Method and device for generating secret key

A technology for generating keys and devices, which is applied in the field of information security, can solve problems such as unfavorable data confidentiality and exposure of private data of users of electronic terminals, and achieve the effects of improving security, safe data sharing, and ensuring security

Active Publication Date: 2014-04-16
SAMSUNG ELECTRONICS CHINA R&D CENT +1
View PDF8 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in these personalized services, when data is exchanged between electronic terminals, or when electronic terminals and servers exchange data, there is a danger of exposing the private data of users of electronic terminals.
In addition, even if a key is used to encrypt data, since the key may be known by other objects (such as a server) other than the object using the key (such as an electronic terminal) during the creation and distribution of the key , which is not conducive to the confidentiality of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating secret key
  • Method and device for generating secret key
  • Method and device for generating secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the invention will now be described in detail, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like parts throughout. The embodiments are described below in order to explain the present invention by referring to the figures.

[0041] figure 1 A flowchart showing a method for generating a key at an electronic terminal according to an embodiment of the present invention.

[0042] In step 101, at least one user feature of an electronic terminal is acquired. User features are features that can characterize user interests. For example, the user feature may be tags of TV programs that the user often watches (type of program, keyword of the program, director, actor, etc.). User characteristics can be acquired in various ways. For example, the user characteristics of the electronic terminal may be acquired by receiving the user characteristics input by the user on the electronic terminal, or the user ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for generating a secret key. The method includes the following steps that at least one user characteristic of an electronic terminal is obtained; irreversible abstract generalization is performed on the obtained user characteristic so as to obtain a user characteristic abstract of the electronic terminal; the user characteristic abstract of the electronic terminal is sent to a server; a group characteristic abstract of a group where the electronic terminal exists is received from the server, wherein the group characteristic abstract is determined based on the user characteristic abstract of the electronic terminal; a group secret key of the group where the electronic terminal exists is generated based on the group characteristic abstract of the group where the electronic terminal exists and the user characteristic of the electronic terminal.

Description

technical field [0001] The present invention relates to the field of information security, more specifically, to a method and device for generating a key, and a method and device for protecting data in an electronic terminal. Background technique [0002] With the development of science and technology, electronic terminals (such as TVs, computers, and smart phones) that provide personalized services have widely appeared in our lives. These electronic terminals can provide users with personalized services based on explicit or implicit user behaviors. Services, such as data sharing, information recommendation, etc. [0003] However, in these personalized services, when data is exchanged between electronic terminals or between electronic terminals and servers, there is a risk of exposing private data of users of electronic terminals. In addition, even if a key is used to encrypt data, since the key may be known by other objects (such as a server) other than the object using th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 洪静徐旭彬
Owner SAMSUNG ELECTRONICS CHINA R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products