Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption key acquisition method and system

A technology of encryption key and acquisition method, which is applied in the field of encryption key acquisition method and system, can solve problems such as leakage of signature private key, and achieve the effect of protecting signature private key

Active Publication Date: 2017-05-10
TENDYRON CORP
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the above-mentioned existing specification "GM-T 0016-2012 Smart Cryptographic Key Password Application Interface Specification", there are currently the following risks: the signature public key is generated by the local terminal and uploaded to the server, and the encrypted private key is generated by the server and sent to the local However, during the download process, the server in the existing specification encrypts the encryption private key with the signature public key and sends it to the local terminal. Since the signature public key can be obtained by a third party, this leads to the third party being able to simulate the server using the signature The public key encrypts the data, sends a large number of ciphertexts encrypted by the signature public key to the terminal, and monitors the decryption results of the terminal to obtain the terminal's signature private key, resulting in the leakage of the signature private key in the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption key acquisition method and system
  • Encryption key acquisition method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides an encryption key acquisition method.

[0028] figure 1 A flowchart of an encryption key acquisition method provided in this embodiment, such as figure 1 As shown, the encryption key acquisition method in this embodiment mainly includes the following steps S101 to S108.

[0029] S101. The terminal generates and saves a public signature key and a private signature key of the terminal based on a first security algorithm, and generates a temporary public key and a temporary private key based on a second security algorithm.

[0030] Among them, in this embodiment, the terminal is a terminal device capable of asymmetric encryption and decryption, for example, it can be a terminal device such as USBKEY, smart card, mobile phone, wearable device, etc. The first security algorithm and the second security algorithm are both in the terminal The stored preset asymmetric algorithm is used to generate a public-private key pair. The signature public key and...

Embodiment 2

[0063] This embodiment provides an encryption key acquisition system, which can be used to implement the encryption key acquisition method described in Embodiment 1.

[0064] figure 2 A schematic diagram of the architecture of an encryption key acquisition system provided in this embodiment, as shown in figure 2 As shown, the system mainly includes a terminal 201 and a server 202 .

[0065] In this embodiment, the terminal 201 is configured to generate and store the signature public key and the signature private key based on the first security algorithm, generate and store the temporary public key and the temporary private key based on the second security algorithm, and send the first data packet to To the server 202, wherein, the first data packet includes at least: a signature public key and a temporary public key; the server 202 is used to receive the first data packet, obtain the signature public key and the temporary public key, and store the signature public key; base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption key acquisition method and system. The method comprises the steps that: a terminal generates and stores a signature public key and a signature private key of the terminal, stores temporary public key and a temporary private key, and at least sends the signature public key and the temporary public key to a server; the server acquires the signature pubic key and the temporary public key, and stores the signature public key; the server generates and stores an encryption public key, an encryption private key, a data encryption code and a data decryption code of the terminal; the encryption private key is subjected to an encryption operation by utilizing the data encryption code to generate first encrypted information; the data decryption code is subjected to the encryption operation by utilizing the temporary public key to generate second encrypted information; at least the first encrypted information and the second encrypted information are sent to the terminal; the terminal acquires the first encrypted information, carries out a decryption operation on the second encrypted information by utilizing the temporary private key to acquire the data decryption code, and carries out the decryption operation on the first encrypted information by utilizing the data decryption code to acquire the encryption private key; and the terminal stores the encryption private key.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an encryption key acquisition method and system. Background technique [0002] On November 22, 2012, the General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China promulgated the "GM-T0016-2012 Smart Password Key Password Application Interface Specification", which stipulates the smart password key password application interface based on the PKI password system, and describes the password The definition of functions, data types and parameters of the application interface and the security requirements of the equipment are applicable to the development, use and testing of smart password key products. [0003] However, in the above-mentioned existing specification "GM-T 0016-2012 Smart Cryptographic Key Password Application Interface Specification", there are currently the following risks: the signature public key is generated by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/30H04L9/3247
Inventor 李东声
Owner TENDYRON CORP