Method and apparatus for protecting key, and computer readable storage medium

A key and permission technology, applied to secure communication devices and key distribution, can solve problems such as data security reduction

Inactive Publication Date: 2018-05-04
Fisherman Information Technology Co Ltd
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the keys corresponding to different application systems are usually different. In other w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting key, and computer readable storage medium
  • Method and apparatus for protecting key, and computer readable storage medium
  • Method and apparatus for protecting key, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033] The core of the present invention is to provide a key protection method, device and computer-readable storage medium, which are used to prevent errors when using the key or accidental theft of the key.

[0034] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting a key. The method is applied to a device for storing the key, and comprises the following steps: obtaining a request instruction of using the key sent by an application object, wherein the request instruction comprises identity verification information; judging whether the identity verification information is matched with the application object; andif so, opening use permission of the target key corresponding to the request instruction, and otherwise, limiting the use permission of the target key. Therefore, by adoption of the method, the problem of confused use of the key can be effectively prevented, and the security of the key is improved. In addition, the invention also provides an apparatus for protecting the key and a computer readablestorage medium, which also have the above advantageous effects.

Description

technical field [0001] The present invention relates to the technical field of computer information security, in particular to a method, device and computer-readable storage medium for protecting keys. Background technique [0002] With the rapid development of the Internet, more and more attention has been paid to information security. A key is a parameter that is entered in an algorithm that converts plaintext to ciphertext or ciphertext to plaintext. In order to realize the secure transmission of information, usually, it is necessary to perform encryption and decryption through corresponding keys, so as to protect the security of information. [0003] In the prior art, multiple keys are stored in the same hardware device, and this hardware device needs to be used repeatedly in different application systems. Obviously, the keys corresponding to different application systems are usually different. In other words, each application system has its own corresponding key. Enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3231H04L9/088H04L9/0894H04L9/3226
Inventor 宋志华徐波孙鹏
Owner Fisherman Information Technology Co Ltd
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products