Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for secret key generation and corresponding decryption

A technology for generating keys and user equipment, which is applied in the computer field and can solve problems such as key security at the user equipment end

Active Publication Date: 2016-06-15
SUNINFO INFORMATION TECH
View PDF8 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of this application is to provide a method and device for generating a key and corresponding decryption, so as to solve the key security problem at the user equipment end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for secret key generation and corresponding decryption
  • Method and device for secret key generation and corresponding decryption
  • Method and device for secret key generation and corresponding decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The application will be described in further detail below in conjunction with the accompanying drawings.

[0039] figure 1 A schematic structural diagram of a user equipment for generating a key according to one aspect of the present application is shown. The user equipment 1 includes a password generation device 11 and an encryption device 12, wherein the password generation device 11 iteratively generates an encryption password based on the unique identifier of the user equipment; the encryption device 12 obtains the key information of the current application, and uses the encryption password The key information is encrypted.

[0040] Here, the user equipment 1 includes but is not limited to any mobile electronic product that can interact with the user through a touch panel, such as a smart phone, a PDA, etc., and the mobile electronic product can use any operating system, such as android operating system, iOS operating system, etc. Preferably, the user equipment 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a method and device for secret key generation and corresponding decryption. The method comprises the steps that: an encryption password is generated in an iterative manner based on a unique identifier of user equipment; current applied secret key information is obtained and the encrypted password is utilized to encrypt the secret key information, so that the secret key can only be called by a specific application and cannot be called by other applications or terminals, which meets the requirements of application binding and device binding; iterative calculation is performed to obtain the encrypted password based on the unique identifier of the user equipment when the user equipment starts a current application; the encrypted secret key information of the current application is obtained, and the encrypted password is utilized to decrypt the encrypted secret key information; and the encrypted secret key information is utilized to decrypt relevant data stored in the current application, so that the secret key is only enabled to be used when the user uses the application, and the secret key security requirement approved by the user is met.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a technology for generating keys and corresponding decryption. Background technique [0002] The attack model of the mobile terminal key is divided into three types: malware, which applies for all available system permissions, such as sending text messages, making calls, reading contacts, obtaining geographical location and other private information; jailbreak attack, obtaining the highest authority of the device, scanning File system, to obtain system sensitive data; monitor root attacks, monitor user keyboard input, and obtain input content. [0003] At present, there are mainly the following types of key protection methods for mobile terminals: First, ARMTrustZone technology, which divides embedded devices into two independent operating environments from the design of system bus, processor, etc., NormalWord is responsible for AndroidOS operation, and Secureword is respon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W12/02H04W12/04H04W12/03H04W12/041
CPCH04L9/0866H04W12/02H04W12/04
Inventor 赵伟黄明文甄健鹏
Owner SUNINFO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products