Supercharge Your Innovation With Domain-Expert AI Agents!

Key protection method

A key protection and key technology, which is applied to data and information that needs to be encrypted and backed up. Based on the field of key protection, it can solve problems such as key loss and information cannot be recovered, and achieve the effect of improving security and reliability.

Inactive Publication Date: 2016-10-12
Fisherman Information Technology Co Ltd
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem that the key is lost and the information cannot be recovered after the password is memorized or written to the computer or the hardware in the U disk and the hardware is broken, the present invention provides a key protection method with high security and reliability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method
  • Key protection method

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0014] Encryption process:

[0015] Randomly generate a random number as the key to encrypt the plaintext.

[0016] Use this key to encrypt plaintext data to generate ciphertext.

[0017] Use the (3,5) threshold algorithm to split the key into 5 sub-keys.

[0018] Store the 5 sub-keys in 5 USB KEYs, and distribute the 5 USB KEYs to 5 different personnel for safekeeping.

[0019] USB KEY custodians set their own USB KEY passwords respectively.

[0020] Decryption process:

[0021] Choose any three USB KEY managers, enter their own USB KEY including passwords, and take out three sub-keys.

[0022] Using the (3,5) threshold algorithm, the three-molecule key is restored to the original key.

[0023] Use the original key to decrypt the ciphertext data to obtain plaintext data.

[0024] The key is randomly generated in the above encryption process, and a random number generator can be used to generate a data string without any rules as the key.

[0025] Encrypt the plaintext: You can choose...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key protection method, including USB KEY, is characterized in that: 5 USB KEYs are used to store keys, and the secret key of the file to be kept secret is divided into (3, 5) threshold mode to divide the original key, respectively It is stored in 5 USB KEYs, and there are 5 different people to keep them; when restoring, any three people can recover the original key and decrypt the ciphertext. The intentional effect of the present invention is to solve the disadvantages of relying on the human brain to record the key or the hard disk and U disk to record the key, and improve the security and reliability of the key management after data encryption.

Description

Technical field [0001] The present invention relates to the field of computer information security, and is mainly aimed at an improvement of the security and reliability of key storage in key management, and is especially suitable for the situation where data information needs to be encrypted and backed up, specifically a key-based protection method. Background technique [0002] This patent relates to the field of computer information security. The management of keys in the current information security field basically still uses passwords. Passwords and passwords are remembered by people, or the passwords are stored in a computer or U disk. This method has great risks. . Because the password is too long to remember, the computer or U disk hardware is damaged or the password is forgotten, and the original encrypted information will be lost. Summary of the invention [0003] In order to solve the problem that the key is lost after the password is memorized by a person or written ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/085H04L9/0625H04L9/0631H04L9/0877
Inventor 宋志华郭刚房宝龙
Owner Fisherman Information Technology Co Ltd
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More