Key backup and recovery method based on integrated encryption technology

A recovery method and encryption algorithm technology, applied in the field of information security, can solve problems such as imperfect key storage methods

Active Publication Date: 2020-05-08
FUDAN UNIV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a key backup and recovery method based on integrated encryption technology, which balances security and ease of use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key backup and recovery method based on integrated encryption technology
  • Key backup and recovery method based on integrated encryption technology
  • Key backup and recovery method based on integrated encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The implementation is carried out on the premise of the technical solution of the present invention, so that those skilled in the relevant fields can better understand the technical and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following embodiments.

[0034] In this embodiment, the encrypted key is stored in a third-party custodian, and the custodian provides key storage and recovery services. The custodian provides functions such as user registration, key backup, key recovery, and password change.

[0035] First of all, the custodian provides a registration interface. The user registers an account with the custodian. The account contains an account number and a password. With an account, you can use the custodian’s key backup and key recovery functions. The custod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and particularly relates to a key backup and recovery method based on an integrated encryption technology. The method comprises the following steps: configuring a security level, and configuring different encryption algorithms and the number of information required to be input by a user according to the corresponding security level; obtaining an encryption key according to the biological characteristic information and the private information of the user, and encrypting the key to be backed up and stored by the user through an encryption algorithm; storing the information generated by the integrated encryption; decrypting and recovering the key stored in an encrypted mode when the key needs to be used for decryption or signature; obtaining all initial key plaintexts and re-encrypting when the password needs to be modified; and re-storing the encrypted key to cover the old data and finish the password modification operation. Safety and usability are weighed by the method, a user sets passwords of different safety levels according to needs, and the problem that an existing key storage method is incomplete is solvedthrough an integrated encryption algorithm.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a key backup and recovery method. Background technique [0002] Modern cryptography is mainly divided into symmetric cryptography and asymmetric cryptography (also known as public key cryptography). The correctness and security of cryptographic algorithms depend on mathematical problems: large integer decomposition problems, discrete logarithm problems, elliptic curve discrete logarithms Problems, these problems are based on large integers for calculation. In the environment of rapid development of computer hardware, academic research and production environments, the length of a secure cryptographic key must be at least 128 bits, and 256 bits is more commonly used. The more bits, the higher the security strength. Enterprises and general users have to memorize a 256-bit key when they produce and use secure password products on a daily basis. For example, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0866H04L9/088H04L9/0894
Inventor 阚海斌张如意刘百祥张新鹏吴小川
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products