CN103686714B - A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted - Google Patents

A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted Download PDF

Info

Publication number
CN103686714B
CN103686714B CN201310571521.8A CN201310571521A CN103686714B CN 103686714 B CN103686714 B CN 103686714B CN 201310571521 A CN201310571521 A CN 201310571521A CN 103686714 B CN103686714 B CN 103686714B
Authority
CN
China
Prior art keywords
mouth
encryption
equipment
encryption device
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310571521.8A
Other languages
Chinese (zh)
Other versions
CN103686714A (en
Inventor
赵彬
沈宁
罗鸣
陈波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Huarui Network Information Service Co. Ltd.
Original Assignee
Anhui Yun Dun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Yun Dun Information Technology Co Ltd filed Critical Anhui Yun Dun Information Technology Co Ltd
Priority to CN201310571521.8A priority Critical patent/CN103686714B/en
Publication of CN103686714A publication Critical patent/CN103686714A/en
Application granted granted Critical
Publication of CN103686714B publication Critical patent/CN103686714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of mobile encrypted equipment room based on off-line hardware device and set up the implementation method trusted, a group encryption equipment of user includes a main encryption equipment and multiple common encryption equipment;It specifically comprises the following steps that 1, main encryption equipment initializes 1, generate " KI to ", 2, generate " symmetric key protection double secret key ";User setup PIN code;2, the most initialized main encryption equipment or common encryption equipment insert the A mouth of female shield, and encryption device to be initiated inserts the B mouth of female shield;3, user needs to input the PIN code of the encryption device being inserted in A mouth, and after PIN code is verified, female shield processes.The invention have the advantages that: the file needs of encryption in any client of a user can be decrypted in other clients of this user;Need during setting up trusting relationship between encryption device to prevent hackers from attacking, and set up trusting relationship between my encryption device non-.

Description

A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted
Technical field
The present invention relates to mobile encrypted equipment room and set up the technical field trusted, a kind of mobile encrypted equipment room based on off-line hardware device is built The vertical implementation method trusted.
Background technology
During encryption cloud disk realizes, the problem that user's scene and needs solve is: 1, a user has multiple stage client (PC or mobile device), A hardware encryption device (USB or TF card interface form) it is inserted with in every client;2, each encryption device is no initializtion when consigning to user State, needs user to complete it and initializes.3, in any client of a user, the file of encryption needs other clients this user Can be decrypted on Duan;4, need to prevent hackers from attacking during setting up trusting relationship between encryption device, and my encryption non-sets Trusting relationship is set up between Bei.
Summary of the invention
The shortcoming that the invention solves the problems that above-mentioned prior art, it is provided that a kind of mobile encrypted equipment room based on off-line hardware device sets up the realization side trusted Method.
The present invention solves the technical scheme that its technical problem uses: this mobile encrypted equipment room based on off-line hardware device sets up the realization side trusted Method, a group encryption equipment of user includes a main encryption equipment and multiple common encryption equipment, and for no initializtion state, inside does not comprise any close Key;It specifically comprises the following steps that
(1), main encryption equipment initializes: main encryption equipment inserts the A mouth of female shield, and female shield reads its facility information, learns that it is main encryption equipment, And also be not initialised, then carry out following initialization procedure, (1), generate " KI to ", (2), generate that " symmetric key is protected Double secret key ";User setup PIN code;
(2), the most initialized main encryption equipment or common encryption equipment insert the A mouth of female shield, encryption device to be initiated is inserted female shield B mouth;If the equipment that A mouth inserts is the equipment that no initializtion equipment or B mouth insert is initialization apparatus, then point out error message;
(3), user need to input the PIN code of the encryption device being inserted in A mouth, after PIN code is verified, female shield is handled as follows:
1. the encryption device of pre-initialize B mouth, generates " KI to ";
2. " KI to " PKI of B mouth encryption device is taken out, pass to the encryption device of A mouth;
3. the encryption device of A mouth uses " KI to " PKI of B mouth encryption device to " symmetric key protection double secret key " It is encrypted, returns to the encryption device of B mouth;
4. the encryption device of B mouth uses " KI to " private key of oneself, is decrypted the data obtained, and it is " right to obtain Claim key-protection key to ", and be saved in the nonvolatile storage of oneself;
5. the PIN code of user setup B mouth encryption device.
The invention have the advantages that: provide a kind of mobile encrypted equipment room based on off-line hardware device and set up the implementation method trusted, at one The file needs of encryption in any client of user can be decrypted in other clients of this user;Set up between encryption device and trust Need during relation to prevent hackers from attacking, and set up trusting relationship between my encryption device non-.
Detailed description of the invention
Below in conjunction with embodiment, the invention will be further described:
This mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted, it is achieved method is as follows: a group encryption equipment of user Including a main encryption equipment and multiple common encryption equipment, for no initializtion state, inside does not comprise any key;It specifically comprises the following steps that
(1), main encryption equipment initializes: main encryption equipment inserts the A mouth of female shield, and female shield reads its facility information, learns that it is main encryption equipment, And also be not initialised, then carry out following initialization procedure, (1), generate " KI to ", (2), generate that " symmetric key is protected Double secret key ";User setup PIN code;
(2), the most initialized main encryption equipment or common encryption equipment insert the A mouth of female shield, encryption device to be initiated is inserted female shield B mouth;If the equipment that A mouth inserts is the equipment that no initializtion equipment or B mouth insert is initialization apparatus, then point out error message;
(3), user need to input the PIN code of the encryption device being inserted in A mouth, after PIN code is verified, female shield is handled as follows:
6. the encryption device of pre-initialize B mouth, generates " KI to ";
7. " KI to " PKI of B mouth encryption device is taken out, pass to the encryption device of A mouth;
8. the encryption device of A mouth uses " KI to " PKI of B mouth encryption device to " symmetric key protection double secret key " It is encrypted, returns to the encryption device of B mouth;
9. the encryption device of B mouth uses " KI to " private key of oneself, is decrypted the data obtained, and it is " right to obtain Claim key-protection key to ", and be saved in the nonvolatile storage of oneself;
10. the PIN code of user setup B mouth encryption device.
1. cloud shield i.e. " hardware encryption device ", has USB and TF card packing forms.The encryption device of TF card packing forms can use The switching of TF-USB adapter is USB packing forms
2. encryption device can consign to user by the way of express delivery, and the encryption device that user receives is no initializtion state, and inside is not Comprise any key.
3., after encryption device needs to use female shield to initialize, could be used.
4. complete inside initialized encryption device, to comprise two pairs of unsymmetrical key pair
1. KI pair
2. symmetric key protection double secret key
5. in the group encryption equipment that user obtains, there is a main encryption equipment, use shell and other encryption device district of different colours Point.
6. the difference of main encryption equipment and common encryption equipment is:
1., when upper layer application obtains encryption device information, main encryption equipment can return distinctive mark, shows it oneself is main encryption Equipment
2., when carrying out main encryption equipment and initializing, female shield can call the interface of main encryption equipment, generates " KI respectively Right " and " symmetric key protection double secret key ", and when carrying out the initialization of common encryption equipment, only generate and " authenticate close Key to ", " symmetric key protection double secret key " is injected into.
1. female shield is an embedded device, comprises with lower component:
1. power supply adaptor
2. LCDs
The most some buttons
4. two USB interface
A) A mouth: for inserting the encryption device being initialised, or the main encryption equipment not being initialised
B) B mouth: for inserting the encryption device not being initialised;
2. in female shield, do not preserve any PKI and private key information.
In addition to the implementation, the present invention can also have other embodiments.The technical scheme that all employing equivalents or equivalent transformation are formed, all falls Protection domain at application claims.

Claims (1)

1. a mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted, it is characterised in that: a group encryption of user sets For including a main encryption equipment and multiple common encryption equipment, for no initializtion state, inside does not comprise any key;It specifically comprises the following steps that
(1), main encryption equipment initializes: main encryption equipment inserts the A mouth of female shield, and female shield reads its facility information, learns that it is main encryption equipment, And also be not initialised, then carry out following initialization procedure, (a), generate " KI to ", (b), generate that " symmetric key is protected Double secret key ";User setup PIN code;
(2), the most initialized main encryption equipment insert the A mouth of female shield, encryption device to be initiated is inserted the B mouth of female shield;If A mouth The equipment inserted be the equipment that no initializtion equipment or B mouth insert be initialization apparatus, then point out error message;
(3), user need to input the PIN code of the encryption device being inserted in A mouth, after PIN code is verified, female shield is handled as follows:
1. the encryption device of pre-initialize B mouth, generates " KI to ";
2. " KI to " PKI of B mouth encryption device is taken out, pass to the encryption device of A mouth;
3. the encryption device of A mouth uses " KI to " PKI of B mouth encryption device to " symmetric key protection double secret key " It is encrypted, returns to the encryption device of B mouth;
4. the encryption device of B mouth uses " KI to " private key of oneself, is decrypted the data obtained, and it is " right to obtain Claim key-protection key to ", and be saved in the nonvolatile storage of oneself;
5. the PIN code of user setup B mouth encryption device.
CN201310571521.8A 2013-11-13 2013-11-13 A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted Active CN103686714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310571521.8A CN103686714B (en) 2013-11-13 2013-11-13 A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310571521.8A CN103686714B (en) 2013-11-13 2013-11-13 A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted

Publications (2)

Publication Number Publication Date
CN103686714A CN103686714A (en) 2014-03-26
CN103686714B true CN103686714B (en) 2017-01-04

Family

ID=50322721

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310571521.8A Active CN103686714B (en) 2013-11-13 2013-11-13 A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted

Country Status (1)

Country Link
CN (1) CN103686714B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515853A (en) * 2009-03-09 2009-08-26 深圳同方电子设备有限公司 Information terminal and information safety device thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8745386B2 (en) * 2010-06-21 2014-06-03 Microsoft Corporation Single-use authentication methods for accessing encrypted data

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101515853A (en) * 2009-03-09 2009-08-26 深圳同方电子设备有限公司 Information terminal and information safety device thereof

Also Published As

Publication number Publication date
CN103686714A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
US10601801B2 (en) Identity authentication method and apparatus
US11880831B2 (en) Encryption system, encryption key wallet and method
US9467430B2 (en) Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
TWI515601B (en) Electronic device, method for establishing and enforcing a security policy associated with anaccess control element, and secure element
SG10201901366WA (en) Key exchange through partially trusted third party
WO2014083335A3 (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
EP2639997A1 (en) Method and system for secure access of a first computer to a second computer
NZ592061A (en) Secure negotiation of authentication capabilities
CN104468627B (en) A kind of data ciphering method and system carrying out terminal data backup by server
WO2011159715A3 (en) Key management systems and methods for shared secret ciphers
WO2015158172A1 (en) User identity identification card
US20200195446A1 (en) System and method for ensuring forward & backward secrecy using physically unclonable functions
US10091189B2 (en) Secured data channel authentication implying a shared secret
JP2018505620A5 (en) Communication system and authentication method
SI2150915T1 (en) Secure login protocol
KR100668446B1 (en) Safe --method for transferring digital certificate
CN105142134A (en) Parameter obtaining and transmission methods/devices
CN104639327A (en) Method for identifying and correlating equipment by digital certificate
CN103686714B (en) A kind of mobile encrypted equipment room based on off-line hardware device sets up the implementation method trusted
CN104469752A (en) Encryption method and device and terminal
US9876774B2 (en) Communication security system and method
Xie et al. Secure mobile user authentication and key agreement protocol with privacy protection in global mobility networks
KR20140043836A (en) Communication system utilizing fingerprint information and use of the system
EP3556046B1 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN106487509B (en) A kind of method and host equipment generating key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20170418

Address after: 234000 Suzhou province high tech Zone, Anhui, Chen Chen Road, No. 8

Patentee after: Suzhou Huarui Network Information Service Co. Ltd.

Address before: Hangzhou City, Zhejiang province Xihu District 310012 No. 252 Wensanlu Road Weixing building 3A-1

Patentee before: Anhui Yun Dun Information Technology Co., Ltd

TR01 Transfer of patent right