Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key protection method and system in open environment

A key protection and key technology, applied in the field of information security, to achieve the effect of network and automation, wide popularity and cost saving

Active Publication Date: 2018-02-13
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, how the virtual key device realizes the secure storage and use of the key of the original security chip is an important factor restricting the development of the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method and system in open environment
  • Key protection method and system in open environment
  • Key protection method and system in open environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0050] The key protection system involves two parts, the client and the key center. The client submits a key application, stores the key factor, and uses the key factor to perform related cryptographic operations; the key center is mainly responsible for key production and Decentralization of keys. In the following, we will introduce how to protect the key in the whole life cycle of the key according to the three parts of key application and distribution, key storage and key use.

[0051] The protection of the key application and distribution process is divided into the following steps, such as figure 1 Shown: (1) The client generates a random number, calculates the factor d and encrypts the random number with the public key of the key center to generate a digital envelope; (2) sends the digital envelope and user ID to the key center, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key protection method and system in an open environment, and relates to the technical field of information security. The system is characterized in that two random factors dand t are mixed into a key; the key is hidden in parameters f and g; a digital envelope technology is used for realizing the network transmission of the variables; the effective protection in five links of key application, key production, key transmission, key storage, key use and the like is realized. The effects that the key does not occur in a source code form in the use process and is only called in a parameter form is achieved; the stealing on the key by hackers can be effectively prevented; the key protection problem in the open environment is effectively solved.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a key protection method and system in an open environment Background technique [0002] In recent years, the rapid development of the mobile Internet has produced new industries such as mobile office and mobile payment. It is a general trend that information services and financial services will develop towards the Internet and mobile. This trend is first reflected in the financial system. Financial institutions Changes and innovations have been carried out through the deployment of mobile banking. According to statistics, in 2016, the average monthly active users of TOP 20 mobile banking in my country reached 124.94 million. It is estimated that the average monthly active users of all banks will be about 150 million. The mobile banking market in 2016 will exceed one trillion. [0003] However, it is worth noting that the key security issues that cyber warfare relied o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0894
Inventor 南相浩李维刚
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products