CN109257381A - A kind of key management method, system and electronic equipment - Google Patents

A kind of key management method, system and electronic equipment Download PDF

Info

Publication number
CN109257381A
CN109257381A CN201811327452.5A CN201811327452A CN109257381A CN 109257381 A CN109257381 A CN 109257381A CN 201811327452 A CN201811327452 A CN 201811327452A CN 109257381 A CN109257381 A CN 109257381A
Authority
CN
China
Prior art keywords
target
platform
key
key information
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811327452.5A
Other languages
Chinese (zh)
Inventor
李成霞
李勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co Ltd filed Critical Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201811327452.5A priority Critical patent/CN109257381A/en
Publication of CN109257381A publication Critical patent/CN109257381A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of key management methods, which comprises obtains the account name that the login target platform of active user end input uses;The platform name of account name and the target platform that login target platform based on active user's input uses, obtains target cipher key information in the key management apparatus for the key information for being stored at least one platform;The target platform is logged in based on the target cipher key information and the account name.The embodiment of the present application scheme may be implemented to be managed collectively the password of different accounts.The embodiment of the present application also provides a kind of key management system and electronic equipments.

Description

A kind of key management method, system and electronic equipment
Technical field
This application involves technical field of data processing, set in particular to a kind of key management method, system and electronics It is standby.
Background technique
With the development of network technology, more and more users are managed money matters by point to point network financing platform.In order to Risk control, many users can manage money matters on different financing platforms.In this way, each user can exist many account and Account key, the setting and management of account and account key are just particularly important.If the account of each platform and account password are set It is set to identical, although remembering convenient for user, once Key Exposure occurs for some platform, other platform keys divulge a secret Risk be consequently increased.
During family finance, for the management of account and account password, most of user by way of memory or Person is managed account and account password using the mode of special number, for example, using birthday, telephone number, license plate number etc. As account password.But now due to the prosperity of network technology, the personal information of user are easy to obtain, illegal person can be with Account password is guessd out using these personal information.If in addition, one group of account password of user's self-setting, but working as account password mistake It is easy to forget when more.As it can be seen that the mode of user password management is unfavorable for the way to manage of more account passwords at present.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of key management method, system and electronic equipment, energy It is enough that authentication is carried out to user, and using key information needed for key management apparatus offer login target platform, it realizes and uses The unified management of the multiple passwords in family increases the safety of user's logon account.
In a first aspect, the embodiment of the present application provides a kind of key management method, it is applied to user terminal, the method packet It includes:
Obtain the account name that the login target platform of active user end input uses;
The platform name of account name and the target platform that login target platform based on active user's input uses, is being deposited Contain acquisition target cipher key information in the key management apparatus of the key information of at least one platform;
The target platform is logged in based on the target cipher key information and the account name.
It is described to be obtained in the key management apparatus for the key information for being stored at least one platform in above-mentioned technical proposal Before target cipher key information, further includes:
Verifying message is sent to certificate server, authenticates the certificate server to the key management apparatus;
Receive the authentication result that certificate server carries out verifying return to the key management apparatus;
If the certificate server passes through the certification of the key management apparatus, obtained in the key management apparatus Take target cipher key information.
In above-mentioned technical proposal, account name and the mesh that the login target platform based on active user's input uses The platform name for marking platform obtains target cipher key information in the key management apparatus for being stored at least one platform key information, Include:
According to the platform name of account name and the target platform that the login target platform that active user inputs uses, determine Inquire the target sequence number of the target cipher key information;
The corresponding destination node of the target sequence number is searched in the chained list node of the key management apparatus;Wherein, institute State the key information that platform is stored in chained list node;
The target cipher key information is obtained in the destination node.
It is described that the target sequence number correspondence is searched in the chained list node of the key management apparatus in above-mentioned technical proposal Destination node, comprising:
The serial number of i-th of chained list node is obtained in the chained list node;
The serial number for i-th of chained list node that will acquire is compared with the target sequence number;
If the serial number of i-th of chained list node is identical as the target sequence number, it is determined that i-th of chained list node For the destination node;Otherwise, obtain i+1 chained list node serial number, and will acquire i+1 chained list node serial number and The target sequence number compares, until the serial number of the chained list node of acquisition is identical as the serial number of the destination node;Wherein, i For natural number.
It is described that the target platform is logged in based on the target cipher key information and the account name in above-mentioned technical proposal, Include:
According to the cipher key-extraction rule negotiated with the target platform, obtained in the predetermined position of the target cipher key information The key information of presetting digit capacity is taken, and using the key information of presetting digit capacity as the login password for logging in the target platform;
The target platform is logged in using the login password and the user name.
In above-mentioned technical proposal, the method also includes:
Restore to instruct according to key information, obtains seed key information in the memory unit;
The seed key information is sent to key management apparatus, wherein the seed key information is used for the key Management equipment restores the target cipher key information.
Second aspect, the embodiment of the present application also provides a kind of key management methods, are applied in key management apparatus, institute Stating equipment includes: identity authentication and key management unit;
The key management unit is used to store the key information of at least one platform, and the identity authentication is close for storing The authentication information of key management equipment;
The described method includes: obtaining target cipher key information for the user terminal when connecting with user terminal;Make the user End group logs in target platform in the account name of the target cipher key information and user.
In above-mentioned technical proposal, before the acquisition target cipher key information for the user terminal, further includes:
According to the checking request that certificate server is sent, carries to certificate server transmission and set using key management The authentication information that standby private key is encrypted makes the certificate server based on the public affairs of the key management apparatus prestored Key verify to the authentication information and return authentication result.
In above-mentioned technical proposal, target cipher key information is generated according to following steps:
Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information;
The target cipher key information of generation is stored in the destination node of chained list node;
Based on target sequence number of the destination node in the chained list node and the key generate instruction carry it is flat Platform name and account name establish the corresponding relationship between the platform name, the account name and the target sequence number.
The third aspect, the embodiment of the present application also provides a kind of key management system, the system comprises: key management is set Standby and user terminal;Wherein,
The key management apparatus, for storing the key information of at least one platform, when being connect with the user terminal, Target cipher key information is obtained for the user terminal;
The user terminal, the account name that the login target platform for obtaining the input of active user end uses;Based on current The platform name of account name and the target platform that the login target platform of user's input uses, is being stored at least one platform Key information key management apparatus in obtain target cipher key information, and be based on the target cipher key information and the account name Log in the target platform.
In above-mentioned technical proposal, the key management apparatus is specifically used for sending confirmation to user terminal according to user's operation Log-in instruction;Authentication information is sent to the certificate server according to the checking request that the certificate server is sent;
The user terminal, specifically for the confirmation log-in instruction sent according to the key management apparatus, to authentication service Device sends verifying message, the authentication result of certificate server is received, if the certificate server is to the key management apparatus Certification passes through, then target cipher key information is obtained in the key management apparatus;
Certificate server, the verifying message for being sent according to user terminal send verifying to the key management apparatus and ask It asks;The key management apparatus is authenticated according to the authentication information that the key management apparatus is sent, and to described User terminal return authentication result.
Fourth aspect, the embodiment of the present application also provides a kind of electronic equipment, comprising: processor, memory and bus, institute State memory and be stored with the executable computer program of the processor, when electronic equipment operation, the processor with it is described By bus communication between memory, when the processor executes the computer program the step of realization preceding method.
5th aspect, the embodiment of the present application also provide a kind of computer readable storage medium, the computer-readable storage medium The step of being stored with computer program in matter, the above method executed when which is run by processor.
Key management method, system and electronic equipment provided by the embodiments of the present application, available active user end input The account name that uses of login target platform, and the account name that uses of the login target platform based on active user's input and target The platform name of platform obtains target cipher key information in the key management apparatus for the key information for being stored at least one platform, And target cipher key information and account name login target platform based on acquisition.In this way, use can be obtained in key management apparatus In the key information for logging in multiple target platforms.The password of multiple accounts is carried out by memory by user in the prior art close The mode of code management is compared, and using key managing project provided by the embodiments of the present application, not only can use key management apparatus The secure log for guaranteeing user account can also obtain the key information for logging in different platform in key management apparatus, realize The password of different accounts is managed collectively, provides convenience for user.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of basic flow chart of key management method provided by the embodiment of the present application;
Fig. 2 shows the schematic diagrames that user identity provided by the embodiment of the present application carries out verification process;
Fig. 3 shows the schematic diagram of key management apparatus provided by the embodiment of the present application;
Fig. 4 shows the schematic diagram of the chained list node of identity authentication provided by the embodiment of the present application;
Fig. 5 shows the basic flow chart of another kind key management method provided by the embodiment of the present application;
Fig. 6 shows the schematic diagram of the storage format of key information in chained list node provided by the embodiment of the present application;
Fig. 7 shows the schematic diagram that target cipher key information process is generated provided by the embodiment of the present application;
Fig. 8 shows the schematic diagram of user terminal provided by the embodiment of the present application;
Fig. 9 shows the schematic diagram of key management apparatus provided by the embodiment of the present application;
Figure 10 shows the schematic diagram of key management system provided by the embodiment of the present application;
Figure 11 shows the structural schematic diagram of electronic equipment provided by the embodiment of the present application;
Figure 12 shows the structural schematic diagram of another kind electronic equipment provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
The embodiment of the present application following methods, device, system, electronic equipment or computer storage medium can be applied to any The scene that the key information to multiple platforms is managed is needed, for example, can be applied to key or Password Management software etc..This Application embodiment specific application scenarios are not restricted, it is any using method provided by the embodiments of the present application to the use of account Family carries out authentication and the scheme that is managed to the key information of multiple platforms is in the application protection scope.
Key management method, device, system, electronic equipment and computer storage medium provided by the embodiments of the present application, can With the confirmation log-in instruction sent according to the key management apparatus received, authentication information is sent to certificate server, is made Certificate server authenticates key management apparatus, thereby may be ensured that the safety of user account.If certificate server is to close The certification of key management equipment passes through, then the account name that uses of login target platform and target platform based on active user's input Platform name obtains target cipher key information in the key management apparatus for the key information for being stored at least one platform, and is based on The target cipher key information and account name of acquisition log in target platform.In this way, not only can be before user logs in target platform, benefit Key management apparatus is verified with certificate server, guarantees the safety of user account, further, it is also possible in key management The key information for logging in multiple target platforms is obtained in equipment, realizes the management of different user account key information.If By user Password Management is carried out to the password of multiple accounts by way of memory, is not only easy to forget when password is excessive, also It is easy to be cracked.Using key managing project provided by the embodiments of the present application, by the safety certification of user account and can be mostly used The key management of family account combines, and not only can use the secure log that key management apparatus guarantees user account, may be used also To provide the Password Management scheme of multiple accounts using key management apparatus for user, the unified pipe of the password of different accounts is realized Reason, provides convenience for user.
For convenient for understanding the present embodiment, first to a kind of key management method disclosed in the embodiment of the present application into Row is discussed in detail.
A kind of basic procedure of key management method provided by the embodiments of the present application is as shown in Figure 1, be applied to user terminal, institute The method of stating includes:
S101 obtains the account name that the login target platform of active user end input uses.
Here, user terminal can be terminal device, such as the movement of laptop, mobile phone, electronic watch, electronics bracelet is eventually End equipment can also be the fixed terminal equipments such as desktop computer, server.User terminal can be equipped with and key management apparatus pair The key management application answered, user terminal can be applied by key management and key management apparatus are configured and managed.
In specific implementation, key management apparatus may be mounted in user terminal or separately positioned with user terminal.User exists When logging in target platform using user terminal, account that the login target platform of user terminal available active user end input uses Name.Before logining target platform, if key management apparatus is mounted in user terminal, user terminal by display interface or can be mentioned Show that sound provides user and confirms to the operation of present access destination platform;If key management apparatus is separately positioned with user terminal, Then user terminal, which can first pass through display interface or prompt tone and provide user, connects key management apparatus, is detecting and key management After equipment connection, user can be provided by display interface or prompt tone and the operation of present access destination platform is carried out really Recognize.Here, it if key management apparatus is separately positioned with user terminal, can be attached by inserting mode and user terminal;? In some embodiments, user terminal can also be wirelessly attached with user terminal.
Here, confirmation key can be set on key management apparatus, user can be by user's operation to current accessed The operation of target platform confirmed, such as by user's operations such as clicking operation, pressing operations to present access destination platform Operation confirmed.Confirmation log-in instruction can be generated according to user's operation in key management apparatus, and sending to user terminal should Confirm log-in instruction.User terminal, can be to authentication service after the confirmation log-in instruction for receiving key management apparatus transmission Device sends authentication information, authenticates certificate server to the key management apparatus.
In specific implementation, user terminal sends authentication information to certificate server using key management apparatus, makes to recognize The process that card server authenticates the key management apparatus can be as shown in Fig. 2, user terminal can be to certificate server Verifying message is sent, so that certificate server is sent checking request to key management apparatus according to verifying message, and based on the received Checking request is carried to certificate server transmission using key management apparatus and is encrypted using the private key of key management apparatus Authentication information, the key pipe for using public key of the certificate server based on the key management apparatus prestored to active user Reason equipment authenticate and return authentication result.Specifically such as, user terminal sends verifying message, certificate server to certificate server After receiving verifying message, checking request is sent to key management apparatus.Key management apparatus receives server transmission Checking request after, authentication information is encrypted using the private key of storage inside, and the identity after encryption is recognized Card information is sent to certificate server, and authentication information here can be the digital certificate of key management apparatus.Certification clothes After business device receives the authentication information of encryption, using the key management apparatus prestored public key to authentication information into Row decryption, and authentication is carried out to key management apparatus using the authentication information after decryption, authentication result is generated, then The authentication result is returned to user terminal.
Here, the structure of key management apparatus can be as shown in figure 3, include identity authentication and key management unit.Wherein Identity authentication can for quick online identity verify (Fast Identity Online, FIDO) device.In identity authentication It is stored with the authentication information of key management apparatus, for example, it is stored with the digital certificate of key management apparatus, the digital certificate The equipment identities of key management apparatus can be characterized.The public private key pair of key management apparatus is also stored in identity authentication, it should Public private key pair includes public key and private key, and private key therein can be used for being added for the authentication information of key management apparatus It is close, such as signed using private key to digital certificate.
S102, the platform of account name and the target platform that the login target platform based on active user's input uses Name obtains target cipher key information in the key management apparatus for the key information for being stored at least one platform.
In specific implementation, if the authentication result that certificate server returns shows to pass through the certification of key management apparatus, The platform name of account name and target platform that can be then used according to the login target platform that active user inputs, be stored with to Target cipher key information is obtained in the key management apparatus of the key information of a few platform.Here, the key of key management apparatus It can store the key information of multiple platforms in manager, the key information of each platform can store in key management unit In chained list node, each chained list node corresponds to the key information of a platform.If the authentication result table that certificate server returns The bright certification to key management apparatus does not pass through, then can terminate current process, and prompt user authentication failure.
Here, user terminal is used in the login target platform inputted based on active user account name and target platform it is flat Platform name, when obtaining target cipher key information in the key management apparatus for the key information for being stored at least one platform, Ke Yigen According to the platform name of account name and target platform that the login target platform that active user inputs uses, inquiry target cipher key letter is determined The target sequence number of breath searches the corresponding destination node of target sequence number in the chained list node of key management apparatus, and in target knot Target cipher key information is obtained in point.Here, the key information of platform is stored in chained list node.For example, user terminal can calculate The cryptographic Hash of the platform name of the account name and target platform of active user's input, and using calculated cryptographic Hash as inquiry linked list The sign of the serial number of node determines destination node further according to the corresponding relationship between cryptographic Hash and the serial number of chained list node Corresponding target sequence number.
In specific implementation, when searching the corresponding destination node of target sequence number in the chained list node of key management apparatus, The serial number and target sequence for i-th of the chained list node that the serial number of i-th of chained list node can be obtained in chained list node, and will acquire It number compares, if the serial number of i-th of chained list node is identical as target sequence number, it is determined that i-th of chained list node is target Node.Otherwise, obtain i+1 chained list node serial number, and will acquire i+1 chained list node serial number and target sequence number into Row comparison, until the serial number of the chained list node of acquisition is identical as the serial number of destination node, wherein i is natural number.Here, it is looking into When looking for the corresponding destination node of target sequence number, it can successively be searched according to the sequence of chained list node.For example, key management unit Chained list node schematic diagram as shown in figure 4, when searching destination node, can be begun looking for from root node, it is assumed that root node Serial number 0, serial number 0 can be compared with target sequence number, if target sequence number is also 0, root node be destination node. If target sequence number is not 0, next node of root node is searched, it is assumed that the serial number 1 of next node of root node, then Serial number 1 can be compared with target sequence number, if target sequence number is 1, the node of serial number 1 is destination node.If mesh Marking serial number is not 1, then searches next node of the node of serial number 1, until finding serial number node identical with target sequence number, Alternatively, until traversing whole chained list nodes.
S103 logs in the target platform based on the target cipher key information and the account name.
Here, after the target cipher key information that destination node is obtained in key management apparatus, it can use target cipher key Information and account name log in target platform.When logging in target platform, the target cipher key information that can be will acquire is as login mesh The corresponding password of account name of mark platform is logged in.It in specific implementation, can also basis and mesh when logging in target platform The cipher key-extraction rule that platform is negotiated is marked, obtains the key information of presetting digit capacity in the predetermined position of target cipher key information, and Using the key information of presetting digit capacity as the login password for logging in the target platform, then stepped on using login password and user name Record target platform.The safety of password can be enhanced in this way, even if the key information in key management apparatus is obtained It takes, also target account can not be directly logged in by the key information of acquisition, to guarantee the safety of target account.
In some embodiments, user terminal can restore to instruct according to key information, and it is close to obtain seed in the memory unit Key information.Here, key information, which restores instruction, can be what user terminal was generated according to user's operation, alternatively, can be by other What electronic equipment was sent.User terminal can restore the conjunction of instruction after obtaining key information and restoring instruction with validation key information Method, the finger print information or the device authentication code by verifying other electronic equipments that the user of user's operation is such as executed by verifying Etc. verification modes, validation key information restore instruction legitimacy.If it is legal that user terminal validation key information is restored to instruct, Storage unit obtains seed key information, and sends seed key information to key management apparatus, is based on key management apparatus Seed key Information recovering target cipher key information.Here, storage unit can be set to the storage unit of any storage equipment, can To be integrated on the user terminal for being equipped with user terminal, can also be integrated in other storage equipment.By being set to key management Preparation send seed key information, causes the key information of storage to be lost even if key management apparatus breaks down, key management is set It is standby can pre-stored seed key information based on the received, restore the key information of storage.Alternatively, in key management apparatus In the case where loss, user terminal can send pre-stored seed key information to new key management apparatus, make new close Key management equipment restores key information according to seed key information.
The key management method provided through the foregoing embodiment can not only utilize before user logs in target platform Key management apparatus verifies user identity, guarantees the safety of user account, further, it is also possible in key management apparatus The middle key information obtained for logging in multiple platforms realizes management to different user account key information, so as to for User provides the Password Management scheme of multiple accounts, realizes the unified management of the password of different accounts, provides convenience for user.
As shown in figure 5, can be applied to key management apparatus the embodiment of the present application also provides a kind of key management method In, the equipment includes: identity authentication and key management unit;The key management unit is for storing the close of at least one platform Key information, the identity authentication are used to store the authentication information of key management apparatus;The described method includes:
S201, the identity authentication sends confirmation log-in instruction to the user terminal according to user's operation, so that described User terminal sends verifying message to certificate server.
Here, the structure of key management apparatus can be as shown in figure 3, the equipment may include identity authentication and key pipe Manage device.Identity authentication therein can verify (Fast Identity Online, FIDO) device for quick online identity.Wherein Key management unit can store the key information of at least one platform.Here, key information can store in key management unit Chained list node in.The key information of each chained list node may include private key, public key, chain code and serial number.
In specific implementation, for key management apparatus after connecting user terminal, the identity authentication of key management apparatus can To send confirmation log-in instruction to user terminal according to user's operation.User terminal is sent out according to confirmation log-in instruction to certificate server Verifying message is sent, so that certificate server sends checking request to key management apparatus.
S202, the identity authentication are sent out according to the checking request that the certificate server is sent to the certificate server Authentication information is sent, authenticates the certificate server to the key management apparatus.
Here, identity authentication can take after the checking request for receiving certificate server transmission to the certification Business device sends authentication information, authenticates the certificate server to the key management apparatus.To the certification When server sends authentication information, it can send to Authentication server and be believed using the authentication that private key is encrypted Breath.The authentication information stored in identity authentication may include the digital certificate of key management apparatus, which can To characterize the equipment identities of key management apparatus.The public private key pair of key management apparatus, the public affairs are also stored in identity authentication To including public key and private key, private key therein can be used for being encrypted for the authentication information of key management apparatus private key, Such as signed using private key to digital certificate.After certificate server receives the authentication information of encryption, using prestoring The public key of key management apparatus authentication information is decrypted, and using the authentication information after decryption to key pipe It manages equipment and carries out authentication, generate authentication result, then return to the authentication result to user terminal.
S203, the key management unit is used to store the key information of at least one platform, if the certificate server pair The certification of the key management apparatus passes through, and obtains target cipher key information for user terminal;Wherein, the user terminal is used to be based on institute The account name for stating target cipher key information and user logs in target platform.
Here, if the authentication result that certificate server returns shows that the certification of key management unit passes through, key management unit Target cipher key information can be obtained for user terminal.Key management unit is stored with the key information of at least one platform, each platform Key information can store in chained list node, each chained list node correspond to a platform key information.Chained list node The storage format of middle key information is as shown in fig. 6, key information may include private key, public key, chain code and serial number.
In specific implementation, the key information of at least one platform stored in key management unit is by key management unit It is that the key generation instruction sent according to user terminal is generated.User terminal is in the account for registering target platform according to user's operation When family, the account name that the platform name of target platform and user input can be sent to key management unit.Key management unit can be with Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information.Generating target cipher key After information, the target cipher key information of generation can be stored in the destination node of chained list node, and be existed based on destination node Target sequence number and key in the chained list node generate the platform name and account name that instruction carries, and establish the platform name, institute State the corresponding relationship between account name and the target sequence number.Here, target cipher key information may include private key, public key, chain code And target sequence number.
Here, as shown in fig. 7, when generating target cipher key information using seed key information, if not having in key management unit There is the chained list node of storage, then it can be close using preset algorithm and generating random number root using random number as seed key information Key information.Here random number can be preset byte, such as 32 bytes.Utilizing preset algorithm and generating random number root key information When, it can use preset algorithm and operation carried out to random number, and using 32 byte of a left side of the data obtained after operation as root key The private key of information, can be using 32 byte of the right side of the data obtained after operation as the chain code of root key information, for example, utilizing SHA512 algorithm carries out operation to random number.After generating private key, the public key that private key generates root key information, example can use Such as, private key calculate using elliptic curve encryption algorithm (Elliptic Curves Cryptography, ECC) and generate root The public key of key information, root key information here are target cipher key information.If being stored with chained list node in certificate server, Then son can be generated using preset algorithm and root key information using the root key information in chained list node as seed key information Key information.Here root key information includes private key, public key, chain code and serial number.Utilizing preset algorithm and root key information When generating sub-key information, it can use preset algorithm and operation carried out to the public key, chain code and serial number of root key information, and will fortune 32 byte of a left side of the data obtained after calculation and the private component of root key information take the mould of n as the private key of sub-key information, Using 32 byte of the right side of the data obtained after operation as the chain code of sub-key information.For example, using SHA512 algorithm to root key Information carries out operation.After the private key for generating sub-key information, the public key that private key generates sub-key information, example can use Such as, using elliptic curve encryption algorithm (Elliptic Curves Cryptography, ECC) to the private key of sub- key information into Row calculates, and generates the public key of sub-key information.Wherein, n is positive integer, can indicate the number that sub-key generates.
The key management method provided through the foregoing embodiment can utilize certification before user logs in target platform Server verifies key management apparatus, guarantees the safety of user account.In addition, the key management of key management apparatus The key information for logging in multiple platforms is stored in device, when logging in target platform, key management unit can provide login target The key information of platform realizes the management to different user account key information.Key management side provided by the embodiments of the present application Authentication and multi-key cipher management can be combined together by case, so as to guarantee user account it is safe while, for Family provides the Password Management scheme of multiple accounts, realizes the unified management of the password of different accounts, provides convenience for user.
Conceived based on same application, key management dress corresponding with key management method is additionally provided in the embodiment of the present application It sets, since the principle that the device in the embodiment of the present application solves the problems, such as is similar to the above-mentioned key management method of the embodiment of the present application, Therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
As shown in figure 8, user terminal 80 provided by the embodiments of the present application includes: that the first acquisition module 81, second obtains module 82 and login module 83.
Described first obtains module 81, the account name that the login target platform for obtaining the input of active user end uses;
Described second obtains module 82, the account name and institute that the login target platform for being inputted based on active user is used The platform name for stating target platform, obtains target cipher key in the key management apparatus for the key information for being stored at least one platform Information;
The login module 83, for logging in the target platform based on the target cipher key information and the account name.
In specific implementation, described device further include: authentication module makes for sending verifying message to certificate server The certificate server authenticates the key management apparatus;Certificate server is received to carry out the key management apparatus Verify the authentication result returned;If the certificate server passes through the certification of the key management apparatus, in the key Target cipher key information is obtained in management equipment.
In specific implementation, described second module 82 is obtained, specifically for being stored at least one according to following steps Target cipher key information is obtained in the key management apparatus of platform key information:
According to the platform name of account name and the target platform that the login target platform that active user inputs uses, determine Inquire the target sequence number of the target cipher key information;
The corresponding destination node of the target sequence number is searched in the chained list node of the key management apparatus;Wherein, institute State the key information that platform is stored in chained list node;
The target cipher key information is obtained in the destination node.
In specific implementation, described second module 82 is obtained, specifically for setting according to following steps in the key management The corresponding destination node of the target sequence number is searched in standby chained list node:
The serial number of i-th of chained list node is obtained in the chained list node;
The serial number for i-th of chained list node that will acquire is compared with the target sequence number;
If the serial number of i-th of chained list node is identical as the target sequence number, it is determined that i-th of chained list node For the destination node;Otherwise, obtain i+1 chained list node serial number, and will acquire i+1 chained list node serial number and The target sequence number compares, until the serial number of the chained list node of acquisition is identical as the serial number of the destination node;Wherein, i For natural number.
In specific implementation, the login module 83 is specifically used for logging in the target platform according to following steps:
According to the cipher key-extraction rule negotiated with the target platform, obtained in the predetermined position of the target cipher key information The key information of presetting digit capacity is taken, and using the key information of presetting digit capacity as the login password for logging in the target platform;
The target platform is logged in using the login password and the user name.
In specific implementation, the sending module, restores to instruct according to key information, and it is close to obtain seed in the memory unit Key information;
The seed key information is sent to key management apparatus, wherein the seed key information is used for the key Management equipment restores the target cipher key information.
As shown in figure 9, key management apparatus 90 provided by the embodiments of the present application includes: identity authentication 91 and key management Device 92.
The identity authentication 91, for storing the authentication information of key management apparatus;
The key management 92, for storing the key information of at least one platform, when being connect with user terminal, for described User terminal obtains target cipher key information, and the user terminal is made to log in mesh based on the account name of the target cipher key information and user terminal Mark platform.
In specific implementation, the identity authentication 91, specifically for the checking request sent according to certificate server, to Certificate server transmission carries the authentication information encrypted using the private key of key management apparatus, makes described to recognize Card public key of the server based on the key management apparatus prestored verify to the authentication information and return authentication As a result.
In specific implementation, the key management unit 92 is specifically used for generating target cipher key information according to following steps:
Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information;
The target cipher key information of generation is stored in the destination node of chained list node;
Based on target sequence number of the destination node in the chained list node and the key generate instruction carry it is flat Platform name and account name establish the corresponding relationship between the platform name, the account name and the target sequence number.
Key management apparatus 90 provided in this embodiment can utilize authentication before user logs in target platform Device can verify user identity, guarantee the safety of user account.In addition, in the key management unit of key management apparatus It is stored with the key information for logging in multiple platforms, when logging in target platform, key management unit can provide login target platform Key information, realize management to different user account key information.Key management apparatus 90 provided by the embodiments of the present application, Identity authentication and key management unit are combined together, so as to be mentioned for user while guaranteeing that user account is safe For the Password Management scheme of multiple accounts, the unified management of the password of different accounts is realized, provide convenience for user.
It as shown in Figure 10, is a kind of structural schematic diagram of key management system 1000 provided by the embodiment of the present application, packet It includes: key management apparatus 1001 and user terminal 1002.
The key management apparatus 1001 connects for storing the key information of at least one platform with the user terminal When connecing, target cipher key information is obtained for the user terminal;
The user terminal 1002, the account name that the login target platform for obtaining the input of active user end uses;It is based on The platform name of account name and the target platform that the login target platform of active user's input uses, is being stored at least one Target cipher key information is obtained in the key management apparatus of the key information of platform;Based on the target cipher key information and the account Name logs in the target platform.
In specific implementation, the key management apparatus 1001 is specifically used for being sent according to user's operation to user terminal true Recognize log-in instruction;Authentication information is sent to the certificate server according to the checking request that the certificate server is sent;
The user terminal 1002, specifically for the confirmation log-in instruction sent according to the key management apparatus, to certification Server sends verifying message, the authentication result of certificate server is received, if the certificate server sets the key management Standby certification passes through, then target cipher key information is obtained in the key management apparatus;
The system also includes certificate servers 1003, the verifying message for being sent according to user terminal, to the key Management equipment sends checking request;The authentication information sent according to the key management apparatus is to the key management apparatus It is authenticated, and to the user terminal return authentication result.
In specific implementation, the key management apparatus 1001, is asked specifically for the verifying sent according to certificate server It asks, carries the authentication information encrypted using the private key of key management apparatus to certificate server transmission, make The certificate server is verified and is returned to the authentication information based on the public key of the key management apparatus prestored Return authentication result.
In specific implementation, the key management apparatus 1001 is specifically used for generating target cipher key letter according to following steps Breath:
Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information;
The target cipher key information of generation is stored in the destination node of chained list node;
Based on target sequence number of the destination node in the chained list node and the key generate instruction carry it is flat Platform name and account name establish the corresponding relationship between the platform name, the account name and the target sequence number.
In specific implementation, the user terminal 1002 is specifically used for obtaining target cipher key information according to following steps:
According to the platform name of account name and the target platform that the login target platform that active user inputs uses, determine Inquire the target sequence number of the target cipher key information;
The corresponding destination node of the target sequence number is searched in the chained list node of the key management apparatus;Wherein, institute State the key information that platform is stored in chained list node;
The target cipher key information is obtained in the destination node.
It as shown in figure 11, is the structural schematic diagram of a kind of electronic equipment 1100 provided by the embodiment of the present application, comprising: place Manage device 1101, memory 1102 and bus 1103;
The machine readable instructions that the memory storage 1102 has the processor 1101 executable are (for example, the life in Fig. 8 Enable module 81, obtain module 82 and login module 83 is corresponding executes instruction), when electronic equipment operation, the processor It is communicated between 1101 and the memory 1102 by bus 1103, when the processor 1101 executes the machine readable instructions Realize following processing:
Obtain the account name that the login target platform of active user end input uses;
The platform name of account name and the target platform that login target platform based on active user's input uses, is being deposited Contain acquisition target cipher key information in the key management apparatus of the key information of at least one platform;
The target platform is logged in based on the target cipher key information and the account name.
In specific implementation, described to be stored with the close of at least one platform in the processing that above-mentioned processor 1101 executes In the key management apparatus of key information before acquisition target cipher key information, further includes:
Verifying message is sent to certificate server, authenticates the certificate server to the key management apparatus;
Receive the authentication result that certificate server carries out verifying return to the key management apparatus;
If the certificate server passes through the certification of the key management apparatus, obtained in the key management apparatus Take target cipher key information.
In specific implementation, in the processing that above-mentioned processor 1101 executes, the login mesh based on active user's input The platform name of account name and the target platform that mark platform uses, in the key pipe for being stored at least one platform key information It manages and obtains target cipher key information in equipment, comprising:
According to the platform name of account name and the target platform that the login target platform that active user inputs uses, determine Inquire the target sequence number of the target cipher key information;
The corresponding destination node of the target sequence number is searched in the chained list node of the key management apparatus;Wherein, institute State the key information that platform is stored in chained list node;
The target cipher key information is obtained in the destination node.
In specific implementation, in the processing that above-mentioned processor 1101 executes, the chained list in the key management apparatus The corresponding destination node of the target sequence number is searched in node, comprising:
The serial number of i-th of chained list node is obtained in the chained list node;
The serial number for i-th of chained list node that will acquire is compared with the target sequence number;
If the serial number of i-th of chained list node is identical as the target sequence number, it is determined that i-th of chained list node For the destination node;Otherwise, obtain i+1 chained list node serial number, and will acquire i+1 chained list node serial number and The target sequence number compares, until the serial number of the chained list node of acquisition is identical as the serial number of the destination node;Wherein, i For natural number.
In specific implementation, described to be based on the target cipher key information and institute in the processing that above-mentioned processor 1101 executes It states account name and logs in the target platform, comprising:
According to the cipher key-extraction rule negotiated with the target platform, obtained in the predetermined position of the target cipher key information The key information of presetting digit capacity is taken, and using the key information of presetting digit capacity as the login password for logging in the target platform;
The target platform is logged in using the login password and the user name.
In specific implementation, in the processing that above-mentioned processor 1101 executes, the method also includes:
Restore to instruct according to key information, obtains seed key information in the memory unit;
The seed key information is sent to key management apparatus, wherein the seed key information is used for the key Management equipment restores the target cipher key information.
It as shown in figure 12, is the structural schematic diagram of a kind of electronic equipment 1200 provided by the embodiment of the present application, comprising: place Manage device 1201, memory 1202 and bus 1203;
The machine readable instructions that the memory storage 1202 has the processor 1201 executable are (for example, the body in Fig. 9 Part authenticator 91 and key management unit 92 is corresponding executes instruction), when electronic equipment operation, the processor 1201 with it is described It is communicated between memory 1202 by bus 1203, the processor 1201 realizes following place when executing the machine readable instructions Reason:
Confirmation log-in instruction is sent to the user terminal according to user's operation, so that the user terminal is sent out to certificate server Send verifying message;Authentication information is sent to the certificate server according to the checking request that the certificate server is sent, Authenticate the certificate server to the key management apparatus;
The key information of at least one platform is stored, if the certificate server is logical to the certification of the key management apparatus It crosses, then obtains target cipher key information for the user terminal;Wherein, the user terminal is used to be based on the target cipher key information and use The account name at family logs in target platform.
In specific implementation, in the processing that above-mentioned processor 1201 executes, the verifying sent according to certificate server It requests to send authentication information to the certificate server, recognizes the certificate server to the key management apparatus Card, comprising:
According to the checking request that certificate server is sent, carries to certificate server transmission and set using key management The authentication information that standby private key is encrypted makes the certificate server based on the public affairs of the key management apparatus prestored Key verify to the authentication information and return authentication result.
In specific implementation, in the processing that above-mentioned processor 1201 executes, target cipher key information is generated according to following steps:
Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information;
The target cipher key information of generation is stored in the destination node of chained list node;
Based on target sequence number of the destination node in the chained list node and the key generate instruction carry it is flat Platform name and account name establish the corresponding relationship between the platform name, the account name and the target sequence number.
In addition, the embodiment of the present application also provides a kind of computer readable storage medium, on the computer readable storage medium It is stored with computer program, key management described in above method embodiment is executed when which is run by processor The step of method.
The computer program product of key management method provided by the embodiment of the present application, including storing program code Computer readable storage medium, the instruction that said program code includes can be used for executing key described in above method embodiment The step of management method, for details, reference can be made to above method embodiments, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application In provided several embodiments, it should be understood that disclosed systems, devices and methods, it can be real by another way It is existing.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic function It can divide, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can collect At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling Conjunction or direct-coupling or communication connection can be the indirect coupling or communication connection by some communication interfaces, device or unit, It can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
The above is only the protection scopes of the specific embodiment of the application, but the application to be not limited thereto, any to be familiar with Those skilled in the art within the technical scope of the present application, can easily think of the change or the replacement, and should all cover Within the protection scope of the application.Therefore, the protection scope of the application should be subject to the protection scope in claims.

Claims (11)

1. a kind of key management method, which is characterized in that be applied to user terminal, which comprises
Obtain the account name that the login target platform of active user end input uses;
The platform name of account name and the target platform that login target platform based on active user's input uses, is being stored with Target cipher key information is obtained in the key management apparatus of the key information of at least one platform;
The target platform is logged in based on the target cipher key information and the account name.
2. the method according to claim 1, wherein described in the key information for being stored at least one platform In key management apparatus before acquisition target cipher key information, further includes:
Verifying message is sent to certificate server, authenticates the certificate server to the key management apparatus;
Receive the authentication result that certificate server carries out verifying return to the key management apparatus;
If the certificate server passes through the certification of the key management apparatus, mesh is obtained in the key management apparatus Mark key information.
3. the method according to claim 1, wherein the login target platform based on active user's input makes The platform name of account name and the target platform, in the key management apparatus for being stored at least one platform key information Obtain target cipher key information, comprising:
According to the platform name of account name and the target platform that the login target platform that active user inputs uses, inquiry is determined The target sequence number of the target cipher key information;
The corresponding destination node of the target sequence number is searched in the chained list node of the key management apparatus;Wherein, the chain The key information of platform is stored in table node;
The target cipher key information is obtained in the destination node.
4. according to the method described in claim 3, it is characterized in that, described look into the chained list node of the key management apparatus Look for the corresponding destination node of the target sequence number, comprising:
The serial number of i-th of chained list node is obtained in the chained list node;
The serial number for i-th of chained list node that will acquire is compared with the target sequence number;
If the serial number of i-th of chained list node is identical as the target sequence number, it is determined that i-th of chained list node is institute State destination node;Otherwise, obtain the serial number of i+1 chained list node, and will acquire the serial number of i+1 chained list node with it is described Target sequence number compares, until the serial number of the chained list node of acquisition is identical as the serial number of the destination node;Wherein, i is certainly So number.
5. the method according to claim 1, wherein described be based on the target cipher key information and the account name Log in the target platform, comprising:
According to the cipher key-extraction rule negotiated with the target platform, obtained in the predetermined position of the target cipher key information pre- If the key information of digit, and using the key information of presetting digit capacity as the login password for logging in the target platform;
The target platform is logged in using the login password and the user name.
6. the method according to claim 1, wherein the method also includes:
Restore to instruct according to key information, obtains seed key information in the memory unit;
The seed key information is sent to key management apparatus, wherein the seed key information is used for the key management Equipment restores the target cipher key information.
7. a kind of key management method, which is characterized in that be applied in key management apparatus, the equipment includes: authentication Device and key management unit;
The key management unit is used to store the key information of at least one platform, and the identity authentication is for storing key pipe Manage the authentication information of equipment;
The described method includes: obtaining target cipher key information when being connect with user terminal for the user terminal, making user's end group Target platform is logged in the account name of the target cipher key information and user terminal.
8. the method according to the description of claim 7 is characterized in that it is described for the user terminal obtain target cipher key information it Before, further includes:
According to the checking request that certificate server is sent, is carried to certificate server transmission and utilize key management apparatus The authentication information that private key is encrypted makes the certificate server based on the public key of the key management apparatus prestored to described Authentication information verify and return authentication result.
9. the method according to the description of claim 7 is characterized in that generating target cipher key information according to following steps:
Instruction is generated according to the key that user terminal is sent, generates target cipher key information using seed key information;
The target cipher key information of generation is stored in the destination node of chained list node;
The platform name of target sequence number and key generation instruction carrying based on the destination node in the chained list node And account name, establish the corresponding relationship between the platform name, the account name and the target sequence number.
10. a kind of key management system, which is characterized in that the system comprises: key management apparatus and user terminal;Wherein,
The key management apparatus, for storing the key information of at least one platform, when being connect with the user terminal, for institute It states user terminal and obtains target cipher key information;
The user terminal, the account name that the login target platform for obtaining the input of active user end uses;Based on active user The platform name of account name and the target platform that the login target platform of input uses, is being stored with the close of at least one platform Target cipher key information is obtained in the key management apparatus of key information;Institute is logged in based on the target cipher key information and the account name State target platform.
11. system according to claim 10, which is characterized in that
The key management apparatus is specifically used for sending confirmation log-in instruction to user terminal according to user's operation;It is taken according to certification The checking request that device is sent of being engaged in sends authentication information to certificate server;
The user terminal is sent out specifically for the confirmation log-in instruction sent according to the key management apparatus to certificate server Verifying message is sent, the authentication result of certificate server is received, if certification of the certificate server to the key management apparatus Pass through, then obtains target cipher key information in the key management apparatus;
The system also includes certificate servers, the verifying message for being sent according to user terminal, to the key management apparatus Send checking request;The key management apparatus is recognized according to the authentication information that the key management apparatus is sent Card, and to the user terminal return authentication result.
CN201811327452.5A 2018-11-08 2018-11-08 A kind of key management method, system and electronic equipment Pending CN109257381A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811327452.5A CN109257381A (en) 2018-11-08 2018-11-08 A kind of key management method, system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811327452.5A CN109257381A (en) 2018-11-08 2018-11-08 A kind of key management method, system and electronic equipment

Publications (1)

Publication Number Publication Date
CN109257381A true CN109257381A (en) 2019-01-22

Family

ID=65044025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811327452.5A Pending CN109257381A (en) 2018-11-08 2018-11-08 A kind of key management method, system and electronic equipment

Country Status (1)

Country Link
CN (1) CN109257381A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166234A (en) * 2019-05-21 2019-08-23 阿里巴巴集团控股有限公司 A kind of creation of business cipher key and business datum encryption method, apparatus and system
CN111464297A (en) * 2020-03-30 2020-07-28 百度国际科技(深圳)有限公司 Transaction processing method and device based on block chain, electronic equipment and medium
CN112257041A (en) * 2020-10-19 2021-01-22 当家移动绿色互联网技术集团有限公司 Item control method and device and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
CN101777992A (en) * 2008-12-24 2010-07-14 华为终端有限公司 Method, equipment and system for logging in gateway
CN102148685A (en) * 2010-02-04 2011-08-10 陈祖石 Method and system for dynamically authenticating password by multi-password seed self-defined by user
CN102497635A (en) * 2011-11-28 2012-06-13 宇龙计算机通信科技(深圳)有限公司 Server, terminal and account password acquisition method
CN104333452A (en) * 2014-10-26 2015-02-04 重庆智韬信息技术中心 Multi-account encryption method for file data
CN104780048A (en) * 2015-04-13 2015-07-15 中国电子科技集团公司第二十八研究所 Lightweight mirror image file encryption system and method
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN107124409A (en) * 2017-04-25 2017-09-01 新华三技术有限公司 A kind of access authentication method and device
CN107423638A (en) * 2017-08-02 2017-12-01 成都安恒信息技术有限公司 A kind of password management system and application method based on order detection type Modify password

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777992A (en) * 2008-12-24 2010-07-14 华为终端有限公司 Method, equipment and system for logging in gateway
CN101719826A (en) * 2009-05-13 2010-06-02 北京宏基恒信科技有限责任公司 Dynamic token having function of updating seed key and updating method for seed key thereof
CN102148685A (en) * 2010-02-04 2011-08-10 陈祖石 Method and system for dynamically authenticating password by multi-password seed self-defined by user
CN102497635A (en) * 2011-11-28 2012-06-13 宇龙计算机通信科技(深圳)有限公司 Server, terminal and account password acquisition method
CN104333452A (en) * 2014-10-26 2015-02-04 重庆智韬信息技术中心 Multi-account encryption method for file data
CN104780048A (en) * 2015-04-13 2015-07-15 中国电子科技集团公司第二十八研究所 Lightweight mirror image file encryption system and method
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN107124409A (en) * 2017-04-25 2017-09-01 新华三技术有限公司 A kind of access authentication method and device
CN107423638A (en) * 2017-08-02 2017-12-01 成都安恒信息技术有限公司 A kind of password management system and application method based on order detection type Modify password

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166234A (en) * 2019-05-21 2019-08-23 阿里巴巴集团控股有限公司 A kind of creation of business cipher key and business datum encryption method, apparatus and system
CN111464297A (en) * 2020-03-30 2020-07-28 百度国际科技(深圳)有限公司 Transaction processing method and device based on block chain, electronic equipment and medium
CN111464297B (en) * 2020-03-30 2023-05-26 百度国际科技(深圳)有限公司 Transaction processing method, device, electronic equipment and medium based on block chain
CN112257041A (en) * 2020-10-19 2021-01-22 当家移动绿色互联网技术集团有限公司 Item control method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US10846372B1 (en) Systems and methods for trustless proof of possession and transmission of secured data
US9185111B2 (en) Cryptographic authentication techniques for mobile devices
CN105915338B (en) Generate the method and system of key
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
US10887110B2 (en) Method for digital signing with multiple devices operating multiparty computation with a split key
EP3684005A1 (en) Method and system for recovering cryptographic keys of a blockchain network
JP2018093434A (en) Transaction management method, transaction management program and transaction management device
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN111131336B (en) Resource access method, device, equipment and storage medium under multi-party authorization scene
CN111275419A (en) Block chain wallet signature right confirming method, device and system
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN109257381A (en) A kind of key management method, system and electronic equipment
CN111901304B (en) Registration method and device of mobile security equipment, storage medium and electronic device
US20230237437A1 (en) Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
CN111314066B (en) Block chain-based data transfer method, terminal and computer-readable storage medium
CN111566647A (en) Identity recognition system based on block chain
CN110719172A (en) Signature method, signature system and related equipment in block chain system
CN111212026A (en) Data processing method and device based on block chain and computer equipment
KR102372503B1 (en) Method for providing authentification service by using decentralized identity and server using the same
KR101586439B1 (en) User data integrity verification method and apparatus capable of guaranteeing privacy
US11082236B2 (en) Method for providing secure digital signatures
JP6581611B2 (en) Authentication key sharing system and authentication key sharing method
CN113271207A (en) Escrow key using method and system based on mobile electronic signature, computer equipment and storage medium
Durán et al. An architecture for easy onboarding and key life-cycle management in blockchain applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190122