CN116055048B - Method and device for storing and restoring scattered keys - Google Patents

Method and device for storing and restoring scattered keys Download PDF

Info

Publication number
CN116055048B
CN116055048B CN202310334521.XA CN202310334521A CN116055048B CN 116055048 B CN116055048 B CN 116055048B CN 202310334521 A CN202310334521 A CN 202310334521A CN 116055048 B CN116055048 B CN 116055048B
Authority
CN
China
Prior art keywords
key
storage
module
private
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310334521.XA
Other languages
Chinese (zh)
Other versions
CN116055048A (en
Inventor
王伟
尹寿长
韩威宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Sefon Software Co Ltd
Original Assignee
Chengdu Sefon Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Sefon Software Co Ltd filed Critical Chengdu Sefon Software Co Ltd
Priority to CN202310334521.XA priority Critical patent/CN116055048B/en
Publication of CN116055048A publication Critical patent/CN116055048A/en
Application granted granted Critical
Publication of CN116055048B publication Critical patent/CN116055048B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a scattered key storage and restoration method and a device, which relate to the technical field of plaintext encryption and aim to realize a safer and more reliable key distribution and storage method, wherein the method comprises the steps of generating a working key and a root key, wherein the root key comprises a public key and a private key; encrypting a target plaintext to be encrypted through a working key; encrypting the working key through the public key to obtain an encryption result; sequentially numbering all key storage modules; the encryption result and the private key are respectively stored in a scattered way in one or more key storage modules with discrete sequence numbers, so as to obtain an allocation storage result; and generating a storage address key according to the distribution storage result. The invention has the advantages of safer encryption and stronger logic.

Description

Method and device for storing and restoring scattered keys
Technical Field
The invention relates to the technical field of plaintext encryption, in particular to a method and a device for storing and restoring a scattered key.
Background
With the rapid development and widespread use of computer technology, the importance of cryptography is also becoming increasingly important. Cryptography is a discipline in which information security is protected and it is studied how to ensure the security of information during its transmission. With advances in technology and increasing demands for secure communications, the field of cryptography is also evolving. One key challenge in cryptography is how to securely distribute, restore keys, which are important tools for encrypting and decrypting information.
Therefore, there is a need to develop a more secure and reliable key distribution storage method to enhance confidentiality.
Disclosure of Invention
The invention aims to provide a scattered key storage and restoration method and device, and aims to realize a safer and more reliable key distribution storage method.
The embodiment of the invention is realized by the following technical scheme:
the invention provides a scattered key storage method, which comprises the following steps:
generating a working key and a root key, wherein the root key comprises a public key and a private key;
encrypting a target plaintext to be encrypted through a working key;
encrypting the working key through the public key to obtain an encryption result;
sequentially numbering all key storage modules;
the encryption result and the private key are respectively stored in a scattered way in one or more key storage modules with discrete sequence numbers, so that an allocation storage result is obtained;
and generating a storage address key according to the distribution storage result.
Preferably, the working key is generated by a symmetric encryption algorithm and the root key is generated by an asymmetric encryption algorithm.
Preferably, the method for decentralized storage includes:
randomly slicing the encryption result and the private key respectively;
and respectively storing the results of the random slicing in one or more designated key storage modules according to a configuration file.
Preferably, a false private key is stored in at least one key storage module which is not stored in a scattered manner.
Preferably, the method for generating the false private key is as follows:
generating a plurality of groups of root keys;
randomly selecting one group of root keys for encryption, wherein the public key is used for encrypting the working key, and the private key is stored in a scattered manner;
the private keys of the remaining root keys are the false private keys.
Preferably, the method for generating the storage address key is as follows:
generating a key storage name for each key storage module, wherein the key storage name comprises a prefix, a middle section and a suffix;
the prefix, the middle section and the suffix are respectively the storage content type, the address information and the sequence number of the corresponding key storage module;
the address information is a string of binary characters, the number of the i bit from the left represents the storage condition in the key storage module with the sequence number of i, 1 represents that the private key or the encryption result is stored in the key storage module, and 0 represents that the private key or the encryption result or the false private key is not stored in the key storage module;
the key storage name serves as the storage address key.
The invention also provides a scattered key restoring method which is applied to the scattered key storage method, and the working key is obtained through restoring the storage address key, and the method comprises the following steps:
decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module;
decrypting the corresponding encryption result through the private key to obtain a working key;
and decrypting the encrypted target plaintext through a working key.
The invention also provides a device for storing and restoring the scattered key, which comprises:
a key generation module: generating a working key and a root key, the root key comprising a public key and a private key;
a first encryption module: encrypting a target plaintext to be encrypted through a working key, and encrypting the working key through the public key to obtain an encryption result;
the key storage module initializing module: for sequentially numbering all key storage modules;
the first intelligent dynamic allocation module: the encryption module is used for carrying out scattered storage on the encryption result in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result;
the second intelligent dynamic allocation module: the private key storage module is used for carrying out scattered storage on the private key in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result;
a storage address key generation module: the storage address key is used for generating a storage address key according to the distribution storage result;
a storage address key decryption module: the encryption module is used for decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module;
a working key decryption module: the encryption method comprises the steps of decrypting the corresponding encryption result through the private key to obtain a working key;
target plaintext decryption module: for decrypting the encrypted target plaintext by means of a working key.
The technical scheme of the embodiment of the invention has at least the following advantages and beneficial effects:
the invention adopts a mode of combining the working key and the root key, thereby increasing the security of the key;
when the key storage module is used and the storage address key is generated, an orderly and discrete storage generation mode is adopted, so that the safety of the storage address key is improved;
the invention implements the decentralized storage of the keys, the key storage modules independently run, the single key storage module does not depend on other key storage modules, the coupling is low, the key storage modules are not interfered with each other in and out of the system, the resources are reasonably utilized, and the stability, the safety and the expandability of the key storage modules are ensured;
the multi-layer secret key is clear in logic when being restored step by step, and the restoring accuracy and efficiency are higher;
the invention has reasonable design, clear logic structure and convenient popularization and application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a principle and a structure of a distributed key storage method according to an embodiment of the present invention
Fig. 2 is a flow chart of a method for storing a distributed key according to an embodiment of the present invention;
fig. 3 is a flow chart of a distributed key decryption method according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
In the description of the present invention, it should be noted that, if the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate an azimuth or a positional relationship based on that shown in the drawings, or an azimuth or a positional relationship in which a product of the application is conventionally put in use, it is merely for convenience of describing the present invention and simplifying the description, and it is not indicated or implied that the referred device or element must have a specific azimuth, be constructed and operated in a specific azimuth, and thus should not be construed as limiting the present invention.
In the description of the present invention, it should also be noted that, unless explicitly stated and limited otherwise, the terms "disposed," "mounted," "connected," and "connected" should be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Example 1
Referring to fig. 1 and 2, the present embodiment provides a distributed key storage method, which includes the following steps:
generating a working key and a root key, wherein the root key comprises a public key and a private key;
encrypting a target plaintext to be encrypted through a working key;
encrypting the working key through the public key to obtain an encryption result;
sequentially numbering all key storage modules;
the encryption result and the private key are respectively stored in a scattered way in one or more key storage modules with discrete sequence numbers, so that an allocation storage result is obtained;
and generating a storage address key according to the distribution storage result.
Preferably, the working key may be generated by a symmetric encryption algorithm, and the root key may be generated by an asymmetric encryption algorithm.
The embodiment utilizes a symmetric encryption algorithm and an asymmetric encryption algorithm simultaneously, wherein the symmetric encryption algorithm is utilized to generate a working key, the working key can encrypt a target plaintext, the asymmetric encryption algorithm is utilized to generate a root key, the public key of the root key is utilized to encrypt the working key, and the private key of the root key is utilized to decrypt the working key. After the encryption of the working key is completed, the system can respectively conduct intelligent scattered storage on the encryption result and the private key of the root key, in the intelligent scattered storage process, the system can automatically generate the storage address key of each key storage module according to the distribution mode, and meanwhile, the storage address key can be generated, so that each storage module can directly and independently operate without interference, no secret leakage exists when any storage module leaks or is broken, and the safety of inscription is guaranteed. The embodiment greatly reduces the complexity of the key distribution process, adopts a multi-level security strategy in the encryption and distribution process, greatly reduces the probability of the key being broken, and ensures the security of the key.
Example 2
The present embodiment is based on the technical solution of embodiment 1, and further describes the dispersion storage.
In this embodiment, the method for decentralized storage includes:
randomly slicing the encryption result and the private key respectively;
and respectively storing the results of the random slicing in one or more designated key storage modules according to a configuration file.
The encryption result and the private key are respectively operated, and particularly, in specific distributed storage key storage module allocation, intelligent dynamic allocation can be performed according to a configuration file, and a user can specify a key distribution mode in the configuration file.
Example 3
The present embodiment is based on the technical scheme of embodiment 1, and further description is given of the dispersed storage and the storage address key.
As a preferable scheme of the embodiment, a false private key is stored in at least one key storage module which does not perform scattered storage.
In this embodiment, the method for generating the false private key includes:
generating a plurality of groups of root keys;
randomly selecting one group of root keys for encryption, wherein the public key is used for encrypting the working key, and the private key is stored in a scattered manner;
the private keys of the remaining root keys are the false private keys.
For example, multiple sets of root keys are randomly generated, and one set of root key pairs is randomly selected for use in this embodiment, for example, a second set of root keys is randomly selected for use, where a public key of the second set of root keys is used to encrypt the working key, and the private key of the second set of root keys is stored in the decentralized manner. The public keys of the rest root keys are not used for encryption, and only the private keys of the root keys are respectively subjected to scattered storage operation. The method aims to increase the complexity of the key storage and restoration process and reduce the probability of key cracking.
Further, the method for generating the storage address key comprises the following steps:
generating a key storage name for each key storage module, wherein the key storage name comprises a prefix, a middle section and a suffix;
the address information is a string of binary characters, the number of the i bit from the left represents the storage condition in the key storage module with the sequence number of i, 1 represents that the private key or the encryption result is stored in the key storage module, and 0 represents that the private key or the encryption result or the false private key is not stored in the key storage module;
the prefix, the middle section and the suffix are respectively the storage content type, the address information and the sequence number of the corresponding key storage module;
the key storage name serves as the storage address key.
The following is explained by a case:
for example, the key storage module may include JVM parameters, system environment variables, local files, class lookup paths, and remote servers.
The sequence numbers assigned to the key storage modules for storing private keys in a scattered manner are necessarily discrete, for example, 01, 03, 05 and 07 respectively, and the sequence numbers are discrete numbers, which meet the implementation requirements of the embodiment.
At this time, in order to reduce the probability of key cracking, the system discretely generates a key storage name:
such as the key storage names first 1010101_01, first 1010101_03, first 1010101_05 and second 1010101_07. The storage content type of the designated letter first representing the key storage module is a private key, and the storage content type of the designated letter first representing the key storage module is an encryption result. Each bit of the address information in the middle represents the storage condition of a key storage module according to the ascending order of the sequence numbers from the left side, the number 1 represents that the key storage module stores a private key or an encryption result, the number 0 represents that no private key or no encryption result is stored, but false private keys are possibly stored, the private keys are stored in the sequence numbers 01, 03 and 05, and the encryption result is stored in the sequence numbers 07, so the address information 1010101.
Meanwhile, the first_1010101_02 key storage name can be generated in the local file with the sequence number of 02 and without any key stored, but the storage address only stores randomly generated false private keys, and because the false private key type also belongs to the private keys, the prefix of the key storage name is the first representing the private keys, so that when an attacker carries out decoding, decoding steps are greatly improved, and decoding probability is reduced.
In particular, the process private key and the encryption result are stored separately, and each may be stored in one or more key storage modules.
Example 4
The present embodiment further provides a method for restoring a distributed key, referring to fig. 3, which is applied to the method for storing a distributed key in any one of the foregoing embodiments, where the working key is obtained by restoring the storage address key, and includes the following steps:
decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module;
decrypting the corresponding encryption result through the private key to obtain a working key;
and decrypting the encrypted target plaintext through a working key.
When decrypting with the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module, for example, referring to the rule of embodiment 3, in the key storage module storing contents, we have several storage address keys of first_1010101_01, first_1010101_02, first_1010101_03, first_1010101_05 and second_1010101_07, and from the intermediate address information 1010101 we can know that the key storage module with the required advance sequence numbers of 1, 3, 5 and 7, so that first_1010101_01, first_1010101_03, first_1010101_05 and second_1010101_07 can be taken out individually according to the suffix, and from the prefix we can know that the first_1011_01, first_1010101_03, first_0101_05 is the private key inside and that the second_0101_07 is the encryption result inside.
The original private key and the encryption result can be restored by extracting the scattered private key and the encryption result, and the encryption result is obtained by encrypting the working key by the public key paired with the private key, namely the private key and the encryption result have unique correspondence, the restored private key and the encryption result are stored in a paired way, so the private key can be used for decrypting the encryption result to restore the working key, and finally the encrypted target plaintext can be restored by decrypting the working key.
Example 5
The embodiment also provides a device for storing and restoring the distributed key, which comprises:
a key generation module: generating a working key and a root key, the root key comprising a public key and a private key;
a first encryption module: encrypting a target plaintext to be encrypted through a working key, and encrypting the working key through the public key to obtain an encryption result;
the key storage module initializing module: for sequentially numbering all key storage modules;
the first intelligent dynamic allocation module: the encryption module is used for carrying out scattered storage on the encryption result in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result;
the second intelligent dynamic allocation module: the private key storage module is used for carrying out scattered storage on the private key in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result;
a storage address key generation module: the storage address key is used for generating a storage address key according to the distribution storage result;
a storage address key decryption module: the encryption module is used for decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module;
a working key decryption module: the encryption method comprises the steps of decrypting the corresponding encryption result through the private key to obtain a working key;
target plaintext decryption module: for decrypting the encrypted target plaintext by means of a working key.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. A distributed key storage method, comprising the steps of:
generating a working key and a root key, wherein the root key comprises a public key and a private key;
encrypting a target plaintext to be encrypted through a working key;
encrypting the working key through the public key to obtain an encryption result;
sequentially numbering all the key storage modules, and respectively performing scattered storage on the encryption result and the private key in one or more key storage modules with discrete sequential numbering to obtain an allocation storage result; storing a false private key in at least one key storage module which is not subjected to scattered storage;
generating a storage address key according to the distribution storage result;
the method for decentralized storage comprises the following steps:
randomly slicing the encryption result and the private key respectively;
respectively storing the random slicing results in one or more designated key storage modules according to a configuration file;
the method for generating the storage address key comprises the following steps:
generating a key storage name for each key storage module, wherein the key storage name comprises a prefix, a middle section and a suffix;
the prefix, the middle section and the suffix are respectively the storage content type, the address information and the sequence number of the corresponding key storage module; the address information is a string of binary characters, the number of the i bit from the left represents the storage condition in the key storage module with the sequence number of i, 1 represents that the private key or the encryption result is stored in the key storage module, and 0 represents that the private key or the encryption result or the false private key is not stored in the key storage module;
the key storage name serves as the storage address key.
2. A distributed key storage method according to claim 1, wherein: the working key is generated by a symmetric encryption algorithm, and the root key is generated by an asymmetric encryption algorithm.
3. The method for storing the distributed key according to claim 1, wherein the method for generating the false private key is as follows:
generating a plurality of groups of root keys;
randomly selecting one group of root keys for encryption, wherein the public key is used for encrypting the working key, and the private key is stored in a scattered manner;
the private keys of the remaining root keys are the false private keys.
4. A distributed key restoring method applied to the distributed key storing method according to any one of claims 1 to 3, wherein the working key is obtained by restoring the storage address key, comprising the steps of:
decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module;
decrypting the corresponding encryption result through the private key to obtain a working key;
and decrypting the encrypted target plaintext through a working key.
5. A distributed key storage and retrieval apparatus comprising:
a key generation module: generating a working key and a root key, the root key comprising a public key and a private key;
a first encryption module: encrypting a target plaintext to be encrypted through a working key, and encrypting the working key through the public key to obtain an encryption result;
the key storage module initializing module: for sequentially numbering all key storage modules;
the first intelligent dynamic allocation module: the encryption module is used for carrying out scattered storage on the encryption result in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result;
the second intelligent dynamic allocation module: the private key storage module is used for carrying out scattered storage on the private key in one or more key storage modules with discrete sequence numbers to obtain an allocation storage result, and false private keys are stored in at least one key storage module which is not subjected to scattered storage; the method for scattered storage comprises the following steps: the encryption result and the private key are randomly sliced respectively, and the random slicing result is stored in one or more designated key storage modules respectively according to a configuration file;
a storage address key generation module: the storage address key is used for generating a storage address key according to the distribution storage result;
a storage address key decryption module: the encryption module is used for decrypting through the storage address key to obtain the encryption result and the corresponding private key stored in the key storage module; the method for generating the storage address key comprises the following steps:
generating a key storage name for each key storage module, wherein the key storage name comprises a prefix, a middle section and a suffix;
the prefix, the middle section and the suffix are respectively the storage content type, the address information and the sequence number of the corresponding key storage module; the address information is a string of binary characters, the number of the i bit from the left represents the storage condition in the key storage module with the sequence number of i, 1 represents that the private key or the encryption result is stored in the key storage module, and 0 represents that the private key or the encryption result or the false private key is not stored in the key storage module;
the key storage name is used as the storage address key;
a working key decryption module: decrypting the corresponding encryption result through the private key to obtain a working key;
target plaintext decryption module: for decrypting the encrypted target plaintext by means of a working key.
CN202310334521.XA 2023-03-31 2023-03-31 Method and device for storing and restoring scattered keys Active CN116055048B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310334521.XA CN116055048B (en) 2023-03-31 2023-03-31 Method and device for storing and restoring scattered keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310334521.XA CN116055048B (en) 2023-03-31 2023-03-31 Method and device for storing and restoring scattered keys

Publications (2)

Publication Number Publication Date
CN116055048A CN116055048A (en) 2023-05-02
CN116055048B true CN116055048B (en) 2023-05-30

Family

ID=86131752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310334521.XA Active CN116055048B (en) 2023-03-31 2023-03-31 Method and device for storing and restoring scattered keys

Country Status (1)

Country Link
CN (1) CN116055048B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989991A (en) * 2010-11-24 2011-03-23 北京天地融科技有限公司 Method for importing secret keys safely, electronic signature tool, authentication device and system
CN102811124A (en) * 2012-08-01 2012-12-05 连云港杰瑞深软科技有限公司 System validation method based on two-card three-password technique
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN108111524A (en) * 2017-12-28 2018-06-01 广州江南科友科技股份有限公司 Terminal data protection method and system based on private key dynamic generation mechanism
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN110098924A (en) * 2019-04-19 2019-08-06 深圳华中科技大学研究院 Support can search for the level cipher key technique of transparent encryption
WO2022133860A1 (en) * 2020-12-24 2022-06-30 Intel Corporation Key management for crypto processors attached to other processing units

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230077053A1 (en) * 2019-04-26 2023-03-09 Barbara Jean Wilk Authentication using a decentralized and/or hybrid dencentralized secure crypographic key storage method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989991A (en) * 2010-11-24 2011-03-23 北京天地融科技有限公司 Method for importing secret keys safely, electronic signature tool, authentication device and system
CN102811124A (en) * 2012-08-01 2012-12-05 连云港杰瑞深软科技有限公司 System validation method based on two-card three-password technique
CN106330868A (en) * 2016-08-14 2017-01-11 北京数盾信息科技有限公司 Encrypted storage key management system and method of high-speed network
CN108111524A (en) * 2017-12-28 2018-06-01 广州江南科友科技股份有限公司 Terminal data protection method and system based on private key dynamic generation mechanism
CN109543434A (en) * 2018-11-28 2019-03-29 深圳市墨者安全科技有限公司 Block chain information encryption method, decryption method, storage method and device
CN110098924A (en) * 2019-04-19 2019-08-06 深圳华中科技大学研究院 Support can search for the level cipher key technique of transparent encryption
WO2022133860A1 (en) * 2020-12-24 2022-06-30 Intel Corporation Key management for crypto processors attached to other processing units

Also Published As

Publication number Publication date
CN116055048A (en) 2023-05-02

Similar Documents

Publication Publication Date Title
CN104363215B (en) A kind of encryption method and system based on attribute
CN105787387B (en) A kind of database encryption method and the encrypting database querying method
CN101447870B (en) Safe storage method of private key based on technology of distributed password
EP1374464B1 (en) Method and apparatus for camouflaging of data, information and functional transformations
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN106650482A (en) Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN107888381A (en) A kind of implementation method of key importing, apparatus and system
CN105406966B (en) A kind of distribution of threshold secret information, reduction, integrity verification method and device
CN111314050B (en) Encryption and decryption method and device
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN112187448B (en) Data encryption method and system
CN104396182A (en) Method of encrypting data
CN108183791A (en) Applied to the Intelligent terminal data safe processing method and system under cloud environment
Aung et al. A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher)
CN111262852B (en) Business card signing and issuing method and system based on block chain
CN110225028B (en) Distributed anti-counterfeiting system and method thereof
CN115632880A (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
Sen et al. Bit level symmetric key cryptography using genetic algorithm
CN116055048B (en) Method and device for storing and restoring scattered keys
KR100995123B1 (en) Methods and apparatuses for cipher indexing in order to effective search of ciphered-database
CN115712919A (en) Regional medical data encryption and application method
CN111314051B (en) Encryption and decryption method and device
CN110351084B (en) Secret processing method for urban basic mapping data
CN117411727B (en) Encryption method, device and storage medium for symmetric encryption of communication transmission
CN111314079B (en) Encryption and decryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant