Unlock instant, AI-driven research and patent intelligence for your innovation.

Private key processing method, access method, medium and device corresponding to the method

An access method and private key technology, which are applied to encryption devices with shift registers/memory, secure communication devices, and key distribution to achieve the effect of reducing risks

Active Publication Date: 2020-11-13
GUANGZHOU HUADUO NETWORK TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the process of verifying whether the encrypted password provided by the user is correct, there may be cases where a malicious user obtains a successfully verified encrypted password by continuously trying to encrypt the password.
Since each private key digest almost only corresponds to one private key, the private key obtained by successfully verifying the encrypted password is very likely to be the real private key of the user, so there is a risk of malicious users cracking the real private key of the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key processing method, access method, medium and device corresponding to the method
  • Private key processing method, access method, medium and device corresponding to the method
  • Private key processing method, access method, medium and device corresponding to the method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] refer to figure 1 , the embodiment of the present application discloses a private key processing method, which is applied to the client, and the specific steps are:

[0073] S101. Perform a digest operation on the user private key to obtain a private key digest corresponding to the user private key.

[0074] Wherein, the private key digest corresponding to the user private key corresponds to multiple different private keys. The private key summary cor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a private key processing method, an access method, and a medium and device corresponding to the method. By performing a digest operation on the user's private key, the private key digest corresponding to the user's private key is obtained; wherein, the private key corresponding to the user's private key There are multiple different private keys corresponding to the digest; use the user's key to encrypt the user's private key to obtain the user's encrypted private key; combine the user's encrypted private key and the corresponding private key digest of the user's private key to obtain the user's private key Encrypt data. Because the private key digest corresponding to the user's private key obtained in this application actually corresponds to multiple different private keys. Even if a malicious user finds a private key that is consistent with the private key digest corresponding to the user's private key after the digest operation, the private key is not necessarily the real private key of the user, thus reducing the possibility of the malicious user cracking the real private key. Risk to user's private key.

Description

technical field [0001] The present invention relates to the technical field of information encryption, in particular to a private key processing method, an access method, and a medium and a device corresponding to the method. Background technique [0002] In the prior art, the client usually needs to encrypt and save the private key of the user. At present, the method of encrypting the user's private key is: use the encryption password input by the user to generate the user's key (key), and then use the key to encrypt the user's private key and the private key digest corresponding to the user's private key, and obtain the user's The encrypted data of the private key. Wherein, the private key digest corresponding to the user's private key is obtained by performing a digest operation on the user's private key. [0003] If the user wants to retrieve the private key, the user can enter the encryption password to the client, and the client generates a key according to the user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0822H04L9/0643H04L9/3247H04L9/0825
Inventor 林正显李静伦
Owner GUANGZHOU HUADUO NETWORK TECH