Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation and management method and server

A key generation and server technology, which is applied in the computer field, can solve problems such as easy leakage of keys, and achieve the effects of improving security, reducing the risk of being leaked, and increasing the difficulty

Pending Publication Date: 2020-02-21
JUHAOKAN TECH CO LTD
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present application provides a key management method, device, smart device and storage medium to solve the technical problem that the key is easily leaked in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation and management method and server
  • Key generation and management method and server
  • Key generation and management method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to solve the technical problem of high risk of key disclosure in the prior art, in the embodiment of the present application, a key pair is generated on the first server, and then the private key in the key pair is segmented, respectively store in different second servers, and notify the user terminal of the corresponding complete public key at the same time; when a service request encrypted by the terminal with the public key arrives, the second server that undertakes the request goes to other second servers to obtain the stored private key. The key fragments are then spliced ​​into a complete private key, and the spliced ​​private key is used to decrypt and verify the terminal request.

[0042] Below in conjunction with accompanying drawing, the optional implementation mode of this application is described in further detail:

[0043] The embodiment of the present application provides a key generation method and a key management method, which are implemented b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers, in particular to a key generation and management method and a server, which are used for solving the technical problem that a key is easy toleak. The secret key generation method comprises the steps that a corresponding secret key pair is generated at set intervals, and the secret key pair comprises a private key and a public key; and dividing the generated private key into a plurality of private key segments, respectively storing the private key segments into a plurality of second servers, and sending the generated public key to thetarget terminal. The key management method comprises the following steps: storing a corresponding private key segment; receiving a service request which is sent by the target terminal and is encryptedby adopting a public key, and determining a terminal identifier of the target terminal; obtaining private key segments corresponding to the target terminal from other second servers, and splicing theprivate key segments to obtain a complete private key; and performing decryption verification based on the private key. According to the key generation and management method and the server, the safety of the user key information is improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a key generation and management method and server. Background technique [0002] With the development of the Internet and computer technology, data security has been paid more and more attention. Especially at present, users purchase products or services through electronic payment, which has become one of the mainstream consumption methods. The security of the payment system is closely related to the interests of users. The requirements for security are also higher. Once the data is leaked, it may cause large-scale user payment security problems. Therefore, how to further improve user data security has been a research hotspot for those skilled in the art. [0003] The password management scheme based on the public key cryptosystem is one of the mainstream technical means currently used to ensure the security of user data. Public key cryptosystem, also known as asymm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0861H04L9/085H04L9/3297
Inventor 苗建基
Owner JUHAOKAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products