Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A private key protection method, system and device based on key update

A key update and private key technology, applied in the field of private key protection based on key update, can solve the problems of inconvenient use, high risk of digital certificate private key theft, and inconvenient use of hardware costs.

Active Publication Date: 2020-10-30
吕文华
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the process of research, the inventor found that the above three methods have their own disadvantages: the soft certificate is easy to use but the risk level of the digital certificate private key being stolen is relatively high, especially for untrusted running and storage environments such as mobile phones, attackers The private key of the user's digital certificate can be stolen by means of memory tracking and unauthorized access to local files; hard certificates are protected by hardware packaging technology and have high security, but there are problems such as inconvenient use and poor compatibility; The private key of the certificate is hosted on the cloud, and the private key is isolated and protected by the cloud, but it is difficult to ensure that the digital signature is operated by the user himself, and there is a business risk that the cloud can forge the digital signature
[0008] However, although hard certificates can ensure the safe generation and use of signature private keys, their hardware cost and inconvenience have been criticized, especially in today's rapid development of the mobile Internet, end users need to be easy to use and universally applicable Security software that can satisfy security without losing convenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A private key protection method, system and device based on key update
  • A private key protection method, system and device based on key update
  • A private key protection method, system and device based on key update

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] refer to figure 1 , figure 1 A flow chart of an embodiment of a private key protection method based on key update provided by the present invention is shown. Wherein, the first communication terminal stores the first part of the private key, the second communication terminal stores the second part of the private key, and the first part of the private key and the second part of the private key are cooperatively operated to generate an electronic signature. This embodiment is the first communication terminal side, The method includes: step S110 to step S120.

[0114] In step S110, the first communication terminal sends the generated update parameters with inverse elements to the second communication terminal.

[0115] In step S120, after the first communication terminal receives the prompt message that the update of the second part of the private key is successfully updated through the update parameter or its inverse element fed back by the second communication terminal...

Embodiment 2

[0126] refer to figure 2 , figure 2 A flow chart of an embodiment of a private key protection method based on key update provided by the present invention is shown. Wherein, the first communication terminal stores the first part of the private key, the second communication terminal stores the second part of the private key, and the first part of the private key and the second part of the private key are cooperatively operated to generate an electronic signature. This embodiment is the second communication terminal side, The method includes step S210.

[0127] In step S210, the second communication terminal receives the update parameter with the inverse element generated by the first communication terminal sent by the first communication terminal, updates the second part of the private key through the update parameter or its inverse element, and updates the successfully updated The prompt information is sent to the first communication terminal, so that after receiving the p...

Embodiment 3

[0198] refer to Figure 4 , Figure 4 It shows a private key protection system 300 based on key update provided by the present invention, wherein, the first communication terminal stores the first part of the private key, the second communication terminal stores the second part of the private key, and the first part of the private key and the second Electronic signatures are generated after part of the private key collaborative operation, including:

[0199] The first communication terminal 31 is used to send the update parameter with the inverse element generated by it to the second communication terminal; after receiving the update parameter or its inverse element fed back by the second communication terminal to update the second part of the private key After the prompt message of successful update, the first part of the private key is updated with the inverse element corresponding to the update parameter used by the second communication terminal or its inverse element.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a private key protection method, system and device based on key updating. The first part of private keys are stored at a first communication end, the second part of private keys are stored at a second communication end, and electronic signatures are generated after cooperative operation of the first part of private keys and the second part of private keys. The method comprises the following steps: sending generated updating parameters with inverse elements to the second communication end by the first communication end; after the first communication end receives successfully updated prompt messages fed back at the second communication end through the updating parameters or the second part of private keys updated by the inverse elements, updating the first part of private keys through the updating parameters used at the second communication end or the inverse elements corresponding to the updating parameters. Through the key system design that the private keys are stored at the two communication ends respectively, the technological means of dynamic key updating is combined, the attacks, such as bucket effect and exhaustive trial and error, of Hackers for single-point attack of the client are avoided, the business risk that digital signatures are counterfeited by a server is avoided, and the using convenience is promoted.

Description

technical field [0001] The present invention relates to the technical field of mobile security, in particular to a private key protection method, system and device based on key update. Background technique [0002] A digital certificate refers to an electronic signature authentication certificate that complies with the "Electronic Signature Law of the People's Republic of China" and can verify that the signer and the electronic signature data have a reliable relationship in online electronic activities such as online finance, e-government or e-commerce. Digital certificates are based on asymmetric cryptography, including public keys and private keys. The public key is called the public key, and the private key is called the private key. [0003] In the prior art, the digital certificate private key storage methods mainly include the following three methods: [0004] One is a soft certificate, also known as a file certificate, and the private key of the user's digital certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/085H04L9/0869H04L9/0891H04L9/3066H04L9/3249
Inventor 宛海加吕文华董宁周大勇刘学波
Owner 吕文华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products