CN102377564B - Method and device for encrypting private key - Google Patents

Method and device for encrypting private key Download PDF

Info

Publication number
CN102377564B
CN102377564B CN201110361075.9A CN201110361075A CN102377564B CN 102377564 B CN102377564 B CN 102377564B CN 201110361075 A CN201110361075 A CN 201110361075A CN 102377564 B CN102377564 B CN 102377564B
Authority
CN
China
Prior art keywords
key
private key
encryption
private
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110361075.9A
Other languages
Chinese (zh)
Other versions
CN102377564A (en
Inventor
邵官阁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110361075.9A priority Critical patent/CN102377564B/en
Publication of CN102377564A publication Critical patent/CN102377564A/en
Application granted granted Critical
Publication of CN102377564B publication Critical patent/CN102377564B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention provides a method and a device for encrypting a private key. The method for encrypting the private key comprises the following steps of: generating a key according to a key material by a preset symmetric key generating algorithm, encrypting a private key according to the key by a preset encryption algorithm, generating and storing an encrypted private key, and deleting the key and the private key. The device for encrypting the private key comprises a first key generating unit and a private key encrypting unit. The first key generating unit is used for generating the key according to the key material by the preset symmetric key generating algorithm. The private key encrypting unit is used for encrypting the private key according to the key by the preset encryption algorithm, generating and storing the encrypted private key and deleting the key and the private key. According to the method and the device for encrypting the private key, security of the private key is realized, additional security equipment is not needed, and the cost of the equipment can be reduced at the same time of improving the security of the private key.

Description

The encryption method of private key and device
Technical field
The embodiment of the present invention relates to information security technology, particularly relates to a kind of encryption method and device of private key.
Background technology
Along with the development of network technology, the network activity of people is more and more frequent, and in thing followed network transmission process, the security requirement of information is also just more and more higher.Information encryption is the core technology of information security, so-called encryption, and exactly calling that the readable information of " expressly " converts the process of " ciphertext " to, deciphering is then the process " ciphertext " being reverted to " expressly ".Rivest, shamir, adelman, as one of conventional cryptographic algorithm, refers to that ciphering process and decrypting process use the cryptographic algorithm of two different keys.Encryption key for enciphered message is made public, and is called PKI, and the decruption key for decryption information is preserved by deciphering people's secret, is called private key.
The key of rivest, shamir, adelman is exactly private key, ensures the fail safe of private key, the fail safe of the whole encryption system of guarantee.In prior art, in order to ensure the fail safe of private key, available employing hardware-based cryptographic, such as, be kept in usb key (Universal Serial BUS Key, be called for short USBKey) equipment by private key, and USB Key equipment is independently hardware device.But use usb key device storage private key to increase cost, and also there is safety issue in usb key equipment.
Summary of the invention
The embodiment of the present invention provides a kind of encryption method and device of private key, to realize the fail safe of private key, and without the need to additionally increasing safety means, improves the convenience that private key fail safe realizes.
The embodiment of the present invention provides a kind of encryption method of private key, comprising:
Key is generated by presetting Symmetric key generation algorithm according to key material;
By predetermined encryption algorithm, private key is encrypted according to described key, generates the private key after encryption and store, described key and described private key are deleted.
The embodiment of the present invention provides a kind of encryption device of private key, comprising:
First Key generating unit, for generating key according to key material by presetting Symmetric key generation algorithm;
Encrypted private key unit, for being encrypted private key by predetermined encryption algorithm according to described key, being generated the private key after encryption and storing, and described key and described private key is deleted.
As shown from the above technical solution, the encryption method of the private key that the embodiment of the present invention provides and device, key is generated by presetting Symmetric key generation algorithm according to key material, private key is encrypted by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.The embodiment of the present invention, without the need to additionally increasing safety means, can reduce equipment cost while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the present invention;
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the present invention;
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the present invention;
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the present invention.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the present invention.As shown in Figure 1, in information security application, user is encrypted information by the private key in subscriber equipment, then gives other users, with the fail safe of guarantee information in transmitting procedure by the information transmission after encryption.The encryption method of the private key that the present embodiment provides specifically can be applied to the handling process to private key in information security technology, to improve the fail safe of private key.The encryption method of the private key that the present embodiment provides specifically is performed by encryption device, and this encryption device specifically can be integrated in the subscriber equipment be encrypted information by private key, also can arrange separately.
The encryption method of the private key that the present embodiment provides specifically comprises:
Step 10, according to key material by preset Symmetric key generation algorithm generate key.
Particularly, described key material is the material for generating key, and this key material can be arranged arbitrarily, meets the requirement of default Symmetric key generation algorithm.Specifically can arranging according to the information security sexual needs of reality of this default Symmetric key generation algorithm.
The double secret key private key that can be generated by described default Symmetric key generation algorithm according to this is encrypted, and also can be decrypted according to the private key after this key pair encryption.
Step 20, by predetermined encryption algorithm, private key to be encrypted according to described key, to generate the private key after encryption and also store, described key and described private key are deleted.
Alternatively, described predetermined encryption algorithm is specially symmetric encipherment algorithm, DEA (Data Encryption Algorithm, vehicle economy A), Advanced Encryption Standard (AdvancedEncryption Standard is called for short AES) etc. can be comprised.Predetermined encryption algorithm also specifically can be arranged according to the information security sexual needs of reality, is not limited with the present embodiment.
Be encrypted according to double secret key private key, generate the private key after encryption and store, then this key generated in step 10 and original private key are deleted.The private key after encryption is only stored in encryption device, and do not store original private key and for the key to this encrypted private key, therefore, even if the private key after encryption is obtained by hacker, hacker also cannot be decrypted the private key after this encryption, can ensure the fail safe of private key.When in information interactive process, needing to use this private key when information is encrypted, more corresponding decryption processing is carried out to the private key after this encryption, carrying out follow-up information encryption process with this private key by obtaining.
The encryption method of the private key that the present embodiment provides, key is generated by presetting Symmetric key generation algorithm according to key material, private key is encrypted by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.The embodiment of the present invention, without the need to additionally increasing safety means, can reduce equipment cost while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the present invention.As shown in Figure 2, the encryption method of the private key that the present embodiment provides, on the basis of embodiment described in Fig. 1, specifically can also comprise the steps:
Step 30, when receiving the CIPHERING REQUEST carrying information to be encrypted, generate described key according to described key material by described default Symmetric key generation algorithm.
This encryption device specifically can also perform the operation be encrypted data message by private key.Particularly, what described CIPHERING REQUEST was specifically as follows user's input treats in order to instruction the request that enciphered message is encrypted, and also can treat in order to instruction the request that enciphered message is encrypted for what sent by other functional units in business information processing procedure.Specifically information to be encrypted can be carried in this CIPHERING REQUEST.When this encryption device receives this CIPHERING REQUEST, generate described key according to key material by presetting Symmetric key generation algorithm.Key material is identical with the key material in step 10, preset Symmetric key generation algorithm also identical with the default Symmetric key generation algorithm in step 10, the key generated thus with generate in step 10 also identical for the key be encrypted private key.Therefore, can be decrypted by the private key after this key pair encryption.
Private key after step 40, encryption according to described double secret key is decrypted, and generates described private key, is deleted by described key.
Just obtain described private key after private key after encryption is decrypted, then the key generated in step 30 is deleted.
Step 50, according to described private key, described information to be encrypted to be encrypted, described private key is deleted.
Treat after enciphered message is encrypted according to this private key, then this private key is deleted, then the information after encryption is returned to the functional unit of request cryptographic operation, so that follow-up information processing.
Because the key for being decrypted the private key after encryption is also dynamically generate, just delete after the decryption oprerations being completed the private key after to encryption by this key, and thus obtained private key is also just deleted after completing the cryptographic operation treating enciphered message, still only preserve the private key after encryption in encryption device, further increase the fail safe of private key.
Alternatively, in the present embodiment, step 10, generating key according to key material by presetting Symmetric key generation algorithm, comprising:
Hash calculation and/or 64 character codes are carried out to described key material, generates described key.
Particularly, described key material can for the character string preset, also can using PKI corresponding for described private key as key material, and the setting of key material, to meet Hash calculation and 64 character codes require, is not limited with the present embodiment.64 character codes (Base64) are the coding method based on 64 characters, Hash (Hash) can be carried out to described key material and calculate the described key of generation, also can carry out 64 character codes to described key material and generate described key, described key is generated after can also carrying out above-mentioned two kinds of operations successively to described key material, operating sequence can be that Hash calculation is front, 64 character codes rear, also can be 64 based encodes front, Hash calculation is rear.Hash calculation and 64 character code computational efficiencies all higher, the speed of secret generating can be improved.The selection presetting Symmetric key generation algorithm is not limited with the present embodiment.
Alternatively, in the present embodiment, step 10, generating key according to key material by presetting Symmetric key generation algorithm, specifically can comprise:
Using the PKI corresponding with described private key as described key material, generate described key according to described PKI by described default Symmetric key generation algorithm.
In the information security application of reality, private key and PKI normally occur in pairs.Therefore, using PKI corresponding for described private key as described key material, not only can improve the reliability of key material, and the convenience of realization can be improved.
In the present embodiment, generate described key according to described PKI by described default Symmetric key generation algorithm, specifically can comprise the steps:
The partial content of described PKI is generated described key by described default Symmetric key generation algorithm.
Because the data message comprised in PKI is many, the basis generating described key is the partial content of described PKI, calculates the characteristic information of described PKI as described key according to the partial content of described PKI.Even if then described PKI is obtained by hacker, hacker also has no way of knowing that the basis as secret generating is which partial content in PKI, further increases the fail safe of private key.The partial content of described PKI specifically can set according to the action need of reality, also using the full content of PKI as the basis generating described key, can not be limited with the present embodiment.
Be example with PKI (Public Key Infrastructure, PKIX) system below, the encryption method of the private key that the present embodiment provides is described in detail.
At PKI (Public Key Infrastructure, PKIX) in system, adopt digital certificate management PKI, by third-party trusted authorities authentication center, other identity informations of the PKI of user and user are bundled, forms digital certificate.Digital certificate format and certificate content follow X.509 standard, and it is the proof of identification of online entity, prove the legitimacy of a certain entity identities and PKI and the binding relationship of entity and PKI.Digital certificate specifically can comprise: the information of sequence number, client public key, user subject information, visa mechanism, the information such as signature, validity period of certificate of visa mechanism.
The digital certificate of user and private key are stored in encryption device usually in the lump, and encryption device using the PKI in digital certificate as key material, can generate key to the specified portions content of PKI after Hash calculation and 64 character codes.By predetermined encryption algorithm, private key is encrypted according to this key, generates the private key after encryption and store, and this key and private key are deleted.Namely the private key after digital certificate and encryption is stored in encryption device.
When this secret device receives the CIPHERING REQUEST carrying information to be encrypted, calculate according to the specified portions content Hash of PKI in described digital certificate and generate key after 64 character codes, be decrypted according to the private key after this key pair encryption, generate private key, and this key is deleted.Treat enciphered message according to this private key to be encrypted, after completing encryption, this private key is deleted, and the information after encryption is returned to the main body sending this CIPHERING REQUEST, namely complete the ciphering process to interactive information.In the process, the key for deciphering is interim generation, and key and private key are all deleted after finishing using, and only preserves the private key after digital certificate and encryption, ensure that the fail safe of private key in encryption device.
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the present invention.As shown in Figure 3, the encryption device of the private key that the present embodiment provides specifically can realize each step of the encryption method of the private key that any embodiment of the present invention provides, and this repeats no more.The encryption device of the private key that the present embodiment provides specifically can be realized by the form of software and hardware.
The encryption device of the private key that the present embodiment provides specifically comprises the first Key generating unit 11 and encrypted private key unit 12.First Key generating unit 11 is for generating key according to key material by presetting Symmetric key generation algorithm.Encrypted private key unit 12, for being encrypted private key by predetermined encryption algorithm according to described key, being generated the private key after encryption and stores, and described key and described private key is deleted.
The encryption device of the private key that the present embodiment provides, first Key generating unit 11 generates key according to key material by presetting Symmetric key generation algorithm, encrypted private key unit 12 is encrypted private key by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.And the embodiment of the present invention is without the need to additionally increasing safety means, equipment cost can be reduced while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the present invention.As shown in Figure 4, in the present embodiment, the encryption device of this private key specifically can also comprise the second Key generating unit 13, private key generation unit 14 and information encryption unit 15.Second Key generating unit 13, for when receiving the CIPHERING REQUEST carrying information to be encrypted, generates described key according to described key material by described default Symmetric key generation algorithm.Private key generation unit 14 is decrypted for the private key after encryption according to described double secret key, generates described private key, is deleted by described key.Described private key, for being encrypted described information to be encrypted according to described private key, is deleted by information encryption unit 15.
By described second Key generating unit 13, the setting of private key generation unit 14 and information encryption unit 15, realize the encryption treating enciphered message, in this implementation procedure, because the key for being decrypted the private key after encryption also just generates when needs use this key, just delete after the decryption oprerations being completed the private key after to encryption by this key, and thus obtained private key is also just deleted after completing the cryptographic operation treating enciphered message, the private key after encryption is still only preserved in the encryption device of private key, further increase the fail safe of private key.
In the present embodiment, described first Key generating unit 11 specifically can also be used for carrying out Hash calculation, 64 character codes or Hash calculation and 64 character codes to described key material, generates described key.Due to Hash calculation and 64 character code computational efficiencies all higher, the speed of secret generating can be improved.
In the present embodiment, described first Key generating unit 11 also for using the PKI corresponding with described private key as described key material, generate described key according to described PKI by described default Symmetric key generation algorithm.Because private key and PKI normally occur in pairs, using PKI corresponding for described private key as described key material, not only can improve the reliability of key material, and the convenience of realization can be improved.
In the present embodiment, described first Key generating unit 11 is also for generating described key by the partial content of described PKI by described default Symmetric key generation algorithm.Because the data message comprised in PKI is many, the basis generating described key is the partial content of described PKI, even if then described PKI is obtained by hacker, hacker also has no way of knowing that the basis as secret generating is which partial content in PKI, further increases the fail safe of private key.
The encryption method of the private key that the embodiment of the present invention provides and device, can solve the problem how private key is preserved safely in a device.The encryption method of the private key that the embodiment of the present invention provides and device, do not need to increase extra hardware cost, do not need manual intervention when equipment restarts and recovers private key yet.And the key of encryption key just calculates generation when needs use this key, there is not the problem that encryption key is preserved safely, substantially increase the convenience that private key fail safe realizes.The key material adopted in implementation procedure and default Symmetric key generation algorithm, and all can select flexibly the cryptographic algorithm of private key, applicability and extensibility are all stronger, and realize simple, are easy to promote.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that program command is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.

Claims (4)

1. an encryption method for private key, is characterized in that, comprising:
Key is generated by presetting Symmetric key generation algorithm according to key material;
By predetermined encryption algorithm, private key is encrypted according to described key, generates the private key after encryption and store, described key and described private key are deleted;
Described according to key material by preset Symmetric key generation algorithm generate key, comprising:
Using the partial content of the PKI corresponding with described private key as described key material, the partial content according to described PKI generates described key by described default Symmetric key generation algorithm;
The setting of described key material meets Hash calculation and 64 character code requirements.
2. the encryption method of private key according to claim 1, is characterized in that, described method also comprises:
When receiving the CIPHERING REQUEST carrying information to be encrypted, generate described key according to described key material by described default Symmetric key generation algorithm;
Private key after encryption according to described double secret key is decrypted, and generates described private key, is deleted by described key;
According to described private key, described information to be encrypted is encrypted, described private key is deleted.
3. an encryption device for private key, is characterized in that, comprising:
First Key generating unit, for generating key according to key material by presetting Symmetric key generation algorithm;
Encrypted private key unit, for being encrypted according to described double secret key private key, generating the private key after encryption and storing, and described key and described private key is deleted;
Described first Key generating unit specifically for using the partial content of the PKI corresponding with described private key as described key material, the partial content according to described PKI generates described key by described default Symmetric key generation algorithm;
The setting of described key material meets Hash calculation and 64 character code requirements.
4. the encryption device of private key according to claim 3, is characterized in that, also comprises:
Second Key generating unit, for when receiving the CIPHERING REQUEST carrying information to be encrypted, generates described key according to described key material by described default Symmetric key generation algorithm;
Private key generation unit, for being decrypted the private key after described encryption by predetermined encryption algorithm according to described key, being generated described private key, being deleted by described key;
Information encryption unit, for being encrypted described information to be encrypted according to described private key, deletes described private key.
CN201110361075.9A 2011-11-15 2011-11-15 Method and device for encrypting private key Expired - Fee Related CN102377564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110361075.9A CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110361075.9A CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Publications (2)

Publication Number Publication Date
CN102377564A CN102377564A (en) 2012-03-14
CN102377564B true CN102377564B (en) 2015-03-11

Family

ID=45795590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110361075.9A Expired - Fee Related CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Country Status (1)

Country Link
CN (1) CN102377564B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359994A (en) * 2017-07-19 2017-11-17 国家电网公司 The integrated encryption device that a kind of quantum cryptography blends with classical password

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9230091B2 (en) * 2012-06-20 2016-01-05 Microsoft Technology Licensing, Llc Managing use of a field programmable gate array with isolated components
US9424019B2 (en) 2012-06-20 2016-08-23 Microsoft Technology Licensing, Llc Updating hardware libraries for use by applications on a computer system with an FPGA coprocessor
US9298438B2 (en) 2012-06-20 2016-03-29 Microsoft Technology Licensing, Llc Profiling application code to identify code portions for FPGA implementation
CN102857889A (en) * 2012-09-12 2013-01-02 中兴通讯股份有限公司 Method and device for encrypting short messages
CN104270242B (en) * 2014-09-27 2017-12-19 杭州电子科技大学 A kind of ciphering and deciphering device for network data encryption transmission
US10574459B2 (en) * 2015-09-30 2020-02-25 Microsoft Technology Licensing, Llc Code signing service
US20170126414A1 (en) * 2015-10-28 2017-05-04 Texas Instruments Incorporated Database-less authentication with physically unclonable functions
CN106656503B (en) * 2016-10-13 2019-09-24 上海众人网络安全技术有限公司 Method for storing cipher key, data encryption/decryption method, electric endorsement method and its device
CN106487509B (en) * 2016-11-09 2019-01-29 北京信安世纪科技股份有限公司 A kind of method and host equipment generating key
CN106549754A (en) * 2016-11-24 2017-03-29 北京爱接力科技发展有限公司 The method and apparatus of management key
CN107359993A (en) * 2017-08-29 2017-11-17 国家电网公司 A kind of power information collection safety protecting method and system based on quantum cryptography
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN108471352B (en) * 2018-03-16 2022-03-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on distributed private key
CN108494551A (en) * 2018-03-16 2018-09-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on collaboration key
CN109525396B (en) * 2018-09-30 2021-02-23 华为技术有限公司 Method and device for processing identity key and server
WO2020076234A1 (en) * 2018-10-12 2020-04-16 Aioz Pte Ltd Apparatus and method for controlling data access
CN109547201B (en) * 2018-12-14 2023-04-14 平安科技(深圳)有限公司 Encryption method of root key, computer readable storage medium and terminal equipment
CN110838909A (en) * 2019-10-09 2020-02-25 核芯互联科技(青岛)有限公司 Encryption and decryption method and system for key file
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium
CN113094718A (en) * 2019-12-23 2021-07-09 华为数字技术(苏州)有限公司 File encryption method and related device
CN114531236B (en) * 2022-03-02 2023-10-31 杭州华澜微电子股份有限公司 Key processing method and device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101778381A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Digital certificate generation method, user key acquisition method, mobile terminal and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6931133B2 (en) * 2002-09-03 2005-08-16 Verisign, Inc. Method and system of securely escrowing private keys in a public key infrastructure

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101778381A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Digital certificate generation method, user key acquisition method, mobile terminal and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359994A (en) * 2017-07-19 2017-11-17 国家电网公司 The integrated encryption device that a kind of quantum cryptography blends with classical password

Also Published As

Publication number Publication date
CN102377564A (en) 2012-03-14

Similar Documents

Publication Publication Date Title
CN102377564B (en) Method and device for encrypting private key
US10785019B2 (en) Data transmission method and apparatus
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
US11930103B2 (en) Method, user device, management device, storage medium and computer program product for key management
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN104200176A (en) System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
US20120290833A1 (en) Certificate Blobs for Single Sign On
CN111970114B (en) File encryption method, system, server and storage medium
CN109873699A (en) A kind of voidable identity public key encryption method
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN109347923B (en) Anti-quantum computing cloud storage method and system based on asymmetric key pool
CN103108245B (en) A kind of intelligent television pays cipher key system and method for payment based on intelligent television
CN112118113A (en) Multi-party cooperative group signature method, device, system and medium based on SM2 algorithm
US20130198524A1 (en) Object with identity based encryption
JP5324813B2 (en) Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program
CN109299618B (en) Quantum-resistant computing cloud storage method and system based on quantum key card
CN116707778A (en) Data hybrid encryption transmission method and device and electronic equipment
CN110750326A (en) Disk encryption and decryption method and system for virtual machine
EP4283549A1 (en) Payment service implementation method and device
CN107070648B (en) Key protection method and PKI system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150311

Termination date: 20181115

CF01 Termination of patent right due to non-payment of annual fee