CN101951315A - Key processing method and device - Google Patents

Key processing method and device Download PDF

Info

Publication number
CN101951315A
CN101951315A CN 201010280853 CN201010280853A CN101951315A CN 101951315 A CN101951315 A CN 101951315A CN 201010280853 CN201010280853 CN 201010280853 CN 201010280853 A CN201010280853 A CN 201010280853A CN 101951315 A CN101951315 A CN 101951315A
Authority
CN
China
Prior art keywords
private key
key
random code
ciphertext
processing method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201010280853
Other languages
Chinese (zh)
Inventor
李铭轩
仇剑书
冯伟斌
刘红旗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN 201010280853 priority Critical patent/CN101951315A/en
Publication of CN101951315A publication Critical patent/CN101951315A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a key processing method and a device. The method comprises the following steps: after a key generating request is received, generating a key pair which comprises a public key for encrypting data and a private key for decrypting data; acquiring a random code; and encrypting the generated private key by adopting the random code to form a private key cryptograph. The device comprises a security processor and a write once memory. By adopting the random code to encrypt and decrypt the private key, the embodiment of the invention improves the security of storage of the private key, simultaneously avoids the problem that the private key is stored in a position with high security, reduces the complexity of storage and access, and is convenient for user operation.

Description

Cipher key processing method and device
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of cipher key processing method and device.
Background technology
Popularize along with information-based and digitized, the key safety problem more and more is subjected to people's attention.Common business exchange activity etc. all is based on the fail safe of private key bar none, that is to say that the fail safe of all online communation activities all depends on private key, and therefore protecting the safety of private key is the vital part of network security.
In the prior art, the right generation of key generates when the user applies certificate basically.It is right to generate pair of secret keys by client, and private key is stored in the client, and PKI then is sent to server end in company with other user profile and carries out signature authentication.
But private key adopts clear-text way to be stored in client in the prior art, causes the private key fail safe very low, if be stored in safe position, then stores and visit the process complexity of private key, is not easy to user's operation.
Summary of the invention
The embodiment of the invention provides a kind of cipher key processing method and device, in order to solve the defective of available technology adopting clear-text way storage private key, and with the fail safe of raising private key storage, and the complexity of storage of reduction private key and visit.
The embodiment of the invention provides a kind of cipher key processing method, comprising:
After receiving key generation request, it is right to generate key, and described key is to comprising the PKI and the private key that is used for data are decrypted processing that is used for data are carried out encryption;
Obtain random code;
Adopt described random code that the described private key that generates is carried out encryption, form the private key ciphertext.
The embodiment of the invention also provides a kind of cipher key processing method, comprising:
After receiving the private key ciphertext, obtain random code;
Adopt described random code that the described private key ciphertext that receives is decrypted processing, obtain private key.
The embodiment of the invention provides a kind of key handling device, comprise: safe processor and one-time write memory, after described safe processor is used to receive key generation request, the generation key is right, described key is to comprising the PKI and the private key that is used for data are decrypted processing that is used for data are carried out encryption, and the random code that adopts described one-time write memory to provide is carried out encryption to the described private key that generates, formation private key ciphertext.
The embodiment of the invention also provides a kind of key handling device, comprise: safe processor and one-time write memory, after described safe processor is used to receive the private key ciphertext, the random code that adopts described one-time write memory to provide is decrypted processing to the described private key ciphertext that receives, and obtains private key.
The cipher key processing method of the embodiment of the invention and device, handle by adopting random code that private key is carried out encryption and decryption, improved the fail safe of private key storage, avoided simultaneously private key is stored in safe position, reduce the complexity of storage and visit, be convenient to user's operation.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of cipher key processing method one embodiment of the present invention;
Fig. 2 is the flow chart of another embodiment of cipher key processing method of the present invention;
Fig. 3 is the structural representation of key handling device one embodiment of the present invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
Fig. 1 is the flow chart of cipher key processing method one embodiment of the present invention.As shown in Figure 1, the embodiment of the invention provides a kind of cipher key processing method, comprising:
Step 101, receive after key generates request, it is right to generate key, and this key is used for data are carried out the PKI of encryption and are used for data are decrypted the private key of processing to comprising;
Step 102, obtain random code;
Step 103, the above-mentioned random code of employing are carried out encryption to the private key that generates, and form the private key ciphertext.
In the present embodiment, above-mentioned steps can be carried out by safe processor in the set-top box.When safe processor receives password generation request, generate a pair of PKI and private key, PKI is used for data are carried out encryption, and private key is used for data are decrypted processing.Then, obtaining a random code carries out storing after the encryption to the private key that generates.Private key in the embodiment of the invention can be used for digital certificate is carried out signature verification to guarantee the legitimacy of digital certificate, also can be used for carrying out digital signature at applying digital certificate, to guarantee certificate granting center (Certificate Authority; Hereinafter to be referred as: the CA) legitimacy of this applying digital certificate of checking after receiving applying digital certificate.
The cipher key processing method of the embodiment of the invention, by adopting random code that private key is carried out encryption, improved the fail safe of private key storage, avoided simultaneously private key is stored in safe position, reduce the complexity of storage and visit, be convenient to user's operation.
On the basis of the foregoing description, step 102 can comprise:
S11, to one-time write memory (One Time Program Memory; Hereinafter to be referred as: OTP) send the random code request;
S12, receive the random code that this OTP returns.
The OTP that is arranged in set-top box has the characteristic of one-time write, and data can not be changed after by one-time write.Therefore, can in OTP, write a legal random code in advance.When safe processor generate key to after, read this random code from OTP private key carried out encryption.
In technique scheme, can adopt symmetric encipherment algorithm or RSA (Ron Rivest, Adi Shamirh and Len Adleman) rivest, shamir, adelman that the described private key that generates is carried out encryption.In addition, after the described private key that generates is carried out encryption, can also deposit the storage cryptographic algorithm sign of the type that is used to indicate the cryptographic algorithm that is adopted, so that follow-uply the private key ciphertext is decrypted processing when reading private key.
Fig. 2 is the flow chart of another embodiment of cipher key processing method of the present invention.As shown in Figure 2, the embodiment of the invention provides another kind of cipher key processing method, comprising:
Step 201, receive the private key ciphertext after, obtain random code;
Step 202, the above-mentioned random code of employing are decrypted processing to the private key ciphertext that receives, and obtain private key.
In the present embodiment, above-mentioned steps can be carried out by safe processor in the set-top box.When safe processor when the module of storage private key ciphertext receives the private key ciphertext, at first obtain the random code of using when encrypting this private key, and the private key ciphertext be decrypted processing, to obtain this private key with this random code.
The cipher key processing method of the embodiment of the invention, by adopting random code that private key is decrypted processing, improved the fail safe of private key storage, avoided simultaneously private key is stored in safe position, reduce the complexity of storage and visit, be convenient to user's operation.
On the basis of the foregoing description, step 201 can comprise:
S21, send the random code request to OTP;
S22, receive the random code that this OTP returns.
Because the random code that writes among the OTP in advance is unmodifiable, therefore adopts private key is carried out the fail safe that encryption and decryption can guarantee private key.
In technique scheme, can adopt symmetric encipherment algorithm or RSA rivest, shamir, adelman that the private key ciphertext that receives is decrypted processing.
Fig. 3 is the structural representation of key handling device one embodiment of the present invention.As shown in Figure 3, the embodiment of the invention provides a kind of key handling device, comprise safe processor 31 and OTP32, after safe processor 31 is used to receive key generation request, the generation key is right, this key is used for data are carried out the PKI of encryption and are used for data are decrypted the private key of processing to comprising, and the random code that adopts OTP32 to provide carries out encryption to the described private key that generates, and forms the private key ciphertext.
In the present embodiment, the key handling device is to be integrated in the device of in the set-top box key in the set-top box being handled.When safe processor 31 receives password generation request, generate a pair of PKI and private key, PKI is used for data are carried out encryption, and private key is used for data are decrypted processing.Then, obtaining a random code from OTP32 carries out storing the private key ciphertext that forms after the encryption to the private key that generates.
The key handling device of the embodiment of the invention, by adopting random code that private key is carried out encryption, improved the fail safe of private key storage, avoided simultaneously private key is stored in safe position, reduce the complexity of storage and visit, be convenient to user's operation.
In addition, on the basis of the foregoing description, key handling device provided by the invention can also comprise: digital copyright management (Digital Right Management; Hereinafter to be referred as: DRM) client 33, and this drm agent 33 is used for sending key to safe processor 31 and generates request, and receives private key ciphertext and PKI that safe processor 31 generates.Drm agent 33 communicates as interface and the outside DRM server that licenses down.
The embodiment of the invention also provides a kind of key handling device, the structural representation of this device as shown in Figure 3, comprise: safe processor 31 and OTP32, after safe processor 31 is used to receive the private key ciphertext, the random code that adopts OTP32 to provide is decrypted processing to the private key ciphertext that receives, and obtains private key.
In the present embodiment, the key handling device is to be integrated in the device of in the set-top box key in the set-top box being handled.When safe processor 31 when the module of storage private key ciphertext receives the private key ciphertext, at first obtain the random code of using when encrypting this private key, and the private key ciphertext be decrypted processing, to obtain this private key with this random code from OTP32.
The key handling device of the embodiment of the invention, by adopting random code that private key is decrypted processing, improved the fail safe of private key storage, avoided simultaneously private key is stored in safe position, reduce the complexity of storage and visit, be convenient to user's operation.
In addition, on the basis of the foregoing description, key handling device provided by the invention can also comprise: drm agent 33, this drm agent 33 are used for sending the private key ciphertext to safe processor 31, and receive the private key that safe processor 31 obtains.Drm agent 33 communicates as interface and the outside DRM server that licenses down.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (11)

1. a cipher key processing method is characterized in that, comprising:
After receiving key generation request, it is right to generate key, and described key is to comprising the PKI and the private key that is used for data are decrypted processing that is used for data are carried out encryption;
Obtain random code;
Adopt described random code that the described private key that generates is carried out encryption, form the private key ciphertext.
2. cipher key processing method according to claim 1 is characterized in that, the described random code of obtaining comprises:
Send the random code request to the one-time write memory;
Receive the random code that described one-time write memory returns.
3. cipher key processing method according to claim 1 is characterized in that, described described private key to generation carries out encryption, comprising:
Adopt symmetric encipherment algorithm or RSA rivest, shamir, adelman that the described private key that generates is carried out encryption.
4. cipher key processing method according to claim 3 is characterized in that, after the described private key that generates is carried out encryption, also comprises:
Storage encryption algorithm sign, described cryptographic algorithm sign is used to indicate the type of the cryptographic algorithm that is adopted.
5. a cipher key processing method is characterized in that, comprising:
After receiving the private key ciphertext, obtain random code;
Adopt described random code that the described private key ciphertext that receives is decrypted processing, obtain private key.
6. cipher key processing method according to claim 5 is characterized in that, the described random code of obtaining comprises:
Send the random code request to the one-time write memory;
Receive the random code that described one-time write memory returns.
7. cipher key processing method according to claim 5 is characterized in that, described the described private key ciphertext that receives is decrypted processing, comprising:
Adopt symmetric encipherment algorithm or RSA rivest, shamir, adelman that the described private key ciphertext that receives is decrypted processing.
8. a key handling device is characterized in that, comprising: safe processor and one-time write memory,
After described safe processor is used to receive key generation request, the generation key is right, described key is to comprising the PKI and the private key that is used for data are decrypted processing that is used for data are carried out encryption, and the random code that adopts described one-time write memory to provide is carried out encryption to the described private key that generates, formation private key ciphertext.
9. key handling device according to claim 8 is characterized in that, also comprises:
The digital copyright management client is used for sending described key to described safe processor and generates request, and receives described private key ciphertext and PKI that described safe processor generates.
10. a key handling device is characterized in that, comprising: safe processor and one-time write memory,
After described safe processor was used to receive the private key ciphertext, the random code that adopts described one-time write memory to provide was decrypted processing to the described private key ciphertext that receives, and obtains private key.
11. key handling device according to claim 10 is characterized in that, also comprises:
The digital copyright management client is used for sending described private key ciphertext to described safe processor, and receives the described private key that described safe processor obtains.
CN 201010280853 2010-09-10 2010-09-10 Key processing method and device Pending CN101951315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010280853 CN101951315A (en) 2010-09-10 2010-09-10 Key processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010280853 CN101951315A (en) 2010-09-10 2010-09-10 Key processing method and device

Publications (1)

Publication Number Publication Date
CN101951315A true CN101951315A (en) 2011-01-19

Family

ID=43454680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010280853 Pending CN101951315A (en) 2010-09-10 2010-09-10 Key processing method and device

Country Status (1)

Country Link
CN (1) CN101951315A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857522A (en) * 2012-10-12 2013-01-02 广州市品高软件开发有限公司 Identity authentication method and system for cloud computing desktop terminal
CN103037366A (en) * 2011-09-30 2013-04-10 卓望数码技术(深圳)有限公司 Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique
WO2016128856A1 (en) * 2015-02-13 2016-08-18 International Business Machines Corporation Automatic key management using enterprise user identity management
CN106411893A (en) * 2016-09-30 2017-02-15 成都知道创宇信息技术有限公司 Hypertext transfer protocol secure (HTTPS) service deployment method
CN107004083A (en) * 2014-12-12 2017-08-01 耐瑞唯信有限公司 Device keyses are protected
CN108540486A (en) * 2018-04-23 2018-09-14 湖南东方华龙信息科技有限公司 The generation of cloud key and application method
WO2018166356A1 (en) * 2017-03-15 2018-09-20 阿里巴巴集团控股有限公司 Method, device, and system for encrypting secret key
US10348727B2 (en) 2015-02-13 2019-07-09 International Business Machines Corporation Automatic key management using enterprise user identity management
CN111953484A (en) * 2020-08-03 2020-11-17 上海移远通信技术股份有限公司 Communication method, device and client
TWI735208B (en) * 2020-04-20 2021-08-01 宜鼎國際股份有限公司 Data protection system and method
US11616654B2 (en) 2018-04-24 2023-03-28 Spectrum Brands, Inc. Secure provisioning of internet of things devices, including electronic locks

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852432A (en) * 2005-12-27 2006-10-25 华为技术有限公司 Method for enciphering and deciphering living-broadcasting flow-medium data
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101483518A (en) * 2009-02-20 2009-07-15 北京天威诚信电子商务服务有限公司 Customer digital certificate private key management method and system
CN101610148A (en) * 2009-07-08 2009-12-23 李伟 A kind of reciprocity internet digital literary property protection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852432A (en) * 2005-12-27 2006-10-25 华为技术有限公司 Method for enciphering and deciphering living-broadcasting flow-medium data
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101483518A (en) * 2009-02-20 2009-07-15 北京天威诚信电子商务服务有限公司 Customer digital certificate private key management method and system
CN101610148A (en) * 2009-07-08 2009-12-23 李伟 A kind of reciprocity internet digital literary property protection method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037366A (en) * 2011-09-30 2013-04-10 卓望数码技术(深圳)有限公司 Mobile terminal user authentication method and mobile terminal based on asymmetric cryptographic technique
CN103037366B (en) * 2011-09-30 2016-10-26 卓望数码技术(深圳)有限公司 Mobile phone users authentication method based on asymmetric cryptographic technique and mobile terminal
CN102857522A (en) * 2012-10-12 2013-01-02 广州市品高软件开发有限公司 Identity authentication method and system for cloud computing desktop terminal
CN107004083A (en) * 2014-12-12 2017-08-01 耐瑞唯信有限公司 Device keyses are protected
US11018847B2 (en) 2014-12-12 2021-05-25 Nagravision S.A. Device keys protection
US10348727B2 (en) 2015-02-13 2019-07-09 International Business Machines Corporation Automatic key management using enterprise user identity management
WO2016128856A1 (en) * 2015-02-13 2016-08-18 International Business Machines Corporation Automatic key management using enterprise user identity management
GB2550786A (en) * 2015-02-13 2017-11-29 Ibm Automatic key management using enterprise user identity management
US10454676B2 (en) 2015-02-13 2019-10-22 International Business Machines Corporation Automatic key management using enterprise user identity management
CN106411893A (en) * 2016-09-30 2017-02-15 成都知道创宇信息技术有限公司 Hypertext transfer protocol secure (HTTPS) service deployment method
CN106411893B (en) * 2016-09-30 2019-08-13 成都知道创宇信息技术有限公司 A kind of dispositions method of HTTPS service
CN108632021A (en) * 2017-03-15 2018-10-09 阿里巴巴集团控股有限公司 A kind of key encryption method, device and system
WO2018166356A1 (en) * 2017-03-15 2018-09-20 阿里巴巴集团控股有限公司 Method, device, and system for encrypting secret key
US11271726B2 (en) 2017-03-15 2022-03-08 Alibaba Group Holding Limited Key encryption methods, apparatuses, and systems
CN108540486A (en) * 2018-04-23 2018-09-14 湖南东方华龙信息科技有限公司 The generation of cloud key and application method
US11616654B2 (en) 2018-04-24 2023-03-28 Spectrum Brands, Inc. Secure provisioning of internet of things devices, including electronic locks
TWI808160B (en) * 2018-04-24 2023-07-11 美商品譜公司 Secure provisioning of internet of things devices, including electronic locks
TWI735208B (en) * 2020-04-20 2021-08-01 宜鼎國際股份有限公司 Data protection system and method
CN111953484A (en) * 2020-08-03 2020-11-17 上海移远通信技术股份有限公司 Communication method, device and client

Similar Documents

Publication Publication Date Title
JP7104248B2 (en) An encrypted asset encryption key part that allows the assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
CN101951315A (en) Key processing method and device
RU2584500C2 (en) Cryptographic authentication and identification method with real-time encryption
CN103684766B (en) A kind of private key protection method of terminal use and system
CN109379387B (en) Safety certification and data communication system between Internet of things equipment
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN107908574A (en) The method for security protection of solid-state disk data storage
WO2010057423A1 (en) Encryption and decryption method and system for ic card and the reader device
CN112507296B (en) User login verification method and system based on blockchain
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
CN103560892A (en) Secret key generation method and secret key generation device
CN104333545A (en) Method for encrypting cloud storage file data
TWI476629B (en) Data security and security systems and methods
CN107911221B (en) Key management method for secure storage of solid-state disk data
WO2012053886A1 (en) A method and system for file encryption and decryption in a server
US20200160333A1 (en) System and method for the protection of consumer financial data utilizing dynamic content shredding
CN103634789A (en) Mobile terminal and method
CN103177225A (en) Method and system of data management
CN1266617C (en) Computer data protective method
CN107342862B (en) Method and system for realizing key generation and protection by cloud plus-end triple-authority separation
CN107332663A (en) Archive management method based on encryption technology
CN113836516B (en) Printer selenium drum anti-counterfeiting and printing frequency protection system and method
TWI430643B (en) Secure key recovery system and method
EP2299379A1 (en) Digital rights management system with diversified content protection process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110119