CN103888938A - PKI private key protection method of dynamically generated key based on parameters - Google Patents
PKI private key protection method of dynamically generated key based on parameters Download PDFInfo
- Publication number
- CN103888938A CN103888938A CN201210553333.8A CN201210553333A CN103888938A CN 103888938 A CN103888938 A CN 103888938A CN 201210553333 A CN201210553333 A CN 201210553333A CN 103888938 A CN103888938 A CN 103888938A
- Authority
- CN
- China
- Prior art keywords
- private key
- mobile terminal
- terminal
- user
- unique identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a PKI private key protection method of a dynamically generated key based on parameters. A private key is dynamically generated and obtained in each time of use according to the combined operation of three parameters of a terminal unique identification, terminal information and a private key factor, the private key is not stored in the local, but a PKI private key is dynamically generated through the combination of the unique physical device information of a user and other factors, the private key can be not stolen, the security of the private key is greatly improved, and thus the storage safety and access safety problems of the private key are solved. Further, a private key factor can only be obtained by providing the terminal information, the terminal unique identification and an answer of an image verification code, the attacking and obtainment of the private key factor number by an external hacker are prevented, and the safety of the private key is further enhanced through the protection of the private key factor.
Description
Technical field
The present invention relates to the mutual security fields of mobile device data, refer in particular to a kind of PKI private key guard method of the dynamic generation key based on parameter.
Background technology
As everyone knows, while relating to data encryption in existing mobile device, the protection of private key is the basic guarantee based on PKI system encryption and decryption and signature computing validity.And for the soft certificate of cellphone subscriber, because key is to be kept on the storage medium of cell phone apparatus end in the mode of file, so the safety problem of private key is particularly outstanding.The soft certificate private key of user on mobile device is encrypted storage and is conventionally adopted following methods at present:
1, be kept in memory with the form of key file, be encrypted storage with a fixing encryption key, obtain private key after using encryption key to be decrypted this key file need to access private key time;
2, the PIN code arranging according to user is to obtain encryption key after the factor is calculated, this key is as the encryption key of soft certificate private key file, when deciphering, also require user to input correct PIN code, after the decruption key identical with encryption key, soft certificate private key file is decrypted by obtaining after computing, finally obtains user's private key.
But the deficiency that the encryption storage means of above-mentioned existing private key exists:
1, for adopting fixed-encryption key to carry out the mode that soft certificate key file is encrypted, once assailant can copy this key file to the enterprising enforcement use of other mobile phone terminals after obtaining the user key file on memory device, fixed-encryption key is easily cracked simultaneously;
2, private key is stored on mobile phone terminal as encryption keys by monofactor, such as by user's PIN code, private key file being encrypted, as long as assailant has obtained user's PIN code like this, just can shift key file and use to other mobile phone terminals, in safety, there is risk.
As fully visible, in private key protection, if although only to adopt merely mode based on the single password code private key on mobile phone terminal to be encrypted the more another kind of method of method of storage more reliable, the fragility on still existence is safe.
Summary of the invention
The object of the invention is to overcome above-mentioned defect, a kind of PKI private key guard method of the dynamic generation key based on parameter is provided.
The object of the present invention is achieved like this: a kind of PKI private key guard method of the dynamic generation key based on parameter, comprising:
Private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And, at least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering; Wherein cryptographic key factor is random generation, the fixing numerical value of preserving after generating;
User key is to initialization;
The random cryptographic key factor that generates, generates the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved;
Private key secure access;
According to the private key of dynamic generation, transaction data is signed and formed signed data by algorithm, send at least terminal unique identification and signed data and verify;
In above-mentioned steps, after at least with the answer of end message and graphical verification code, cryptographic key factor being encrypted, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption; And, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of encryption receiving is decrypted;
In above-mentioned steps, described end message comprises user's PIN code; Described self the end message obtaining sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code; Described terminal unique identification comprises No. IMSI or IMEI number of terminal.
In above-mentioned steps, described respond packet contains the request of obtaining of terminal uniquely identified cryptographic key factor and generates private key and terminal self execution outer by terminal respectively.
In above-mentioned steps, the dynamic generation of private key specifically comprises step,
A), on mobile terminal, obtain terminal unique identification;
B), on mobile terminal transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code;
In above-mentioned steps B, on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, continues step by side;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key;
G) private key that, basis dynamically generates on mobile terminal is preserved signed data after transaction data is signed;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct;
Before above-mentioned steps A, also comprise that user key, to initialization, comprises step,
A), on mobile terminal, obtain the unique identification of terminal;
B), on mobile terminal, generate random number;
C), on mobile terminal, point out user to set user's PIN code;
D), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes algorithm to generate the key pair of PKI, private key;
E), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, is preserved by execution.
Total institute is known, the private key of terminal is the key message of authenticating user identification, guarantee not by unauthorized access, steal, copy uses and cracks, the present invention comprehensively adopts terminal unique identification (No. IMSI or IMEI number) for this reason, end message (user's PIN code), these three parameter combinations computings of cryptographic key factor (random number) dynamically obtain private key, be that private key is not kept at this locality, but dynamically generate PKI private key in conjunction with the unique factor such as physical equipment information and the random number of security platform of the users such as mobile phone terminal SIM card, the fail safe meeting of private key is greatly improved, thereby storage security and the access security problem of the private key having solved.In addition, in the present embodiment method, carry out and be divided into the security platform two parts on the backstage outside security bundle and the mobile terminal operating on mobile terminal, both independences of working, the more difficult external interference of simultaneously receiving, has further increased safety reliability.
[accompanying drawing explanation]
Below in conjunction with accompanying drawing in detail concrete structure of the present invention is described in detail
Fig. 1 is specific embodiments of the invention initialization flowchart;
Fig. 2 is specific embodiments of the invention flow chart.
[embodiment]
Below in conjunction with accompanying drawing, the specific embodiment of the invention is described in detail.
The present invention relates to a kind of PKI private key guard method of the dynamic generation key based on parameter, comprising:
private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And,
At least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering.
Above-mentioned cryptographic key factor is random generation, the fixing numerical value of preserving after generating.
By above method, not after static generation, preserve at private key, but according to need to use time side dynamically to generate at every turn, this is effectively avoided the static private key of preserving in the past to have the danger being cracked.In addition, the generation of private key is based at least comprising end message, terminal unique identification and three parameters of cryptographic key factor, and end message content is not directly obtained in request and is sent at cryptographic key factor, but obtain by terminal unique identification, even if cut the people that wins the third place and also cannot be obtained by this request msg obtaining in request process data thus, add that in parameter, cryptographic key factor is encrypted rear transmission by the parameter based at least comprising end message especially, take a step forward and need deciphering side obtainable at dynamic generation private key, therefore in whole method, realized the protection of the full stage high reliability to private key from " existence " to " generation " process.
In said method, as optionally, terminal unique identification comprises No. IMSI or IMEI number of terminal.And end message can comprise user's PIN code, the password that when this user's PIN code is initial, user sets voluntarily, self the end message obtaining described in method sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code;
In said method, as optionally, after can being at least encrypted cryptographic key factor with the answer of end message and graphical verification code, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption.Corresponding, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of the encryption receiving is decrypted.In cryptographic key factor is encrypted, add graphical verification code can effectively introduce a variable, thereby strengthen the Cipher Strength of cryptographic key factor.
Common, before said method is carried out, need to carry out
user key is to initialization, generate at random cryptographic key factor, generate the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved.
After above-mentioned dynamic generation private key, can realize
private key secure access, process is, according to the private key of dynamic generation, transaction data signed and formed signed data by algorithm, sends at least terminal unique identification and signed data and verifies.
In said method, respond packet containing terminal uniquely identified cryptographic key factor obtain request with generate private key can by terminal two independently part carry out, also can be respectively by terminal outer with terminal self execution, wherein the latter is due to the partial data setting of disembarking, therefore coefficient of safety is higher.
A specific embodiment that is the inventive method referring to Fig. 1,2, this embodiment is take mobile terminal as example,
Wherein Fig. 1 be user key to initialization, comprise step:
1), on mobile terminal (being expressed as the security bundle operating on mobile terminal in figure), obtain the unique identification of terminal;
2), on mobile terminal, generate
random number(being cryptographic key factor);
3), on mobile terminal, point out user to set user's PIN code;
4), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes the key pair that generates PKI, private key such as RSA or SM2 algorithm;
5), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal outer (being expressed as the security platform operating in outside mobile terminal in figure) is verified mobile terminal identity after receiving, if checking, not by returning to mistake, is preserved by execution.
Preferably, after above-mentioned initialization completes, carry out according to demand private key and dynamically generate, referring to Fig. 2, comprise step:
A), in
mobile terminalon (being expressed as the security bundle operating on mobile terminal in figure), obtain terminal unique identification;
B), on mobile terminal, transmitting terminal unique identification is extremely
outside mobile terminalthe graph data of (being expressed as the security platform operating in outside mobile terminal in figure) acquisition request graphical verification code and random number (being cryptographic key factor);
Best, in this step, on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, continues step by side;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key;
G), preserve signed data after transaction data being signed according to the private key dynamically generating on mobile terminal, algorithm is RSA or SM2;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct.
As fully visible, the advantage of this patent method is:
1, the each use all of user's PKI private key dynamically generates, and is not kept at mobile terminal side, dynamically generates thus by private key, is not kept at the characteristic of mobile terminal this locality, and private key can not be stolen.
2, user's PKI private key is according to end message (user's PIN code), the unique identification (No. IMSI or IMEI number) of terminal and initialization are kept at security platform cryptographic key factor (random number) after generating generates as the factor, and the generation of private key needs user to input PIN code, then identify in conjunction with terminal hardware, and decipher the random number of preserving from platform, the difficulty that three obtains is simultaneously very large.
3, need to provide the answer of graphical user identifying code, user's PIN code, just can obtain with terminal unique identification the cryptographic key factor (random number) that platform is preserved, prevent that the random number of platform preservation from being attacked by outside Hacker Program, guarantee the safety of the random number of platform preservation.
It is pointed out that and the invention is not restricted to above-mentioned execution mode, any simple modification, equivalent variations and modification that any those skilled in the art do above-described embodiment in based on technical solution of the present invention, all belong in protection scope of the present invention.
Claims (10)
1. a PKI private key guard method for the dynamic generation key based on parameter, comprising:
Private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And,
At least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering;
Wherein cryptographic key factor is random generation, the fixing numerical value of preserving after generating.
2. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 1, is characterized in that: also comprise, user key is to initialization;
The random cryptographic key factor that generates, generates the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved.
3. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 1, is characterized in that: also comprise private key secure access;
According to the private key of dynamic generation, transaction data is signed and formed signed data by algorithm, send at least terminal unique identification and signed data and verify.
4. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 1-3, it is characterized in that: in described, after at least with the answer of end message and graphical verification code, cryptographic key factor being encrypted, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption; And, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of encryption receiving is decrypted.
5. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 4 any one, is characterized in that: described end message comprises user's PIN code; Described self the end message obtaining sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code; Described terminal unique identification comprises No. IMSI or IMEI number of terminal.
6. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 5 any one, is characterized in that: described respond packet contains the request of obtaining of terminal uniquely identified cryptographic key factor and generates private key and terminal self execution outer by terminal respectively.
7. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 6 any one, is characterized in that: the dynamic generation of private key specifically comprises step,
A), on mobile terminal, obtain terminal unique identification;
B), on mobile terminal transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key.
8. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 7, is characterized in that: before described steps A, also comprise that user key, to initialization, comprises step,
A), on mobile terminal, obtain the unique identification of terminal;
B), on mobile terminal, generate random number;
C), on mobile terminal, point out user to set user's PIN code;
D), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes algorithm to generate the key pair of PKI, private key;
E), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, is preserved by execution.
9. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 7 or 8, is characterized in that: after described step F, also comprises,
G) private key that, basis dynamically generates on mobile terminal is preserved signed data after transaction data is signed;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct.
10. as required the PKI private key guard method of the dynamic generation key based on parameter as described in 7 or 8; it is characterized in that: described private key dynamically generates in step B; on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code; mobile terminal is external to be received and rear mobile terminal identity is verified; if checking, not by returning to mistake, continues step by side.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210553333.8A CN103888938A (en) | 2012-12-19 | 2012-12-19 | PKI private key protection method of dynamically generated key based on parameters |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210553333.8A CN103888938A (en) | 2012-12-19 | 2012-12-19 | PKI private key protection method of dynamically generated key based on parameters |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103888938A true CN103888938A (en) | 2014-06-25 |
Family
ID=50957622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210553333.8A Pending CN103888938A (en) | 2012-12-19 | 2012-12-19 | PKI private key protection method of dynamically generated key based on parameters |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103888938A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104615942A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Solid-state drive encryption key generation method |
CN105959108A (en) * | 2016-06-27 | 2016-09-21 | 收付宝科技有限公司 | Method, device and system for encrypting and decrypting cloud payment limiting secret key |
CN106776111A (en) * | 2017-01-06 | 2017-05-31 | 东北大学 | A kind of recovered cloud storage system based on LRC correcting and eleting codes |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
CN108111524A (en) * | 2017-12-28 | 2018-06-01 | 广州江南科友科技股份有限公司 | Terminal data protection method and system based on private key dynamic generation mechanism |
CN108141367A (en) * | 2015-09-30 | 2018-06-08 | 微软技术许可有限责任公司 | Code signing service |
CN108509800A (en) * | 2017-02-28 | 2018-09-07 | 盖特资讯系统股份有限公司 | Data guard method and system |
CN110708167A (en) * | 2019-10-14 | 2020-01-17 | 杭州云萃流图网络科技有限公司 | Method, device, equipment and medium for generating public key and private key |
CN110943976A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN111178884A (en) * | 2019-12-16 | 2020-05-19 | 平安壹钱包电子商务有限公司 | Information processing method, device, equipment and readable storage medium |
TWI705349B (en) * | 2015-07-08 | 2020-09-21 | 香港商阿里巴巴集團服務有限公司 | Terminal authentication processing, authentication method, device and system |
WO2020192698A1 (en) * | 2019-03-27 | 2020-10-01 | 华为技术有限公司 | Data secure backup and secure recovery methods, and electronic device |
US10867056B2 (en) | 2017-02-06 | 2020-12-15 | iDGate Corporation | Method and system for data protection |
CN112199730A (en) * | 2020-11-17 | 2021-01-08 | 上海优扬新媒信息技术有限公司 | Method and device for processing application data on terminal and electronic equipment |
-
2012
- 2012-12-19 CN CN201210553333.8A patent/CN103888938A/en active Pending
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104615942A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Solid-state drive encryption key generation method |
TWI705349B (en) * | 2015-07-08 | 2020-09-21 | 香港商阿里巴巴集團服務有限公司 | Terminal authentication processing, authentication method, device and system |
CN108141367A (en) * | 2015-09-30 | 2018-06-08 | 微软技术许可有限责任公司 | Code signing service |
CN105959108A (en) * | 2016-06-27 | 2016-09-21 | 收付宝科技有限公司 | Method, device and system for encrypting and decrypting cloud payment limiting secret key |
CN106776111A (en) * | 2017-01-06 | 2017-05-31 | 东北大学 | A kind of recovered cloud storage system based on LRC correcting and eleting codes |
US10867056B2 (en) | 2017-02-06 | 2020-12-15 | iDGate Corporation | Method and system for data protection |
CN108509800A (en) * | 2017-02-28 | 2018-09-07 | 盖特资讯系统股份有限公司 | Data guard method and system |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
CN108111524A (en) * | 2017-12-28 | 2018-06-01 | 广州江南科友科技股份有限公司 | Terminal data protection method and system based on private key dynamic generation mechanism |
WO2020192698A1 (en) * | 2019-03-27 | 2020-10-01 | 华为技术有限公司 | Data secure backup and secure recovery methods, and electronic device |
CN110708167A (en) * | 2019-10-14 | 2020-01-17 | 杭州云萃流图网络科技有限公司 | Method, device, equipment and medium for generating public key and private key |
CN110943976A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN110943976B (en) * | 2019-11-08 | 2022-01-18 | 中国电子科技网络信息安全有限公司 | Password-based user signature private key management method |
CN111178884A (en) * | 2019-12-16 | 2020-05-19 | 平安壹钱包电子商务有限公司 | Information processing method, device, equipment and readable storage medium |
CN111178884B (en) * | 2019-12-16 | 2024-04-12 | 平安壹钱包电子商务有限公司 | Information processing method, device, equipment and readable storage medium |
CN112199730A (en) * | 2020-11-17 | 2021-01-08 | 上海优扬新媒信息技术有限公司 | Method and device for processing application data on terminal and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103888938A (en) | PKI private key protection method of dynamically generated key based on parameters | |
CN104660605B (en) | A kind of multiple-factor auth method and its system | |
US9917692B2 (en) | Key exchange system, key exchange method, key exchange device, control method thereof, and recording medium for storing control program | |
US9166793B2 (en) | Efficient authentication for mobile and pervasive computing | |
CN103166958B (en) | A kind of guard method of file and system | |
CN110519046B (en) | Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD | |
CN106452770B (en) | Data encryption method, data decryption method, device and system | |
CN101789866B (en) | High-reliability safety isolation and information exchange method | |
US9445269B2 (en) | Terminal identity verification and service authentication method, system and terminal | |
CN105162772A (en) | IoT equipment authentication and key agreement method and device | |
CN103297403A (en) | Method and system for achieving dynamic password authentication | |
CN106330838B (en) | A kind of dynamic signature method and the client and server using this method | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
WO2019077581A1 (en) | System and method for generating and depositing keys for multi-point authentication | |
CN103684766A (en) | Private key protection method and system for terminal user | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN107483429B (en) | A kind of data ciphering method and device | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
Chen et al. | Security analysis and improvement of user authentication framework for cloud computing | |
CN105553654A (en) | Key information query processing method and device and key information management system | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
CN105187382A (en) | Multi-factor identity authentication method for preventing library collision attacks | |
CN102970676A (en) | Method for processing original data, internet of thing system and terminal | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140625 |