Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety method and system based on asymmetric secret key pair

An asymmetric key and security system technology, which is applied in the field of security methods and systems based on asymmetric key pairs, can solve the problem of interfering with the use of public or private key pairing, the complexity of the asymmetric key pair process, and the impact on chips. operating system issues

Active Publication Date: 2016-09-28
HENGBAO
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the storage locations of the public key and the private key are different, the processing of the public key and the private key cannot be completed at one time, which makes the process of operating the asymmetric key pair complicated; During the operation of the private key, data residues are likely to occur, and these residual data will interfere with the pairing of other public keys or private keys, thereby affecting the management of the chip operating system (Chip Operating System, hereinafter referred to as COS)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety method and system based on asymmetric secret key pair
  • Safety method and system based on asymmetric secret key pair
  • Safety method and system based on asymmetric secret key pair

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The embodiment of the present invention provides a security method based on an asymmetric key, such as figure 1 As shown, the above security methods based on asymmetric key pairs include:

[0045] S11. Generate a certificate and an asymmetric key pair corresponding to the certificate according to the generation instruction, where the asymmetric key pair includes a corresponding public key and a private key.

[0046]S12. Store the certificate in the certificate storage; store the public key, the unique identifier of the private key, and the unique identifier of the certificate in the first storage. The private key, the unique identifier of the public key and the unique identifier of the certificate are stored in the second storage. Wherein, the unique identifier of the private key is associated with the private key, the unique identifier of the certificate is associated with the certificate, and the unique identifier of the key is associated with the public key. The ce...

Embodiment 2

[0070] This embodiment provides a security system based on an asymmetric key pair. The security system based on asymmetric key pair matching mentioned in this embodiment is applicable to the security method based on the asymmetric key pair in the first embodiment. ,Such as image 3As shown, the security system based on an asymmetric key pair in this embodiment includes: a trigger module 1, a generation module 2, a storage module 3, and an application module 4, wherein the trigger module 1 is used to generate a trigger instruction, and the trigger instruction includes generating instruction. The generation module 2 is connected with the trigger module 1, and the generation module 2 is used to generate an asymmetric key pair and a certificate according to the generation instruction. The storage module 3 is connected to the generation module 2, and the storage module 3 includes a certificate storage, a first storage and a second storage which are connected to each other by signa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety method and system based on an asymmetrical secret key pair, relates to the technical field of computer application and is used for simplifying the operation process of the asymmetrical secret key pair and ensuring the safety of a COS (Chip Operating System). The safety method comprises the steps of generating a certificate and the asymmetrical secret key pair corresponding to the certificate according to a generation instruction, wherein the asymmetrical secret key pair comprises a public secret key and a private secret key which are corresponding; storing the certificate in a certificate memory; storing the public secret key, a private secret key unique identifier and a certificate unique identifier in a first memory; storing a public secret key unique identifier, the certificate unique identifier and the private secret key in a second memory; associating the private secret key unique identifier with the private secret key, and associating the certificate unique identifier with the certificate; associating the public secret key unique identifier with the public secret key; carrying out mutual signal connection on the certificate memory, the first memory and the second memory; and applying the generated asymmetrical secret key pair and certificate. The method and the system are used for encrypting or decrypting data.

Description

technical field [0001] The invention relates to the application field of computer technology, in particular to a security method and system based on an asymmetric key pair. Background technique [0002] With the development and application of Internet of Things and ubiquitous network technologies, information security in the network environment is particularly important. At present, the core of ensuring information security lies in the key management of the cryptographic system, and the resulting security authentication and encrypted communication system, such as using asymmetric key pairs to protect information security. [0003] Specifically, the asymmetric key pair includes a pair of different keys (public key and private key). If the public key is used to encrypt data, only the corresponding private key can be used to decrypt it; If the data is encrypted, only the corresponding public key can be used to decrypt it. It can be seen from the above that the public key and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0825H04L9/0861H04L9/0891H04L9/0894H04L63/0442H04L63/068
Inventor 杜立翠
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products