Unlock instant, AI-driven research and patent intelligence for your innovation.

A hardware-based method and system for safely recovering encrypted data

An encrypted data and security technology, applied in the field of encrypted data recovery, can solve problems such as inability to decrypt data, and achieve the effect of ensuring security and avoiding obtaining file keys

Active Publication Date: 2022-03-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there are also some problems, such as when the user's hardware security device is lost, damaged or invalid, the user will face the dilemma of being unable to decrypt the encrypted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A hardware-based method and system for safely recovering encrypted data
  • A hardware-based method and system for safely recovering encrypted data
  • A hardware-based method and system for safely recovering encrypted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions of the present invention will be described in further detail below through specific implementation methods.

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. On the contrary, the invention covers any alternatives, modifications, equivalent methods and schemes within the spirit and scope of the invention as defined by the claims. Further, in order to make the public have a better understanding of the present invention, some specific details are described in detail in the following detailed description of the present invention. The present invention can be fully understood by those skilled in the art without the descr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for safely recovering encrypted data based on hardware. The user establishes a security identity group through CKMS, uses the shared key of the security identity group to encrypt the file key of the user equipment, and saves it to the application server; When it is necessary to use a new device to restore encrypted data, the user initiates an application to the administrator, and the administrator decrypts the file key through the group shared key and uses the key provided by the new device for second encryption and saves the encrypted file key to the application The server: the new device obtains and decrypts the encrypted file key to restore the file, and at the same time removes the information of the original device in the group, and encrypts the file key with a new group shared key and backs it up to the application server. The invention avoids the problem of undecryption caused by loss or failure of hardware equipment, and at the same time prevents illegal equipment from obtaining keys and decrypting protected data, and has high security.

Description

technical field [0001] The invention relates to the technical field of encrypted data restoration, in particular to a method and system for safely restoring encrypted data based on hardware. Background technique [0002] Hardware encryption generally implements cryptographic operations through dedicated encryption chips or independent modules, and has high reliability, security, and processing efficiency, so it is widely used in sensitive data protection scenarios. Portable hardware security devices are popular among those who need data protection because of their small size, portability and good adaptability. But there are also some problems. For example, when the user's hardware security device is lost, damaged or invalid, the user will face the dilemma of being unable to decrypt the encrypted data. [0003] In order to solve the above problems, the key of the hardware security device can be encrypted and handed over to a reliable third party for safekeeping. When the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0894H04L9/0891H04L9/0822H04L9/0847
Inventor 杜小军张水旺吴京胡婷婷宝银灯廖正赟
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH