Unlock instant, AI-driven research and patent intelligence for your innovation.

Private key processing method, access method, medium and device corresponding to method

A technology of processing method and access method, which is applied in the medium field of processing method, device, access method and corresponding method, to achieve the effect of reducing risks

Active Publication Date: 2019-11-22
GUANGZHOU HUADUO NETWORK TECH
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the process of verifying whether the encrypted password provided by the user is correct, there may be cases where a malicious user obtains a successfully verified encrypted password by continuously trying to encrypt the password.
Since each private key digest almost only corresponds to one private key, the private key obtained by successfully verifying the encrypted password is very likely to be the real private key of the user, so there is a risk of malicious users cracking the real private key of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key processing method, access method, medium and device corresponding to method
  • Private key processing method, access method, medium and device corresponding to method
  • Private key processing method, access method, medium and device corresponding to method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] refer to figure 1 , the embodiment of the present application discloses a private key processing method, which is applied to the client, and the specific steps are:

[0073] S101. Perform a digest operation on the user private key to obtain a private key digest corresponding to the user private key.

[0074] Wherein, the private key digest corresponding to the user private key corresponds to multiple different private keys. The private key summary cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key processing method, an access method, a medium and a device corresponding to the method. The method comprises the steps: carrying out the abstract operation of a user private key, and obtaining a private key abstract corresponding to the user private key; wherein the private key abstract corresponding to the user private key corresponds to a plurality of different private keys; encrypting the user private key by using the key of the user to obtain an encrypted private key of the user; and combining the encrypted private key of the user with the private keyabstract corresponding to the private key of the user to obtain encrypted data of the private key of the user. Due to the fact that the private key abstract corresponding to the user private key is obtained in the application, the private key abstract corresponds to a plurality of different private keys. Even if a malicious user finds a private key, the private key is consistent with a private keyabstract corresponding to the user private key after abstract operation, and the private key is not necessarily a real private key of the user, so that the risk that the malicious user cracks the real user private key is reduced.

Description

technical field [0001] The present invention relates to the technical field of information encryption, in particular to a private key processing method, an access method, and a medium and a device corresponding to the method. Background technique [0002] In the prior art, the client usually needs to encrypt and save the private key of the user. At present, the method of encrypting the user's private key is: use the encryption password input by the user to generate the user's key (key), and then use the key to encrypt the user's private key and the private key digest corresponding to the user's private key, and obtain the user's The encrypted data of the private key. Wherein, the private key digest corresponding to the user's private key is obtained by performing a digest operation on the user's private key. [0003] If the user wants to retrieve the private key, the user can enter the encryption password to the client, and the client generates a key according to the user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0822H04L9/0643H04L9/3247H04L9/0825
Inventor 林正显李静伦
Owner GUANGZHOU HUADUO NETWORK TECH