private key. Background technique [0002] As we all know, the protection of the user's private key is based on the PKI (Public Key Infrastructure, public key infrastructure) system encryption and decryption and the basic guarantee of the validity of the signature operation. For end-user soft certificates, since the key is stored as a file on the storage medium of the device, the security of the user's private key is particularly prominent. At present, the encrypted storage of the private key of the user soft certificate usually adopts the following methods: [0003] 1. It is stored in the memory in the form of a key file, encrypted and stored with a fixed encryption key, and when the private key needs to be accessed, the encryption key is used to decrypt the key file to obtain the user's private key; [0004] 2. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 刘琼玉刘志诚吴勇王有为袁胜
Owner 卓望数码技术(深圳)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More