Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for generating private key

A private key and algorithm technology, applied in the field of information security, can solve problems such as inconvenient use, and achieve the effect of improving security, reliability and flexibility

Active Publication Date: 2019-01-11
北京信安世纪科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can protect the private key very well, but it is extremely inconvenient to use for most mobile devices today

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating private key
  • Method and device for generating private key
  • Method and device for generating private key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0052] According to an embodiment of the present invention, there is provided

[0053] Such as figure 1 As shown, the method for generating a private key according to an embodiment of the present invention includes:

[0054] Step S101, receiving the user password of the user;

[0055] Step S103, collecting the user's device information;

[0056] Step S105, extracting device information according to the user password to obtain key device information;

[0057] Step S107, using a predetermin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key generation method and device. The private key generation method comprises: receiving a user password of a user; collecting equipment information of the user; extracting the equipment information according to the user password to obtain key equipment information; and processing the user password and the key equipment information by use of a preset algorithm to generate a private key of the user. According to the method and the device provided by the invention, the private key is generated based on the equipment information and the user password, not only better security protection is provided to the private key, but also requirements of mobile equipment are met, and the security, the reliability and the flexibility of the private key are greatly improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for generating a private key. Background technique [0002] In 1976, two scholars at Stanford University, Diffie and Hellman, proposed the concept of public key cryptosystem. The so-called public-key cryptosystem uses different encryption keys and decryption keys, and it is a cryptographic system that "deriving the decryption key from a known encryption key is computationally infeasible". [0003] In the public key cryptosystem, the encryption key (that is, the public key) PK is public information, and the decryption key (that is, the secret key) SK needs to be kept secret. Encryption algorithm E and decryption algorithm D are also public. Although the secret key SK is determined by the public key PK, SK cannot be calculated from PK. [0004] In the public key cryptosystem, how to protect the private key from leakage is a crucial task. At present...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0869
Inventor 汪宗斌
Owner 北京信安世纪科技股份有限公司