Supercharge Your Innovation With Domain-Expert AI Agents!

Encryption and decryption method and device for software password module account

A technology of a cryptographic module and an encryption method, applied in the field of information security, can solve the problems of complex technology implementation, low computing efficiency, and inappropriate use of a large number of keys, and achieve the effects of improving computing efficiency, improving security, and being simple and convenient to unlock.

Pending Publication Date: 2022-04-12
BEIJING QIANXIN TECH +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, whether it is white-box cryptography or collaborative technology, the technical implementation is more complicated, the operation efficiency is low, and it is not suitable for a large number of keys.
In addition, in some applications, there may be a large number of keys. If each key needs to be processed collaboratively, more communication overhead and computing overhead will be required.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device for software password module account
  • Encryption and decryption method and device for software password module account
  • Encryption and decryption method and device for software password module account

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0073] Combine below Figure 1-Figure 7 Describe the encryption and decryption method of the account number of the software cryptographic module of the present invention.

[0074] see figure 1 , figure 1 It is a schematic flow chart of the encryption method of the account number of the software cryptographic module provided by the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and a device for encrypting and decrypting a software password module account. The encryption method comprises the steps of receiving an encryption instruction to generate a first random number, and determining coordinates of a first point based on the first random number and coordinates of a base point on an elliptic curve; determining coordinates of a second point based on the first random number and the coordinates of the P point; generating a key based on the coordinate of the second point to encrypt a target file in a software password module to generate a first ciphertext, and encrypting the coordinate of the second point and the target file based on a Hash algorithm to generate a second ciphertext; and generating a target ciphertext based on the coordinate of the first point, the first ciphertext and the second ciphertext. Wherein the coordinates of the P point are generated by the far-end collaborative server based on a randomly generated second private key fragment, the coordinates of the base point and the coordinates of the P1 point; the coordinates of the P1 point are generated by the local working platform on the basis of the coordinates of the base point and a first private key fragment generated on the basis of an unlocking password input by a user. The embodiment of the invention can give consideration to both efficiency and safety.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for encrypting and decrypting account numbers of a software cryptographic module. Background technique [0002] A software cryptographic module refers to a collection of cryptographic capabilities in a software form with clear boundaries. Cryptographic capabilities include cryptographic algorithms and cryptographic protocols. Cryptographic algorithms include symmetric algorithms, asymmetric algorithms, and hash algorithms. Cryptographic protocols include TLS protocol, SSL protocol, TLCP protocol, etc. The manifestation form of the software cryptographic module can be a library or a process. Regardless of the form, there is a problem of safe storage of the key and the problem of unlocking and using it. [0003] The existing safe storage and unlocking methods of keys mainly include white-box cryptography and collaboration technology. Among them,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62
Inventor 张华王爱兵刘川意
Owner BEIJING QIANXIN TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More