Secret key generation method and device

A technology for generating devices and keys, which is applied to key distribution, can solve the problems of insufficient data protection and security, achieve the effects of protecting property and life, solving insufficient security, and improving data security

Pending Publication Date: 2022-04-05
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a key generation method and device to at least solve the technical problem of insufficient security in data protection due to traditional data desensitization methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method and device
  • Secret key generation method and device
  • Secret key generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is an embodiment of a part of the application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0022] It should be noted that the terms "first" and "second" in the description and claims of the present application and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key generation method and device. The method comprises the steps that at least two gene banks are obtained from a first system to be recombined, a target gene bank is obtained, each gene bank comprises a secret key and offset, and the secret keys and the offset are used for encrypting data; intercepting a gene pool with a preset length from the target gene pool to obtain a target key and a target offset; and encrypting the target key and the target offset. According to the method and the device, the technical problem that the security of data protection is not high enough due to a traditional data desensitization mode is solved.

Description

technical field [0001] The present application relates to the field of data encryption, and in particular, to a method and device for generating a key. Background technique [0002] Data desensitization refers to the transformation of certain sensitive information through desensitization rules to achieve reliable protection of sensitive data. In the case of customer security data or some commercially sensitive data, real data is transformed and provided for testing without violating system rules, such as data desensitization of personal information. This allows safe use of masked real-world datasets in development, testing, and other non-production environments, as well as outsourced environments. The symmetric encryption algorithm uses the same key for encryption and decryption. Asymmetric encryption is different from a symmetric encryption algorithm. An asymmetric algorithm requires two keys: a public key and a private key, that is, a public key and a private key. The pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06F21/60
Inventor 王乾孙科蒋艳军赵轶新
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products