CN103888938A - PKI private key protection method of dynamically generated key based on parameters - Google Patents

PKI private key protection method of dynamically generated key based on parameters Download PDF

Info

Publication number
CN103888938A
CN103888938A CN201210553333.8A CN201210553333A CN103888938A CN 103888938 A CN103888938 A CN 103888938A CN 201210553333 A CN201210553333 A CN 201210553333A CN 103888938 A CN103888938 A CN 103888938A
Authority
CN
China
Prior art keywords
private key
mobile terminal
terminal
user
unique identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210553333.8A
Other languages
Chinese (zh)
Inventor
颜志超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN HUAYING DIGITAL BUSINESS Co Ltd
Original Assignee
SHENZHEN HUAYING DIGITAL BUSINESS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN HUAYING DIGITAL BUSINESS Co Ltd filed Critical SHENZHEN HUAYING DIGITAL BUSINESS Co Ltd
Priority to CN201210553333.8A priority Critical patent/CN103888938A/en
Publication of CN103888938A publication Critical patent/CN103888938A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a PKI private key protection method of a dynamically generated key based on parameters. A private key is dynamically generated and obtained in each time of use according to the combined operation of three parameters of a terminal unique identification, terminal information and a private key factor, the private key is not stored in the local, but a PKI private key is dynamically generated through the combination of the unique physical device information of a user and other factors, the private key can be not stolen, the security of the private key is greatly improved, and thus the storage safety and access safety problems of the private key are solved. Further, a private key factor can only be obtained by providing the terminal information, the terminal unique identification and an answer of an image verification code, the attacking and obtainment of the private key factor number by an external hacker are prevented, and the safety of the private key is further enhanced through the protection of the private key factor.

Description

A kind of PKI private key guard method of the dynamic generation key based on parameter
Technical field
The present invention relates to the mutual security fields of mobile device data, refer in particular to a kind of PKI private key guard method of the dynamic generation key based on parameter.
Background technology
As everyone knows, while relating to data encryption in existing mobile device, the protection of private key is the basic guarantee based on PKI system encryption and decryption and signature computing validity.And for the soft certificate of cellphone subscriber, because key is to be kept on the storage medium of cell phone apparatus end in the mode of file, so the safety problem of private key is particularly outstanding.The soft certificate private key of user on mobile device is encrypted storage and is conventionally adopted following methods at present:
1, be kept in memory with the form of key file, be encrypted storage with a fixing encryption key, obtain private key after using encryption key to be decrypted this key file need to access private key time;
2, the PIN code arranging according to user is to obtain encryption key after the factor is calculated, this key is as the encryption key of soft certificate private key file, when deciphering, also require user to input correct PIN code, after the decruption key identical with encryption key, soft certificate private key file is decrypted by obtaining after computing, finally obtains user's private key.
But the deficiency that the encryption storage means of above-mentioned existing private key exists:
1, for adopting fixed-encryption key to carry out the mode that soft certificate key file is encrypted, once assailant can copy this key file to the enterprising enforcement use of other mobile phone terminals after obtaining the user key file on memory device, fixed-encryption key is easily cracked simultaneously;
2, private key is stored on mobile phone terminal as encryption keys by monofactor, such as by user's PIN code, private key file being encrypted, as long as assailant has obtained user's PIN code like this, just can shift key file and use to other mobile phone terminals, in safety, there is risk.
As fully visible, in private key protection, if although only to adopt merely mode based on the single password code private key on mobile phone terminal to be encrypted the more another kind of method of method of storage more reliable, the fragility on still existence is safe.
Summary of the invention
The object of the invention is to overcome above-mentioned defect, a kind of PKI private key guard method of the dynamic generation key based on parameter is provided.
The object of the present invention is achieved like this: a kind of PKI private key guard method of the dynamic generation key based on parameter, comprising:
Private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And, at least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering; Wherein cryptographic key factor is random generation, the fixing numerical value of preserving after generating;
User key is to initialization;
The random cryptographic key factor that generates, generates the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved;
Private key secure access;
According to the private key of dynamic generation, transaction data is signed and formed signed data by algorithm, send at least terminal unique identification and signed data and verify;
In above-mentioned steps, after at least with the answer of end message and graphical verification code, cryptographic key factor being encrypted, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption; And, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of encryption receiving is decrypted;
In above-mentioned steps, described end message comprises user's PIN code; Described self the end message obtaining sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code; Described terminal unique identification comprises No. IMSI or IMEI number of terminal.
In above-mentioned steps, described respond packet contains the request of obtaining of terminal uniquely identified cryptographic key factor and generates private key and terminal self execution outer by terminal respectively.
In above-mentioned steps, the dynamic generation of private key specifically comprises step,
A), on mobile terminal, obtain terminal unique identification;
B), on mobile terminal transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code;
In above-mentioned steps B, on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, continues step by side;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key;
G) private key that, basis dynamically generates on mobile terminal is preserved signed data after transaction data is signed;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct;
Before above-mentioned steps A, also comprise that user key, to initialization, comprises step,
A), on mobile terminal, obtain the unique identification of terminal;
B), on mobile terminal, generate random number;
C), on mobile terminal, point out user to set user's PIN code;
D), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes algorithm to generate the key pair of PKI, private key;
E), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, is preserved by execution.
Total institute is known, the private key of terminal is the key message of authenticating user identification, guarantee not by unauthorized access, steal, copy uses and cracks, the present invention comprehensively adopts terminal unique identification (No. IMSI or IMEI number) for this reason, end message (user's PIN code), these three parameter combinations computings of cryptographic key factor (random number) dynamically obtain private key, be that private key is not kept at this locality, but dynamically generate PKI private key in conjunction with the unique factor such as physical equipment information and the random number of security platform of the users such as mobile phone terminal SIM card, the fail safe meeting of private key is greatly improved, thereby storage security and the access security problem of the private key having solved.In addition, in the present embodiment method, carry out and be divided into the security platform two parts on the backstage outside security bundle and the mobile terminal operating on mobile terminal, both independences of working, the more difficult external interference of simultaneously receiving, has further increased safety reliability.
  
[accompanying drawing explanation]
Below in conjunction with accompanying drawing in detail concrete structure of the present invention is described in detail
Fig. 1 is specific embodiments of the invention initialization flowchart;
Fig. 2 is specific embodiments of the invention flow chart.
  
[embodiment]
Below in conjunction with accompanying drawing, the specific embodiment of the invention is described in detail.
The present invention relates to a kind of PKI private key guard method of the dynamic generation key based on parameter, comprising:
private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And,
At least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering.
Above-mentioned cryptographic key factor is random generation, the fixing numerical value of preserving after generating.
By above method, not after static generation, preserve at private key, but according to need to use time side dynamically to generate at every turn, this is effectively avoided the static private key of preserving in the past to have the danger being cracked.In addition, the generation of private key is based at least comprising end message, terminal unique identification and three parameters of cryptographic key factor, and end message content is not directly obtained in request and is sent at cryptographic key factor, but obtain by terminal unique identification, even if cut the people that wins the third place and also cannot be obtained by this request msg obtaining in request process data thus, add that in parameter, cryptographic key factor is encrypted rear transmission by the parameter based at least comprising end message especially, take a step forward and need deciphering side obtainable at dynamic generation private key, therefore in whole method, realized the protection of the full stage high reliability to private key from " existence " to " generation " process.
In said method, as optionally, terminal unique identification comprises No. IMSI or IMEI number of terminal.And end message can comprise user's PIN code, the password that when this user's PIN code is initial, user sets voluntarily, self the end message obtaining described in method sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code;
In said method, as optionally, after can being at least encrypted cryptographic key factor with the answer of end message and graphical verification code, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption.Corresponding, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of the encryption receiving is decrypted.In cryptographic key factor is encrypted, add graphical verification code can effectively introduce a variable, thereby strengthen the Cipher Strength of cryptographic key factor.
Common, before said method is carried out, need to carry out user key is to initialization, generate at random cryptographic key factor, generate the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved.
After above-mentioned dynamic generation private key, can realize private key secure access, process is, according to the private key of dynamic generation, transaction data signed and formed signed data by algorithm, sends at least terminal unique identification and signed data and verifies.
  
In said method, respond packet containing terminal uniquely identified cryptographic key factor obtain request with generate private key can by terminal two independently part carry out, also can be respectively by terminal outer with terminal self execution, wherein the latter is due to the partial data setting of disembarking, therefore coefficient of safety is higher.
  
A specific embodiment that is the inventive method referring to Fig. 1,2, this embodiment is take mobile terminal as example,
Wherein Fig. 1 be user key to initialization, comprise step:
1), on mobile terminal (being expressed as the security bundle operating on mobile terminal in figure), obtain the unique identification of terminal;
2), on mobile terminal, generate random number(being cryptographic key factor);
3), on mobile terminal, point out user to set user's PIN code;
4), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes the key pair that generates PKI, private key such as RSA or SM2 algorithm;
5), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal outer (being expressed as the security platform operating in outside mobile terminal in figure) is verified mobile terminal identity after receiving, if checking, not by returning to mistake, is preserved by execution.
Preferably, after above-mentioned initialization completes, carry out according to demand private key and dynamically generate, referring to Fig. 2, comprise step:
A), in mobile terminalon (being expressed as the security bundle operating on mobile terminal in figure), obtain terminal unique identification;
B), on mobile terminal, transmitting terminal unique identification is extremely outside mobile terminalthe graph data of (being expressed as the security platform operating in outside mobile terminal in figure) acquisition request graphical verification code and random number (being cryptographic key factor);
Best, in this step, on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, continues step by side;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key;
G), preserve signed data after transaction data being signed according to the private key dynamically generating on mobile terminal, algorithm is RSA or SM2;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct.
As fully visible, the advantage of this patent method is:
1, the each use all of user's PKI private key dynamically generates, and is not kept at mobile terminal side, dynamically generates thus by private key, is not kept at the characteristic of mobile terminal this locality, and private key can not be stolen.
2, user's PKI private key is according to end message (user's PIN code), the unique identification (No. IMSI or IMEI number) of terminal and initialization are kept at security platform cryptographic key factor (random number) after generating generates as the factor, and the generation of private key needs user to input PIN code, then identify in conjunction with terminal hardware, and decipher the random number of preserving from platform, the difficulty that three obtains is simultaneously very large.
3, need to provide the answer of graphical user identifying code, user's PIN code, just can obtain with terminal unique identification the cryptographic key factor (random number) that platform is preserved, prevent that the random number of platform preservation from being attacked by outside Hacker Program, guarantee the safety of the random number of platform preservation.
It is pointed out that and the invention is not restricted to above-mentioned execution mode, any simple modification, equivalent variations and modification that any those skilled in the art do above-described embodiment in based on technical solution of the present invention, all belong in protection scope of the present invention.

Claims (10)

1. a PKI private key guard method for the dynamic generation key based on parameter, comprising:
Private key dynamically generates;
Respond packet is obtained request containing terminal uniquely identified cryptographic key factor, according to the end message of this terminal unique identification inquiry preservation, returns to the cryptographic key factor of encryption after at least with end message, cryptographic key factor being encrypted; And,
At least with self the end message obtaining, the cryptographic key factor of encryption receiving is decrypted, more dynamically generates private key according to terminal unique identification, the end message of self and the cryptographic key factor of deciphering;
Wherein cryptographic key factor is random generation, the fixing numerical value of preserving after generating.
2. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 1, is characterized in that: also comprise, user key is to initialization;
The random cryptographic key factor that generates, generates the key pair that comprises PKI, private key according to this cryptographic key factor, terminal unique identification and end message, PKI is preserved.
3. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 1, is characterized in that: also comprise private key secure access;
According to the private key of dynamic generation, transaction data is signed and formed signed data by algorithm, send at least terminal unique identification and signed data and verify.
4. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 1-3, it is characterized in that: in described, after at least with the answer of end message and graphical verification code, cryptographic key factor being encrypted, return to the corresponding graph data of the answer of figure check code and the cryptographic key factor of encryption; And, at least with obtain self end message and according to the input of the answer of the graphical user check code obtaining after the graph data of present graphical check code, the cryptographic key factor of encryption receiving is decrypted.
5. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 4 any one, is characterized in that: described end message comprises user's PIN code; Described self the end message obtaining sets it as user's PIN code of the end message of self instantly after comprising the input of response user PIN code; Described terminal unique identification comprises No. IMSI or IMEI number of terminal.
6. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 5 any one, is characterized in that: described respond packet contains the request of obtaining of terminal uniquely identified cryptographic key factor and generates private key and terminal self execution outer by terminal respectively.
7. the PKI private key guard method of the dynamic generation key based on parameter as described in claim 6 any one, is characterized in that: the dynamic generation of private key specifically comprises step,
A), on mobile terminal, obtain terminal unique identification;
B), on mobile terminal transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code;
C), outside mobile terminal, search the corresponding information of mobile terminal of preservation according to the terminal unique identification sending, return to error message if cannot find, find and select the answer of a block graphics identifying code and graph data and according to the answer encrypted random number of the graphical verification code of the user's PIN code in information of mobile terminal and selection, then the random number after the graph data of this graphical verification code and above-mentioned encryption be back on mobile terminal in the lump;
D), on mobile terminal, point out the graph data prompting user of input that user carries out user's PIN code present graphical check code to carry out the input of the answer of figure check code;
E), on mobile terminal, according to the answer of the PIN code of user input and graphical verification code, the random number after encrypting is decrypted, decipher the unsuccessful error message of returning, successful continue step;
F), on mobile terminal according to terminal unique identification, user's PIN code, the random number decrypting dynamically generates private key.
8. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 7, is characterized in that: before described steps A, also comprise that user key, to initialization, comprises step,
A), on mobile terminal, obtain the unique identification of terminal;
B), on mobile terminal, generate random number;
C), on mobile terminal, point out user to set user's PIN code;
D), unique identification, user's random number and user's PIN code of the terminal that gets according to above-mentioned three steps on mobile terminal be as the factor, utilizes algorithm to generate the key pair of PKI, private key;
E), in mobile terminal, the PKI of cipher key pair, terminal unique identification, random number, user's PIN code are carried out uploading after data encryption, mobile terminal is external to be received and rear mobile terminal identity is verified, if checking, not by returning to mistake, is preserved by execution.
9. the PKI private key guard method of the dynamic generation key based on parameter as claimed in claim 7 or 8, is characterized in that: after described step F, also comprises,
G) private key that, basis dynamically generates on mobile terminal is preserved signed data after transaction data is signed;
H), on mobile terminal, the answer of terminal unique identification, graphical verification code graph data and signed data are sent to outside mobile terminal;
I), outside mobile terminal according to terminal unique identification, whether the checking of the answer of graphical verification code and signed data correct.
10. as required the PKI private key guard method of the dynamic generation key based on parameter as described in 7 or 8; it is characterized in that: described private key dynamically generates in step B; on mobile terminal, carry out after data encryption transmitting terminal unique identification to mobile terminal and graph data and the random number of acquisition request graphical verification code; mobile terminal is external to be received and rear mobile terminal identity is verified; if checking, not by returning to mistake, continues step by side.
CN201210553333.8A 2012-12-19 2012-12-19 PKI private key protection method of dynamically generated key based on parameters Pending CN103888938A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210553333.8A CN103888938A (en) 2012-12-19 2012-12-19 PKI private key protection method of dynamically generated key based on parameters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210553333.8A CN103888938A (en) 2012-12-19 2012-12-19 PKI private key protection method of dynamically generated key based on parameters

Publications (1)

Publication Number Publication Date
CN103888938A true CN103888938A (en) 2014-06-25

Family

ID=50957622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210553333.8A Pending CN103888938A (en) 2012-12-19 2012-12-19 PKI private key protection method of dynamically generated key based on parameters

Country Status (1)

Country Link
CN (1) CN103888938A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615942A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Solid-state drive encryption key generation method
CN105959108A (en) * 2016-06-27 2016-09-21 收付宝科技有限公司 Method, device and system for encrypting and decrypting cloud payment limiting secret key
CN106776111A (en) * 2017-01-06 2017-05-31 东北大学 A kind of recovered cloud storage system based on LRC correcting and eleting codes
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN108111524A (en) * 2017-12-28 2018-06-01 广州江南科友科技股份有限公司 Terminal data protection method and system based on private key dynamic generation mechanism
CN108141367A (en) * 2015-09-30 2018-06-08 微软技术许可有限责任公司 Code signing service
CN108509800A (en) * 2017-02-28 2018-09-07 盖特资讯系统股份有限公司 Data guard method and system
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN110943976A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN111178884A (en) * 2019-12-16 2020-05-19 平安壹钱包电子商务有限公司 Information processing method, device, equipment and readable storage medium
TWI705349B (en) * 2015-07-08 2020-09-21 香港商阿里巴巴集團服務有限公司 Terminal authentication processing, authentication method, device and system
WO2020192698A1 (en) * 2019-03-27 2020-10-01 华为技术有限公司 Data secure backup and secure recovery methods, and electronic device
US10867056B2 (en) 2017-02-06 2020-12-15 iDGate Corporation Method and system for data protection
CN112199730A (en) * 2020-11-17 2021-01-08 上海优扬新媒信息技术有限公司 Method and device for processing application data on terminal and electronic equipment

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615942A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Solid-state drive encryption key generation method
TWI705349B (en) * 2015-07-08 2020-09-21 香港商阿里巴巴集團服務有限公司 Terminal authentication processing, authentication method, device and system
CN108141367A (en) * 2015-09-30 2018-06-08 微软技术许可有限责任公司 Code signing service
CN105959108A (en) * 2016-06-27 2016-09-21 收付宝科技有限公司 Method, device and system for encrypting and decrypting cloud payment limiting secret key
CN106776111A (en) * 2017-01-06 2017-05-31 东北大学 A kind of recovered cloud storage system based on LRC correcting and eleting codes
US10867056B2 (en) 2017-02-06 2020-12-15 iDGate Corporation Method and system for data protection
CN108509800A (en) * 2017-02-28 2018-09-07 盖特资讯系统股份有限公司 Data guard method and system
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN108111524A (en) * 2017-12-28 2018-06-01 广州江南科友科技股份有限公司 Terminal data protection method and system based on private key dynamic generation mechanism
WO2020192698A1 (en) * 2019-03-27 2020-10-01 华为技术有限公司 Data secure backup and secure recovery methods, and electronic device
CN110708167A (en) * 2019-10-14 2020-01-17 杭州云萃流图网络科技有限公司 Method, device, equipment and medium for generating public key and private key
CN110943976A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN110943976B (en) * 2019-11-08 2022-01-18 中国电子科技网络信息安全有限公司 Password-based user signature private key management method
CN111178884A (en) * 2019-12-16 2020-05-19 平安壹钱包电子商务有限公司 Information processing method, device, equipment and readable storage medium
CN111178884B (en) * 2019-12-16 2024-04-12 平安壹钱包电子商务有限公司 Information processing method, device, equipment and readable storage medium
CN112199730A (en) * 2020-11-17 2021-01-08 上海优扬新媒信息技术有限公司 Method and device for processing application data on terminal and electronic equipment

Similar Documents

Publication Publication Date Title
CN103888938A (en) PKI private key protection method of dynamically generated key based on parameters
CN104660605B (en) A kind of multiple-factor auth method and its system
US9917692B2 (en) Key exchange system, key exchange method, key exchange device, control method thereof, and recording medium for storing control program
US9166793B2 (en) Efficient authentication for mobile and pervasive computing
CN103166958B (en) A kind of guard method of file and system
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN106452770B (en) Data encryption method, data decryption method, device and system
CN101789866B (en) High-reliability safety isolation and information exchange method
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN105162772A (en) IoT equipment authentication and key agreement method and device
CN103297403A (en) Method and system for achieving dynamic password authentication
CN106330838B (en) A kind of dynamic signature method and the client and server using this method
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
WO2019077581A1 (en) System and method for generating and depositing keys for multi-point authentication
CN103684766A (en) Private key protection method and system for terminal user
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN107483429B (en) A kind of data ciphering method and device
CN110020524A (en) A kind of mutual authentication method based on smart card
Chen et al. Security analysis and improvement of user authentication framework for cloud computing
CN105553654A (en) Key information query processing method and device and key information management system
CN106789024A (en) A kind of remote de-locking method, device and system
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140625