Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods and computer program products for encryption key generation and management

An encryption method and encryption key technology, which is applied in the field of generating and managing encryption keys, can solve problems such as tedious and complicated, data loss, and weak encryption

Active Publication Date: 2018-04-17
BICDROID
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since users have difficulty coming up with and remembering strong random passwords, they tend to choose weaker passwords, and the resulting encryption is often weak
As a result, files encrypted with standalone tools may still be vulnerable to some sophisticated attacks
Also, if the password is forgotten or lost, it may be difficult or impossible to recover the original plaintext file from the encrypted file
This effectively results in permanent data loss
Finally, when files are encrypted using standalone tools, sharing encrypted files between a group of people can be tedious and often requires the use of side channels to exchange passwords
[0010] In large-scale information systems, key management including key generation, key exchange, and secret maintenance of keys becomes more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods and computer program products for encryption key generation and management
  • Methods and computer program products for encryption key generation and management
  • Methods and computer program products for encryption key generation and management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]Various systems or methods are described below to provide examples of implementations of the claimed subject matter. The embodiments described below do not limit any claimed subject matter, and any claimed subject matter may cover methods or systems that differ from those described below. Claimed subject matter is not limited to a system or method having all of the features of any one system or method described below, nor to features common to multiple or all of the apparatus or methods described below. It is possible that a system or method described below is not an implementation set forth in any claimed subject matter. Any subject matter disclosed in the systems or methods described below but not claimed in this document may be the subject of another tool of protection, such as a continuing patent application, and by disclosing any such subject matter in this document, this application , inventors or owners do not intend to renounce, disclaim or dedicate them to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The described embodiments relate to encryption methods and computer program products. An encryption application is used to determine a keystore seed with a seed bit set having seed bits in an orderedsequence. A plurality of key derivation sets are determined and a selected key derivation set is selected randomly. A key bit sequence is generated from the seed bit set using the selected key derivation set. An encryption key is generated using the key bit sequence, and corresponding keying information is determined from the selected key derivation set such that the latter is also derivable fromthe former. The keying information discloses zero information about the encryption key absent knowledge of the keystore seed. Plain text data is encrypted using the encryption key to generate cipher text data, and the keying information is stored with the cipher text data. The encryption key may then be deleted.

Description

[0001] related application [0002] This application claims the priority of the PCT patent application titled "METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING ENCRYPTION ON APLURALITY OF DEVICES" submitted on June 12, 2015 with the application number PCT / CA2015 / 050543 and the application number is 14 / 737,940, priority of U.S. patent application entitled "METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCT FOR PROVIDINGENCRYPTION ON A PLURAL OF DEVICES," filed June 12, 2015. The entire contents of PCT Patent Application No. PCT / CA2015 / 050543 and US Patent Application No. 14 / 737,940 are incorporated herein by reference in their entirety. technical field [0003] Embodiments of the present invention relate generally to data protection and encryption, and more particularly to methods and computer program products for generating and managing encryption keys. Background technique [0004] As people rely more and more on computing and Internet technology, data security is m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16
CPCH04L63/062H04L63/0892G06F21/41G06F21/602H04L9/12H04L9/3231H04L9/14H04L9/16H04L9/32G06F21/32G06F21/6254H04L9/085H04L9/3226H04L9/0869H04L9/0894H04L9/0897H04L63/08
Inventor 杨恩辉
Owner BICDROID