Check patentability & draft patents in minutes with Patsnap Eureka AI!

Key storage and acquisition method and device

A storage method and key technology, applied in the field of information security, can solve problems such as private key leakage and affecting information security

Active Publication Date: 2020-11-13
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the plaintext format can easily cause the private key to be leaked and affect information security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key storage and acquisition method and device
  • Key storage and acquisition method and device
  • Key storage and acquisition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar modules or modules having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0026] figure 1 It is a schematic flow chart of a key storage method proposed by an embodiment of the present invention, the method includes:

[0027] S11: Obtain a first key, where the first key is a key that needs to be protected.

[0028] After the key to be protected is determined, the plaintext key can be obtained as the first key.

[0029] S12: Generate a second key, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key storage method and device and a key obtaining method and device. The key storage method comprises the steps of obtaining a first key, wherein the first key is the key needing to be protected; generating a second key and encrypting the first key through adoption of the second key, thereby obtaining a first ciphertext; generating a third key and encrypting the second key through adoption of the third key, thereby obtaining a second ciphertext; and independently storing the first ciphertext, the second ciphertext and the third key, thereby obtaining the first key according to the first ciphertext, the second ciphertext and the third key. According to the method, the storage security of the key can be improved and the information security can be ensured.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a key storage and acquisition method and device. Background technique [0002] With the development of computer technology and the popularity of the Internet, people pay more and more attention to information security. To ensure information security, encryption protocols such as Transport Layer Security (TLS) appear. The TLS protocol is based on an asymmetric encryption algorithm to distribute the public key through a certificate authorized by a digital certificate authority (Certificate Authority, CA), and the private key corresponding to the public key is properly kept on the server side. [0003] At present, when the server saves the private key, it is stored in the local file of the server in the form of plain text. However, the plaintext format can easily cause the private key to be leaked and affect information security. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478
Inventor 陈虓将刘彦梅
Owner ALIBABA GRP HLDG LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More