Private key protection method based on asymmetric secret key system

An asymmetric key and private key technology, applied in key distribution, can solve the problem of pure soft solutions without comparable technologies, and achieve the effect of avoiding theft of signatures

Active Publication Date: 2015-08-05
BANKEYS TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There is currently no comparable technology in pure soft solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key protection method based on asymmetric secret key system
  • Private key protection method based on asymmetric secret key system
  • Private key protection method based on asymmetric secret key system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solution of the present invention is specifically described below in conjunction with the accompanying drawings. It should be pointed out that the technical solution of the present invention is not limited to the implementation described in the examples. Those skilled in the art refer to and learn from the content of the technical solution of the present invention. Improvements and designs made on the basis of the invention shall belong to the protection scope of the present invention.

[0041] Such as figure 1 As shown, the private key protection method based on the asymmetric key system of the present invention:

[0042] Theoretical derivation, where M is the plaintext, N is the public modulus, and P A is the public key of user A, d A is the private key of user A, P A1 and P A2 is the public key fragment of user A, and C is the private key d A The generated ciphertext, C' refers to the second encryption of the ciphertext C by the proxy server side B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a private key protection method based on an asymmetric secret key system. The method comprises the steps: employing distributed operation during the building of a private key and/or signature encryption. A public key is divided into different public key segments, wherein one segment is used for secondary encryption and the other segment is used for decryption and verification. During the distributed operation, a proxy server terminal CPU and a user terminal CPU complete encryption operation at different levels. During the distributed operation, only the distributed operation of the public key is carried out and the distributed operation of a private key is not carried out. The private key is not changed, thereby enabling the private key and the public key on the proxy server terminal to be in asymmetric relation. According to the invention, the concept and logic of a shadow public key is added, and the encryption of the private key or signature cryptograph can pass the verification of the public key only of the shadow public key participates the distributed operation, thereby preventing the encryption operation and a hacker Trojan invader from working in the same CPU and internal memory environment, and avoiding a problem of signature embezzlement caused by the leakage of the private key.

Description

technical field [0001] The invention relates to a private key protection method based on an asymmetric key system, which is used in the fields of electronic signature digital certificate key encryption and identity verification for mobile banking and mobile APP. Background technique [0002] There is currently no comparable technology in pure soft solutions. [0003] The conventional method is a single-CPU operation, that is, the private key is submitted to the verifier after the client performs an independent encryption operation, and the public key is used for decryption and signature verification. [0004] The existing technology closest to this technical solution is U-shield. From the perspective of security, refer to the hardware U-shield for analysis. The hardware U-shield uses independent CPU and memory space for encryption operations, and the purpose is to prevent hackers and Trojans from tracking memory processes and stealing private data. keys or forged signatures...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 吕文华宛海加王家辰
Owner BANKEYS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products