Root key management method and apparatus based on network friends

A management method and root key technology, applied in the field of root key management method and device based on network friends, can solve problems such as loss, difficult root key protection, easy to forget, etc., and achieve the effect of safe storage

Active Publication Date: 2017-06-20
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This patent is mainly aimed at the current root key protection difficulty, inconvenient use, and easy to forget or lose problems. By using the network friend relationship, the user's password is decomposed into several parts through the Shamir threshold scheme, and then stored in different With friends, once the user forgets the root key, some friends can restore the user's root key through video, voice, etc. to ensure the security of the root key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Root key management method and apparatus based on network friends
  • Root key management method and apparatus based on network friends
  • Root key management method and apparatus based on network friends

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0038] Any feature disclosed in this specification, unless specifically stated, can be replaced by other alternative features that are equivalent or have similar purposes. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0039] This patent proposes a root key management method based on network friends, which realizes the distributed management and recovery of the root key through social network relationships. First, the root key is decomposed into n parts through the Shamir(t,n) threshold scheme, and obtained The root key can be recovered by t shares; then, n parts of the key are sent to n different friends for storage; when the user forgets the key, the new public key and his own video, voice and other information ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of secrete key management and provides a root key management method and apparatus based on network friends aiming at the problems in the prior art. By means of the network friends, a user's password is decomposed into a plurality of parts by means of a Shamir threshold scheme and then is stored at different friends, once the user forgets the root key, the user's root key can be recovered by part of friends by means of video and voice, so that the security of the root key can be guaranteed. When the user forgets his / her root key and the public key and the private key for root key protection are lost, the user generates a pair of public key and private key (pk1,sk1); the public key and the private key (pk1,sk1) are in data interaction with the friends storing the part of the root key data to acquire t part of the root key data (xi,yi), and the root key can be recovered by means of the secrete reconstruction formula of the Shamir threshold scheme.

Description

technical field [0001] The invention relates to the field of key management, in particular to a network friend-based root key management method and device. Background technique [0002] The traditional root key generally has three main protection methods: (1) use special hardware storage, high security, but the cost is also high, and cannot be recovered after loss; (2) storage by email or a third party is inconvenient to use, And the security is extremely poor; (3) it is encrypted and stored by the password, and it is obtained by decrypting the password every time it is used. After the password is forgotten, it cannot be recovered, and the password is generally low in randomness, short in length, and easily cracked by violence. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a root key management method and device based on network friends for the problems existing in the prior art. This patent is mainly aimed at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0869H04L9/0894
Inventor 白健周洁安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products