Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation device, encryption device, and key generation and distribution system

A key generation device and key generation technology, applied in the field of information security, can solve the problems of limited information volume and limited use

Active Publication Date: 2019-12-31
蔡利锋
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limitation that the key cannot be reused, the amount of information that OTP can safely transmit cannot be greater than the amount of information contained in the key book, which limits its use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation device, encryption device, and key generation and distribution system
  • Key generation device, encryption device, and key generation and distribution system
  • Key generation device, encryption device, and key generation and distribution system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0104] first, figure 1 is a schematic diagram showing a key generation device and a key distribution system according to an embodiment of the present invention. Such as figure 1 As shown, the key distribution system 1 according to the embodiment of the present invention includes a paired key generation device 100 and a key generation device 200 .

[0105] The key generation device 100 may include:

[0106] A system information module 101 configured to store system information of the key generation device;

[0107] The key generation module 102 is configured to controllably and orderly generate unpredictable information as a key according to the system information, and use the generation sequence number of the unpredictable information as the corresponding key sequence number; and

[0108] The transmission module 103 is configured to send the key sequence number to a paired key generation device, wherein the paired key generation device stores second system information corre...

no. 2 example

[0130] Below, will refer to image 3 The unpredictable information controllable order generation module in the key generation device according to the embodiment of the present invention is described.

[0131] The system information module 101 in the key generation device 100 described in the first embodiment above includes image 3 The unpredictable information shown can control the ordered generation module 300 .

[0132] Such as image 3 As shown, the controllable order generating module 300 includes:

[0133] A control module 301 configured to control the generation of unpredictable information;

[0134] a database module 302 configured to store unpredictable information,

[0135]According to the control of the control module 301 in the first embodiment, the key generation module 102 extracts unpredictable information from the database module 302 in a controllable and orderly manner as a key, and uses the generated serial number as the corresponding key serial number. ...

no. 3 example

[0138] Below, will refer to Figure 4 The unpredictable information controllable order generation module in the key generation device according to the embodiment of the present invention is described.

[0139] The system information module 101 in the key generation device 100 described in the first embodiment above includes Figure 4 Unpredictable information is shown as controllable ordered generation module 400 .

[0140] Such as Figure 4 As shown, the controllable order generating module 400 includes:

[0141] A control module 401 configured to control the generation of unpredictable information;

[0142] A dynamic information module 402 configured to provide input information to be processed;

[0143] The information processing module 403 is configured to convert the input information provided by the dynamic information module into generated information through a predetermined algorithm according to the control of the control module, and extract part of the informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key generation device, an encryption device, a key generation and distribution system, and an information security transmission system. The key generation device comprises: asystem information module configured to store system information of the key generation device; a secret key generation module configured to orderly and controllably generate unpredictable informationas a secret key according to the system information, and a generated serial number of the secret key used as a corresponding secret key serial number; and a transmission module configured to sendthe key sequence number to a paired key generation device, and second system information corresponding to the system information is stored in the paired key generation device.

Description

technical field [0001] The present invention relates to the field of information security, and more specifically, the present invention relates to a key generation device, an encryption device, a key generation and distribution system and an information security delivery system. Background technique [0002] The importance of information security is undeniable. In today's highly developed computer and global interconnected communication technology, the safe transmission and storage of information is very important. Information encryption is an important means to achieve information security. The file is converted into ciphertext through information encryption technology. If the ciphertext can only be deciphered by the authorized party to ensure that it is meaningless to illegal interceptors, the information can be in the form of ciphertext, making full use of the convenience of existing communication technology. safe transfer between. Therefore, an encryption method with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L9/0819H04L63/0428H04L63/062H04L9/08H04L9/40
Inventor 蔡利锋蔡嘉禾王艳
Owner 蔡利锋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products