User key generation method and device, equipment and storage medium

A key generation and user key technology, applied in the field of computer communication and information security, can solve problems such as hidden dangers of user information security, cumbersome process of requesting verification of user identity, etc., and achieve the effect of improving reliability and security

Pending Publication Date: 2020-04-03
SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Under the PKI system, users need to register the corresponding certificates with the CA in advance before communicating, and the CA stores the certificates in the certificate store, which makes the process of requesting to verify the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User key generation method and device, equipment and storage medium
  • User key generation method and device, equipment and storage medium
  • User key generation method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 It is a schematic flowchart of a method for generating a user key provided in Embodiment 1 of the present invention. This embodiment is applicable to the case of generating a key, and the method can be executed by a user key generating device configured in a key parser . Such as figure 1 As shown, the method specifically includes the following steps:

[0043] Step 110: In response to the user's first key generation instruction, determine the user's first key according to the user registration information in the first key generation instruction and the server's first key.

[0044] Wherein, the user registers the user on the application side, and saves the user registration information in the server, wherein the user registration information may include a user account number and a user password. The key resolver responds to the first key generation instruction issued by the user on the application side, obtains the user registration information and the server'...

Embodiment 2

[0058] figure 2 It is a schematic flowchart of a method for generating a user key provided in Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the above-mentioned embodiment. This method can be generated by the user key configured in the key resolver. device to execute. Such as figure 2 As shown, the method specifically includes the following steps:

[0059] Step 210: Determine the second key of the server according to the system parameters of the server, and store the second key of the server.

[0060] Wherein, the key resolver obtains system parameters stored in the server, and the key resolver can be divided into a trusted execution module and a trusted storage module. The trusted execution module is a module that obtains user registration information and server system parameters to calculate the key. The trusted storage module is a trusted execution environment that is used to store the second key of the server and ensure the...

Embodiment 3

[0072] image 3 It is a structural block diagram of a user key generation device provided by an embodiment of the present invention, configured in a key parser, capable of executing a user key generation method provided by any embodiment of the present invention, and having corresponding functions for executing the method Functional modules and beneficial effects. Such as image 3 As shown, the device specifically includes:

[0073] The user's first key determination module 301 is configured to determine the user's first key according to the user's registration information in the first key generation command and the server's first key in response to the user's first key generation instruction;

[0074] The user registration information review module 302 is configured to send the user registration information in the second key generation instruction to the server for review in response to the user's second key generation instruction;

[0075] The user's second key determinat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user key generation method and device, equipment and a storage medium. The method is executed by a key parser, and comprises the following steps: in response to a first key generation instruction of a user, determining the first key of the user according to user registration information in the first key generation instruction and a first key of a server;in response to the second key generation instruction of the user, sending user registration information in the second key generation instruction to the server for auditing; and receiving an auditingresult of the user registration information fed back by the server, and if the auditing is passed, determining the second key of the user according to the second key of the server and the first key ofthe user. According to the embodiment of the invention, a key parser is adopted to determine the user key, and the server is used for auditing the user registration information, so that information leakage caused by overlarge authority of the key parser is avoided.

Description

technical field [0001] Embodiments of the present invention relate to computer communication and information security technologies, and in particular to a method, device, device and storage medium for generating a user key. Background technique [0002] With the development of information technology, information security has attracted more and more attention. When people exchange information, in order to avoid information leakage, they need to use their own private key to keep the information confidential. [0003] The technology widely used to ensure the security and integrity of information is called "PKI" (PublicKey Infrastructure, public key infrastructure), which needs to be bound by a trusted authority CA (CertificateAuthority, digital certificate authority) User public key and user identity information. It is also possible to use the identity-based cryptographic system to deduce the user's public key from the user's identity information, and then generate the user's...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 王琦柳枫李汝佳毛玉莲
Owner SOUTH UNIVERSITY OF SCIENCE AND TECHNOLOGY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products