Working key generation method and device and computer readable storage medium

A work key and key technology, applied in the field of information security, can solve the problems of terminal equipment user loss, reduce the security of terminal equipment, etc., and achieve the effect of a wide range of applications

Active Publication Date: 2021-10-22
FEITIAN TECHNOLOGIES
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] During the data interaction process between the terminal device and the host computer, it is necessary to adopt an encryption scheme for the transmitted data, especially for sensitive data; at present, the encryption scheme adopted is relatively simple. Once the fixed key of the terminal device is leaked, the user of the terminal device will face heavy losses,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Working key generation method and device and computer readable storage medium
  • Working key generation method and device and computer readable storage medium
  • Working key generation method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1 of the present application provides a method for generating a work key, such as figure 1 As shown, the method includes:

[0038] Step 101, the terminal receives the operation command sent by the host computer, and obtains the master key value, the master key counter value and the master key algorithm identifier according to the key index in the operation command;

[0039] In this embodiment, the operation instructions specifically include: data encryption instructions, data decryption instructions, PIN code encryption instructions, Mac check value generation instructions or verification instructions, etc.;

[0040] In this embodiment, obtaining the master key value, the master key counter value, and the master key algorithm identifier according to the key index in the operation instruction specifically includes: obtaining the master key according to the key index in the operation instruction; key to obtain the master key value, master key counter value, an...

Embodiment 2

[0124] Embodiment 2 of the present application provides a method for generating a work key, such as figure 2 , image 3 , Figure 4 As shown, the method includes:

[0125] Step 201, the terminal receives the operation instruction sent by the host computer;

[0126] In this embodiment, the operation instruction specifically includes: a data encryption instruction, a data decryption instruction, a Mac check value generation instruction or a verification instruction, and the like.

[0127] Step 202, the terminal obtains the master key according to the key index in the operation instruction, and obtains the master key value, the master key counter value, the master key algorithm identifier, and the master key type identifier according to the master key;

[0128] In this embodiment, the terminal obtains the master key according to the key index in the operation instruction specifically: the terminal obtains the key index in the operation instruction, searches for the data corre...

Embodiment 3

[0241] Based on the above-mentioned technical solution of a work key generation method provided by this application, this application provides a corresponding structural diagram of a work key generation device, as shown in Figure 5 As shown, a work key generation device 300 of the present application may include:

[0242] The receiving module 301 is used to receive the operation instruction sent by the host computer;

[0243] An acquisition module 302, configured to acquire the master key value, the master key counter value and the master key algorithm according to the key index in the operation instruction;

[0244] A processing module 303, configured to process the master key counter value according to a first preset algorithm to obtain the master key identifier and the first value;

[0245] The setting module 304 is used to initialize the working key buffer, store the master key value into the working key buffer, set the counting value of the working key, initialize the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a working key generation method and device and a computer readable storage medium, and belongs to the technical field of information security. The method comprises the following steps: the terminal receiving an operation instruction sent by an upper computer, obtaining a working key purpose and a working key algorithm according to the operation instruction, setting the working key purpose as a first purpose by the terminal, generating derived data according to the first purpose, a master key identifier, a first numerical value and a master key algorithm, determining the length of a working key according to the working key algorithm, obtaining data in a working key buffer area as a key, generating the working key according with the length of the working key according to the key and the derived data, executing corresponding operation according to the operation instruction and the working key, and returning an operation result to the upper computer. Compared with an encryption scheme in the prior art, the method provided by the invention is safer and wider in application range.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a method and device for generating a work key, and a computer-readable storage medium. Background technique [0002] During the data interaction process between the terminal device and the host computer, it is necessary to adopt an encryption scheme for the transmitted data, especially for sensitive data; at present, the encryption scheme adopted is relatively simple. Once the fixed key of the terminal device is leaked, the user of the terminal device will face heavy losses, so the scheme of using a fixed key to encrypt data will seriously reduce the security of the terminal device. In the prior art, a method of deriving a working key from a fixed key in a terminal device is also adopted, but this method requires an algorithm attached to a fixed key, which has great limitations on the use of subsequent working keys. Contents of the invention [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0891H04L9/0894
Inventor 陆舟
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products