Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying legality of cloud shields in long-distance mode

A remote verification and legality technology, applied in the field of remote verification of cloud shield legality, can solve the problems of forgery and theft of important data and materials

Inactive Publication Date: 2014-10-08
安徽云盾信息技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Now Cloud Shield is more and more widely used. Cloud Shield is used to store and transmit information ciphertext, and realize the security of information storage and transmission on untrustworthy devices; however, during remote operations, there may be counterfeit Cloud Shield to steal Access to important data and information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying legality of cloud shields in long-distance mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The present invention will be described in detail below in conjunction with accompanying drawing and embodiment:

[0010] Such as figure 1 As shown, the method of remotely verifying the legitimacy of Cloud Shield, the specific steps are as follows:

[0011] (1) Set the cloud shield so that each cloud shield saves four non-modifiable data inside the cloud shield when it leaves the factory. A. Root public key PKr: there is always only one pair of root public key PKr and root private key SKr; B. Initial key pair SK0 / PK0: The initial key pair of each Cloud Shield is randomly generated, where SK0 is the initial private key and PK0 is the initial public key; C. Cloud Shield ID: the ID of each Cloud Shield They are all different; D. The initial public key SKr(PK0) signed by the root private key SKr;

[0012] (2) Assuming that network transmission is insecure, hackers may modify data during data transmission. The legitimacy of Cloud Shield can be verified remotely by transmi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for verifying the legality of cloud shields in a long-distance mode. The method includes the following steps that first, four non-modifiable data are stored in each cloud shield when the cloud shield leaves a factory, and the four data comprise A, a root public key PKr, B, an initial secret key pair SK0 / PK0, C, the cloud shield ID and D, an initial public key signed by a root private key SKr; second, the legality of each cloud shield can be verified by transmitting the following three sets of data, namely SKr (PK0), SK0 (ID) and SK0 (PK user public key), and the SKr (PK0) is used for verifying the legality of a PK0 source; if the SK0 (ID) can be decoded to obtain the corresponding ID, the ID is from the same cloud shield. The method for verifying the legality of cloud shields in the long-distance mode has the advantages that due to the fact that the SKr (PK0) is signed by the SKr when leaving the factory, hackers cannot falsify the data; the PK0 source legality is determined, and as long as the SK0 (ID) can be decoded to obtain the ID, the ID and the PK0 are from the same cloud shield; the PK0 source legality is determined, as long as the SK0 (PK user public key) can be decoded, the PK is a user public key which must be from one legal cloud shield, and therefore it is guaranteed that the user public key PK cannot be falsified by hackers.

Description

technical field [0001] The invention relates to the field of legality verification of Cloud Shield, and mainly relates to a method for remotely verifying the legality of Cloud Shield. Background technique [0002] Now Cloud Shield is more and more widely used. Cloud Shield is used to store and transmit information ciphertext, and realize the security of information storage and transmission on untrustworthy devices; however, during remote operations, there may be counterfeit Cloud Shield to steal access to important data and information. Contents of the invention [0003] The purpose of the present invention is to overcome the deficiencies in the prior art and provide a method for remotely verifying the legitimacy of Cloud Shield. [0004] The purpose of the present invention is accomplished through the following technical solutions. The specific steps of this method of remotely verifying the legitimacy of Cloud Shield are as follows: [0005] (1) Set the cloud shield so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 罗鸣陈波沈宁
Owner 安徽云盾信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products