A Key Backup and Recovery Method Based on Integrated Encryption Technology

A recovery method and encryption algorithm technology, applied in the field of information security, can solve problems such as imperfect key storage methods

Active Publication Date: 2021-06-22
FUDAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a key backup and recovery method based on integrated encryption technology, which balances security and ease of use. Users can set passwords with different security levels according to their own needs to solve the problem of existing key encryption. The problem of imperfect storage method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Key Backup and Recovery Method Based on Integrated Encryption Technology
  • A Key Backup and Recovery Method Based on Integrated Encryption Technology
  • A Key Backup and Recovery Method Based on Integrated Encryption Technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The implementation is carried out on the premise of the technical solution of the present invention, so that those skilled in the relevant fields can better understand the technical characteristics and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following embodiments.

[0034] In this embodiment, the encrypted key is stored in a third-party escrow agency, and the escrow agency provides services for key storage and recovery. The escrow agency provides functions such as user registration, key backup, key recovery and password change.

[0035] First, the custodian institution provides a registration interface. Users register an account in the custodian institution. The account contains an account number and password. With an account, the custodian institution's key b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, in particular to a key backup and recovery method based on integrated encryption technology. The method of the present invention includes: configuring a security level, configuring different encryption algorithms and the amount of information that the user needs to input for the corresponding security level; obtaining an encryption key according to the user's biometric information and private information, and encrypting the key that the user wants to back up and store encryption algorithm; store the information generated by integrated encryption; when the key needs to be used for decryption or signature, the encrypted key needs to be decrypted and recovered; when the password needs to be changed, all initial keys must be obtained first Plaintext, re-encrypt; re-store the encrypted key, overwrite the old data, and complete the operation of modifying the password. The method of the invention balances security and ease of use, users set passwords with different security levels according to their own needs, and the integrated encryption algorithm solves the problem of imperfect key storage methods in the prior art.

Description

technical field [0001] The invention belongs to the technical field of information security, and particularly relates to a key backup and recovery method. Background technique [0002] Modern cryptography is mainly divided into symmetric cryptography and asymmetric cryptography (also known as public key cryptography). The correctness and security of cryptographic algorithms depend on mathematical problems: large integer decomposition problems, discrete logarithm problems, elliptic curve discrete logarithm problems Puzzles, all of which are based on calculations based on large integers. In the environment of rapid development of computer hardware, in academic research and production environments, the length of a secure cryptographic key must be at least 128 bits, and 256 bits is more commonly used. The more bits, the higher the security strength. Enterprises and general users have to memorize keys of up to 256 bits in daily production and use of secure cryptographic products...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0866H04L9/088H04L9/0894
Inventor 阚海斌张如意刘百祥张新鹏吴小川
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products