Unlock instant, AI-driven research and patent intelligence for your innovation.

Key encryption storage method, acquisition method and device thereof

A key encryption and key technology, applied in the field of information security, can solve problems affecting ciphertext security, private key leakage, etc., to achieve the effect of improving security and increasing the difficulty of cracking

Active Publication Date: 2022-03-15
BYD CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at this stage, in related technologies, the key is usually directly stored in the electronic device. If the electronic device storing the key is hacked, the private key will be leaked, which will affect the security of the ciphertext.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key encryption storage method, acquisition method and device thereof
  • Key encryption storage method, acquisition method and device thereof
  • Key encryption storage method, acquisition method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0034] The key encryption storage method, acquisition method and device thereof in the embodiments of the present application are described below with reference to the accompanying drawings.

[0035] figure 1 is a schematic flowchart of a key encryption storage method according to an embodiment of the present application.

[0036] Such as figure 1 As shown, the key encryption storage method includes the following steps:

[0037] Step 101, when it is detected that the key to be protected is stored in the target device, the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application proposes a key encryption storage method, acquisition method and device thereof, wherein the method includes: when detecting that the key to be protected is to be stored on the target device, combining the device information and administrator information of the target device, and The user identification associated with the key to be protected is encrypted to obtain the target encryption key of the key to be protected, and the target encryption key is stored in the target device. Therefore, combining the device information and administrator information of the target device, as well as the user ID associated with the key to be protected, the key to be protected is encrypted and stored, which ensures the confidentiality of the key on the target device and improves the security of the target device. The security of the key further ensures the security of the ciphertext throughout the encryption cycle.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a key encryption storage method, an acquisition method and a device thereof. Background technique [0002] With the continuous development of big data and artificial intelligence, information security is becoming more and more important. In the existing technology, information security can be guaranteed through information transmission encryption technology, and the development trend of information transmission encryption technology is asymmetric encryption. Asymmetric encryption technology is also called public key encryption technology. Its key is composed of a public key and a private key pair. The public key is used for encryption and the private key is used for decryption. The private key does not participate in the transmission. It is based on the elliptic curve of the prime field interval The discrete logarithm on . [0003] However, at the curr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0825H04L9/0861
Inventor 刘现款刘晓燕
Owner BYD CO LTD