Secure secret key and ciphertext generation, storage and transmission method and device

A key generation and ciphertext technology, which is applied to secure communication devices and key distribution, can solve problems such as theft, loss of security information keys, and inability to guarantee the security of key storage.

Active Publication Date: 2020-07-10
北京丁牛科技有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Based on such a demand background, many researchers use various encryption technologies to encrypt security information to form ciphertexts, and store and transmit them. However, the problem is that a large number of different ciphertexts correspond to a large number of keys. Then these keys need to be recorded and saved. However, the current technology cannot guarantee the security of key storage. Therefore, there is a risk of leakage during the current storage and transmission of keys and ciphertexts.
[0004] At present, the encrypted storage of security information faces the risk of key loss or theft, and once the key is lost, as long as the person who gets the key can decrypt the ciphertext to obtain security information, so the generation and storage of the key and ciphertext are closely related to Delivery faces security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure secret key and ciphertext generation, storage and transmission method and device
  • Secure secret key and ciphertext generation, storage and transmission method and device
  • Secure secret key and ciphertext generation, storage and transmission method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The application will be further described in detail below in conjunction with the drawings and embodiments.

[0023] In the following introduction, the terms "first" and "second" are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance. The following description provides multiple embodiments of the present disclosure, and different embodiments can be replaced or combined. Therefore, this application may also be considered to include all possible combinations of the same and / or different embodiments described. Therefore, if one embodiment includes features A, B, C, and another embodiment includes features B, D, then this application should also be considered as including all other possible combinations of one or more of A, B, C, and D Although the embodiment may not be clearly written in the following content.

[0024] In order to make the objectives, technical solutions, and advantages of the present invention clearer, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure and secret key and ciphertext generation, storage and transmission method. The method comprises the following steps: pre-establishing and training a joint model; when the trained joint model detects a given specific target, generating a text sentence corresponding to the given specific target through a feature extraction module and a multi-path key generation modulein the joint model; encrypting the security information by using a secret key generated by all or part of the text sentence to generate a ciphertext; packaging the ciphertext and the joint model in apreset application program; and carrying out concealed storage and transmission operation on the ciphertext and the joint model which are packaged together. According to the method, the secret key used for encrypting and decrypting the security information is dynamically generated, and the risk of secret key storage does not exist. The dynamic key is triggered to be generated only when a specifictarget appears, so that the generation, the storage and the transmission of the ciphertext have safety and confidentiality, and the ciphertext can only be decrypted and used by a target user. The invention further provides a generation, storage and transmission device for the secret key and the ciphertext which are safe and secret.

Description

Technical field [0001] The present disclosure relates to the technical field of cyberspace security, and in particular to a method and device for generating, storing, and transmitting secure and secret keys and ciphertexts. Background technique [0002] At present, military-industrial units generally use computer networks for product design and production and management, and incidents of leakage of secrets caused by computers are increasing. In order to ensure the security of state secrets, the state has implemented a confidentiality qualification review and certification system for units engaged in military research and production, and has imposed strict confidentiality requirements on military industry or other secret-related units. On the other hand, many scientific research institutions have very precious scientific research materials or achievement data. Researchers hope to have the full right to interpret these contents before they are publicly released, and do not want to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06G06N3/04
CPCH04L9/0819H04L9/0861H04L9/0894H04L63/0428H04L63/06G06N3/044G06N3/045
Inventor 冀甜甜王忠儒崔翔韩宇甘蕊灵刁嘉文冯林
Owner 北京丁牛科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products