Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetric secret key distribution and message encryption method based on identity information

An asymmetric key and asymmetric encryption technology, applied in the field of information security, can solve the problems of unbelievable communication providers to keep secrets, chaotic key distribution and management mechanisms, man-in-the-middle attacks, etc., to achieve a simple public key experience, increase speed and Operational feasibility, the effect of increasing adaptability

Active Publication Date: 2016-07-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] One is that we still need to store a large number of public keys (even though we may not need to store them, we still need to obtain the corresponding person’s public key from a fixed place, which has a slight delay in communication)
[0011] Furthermore, the asymmetric public-private key is obtained from a third-party server, and we cannot believe whether the communication provider will help us keep the secret (referring to unintentional disclosure or intrusion)
[0012] The most important thing is that during the key distribution process, there will be a lot of information leakage security issues
Especially in the company cluster scenario, the key distribution and management mechanism is chaotic, and it will be attacked by a man in the middle.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric secret key distribution and message encryption method based on identity information
  • Asymmetric secret key distribution and message encryption method based on identity information
  • Asymmetric secret key distribution and message encryption method based on identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] First of all, it should be explained that the present invention is an application of computer technology and modern cryptography in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills.

[0054] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0055] Such as Figure 1 to Figure 4 As shown, an asymmetric key distribution and message encryption system based on identity information is a key distribution server (key dock for short) certified by a CA certificate f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and provides an asymmetric secret key distribution and message encryption method based on identity information. The method comprises enterprise administrator initialization, a user registration process, a user point-to-point communication process and a user many-to-man communication process. User personal secret keys can be distributed more securely; secret key management systems can be constructed according to enterprises and conditions; the user public key management quantity can be reduced, and public key experiment of a user end is simplified; the probability that private keys are intercepted and stolen is reduced; the speed of a whole public key system and the operation feasibility can be improved; the adaptability of the public key system to mobile ends or other ends is enhanced; and a symmetric encryption system and an asymmetric encryption system are applied to an authentication and data transmission phase in a combined mode.

Description

technical field [0001] The invention relates to the field of information security, in particular to an asymmetric key distribution and message encryption method based on identity information. Background technique [0002] In the process of modern information transmission, more and more third-party communication tools appear on the market, and more and more intelligence traffickers, foreign evil force personnel, etc. (hereinafter referred to as hackers) start information interception work. But in the process, we found that hackers can not only attack the client and intercept the transmitted data, they are more inclined to attack the server of the third-party communication tool, and some third-party communication tool manufacturers even back up user data unconsciously. However, the traditional symmetric encryption scheme is easy to blast, and the key storage capacity is huge, so it is not suitable for complex network environments. [0003] In the process of information transm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/083H04L9/0869H04L63/045H04L63/062
Inventor 范渊张小孟吴卓群
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products