Mimicry security password calculation model
A computing model and cryptographic algorithm technology, which is applied to public keys for secure communications, secure communications devices, and key distribution, can solve problems such as the inability to provide a hardware environment and the inability to guarantee the security of cryptographic computations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The implementation system of the present invention will be described below in conjunction with the accompanying drawings.
[0018] figure 2 It is the realization system diagram of the present invention. The figure includes U-shield E1, cryptographic module E2 and application APP in the cloud environment.
[0019] pre-configured
[0020] A1: The SM2 cryptographic algorithm is implemented on the hardware of the USB-shield E1, which has the private key a and the public key Pa. The USB-shield E1 is inserted into the user's local PC and deployed in the user's controlled environment. The cryptographic module E2 is a piece of software that implements the SM2 cryptographic algorithm and has a private key b and a public key Pb. E2 runs in a public cloud environment. The application APP is a background program, including E2, running in the public cloud environment. It can be seen from the above that U-shield E1 is a proprietary hardware, and the encryption module E2 is softw...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com