Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A kind of key protection management method based on android system

A key protection and management method technology, which is applied in the field of key protection management based on the Android system, can solve problems such as complicated encryption process, and achieve the effect of data security protection, safe and convenient key protection and management method, and security protection

Active Publication Date: 2022-07-15
ZHEJIANG UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to improve the deficiency of key management and protection in the encryption system of the existing Android system, the present invention proposes a key management and protection method based on the Android system, which can effectively guarantee the security of the key, and from the Management started to solve the cumbersome encryption process and better adapt to the encryption requirements of the Android system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of key protection management method based on android system
  • A kind of key protection management method based on android system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below with reference to the accompanying drawings.

[0024] refer to figure 1 and figure 2 , a key protection management method based on Android system, the key protection management method comprises a key encryption process and a key decryption process,

[0025] refer to figure 1 , the key encryption process includes the following steps:

[0026] 1.1: Randomly generate an AES key as the key to encrypt and decrypt data.

[0027] 1.2: The user sets a password. First, enter the password into the key generator packaged in SM4. The system will generate a salt 1 (salt) according to the length of the password and return the salt 1 (salt), and then combine the password and salt 1 (salt). ) is combined into SM4 key 1, uses the encryption algorithm of SM4 to encrypt the AES key in 1.1, obtains the encrypted sequence, and stores the encrypted AES key and salt 1 (salt) of SM4 key 1 into the database;

[0028] Step 1.3: The pass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key protection management method based on the Android system, encrypts the private data in the Android system with the AES algorithm, obtains the AES key, sets a password, and uses a random number generator to generate a salt 1 (salt), and combines the password and the salt 1. (salt) is combined into SM4 key 1 and used to encrypt the AES key, the password is the hash value obtained by MD5 hash operation, and the AES key ciphertext, password MD5 hash value and salt 1 (salt) are stored in the database, At the same time, the password can be encrypted by SM4 using the answer to the security question and the randomly generated salt 2 (salt), so that the password can be reset after the password is lost. The key decryption process is the opposite of the encryption process. The invention utilizes multiple encryption strategies to effectively protect the security of the encryption key, prevents attackers from obtaining the key through the database, and protects the data security of the Android system.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a key protection management method based on an Android system. Background technique [0002] Android system is today's mainstream mobile operating system and occupies most of the market share of smartphone operating systems. Open source is an important feature of the Android system, which not only promotes the development of the Android system, but also may lead to the leakage of mobile phone privacy data. The data in the Android system is stored on the disk in plaintext. Once stolen, the attacker can know all the stored data. The encryption of private data can well avoid the risk of private data plaintext being stolen. [0003] At present, the mainstream encryption algorithm is the AES algorithm. The AES algorithm has high security, consumes less resources, and supports the key length of variable block length. The key can be generated through the AES algorithm. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 龙海霞周光健郭渊徐新黎黄玉娇杨旭华
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products