Check patentability & draft patents in minutes with Patsnap Eureka AI!

Key protection method and device

A key protection and public key technology, applied in the field of communication, can solve problems such as conflicts, user name + public key + time stamp inconsistency, and achieve the effect of improving security

Active Publication Date: 2020-06-30
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the adjacent node of the user terminal is a malicious node or the user terminal is replaced by a malicious node, the malicious node will modify the user name + public key + time stamp of the user terminal, and will modify the user name + public key + When the time stamp is released to the network, the user name + public key + time stamp of the user terminal recorded by all nodes in the network may be inconsistent, resulting in conflicts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method and device
  • Key protection method and device
  • Key protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Before introducing the embodiment of the present invention, first introduce the difference between data encryption and identity authentication. Data encryption is to encrypt data, so that even if illegal users obtain the encrypted data, they cannot obtain the correct data content. Therefore, data encryption can protect data and prevent monitoring attacks. The key point is data security. Identity authentication is used to judge the authenticity of an identity. After the identity is confirmed, the system can grant different permissions according to different identities. The focus is on the authenticity of the user. The focus of the two is different.

[0021] Next, introduce the concept and function of public key and private key. Encryption and decryption in modern cryptographic systems use different keys (public keys), that is, asymmetric key cryptosystems. Each communication party needs two keys, namely, a public key and a private key. Keys can encrypt and decrypt eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secret key protection method and device. The method comprises the steps: carrying out the Hash calculation of the node-to-node corresponding user name, public key, time stamp and random number in a peer-to-peer network, and obtaining a Hash value; at least transmitting the user name, the public key, the time stamp and the Hash value to other nodes in the peer-to-peer network when the Hash value is less than a threshold value. According to the embodiment of the invention, the method achieves the Hash calculation of the node-to-node corresponding user name, public key, time stamp and random number in the peer-to-peer network, and obtains the Hash value. At least transmitting the user name, the public key, the time stamp and the Hash value are transmitted to other nodes in the peer-to-peer network when the Hash value is less than the threshold value, so as to enable other nodes to receive the user name and public key of the node. Can a malicious node recalculate another Hash value less than the threshold value only through its own public key, or else any change can cause the Hash calculation failure, and can be found by other nodes in the P2P network, thereby improving the safety of secret key protection.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a key protection method and device. Background technique [0002] The public key (Public Key) and the private key (Private Key) are a key pair obtained through an algorithm (that is, a public key and a private key). The public key is the public part of the key pair, and the private key is the non-public key. public part. Public keys are often used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with the corresponding private key. The key pair obtained by this algorithm can be guaranteed to be unique in the world. When using this key pair, if a piece of data is encrypted with one key, it must be decrypted with the other key. For example, if you encrypt data with the public key, you must use the private key to decrypt it. If you use the private key to encrypt data, you must also use the public key to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/30H04L12/26H04L29/08
CPCH04L9/0643H04L9/08H04L9/0819H04L9/30H04L43/16H04L67/104
Inventor 田新雪马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More