CN101281585A - Intelligent cipher key and method for managing management password of intelligent IC card - Google Patents

Intelligent cipher key and method for managing management password of intelligent IC card Download PDF

Info

Publication number
CN101281585A
CN101281585A CNA2008100941796A CN200810094179A CN101281585A CN 101281585 A CN101281585 A CN 101281585A CN A2008100941796 A CNA2008100941796 A CN A2008100941796A CN 200810094179 A CN200810094179 A CN 200810094179A CN 101281585 A CN101281585 A CN 101281585A
Authority
CN
China
Prior art keywords
key
management password
intelligent
card
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100941796A
Other languages
Chinese (zh)
Inventor
崔红健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ZHIANXIN TECHNOLOGY Ltd
Original Assignee
BEIJING ZHIANXIN TECHNOLOGY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ZHIANXIN TECHNOLOGY Ltd filed Critical BEIJING ZHIANXIN TECHNOLOGY Ltd
Priority to CNA2008100941796A priority Critical patent/CN101281585A/en
Publication of CN101281585A publication Critical patent/CN101281585A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an intelligent cipher key and a management method of the intelligent IC card management password, including the steps: firstly generating the asymmetric key pair namely a clear key and a private key; randomly generating a management password for each intelligent cipher key or intelligent IC card; secondly encrypting the management password generated by using the disclosed cipher; then formatting the intelligent cipher key and the intelligent IC card, and writing the ciphered management password into the intelligent cipher key and the intelligent IC card; finally unlocking the intelligent cipher key or intelligent IC card if needing a management password and reading the ciphered management password and using the private key to decrypt to obtain the original management password. The invention has the advantages that, the generated management password is encrypted and decrypted based on the asymmetric key pair to realize the management on the management password, which effectively prevents the easy leakage of the single management password to bring the safety problems, and avoids the complex management and the easy confusion.

Description

The method for managing management password of intelligent code key and intellective IC card
Technical field
The present invention relates to the management password of a kind of intelligent code key and intellective IC card, particularly relate to a kind of to intelligent code key, the method that the management password of intellective IC card generates and manages.
Background technology
At present, at the intelligent code key that uses in enormous quantities, perhaps during intellective IC card, usually it is concentrated format, and when concentrating format, need or manage the setting of password to intellective IC card to those intelligent code keys, but because the user is numerous, if unification is provided with same management password during format, in case then other people have known wherein any one cipher key, or the management threshold password of intellective IC card, just can be to all cipher keys, or the intellective IC card release, this will badly influence the security of system.In addition, leave office, also can cause the potential safety hazard of system if participate in formative personnel.
Therefore, at the problems referred to above, if the technician just considers at each intelligent code key, perhaps intellective IC card adopts different management passwords, though can solve safety problem like this,, when intelligent code key or intellective IC card quantity are a lot, will bring complex management, problems such as obscuring easily and forget.
Summary of the invention
In view of the above problems, fundamental purpose of the present invention is to provide a kind of method of managing concentratedly safely and effectively based on the management password of asymmetric arithmetic technology generation intelligent code key or intellective IC card.
In order to achieve the above object, the present invention has adopted following technical proposals:
At first, it is right to generate unsymmetrical key, that is, and and public-key cryptography and private cipher key; For each intelligent code key generates a management password at random; Secondly, adopt public-key cryptography that the management password that generates is at random encrypted; Then, format above-mentioned intelligent code key, and the management password after will encrypting writes in this intelligent code key.
At last, if desired intelligent code key is carried out release, the management password after the reading encrypted in intelligent code key then, and utilize private cipher key just can obtain original management password to being decrypted.
In like manner, for the management of the management password of intellective IC card also for to carry out with reference to above-mentioned steps.
The method of the invention is for realizing intelligent code key the management password that generates being carried out the encrypting and decrypting action based on unsymmetrical key, the perhaps management of the management password of intellective IC card, this method prevented effectively that the single management password from very easily revealing and safety issue that system is brought, and the problem of having avoided complex management in the prior art and easily having obscured.
Description of drawings
Fig. 1 is the process flow diagram of the method for managing management password of intelligent code key of the present invention and intellective IC card.
Embodiment
Come the method for managing management password of intelligent code key of the present invention and intellective IC card is described in further detail below in conjunction with accompanying drawing and embodiment.
The method for managing management password of intelligent code key of the present invention and intellective IC card is to utilize unsymmetrical key that the characteristic when the encryption and decryption is managed concentratedly safely and effectively to the management password of intelligent code key and the management password of intellective IC card, it can prevent effectively not only that the management password of single intelligent code key or intellective IC card from very easily revealing and safety issue that system is brought, and also can avoid in the prior art the complex management of management password and the problem of easily obscuring.
Wherein, described unsymmetrical key is to comprising public-key cryptography and private cipher key.
Shown in Fig. 1, the method for managing management password of described intelligent code key and intellective IC card is as follows:
At first, it is right to generate asymmetric secret key, and this asymmetric cryptography key is preserved, promptly, private cipher key wherein is stored in the storage medium with certain security mechanism, and (step 100) derived and preserved to public-key cryptography then with the form of file or extended formatting; Secondly, generate a management password (step 101) at random for each intelligent code key or intellective IC card; And adopt the public-key cryptography in the above-mentioned asymmetric cryptography key that the above-mentioned management password that generates is at random encrypted (step 102) one by one; Then, format this intelligent code key or intellective IC card, and the management password after the above-mentioned encryption is write to intelligent code key or intellective IC card (step 103).
At last, and when needs use the pairing management password of intelligent code key or intellective IC card, in this intelligent code key or intellective IC card, read the management password (step 104) after the above-mentioned encryption, and adopt private cipher key that the management password of this encryption is decrypted, thereby obtain the management password (step 105 and step 106) of original unencryption.
Wherein, described unsymmetrical key generates can be with intelligent cipher equipment, also can adopt software approach to generate, and the private cipher key in this unsymmetrical key needs safe storage, therefore need be kept in the above-mentioned storage medium with security mechanism, for example, private USB flash disk, the storer of encryption or the like.
In addition, the publicly-owned key in the described unsymmetrical key then is to derive with file or extended formatting form in intelligent code key or intellective IC card, so that this publicly-owned key can be distributed or use, this publicly-owned key can be kept in the computer; And described random administration password can adopt the randomizer that carries in intelligent code key or the intellective IC card to generate.
In conjunction with the method flow diagram shown in Fig. 1, and come with the specific embodiment of intelligent code key that the present invention will be described, and be the randomizer that adopts intelligent code key to carry in this embodiment, and conciliate lock tool at the format instrument of intelligent code key design, its course of work is as follows:
At first, use intelligent code key at CA center application digital certificate, and adopt the key escrow mode to generate the RSA1024bit unsymmetrical key, simultaneously, derive this corresponding digital certificate from this described intelligent code key, being about to wherein publicly-owned key derives and it is preserved.
Next, randomizer is at this intelligent code key generation management password at random in the intelligent code key.
Then, adopt the Public key in the above-mentioned unsymmetrical key that this management password is encrypted, and the management password after will encrypting write in the intelligent code key.
In actual the use, owing to be that this above-mentioned digital certificate and format instrument are distributed to the personnel with format authority, for example, personnel A and personnel B, and by this personnel A and personnel B respectively using form chemical industry tool format intelligent code key in batches, therefore, in this process, personnel A and personnel B be can't directly see or know they the actual management password of formative intelligent code key.
In addition, because private cipher key is for being kept in the intelligent code key, and really grasp the keeper that has only of this intelligent code key, then when needs carry out release to this intelligent code key, and have only this keeper to participate in, and in releasing process, for employing is separated lock tool and read and corresponding deciphering encrypting back management password in conjunction with the private cipher key in this intelligent code key, thereby really managed password, and then to this intelligent code key unlocking operation.
In said process, because this decrypting process is to go to carry out decryption oprerations by the private cipher key of separating in the automatic combined with intelligent cipher key of lock tool, therefore, the keeper cannot see actual management password, thereby also avoided the potential security threat that causes owing to human factor, even this keeper leaves office, the intelligent code key that its needs will be preserved privately owned secret key is returned and is got final product, even if it does not return intelligent code key, this keeper can't carry out unlocking operation to other people intelligent code key, has realized that thus the safety of management password is concentrated control.

Claims (2)

1. the management method of the management password of intelligent code key and intellective IC card is characterized in that, comprises the steps:
A, generation public-key cryptography and private cipher key;
B, generate a management password at random for each intelligent code key and intellective IC card;
The public-key cryptography of C, the above-mentioned unsymmetrical key of employing is encrypted the above-mentioned management password that generates at random;
D, format intelligent code key and intellective IC card, and write management password after the encryption therein;
E, when needs management password, the management password after the reading encrypted, and utilize private cipher key to being decrypted obtains original management password.
2. the management method of the management password of intelligent code key and intellective IC card according to claim 1 is characterized in that described private cipher key is to be kept in the storage medium with security mechanism.
CNA2008100941796A 2008-05-07 2008-05-07 Intelligent cipher key and method for managing management password of intelligent IC card Pending CN101281585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100941796A CN101281585A (en) 2008-05-07 2008-05-07 Intelligent cipher key and method for managing management password of intelligent IC card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100941796A CN101281585A (en) 2008-05-07 2008-05-07 Intelligent cipher key and method for managing management password of intelligent IC card

Publications (1)

Publication Number Publication Date
CN101281585A true CN101281585A (en) 2008-10-08

Family

ID=40014046

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100941796A Pending CN101281585A (en) 2008-05-07 2008-05-07 Intelligent cipher key and method for managing management password of intelligent IC card

Country Status (1)

Country Link
CN (1) CN101281585A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868521A (en) * 2012-09-12 2013-01-09 成都卫士通信息产业股份有限公司 Method for enhancing secret key transmission of symmetrical secret key system
CN111523127A (en) * 2020-03-26 2020-08-11 郑州信大捷安信息技术股份有限公司 Authority authentication method and system for password equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102868521A (en) * 2012-09-12 2013-01-09 成都卫士通信息产业股份有限公司 Method for enhancing secret key transmission of symmetrical secret key system
CN102868521B (en) * 2012-09-12 2015-03-04 成都卫士通信息产业股份有限公司 Method for enhancing secret key transmission of symmetrical secret key system
CN111523127A (en) * 2020-03-26 2020-08-11 郑州信大捷安信息技术股份有限公司 Authority authentication method and system for password equipment
CN111523127B (en) * 2020-03-26 2022-02-25 郑州信大捷安信息技术股份有限公司 Authority authentication method and system for password equipment

Similar Documents

Publication Publication Date Title
CN102624522B (en) A kind of key encryption method based on file attribute
US9043610B2 (en) Systems and methods for data security
CN101196855B (en) Mobile encrypted memory device and cipher text storage area data encrypting and deciphering processing method
CN103580855B (en) Usbkey management method based on sharing technology
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
JP4597784B2 (en) Data processing device
JP2009103774A (en) Secret sharing system
CN103955654A (en) USB (Universal Serial Bus) flash disk secure storage method based on virtual file system
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
CN103095452A (en) Random encryption method needing to adopt exhaustion method for deciphering
JP6049914B2 (en) Cryptographic system, key generation device, and re-encryption device
CN101951315A (en) Key processing method and device
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN112383391A (en) Data security protection method based on data attribute authorization, storage medium and terminal
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
JP2024511236A (en) Computer file security encryption method, decryption method and readable storage medium
WO2012053886A1 (en) A method and system for file encryption and decryption in a server
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
CN103207976A (en) Mobile storage file leakage-preventing method and confidential U-disk based on same
TWI728355B (en) Password-protected data storage device and control method for non-volatile memory
CN102270182B (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication
CN101281585A (en) Intelligent cipher key and method for managing management password of intelligent IC card
CN103532708A (en) Computer hardware encryption method of encrypting data through combining hardware
CN115412236A (en) Method for key management and password calculation, encryption method and device
TWI430643B (en) Secure key recovery system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20081008