Online security key protection method and system

A security key and security technology, applied in the field of information security, can solve the problems of encryption and decryption operation speed and network transmission speed performance bottleneck, local cache and encryption and decryption operation process leakage, complex process and other problems

Inactive Publication Date: 2017-07-25
周念东
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) Since the key is stored in the receiver's database, it needs to be requested in advance when using the key. The process is too complicated, and the speed of encryption and decryption operations and network transmission speed will become performance bottlenecks;
[0006] 2) The sender's key is stored centrally in the receiver's database. Once the private key and key ciphertext in the receiver's database are leaked at the same time, the consequences will be disastrous;
[0007] 3) It only transfers the risk of t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online security key protection method and system
  • Online security key protection method and system
  • Online security key protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0039] In order to make the purpose, technical solution and advantages of the present invention more clear, the working principle of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, as shown in the appended figure 1 to attach Figure 4 mentioned.

[0040] Such as figure 1 As shown, the terminal devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a method and system for online security key protection. The method includes: running the core security process when the terminal is started, initializing or binding the secure random storage area and the secure file storage area; starting and running the encryption and decryption algorithm module, according to The security policy configuration provides the encryption and decryption algorithm interface for the security agent process; maintains a key life cycle parameter in the security file storage area, and automatically interacts with the security server when the life cycle expires to update the key script file; references terminal feature parameter analysis Run the key script file to dynamically generate a protection key, use the protection key to encrypt the working key, and store the ciphertext of the working key in a secure file storage area. The invention realizes a low-cost, high-security security key protection scheme that fully utilizes software technology without modifying the hardware scheme, and is applicable to information security fields such as mobile payment and data security storage.

Description

technical field [0001] The invention relates to a key protection method in the field of information security, in particular to a method and system for realizing security key protection in an online manner. Background technique [0002] With the development of information technology, in order to protect sensitive data, more and more encryption technology is used, that is, a set of keys is used to perform an encryption operation on the data to be protected, and the obtained ciphertext is stored and transmitted. The original plaintext data, when the data needs to be used, use the corresponding key to perform an inverse operation of decryption to obtain the plaintext. If you don't know the key, you can't know the plaintext information of the ciphertext, which also serves the purpose of protecting data. In order to obtain a higher level of security protection, we need to keep the encryption key secret to prevent the key from being obtained illegally and revealing the data to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/083
Inventor 周念东
Owner 周念东
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products