Supercharge Your Innovation With Domain-Expert AI Agents!

Collaborative key-based processing method and system, computer equipment and storage medium

A processing method and equipment technology, applied in the field of cryptography, can solve the problem of not being able to obtain any information, and achieve the effect of strengthening security

Inactive Publication Date: 2018-09-04
GUANGDONG CERTIFICATE AUTHORITY +1
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this scheme, part of the private key is stored separately on both sides of the communication, and the two parties can jointly sign or decrypt the message, and neither party can obtain any information about the private key of the other party.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative key-based processing method and system, computer equipment and storage medium
  • Collaborative key-based processing method and system, computer equipment and storage medium
  • Collaborative key-based processing method and system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0034] In the specific technical application, the solution of the embodiment of this application involves two devices, which are recorded as device one and device two. Device one has a private key component of device one, and device two has a private key component of device two. In the cooperative signature and When decrypting, device one is based on the private key component of device one, and device two is based on the private key component of device two, and the two cooperate to complete the process of signing and decrypting. In some embodiments, the first device may be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to a collaborative key-based processing method, computer equipment and a computer storage medium. The collaborative key-based processing method of an embodiment includes the following steps: acquiring a user identification code, and generating a client temporary key based on the user identification code; generating a client private key component; and encrypting the client private key component by using the client temporary key to obtain a client private key component ciphertext. According to the scheme of the embodiment, the generated client private key component is encrypted by using the temporary key derived by the user identification code, an effective protection on the client private key component can be formed, the possibility that a storage key is illegally acquired by a third party can be avoided, and the security of the private key component of a distributed private key can be strengthened.

Description

technical field [0001] The present application relates to the technical field of cryptography, and in particular to a collaborative key-based processing method, a collaborative key-based processing system, computer equipment, and computer storage media. Background technique [0002] With the development of the mobile Internet, it is an urgent need to implement digital signatures on mobile terminals. Since the operating system of the mobile terminal is a non-trusted operating environment that can be modified, in order to effectively protect the user's private key used for signing in the mobile terminal, many researchers have proposed a scheme based on distributed key collaborative generation of electronic signatures. In this scheme, part of the private key is stored separately at the two parties in communication, and the two parties can jointly sign or decrypt the message, and neither party in communication can obtain any information about the private key of the other party. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0643H04L9/0822H04L9/085H04L9/0866H04L9/0869H04L9/3247
Inventor 张永强
Owner GUANGDONG CERTIFICATE AUTHORITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More