Supercharge Your Innovation With Domain-Expert AI Agents!

Cloud key generation and application method

A key generation and key technology, applied in key distribution, can solve the problems of difficulty in ensuring the security of private keys and high cost, and achieve the effect of convenient acquisition and high security

Inactive Publication Date: 2018-09-14
湖南东方中育数据科技有限公司 +1
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional way is to store the public key and private key pair in the storage center located in the shielded computer room, which requires a lot of cost to build hardware facilities; at the same time, if the storage method based on hardware facilities sends the private key to the user, it will be very difficult. It is difficult to guarantee the security of the private key. Therefore, in order to ensure the security of the key, users are usually not provided with the private key corresponding to their electronic identity certificate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud key generation and application method
  • Cloud key generation and application method
  • Cloud key generation and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Considering that in the existing key storage method, it is necessary to invest in hardware facilities such as the storage center and key management center for storing keys, and also need to invest a lot of cost to build a shielded computer room, so that users cannot safely obtain the user's private key. Problem, the embodiment of the present invention provides a cloud key gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cloud key generation and application method. The method comprises the steps of receiving a public key of a first key pair and a key generation request sent by a user; generating a second key pair and a random number; encrypting the second key pair through the random number, thereby obtaining a first ciphertext of the second key pair; encrypting the random number through the public key of the first key pair, thereby obtaining a second ciphertext of the random number; and storing the first ciphertext and the second ciphertext. According to the method, a key is generatedthrough a cloud server, and the generated key is protected layer by layer through adoption of the random number and the key pair, so a user can obtain a private key of the key conveniently, and moreover, the security is relatively high.

Description

technical field [0001] The invention relates to the technical field of cloud key generation, in particular to a method for generating and using a cloud key. Background technique [0002] As the user's electronic identity, the certificate contains the public key of the certificate, and the corresponding private key is stored in the certificate issuing authority. The traditional way is to store the public key and private key pair in the storage center located in the shielded computer room, which requires a lot of cost to build hardware facilities; at the same time, if the storage method based on hardware facilities is issued to users with private keys, it will be very difficult. It is difficult to guarantee the security of the private key. Therefore, in order to ensure the security of the key, the private key corresponding to the electronic identity certificate is usually not provided to the user. Contents of the invention [0003] In view of this, the purpose of the presen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0863H04L9/0869H04L9/3247H04L63/0428H04L63/0435
Inventor 蔡燕何鸥翔王刚邵飞徐雪松颜星
Owner 湖南东方中育数据科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More