Encryption method and equipment applied to key security

A technology of user equipment and keys, which is applied in the field of encryption technology for key security, can solve problems such as key security at the user equipment end, and achieve the effect of user perception

Inactive Publication Date: 2017-03-15
上海艾讯云计算有限公司
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of this application is to provide an encryption method and device for key security to solve the key security problem at the user equipment end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and equipment applied to key security
  • Encryption method and equipment applied to key security
  • Encryption method and equipment applied to key security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The application will be described in further detail below in conjunction with the accompanying drawings.

[0076] figure 1 It shows a schematic flowchart of an encryption method for key security according to one aspect of the present application; the method includes step S11 and step S12,

[0077] In step S11, based on the unique identification string of the mobile application obtained from the service device, the data key of the mobile application is generated; here, the service device randomly generates the unique character string of the mobile application, and the user equipment end obtains the After the unique identification string is obtained, a hash operation is performed to obtain a unique value with a fixed length, and the unique value with a fixed length is used as a data key of the mobile application. Here, the user equipment end is preferably a mobile terminal.

[0078] In step S12, the data key is statically encrypted according to the encryption algorithm ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing an encryption method and encryption equipment applied to key security. The method comprises the steps of acquiring a unique identification character string of a mobile application from service equipment, and generating a data key of the mobile application; and then statically encrypting the data key according to an encryption algorithm and macro definition, and dynamically encrypting the data key according to a preset hash function and acquired MAC addresses and user passwords of user equipment. According to the method and the equipment provided by the invention, the data key of the mobile application is statically encrypted, which ensures that the data key of the mobile application can be only acquired the application including a macro definition encryption process, and thus application binding of the data key is achieved; the data key of the mobile application is dynamically encrypted, so that user equipment binding of the data key is achieved, even the MAC addresses of the user equipment are tampered to be two pieces of consistent user equipment with the inconsistent user passwords, the data key can still be not cracked and thus business data in the mobile application canoe be acquired, and user perception of the data key can be achieved.

Description

technical field [0001] The present application relates to the computer field, and in particular to an encryption technology for key security. Background technique [0002] The attack model of the mobile terminal key is divided into three types: malware, which applies for all available system permissions, such as sending text messages, making calls, reading contacts, obtaining geographical location and other private information; jailbreak attack, obtaining the highest authority of the device, scanning File system, to obtain system sensitive data; monitor root attacks, monitor user keyboard input, and obtain input content. [0003] At present, there are mainly the following types of key protection methods for mobile terminals: First, ARM TrustZone technology divides embedded devices into two independent operating environments from the design of system bus, processor, etc., and Normal Word is responsible for Android OS ( Android system), Secure word is responsible for handling...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/06
CPCH04L9/14H04L9/0618H04L9/0643
Inventor 赵伟郑丽兰李梦雅
Owner 上海艾讯云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products