Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for generating white box key

A key and white box technology, applied in encryption devices with shift registers/memory, secure communication devices, usage of multiple keys/algorithms, etc., can solve problems such as key insecurity, and achieve simplified encryption process, Ease of update and improved security

Inactive Publication Date: 2018-04-20
BEIJING BANGCLE TECH CO LTD
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides a method and device for generating a white-box key to solve the problem of key insecurity in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for generating white box key
  • Method and apparatus for generating white box key
  • Method and apparatus for generating white box key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0025] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0026] Referring to Fig. 1 (a), it is a schematic flow chart of the generation method of the white box key provided by the present application, the generation method mainly include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of terminal security protection, and in particular, to a method and apparatus for generating a white box key for solving the problem of insecure keys in the prior art. The method mainly comprises the following steps: determining a second code block matched with a second parameter combination according to the determined second parameter combination; andrunning the second code block to obtain a white box key, wherein the second parameter combination at least comprises an encryption algorithm identifier, an original key and a target function. Therefore, the key can be conveniently updated, moreover, when the key is updated, a white box library file does not need to be updated, therefore the dynamic white box encryption process can be simplified, and the security of the key can be improved. In addition, the security of the user to decrypt a ciphertext and encrypt the plaintext is improved.

Description

technical field [0001] The present application relates to the technical field of terminal security protection, and in particular to a method and device for generating a white-box key. Background technique [0002] With the development of terminal technology, more and more application programs are installed in the terminal. In the process of using these applications, users will generate some data that they do not want to be stolen by attackers, or users do not want the execution logic of the application itself to be reversely cracked by attackers. In order to protect the security of the application program and the data generated during its running, it is often necessary to encrypt these data. [0003] The traditional encryption technology is black-box encryption technology. Black-box encryption technology generally refers to the technology of encrypting plaintext data with an encryption algorithm in a black-box environment to obtain ciphertext data and keys. Among them, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/16
CPCH04L9/0631H04L9/16H04L2209/16
Inventor 阚志刚陈彪王全洲卢佐华方宁
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products