Method for storing cipher key
A technology for key storage and key data, applied in the field of information security, can solve problems such as increasing the complexity of key management, and achieve the effects of reducing complexity, being less prone to leakage and theft, and improving security mechanisms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050] The overall design idea of the key storage method of the present invention is to realize distributed storage of key material information by performing simple transformation operations on the original key data, thereby improving the safety management mechanism of the original key data.
[0051] Reference figure 1 The figure is a brief process flow chart of the key storage method of the present invention, in which the main steps of the key storage process of the present invention include:
[0052] Step S10: Pre-set the key data transformation algorithm; this key data transformation algorithm can select different algorithms for transformation operation according to the specific situation, such as exclusive OR algorithm, or use common transformation algorithm based on symmetric cryptosystem .
[0053] Step S20, the original key data is generated by the key generator. The original key data is the key information that actually encrypts and transforms various information. It is...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap