Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for generating key and corresponding decryption

A technology for generating keys and user equipment, which is applied in the computer field and can solve problems such as key security at the user equipment end

Active Publication Date: 2021-04-13
SUNINFO INFORMATION TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of this application is to provide a method and device for generating a key and corresponding decryption, so as to solve the key security problem at the user equipment end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating key and corresponding decryption
  • Method and device for generating key and corresponding decryption
  • Method and device for generating key and corresponding decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The application will be described in further detail below in conjunction with the accompanying drawings.

[0039] figure 1 A schematic structural diagram of a user equipment for generating a key according to one aspect of the present application is shown. The user equipment 1 includes a password generation device 11 and an encryption device 12, wherein the password generation device 11 iteratively generates an encryption password based on the unique identifier of the user equipment; the encryption device 12 obtains the key information of the current application, and uses the encryption password The key information is encrypted.

[0040] Here, the user equipment 1 includes but is not limited to any mobile electronic product that can interact with the user through a touch panel, such as a smart phone, a PDA, etc., and the mobile electronic product can use any operating system, such as android operating system, iOS operating system, etc. Preferably, the user equipment 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The purpose of this application is to provide a method and device for generating a key and corresponding decryption, by iteratively generating an encryption password based on the unique identifier of the user equipment; obtaining the key information of the current application, and using the encryption password to The above key information is encrypted. The key can only be accessed by a specific application, and cannot be accessed by other applications or terminals, meeting the requirements of application binding and device binding. When the user equipment starts the current application, based on the unique identifier of the user equipment, an iterative operation is performed to obtain the encrypted password; then, the encrypted key information of the current application is obtained, and the encrypted key information is encrypted by using the encrypted password Decryption; finally, use the decrypted key information to decrypt the relevant data stored in the current application, so that the key can only be used when the user uses the application, meeting the key security requirements agreed by the user.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a technology for generating keys and corresponding decryption. Background technique [0002] The attack model of the mobile terminal key is divided into three types: malware, which applies for all available system permissions, such as sending text messages, making calls, reading contacts, obtaining geographical location and other private information; jailbreak attack, obtaining the highest authority of the device, scanning File system, to obtain system sensitive data; monitor root attacks, monitor user keyboard input, and obtain input content. [0003] At present, there are mainly the following methods for key protection of mobile terminals: First, ARM TrustZone technology divides embedded devices into two independent operating environments from the design of system bus, processor, etc., and Normal Word is responsible for the operation of Android OS. , Secure word is respo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W12/02H04W12/041H04W12/03
CPCH04L9/0866H04W12/02H04W12/04
Inventor 赵伟黄明文甄健鹏
Owner SUNINFO INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More