Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and apparatus for secure distribution of public/private key pairs

A secret key and public key technology, applied in the field of cryptography, can solve problems such as the difficulty of using the hand-delivery distribution system

Inactive Publication Date: 2007-03-28
科瑞技术方案有限责任公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although less costly than providing said resources so that individual users generate public / secret keys directly, manual distribution systems are difficult to use, but are heretofore required, especially in network environments where communication channels are vulnerable to unauthorized or improper monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for secure distribution of public/private key pairs
  • Method and apparatus for secure distribution of public/private key pairs
  • Method and apparatus for secure distribution of public/private key pairs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] FIG. 1 depicts a network system 100 including a server processor 150 and client processors 111-114. Various client processors 111 - 114 are in communication with server processor 150 and may communicate with each other and with other network 170 . The network system 100 may be a local area network, a home control network, a private network, a public network such as the Internet, or the like. Client-server networks have significant advantages especially with regard to resource utilization. For ease of understanding, the following uses the corporate network as an example of a network system. As new members join the company, consider adding new users to the corporate network. As described above, the administrator routinely generates a public / secret key pair for the new employee on the secure processor and hands the new employee a floppy disk containing the assigned public / secret key pair.

[0020] Figure 2 depicts a typical server processor and client processor illustra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A list of public / private key pairs are stored at a server, wherein the private key is stored in an encrypted form, the encryption being based on a master key. To distribute a public / private key pair to a new user, an administrator who has access to the master key retrieves the next available public / private key pair from the server at a client processor that is convenient to both the administrator and the new user. At the client processor, the administrator decrypts the private key of the public / private key pair, using the master key, and provides both the public and private keys to the new user. The new user encrypts the private key, using a biometric or passphrase that is secret to the new user. The private key is immediately erased from the client processor upon encryption with the user's biometric or passphrase key. The encrypted private key, the corresponding public key, and an identification of the new user are communicated to and stored at the server for subsequent access by the new user, and potentially others. By employing this technique, the private key is vulnerable to detection only within the client processor, and only for a brief period of time.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular to distributing a secret key in a public / secret key pair via a network. Background technique [0002] As the use of networked systems for information communication increases and the potential access to such networked systems increases, so does the requirement to communicate securely over such networked systems. Many systems are available today to encrypt and decrypt messages, and to confirm the sender of a message. The encryption technology usually adopted by such a system is an encryption technology based on public / secret key pair technology, such as RSA (Rivest-Shamil-Adleman Algorithm) public key cryptosystem. [0003] In a public / secret key pair cryptosystem, a unique public key is generated from a secret key using a mathematical method that is very difficult or even impossible to apply in reverse. That is, knowing the public key does not facilitate determining th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/30H04L9/083H04L9/0894H04L9/0825H04L9/0866
Inventor M·A·埃普斯坦M·S·帕斯卡
Owner 科瑞技术方案有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products