Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation and distribution method, key generation device and key management system

A key generation device and key generation technology, applied in the field of information security, can solve the problems of lack of advantages in information storage and key management

Pending Publication Date: 2021-11-30
蔡利锋
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The dynamic key scheme is more suitable for real-time communication, and lacks advantages in information storage and key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation and distribution method, key generation device and key management system
  • Key generation and distribution method, key generation device and key management system
  • Key generation and distribution method, key generation device and key management system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0196] figure 1A schematic diagram showing key generation by the method of the present invention. with the help of figure 1 , this embodiment describes the use of the method of the present invention, with the help of time stamps that can be composed of arbitrary information, at least through a one-way data conversion algorithm, relying on a master key generation and secure distribution to meet the required number, key strength The implementation method of an independent key that can be equivalent to the number of bits of the master key.

[0197] The method in the embodiment of the present invention can usually be realized by a key generation module; the key generation module can be used in various systems, including but not limited to key generation devices, key management systems, encryption and decryption devices, and file management system, information security transmission system, etc., can be used as a component of the communication equipment in the system, in the form ...

no. 2 example

[0373] Below, will combine Figure 4 A specific example of generating a key according to the second embodiment is described. The one-way data conversion algorithm employs common data conversion under the control of input information. That is, the one-way data conversion algorithm performs data conversion using input information as control information to generate output information.

[0374] Such as Figure 4 As shown, the system information may include a master key 401, a public database 402, and one-way data conversion algorithms 403, 404 and 405;

[0375] In the method of the second embodiment, the system information further includes public data stored in the public database of the key generating device, and the number of bits contained in the public data is much larger than the number of bits contained in the master key.

[0376] In this example, a one-way data transformation algorithm performs data transformation on the common data to generate output information using i...

no. 3 example

[0431] Below, will refer to Figure 5 A key generation device according to an embodiment of the present invention is described.

[0432] Such as Figure 5 The key generation device 500 shown in this embodiment of the present invention may include:

[0433] System information module 510, configured to store or / and generate system information of the key generating device, may include a master key, at least one one-way data conversion algorithm, and may add a public database as required; the one-way data The conversion algorithm generates output information determined from input information from which it is not feasible to speculate or / and deduce the input information.

[0434] The key generation module 520 is configured to generate a time stamp that can be encoded by any information that is not repeated, and generate a key corresponding to the time stamp according to the system information;

[0435] The transmission module 530 is configured to receive and send the time stamp....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key generation and distribution method, a key generation device, a key management system and an information security transmission system. The key generation and distribution method comprises the steps of acquiring or / and generating system information of a key generation device, the system information at least comprises a master key and at least one one-way data conversion algorithm, the master key is composed of non-public random information, generating output information determined from the input information by the one-way data conversion algorithm according to input information, and speculating or / and deriving a fact that the input information is infeasible from the output information; according to the master key, depending on a timestamp formed by any non-repeated information, generating a key jointly determined by the timestamp and information in the master key by at least adopting one unidirectional data conversion algorithm, and associating the key with the timestamp information; and sending the timestamp to a paired key generation device, wherein the paired key generation device stores second system information corresponding to the system information.

Description

technical field [0001] The present invention relates to the field of information security, more specifically, the present invention relates to a key generation and distribution method, a key generation device, a key management system, an encryption and decryption device, a file security system and an information security transfer system. Background technique [0002] The rapid development of computer and communication technology, as well as the subsequent popularization and application of the Internet of Things, cloud computing, and cloud storage, pose new challenges to information security and provide new opportunities for development. The safe transmission and storage of information is the core of information security, and information encryption is an important means to achieve information security. [0003] Continuous encryption and decryption by saving or sharing a key in advance provides users with great convenience, and is also a commonly used method in cryptography. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0816H04L9/3297H04L9/0827
Inventor 蔡利锋蔡嘉禾王艳
Owner 蔡利锋
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products