Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for discovering public and private key pairs

A public-private key pair and public key technology, which is applied in the field of information security, can solve problems such as difficult retrieval of public-private key pairs

Inactive Publication Date: 2018-03-02
CHINA CHAIN TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above analysis, the present invention proposes a method and device for retrieving the public-private key pair to solve the problem that the existing method for storing the public-private key pair is not easy to retrieve after the public-private key pair is lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for discovering public and private key pairs
  • Method and device for discovering public and private key pairs
  • Method and device for discovering public and private key pairs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] In the description of the present invention, it should be noted that the terms "first" and "second" are used for description purposes only, and should not be understood as indicating or implying relative importance.

[0032] In the description of the present invention, it should be noted that unless otherwise specified and limited, the term "connection" should be understood in a broad sense, for example, it can be a fixed connection, a detachable connection, or an integral connection; It can be a mechan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for discovering public and private key pairs. The method comprises the following steps: a second client sends a discovery request to a first client and stores the path information of a second ciphertext, wherein the second ciphertext is generated by encrypting a second public key pair by using a first public key pair, so that the first client obtains the second ciphertext, and uses a first private key pair to decrypt the second ciphertext to obtain a second private key pair, and feeds back the second private key pair to the second client. The discovery of the second public and private key pairs is achieved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for retrieving a public-private key pair. Background technique [0002] With the development of the information age, the demand for data encryption is getting higher and higher, and the use of public-private key pairs to encrypt data is becoming more and more widely used. Therefore, the storage of public-private key pairs becomes particularly important. [0003] The traditional method of storing the public-private key pair prints the public-private key pair on paper and places it in a safety device such as a safe. In this method, the backup of the public-private key pair is single, and multiple copies cannot be backed up, otherwise it is easy to leak and the storage medium is easily damaged. Once lost, it is not easy to find back. Contents of the invention [0004] In view of the above analysis, the present invention proposes a method and devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0861
Inventor 康昆彬路成业
Owner CHINA CHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products