CN109302400B - Asset password exporting method for operation and maintenance auditing system - Google Patents

Asset password exporting method for operation and maintenance auditing system Download PDF

Info

Publication number
CN109302400B
CN109302400B CN201811210286.0A CN201811210286A CN109302400B CN 109302400 B CN109302400 B CN 109302400B CN 201811210286 A CN201811210286 A CN 201811210286A CN 109302400 B CN109302400 B CN 109302400B
Authority
CN
China
Prior art keywords
password
file
asset
user
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811210286.0A
Other languages
Chinese (zh)
Other versions
CN109302400A (en
Inventor
郭嘉仪
黄海
范渊
吴永越
郑学新
刘韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN201811210286.0A priority Critical patent/CN109302400B/en
Publication of CN109302400A publication Critical patent/CN109302400A/en
Application granted granted Critical
Publication of CN109302400B publication Critical patent/CN109302400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an asset password exporting method for an operation and maintenance auditing system.A password sharing module matches the information of a divided sub ciphertext part with a plaintext part and transmits the information as a record to a file analyzing module, and the file analyzing module encapsulates data and outputs n different password exporting files; adding a user name to the generated file, taking a hash value, and digitally signing a key pair generated for each user; dividing according to a preset authority, distributing files for each user, and carrying out reversible file encryption on the files of the users by using login passwords of the users; the file is transmitted to the subscriber host using an encrypted channel. The invention realizes the safety protection of the exported file. The invention distributes and manages the exported files and realizes the authority division of the asset information export. By means of a digital signature mechanism, traceable sources and tamper resistance are achieved. The safety of the asset information backup is guaranteed, and possible attackers in the intranet are effectively resisted.

Description

Asset password exporting method for operation and maintenance auditing system
Technical Field
The invention belongs to the technical field of information security, and particularly relates to an asset password derivation method for an operation and maintenance auditing system.
Background
Secret sharing technology is an important research content of cryptography and information security, is widely applied to the fields of key management and digital signature, and was originally proposed by Shaimir and Blackly in 1979 based on Lagrance interpolation polynomial and vector method, respectively. The basic idea is that a distributor divides a secret s into n shadow secrets through a secret polynomial and distributes the n shadow secrets to a holder, wherein any information of not less than t shadow secrets is arbitrary. The appearance of the key safety report solves the basic problem of the key safety report, can ensure the safety and the integrity of the secret, and can prevent the risk caused by over concentration of the secret (Ronghui, Morgan swordsman, Changqiang, and the like, a key distribution and recovery algorithm [ J ] based on Shamir secret sharing, 2015(3): 60-69). The password is required to be exported and imported in the operation and maintenance auditing system, however, the safety is important in the password exporting process and is a key part of the system safety, and meanwhile, the responsibility allocation management of the password is crucial and is a key link for preventing internal theft.
Disclosure of Invention
The invention aims to provide an asset password exporting method for an operation and maintenance auditing system, which solves the problem of the security of asset passwords in the exporting process and realizes the security protection of exported files.
The invention distributes and manages the exported files and realizes the authority division of the asset information export. And the credibility of the user is realized through identity authentication. By means of a digital signature mechanism, traceable sources and tamper resistance are achieved. And the exported file can be imported into the system to realize the function of recovering the asset information. The safety of asset information backup is guaranteed, possible attackers in an intranet are effectively resisted, the responsibility of operation and maintenance personnel is determined through authority division, and management is facilitated.
The invention is mainly realized by the following technical scheme: an asset password derivation method for an operation and maintenance auditing system mainly comprises the following steps:
step S102: the cipher sharing module matches the information of the divided sub-ciphertext and the plaintext part according to assets, and transmits the information as a record to the file analysis module, and the file analysis module encapsulates data and outputs n different cipher export files;
step S103: adding a user name to the generated file, taking a hash value, and digitally signing a key pair generated for each user; dividing according to a preset authority, distributing files for each user, and carrying out reversible file encryption on the files of the users by using login passwords of the users; the file is transmitted to the subscriber host using an encrypted channel.
In order to better implement the present invention, in step S103, firstly, the legal identities of the department administrator and the password administrator are ensured through the identity authentication system; and in the operation and maintenance auditing system, generating a pair of public key and private key keys for each user for managing the passwords by adopting a public key encryption system, storing the pair of public key and private key keys in the system and performing digital signature on the exported file.
In order to better implement the present invention, further, in step S103, reversible file encryption is performed on the generated file by using a password of a password administrator logging in the operation and maintenance auditing system; and sending the file to a machine backed up by a password manager by using an sftp protocol, and avoiding man-in-the-middle attack by adopting an encrypted channel.
In order to better implement the present invention, further, the method further comprises the step of password importing:
step S201: uploading the held file to an operation and maintenance auditing system through an encrypted channel; decrypting the file by using a password of a user logging in an operation and maintenance auditing system to obtain the file and a digital signature; verifying the digital signature, if the digital signature is wrong, finishing the operation, recording and feeding back the operation and maintenance audit system;
step S202: after a file of a user is decrypted by using a login password of the user, a file analysis module reads records in the file one by one to form data, reads sub ciphertext parts of corresponding assets in the imported file, and transmits the sub ciphertext parts to a ciphertext recovery module together; the ciphertext recovery module obtains the sub ciphertext, calculates and restores the sub ciphertext through a sharer secret sharing algorithm to obtain a complete original ciphertext, and transmits the ciphertext to the database analysis module;
step S203: and the database analysis module correspondingly combines the plaintext transmission information and the ciphertext of the asset into a database record and writes the database record into an asset database of the operation and maintenance auditing system, and the asset password is led in and recovered.
In order to better implement the present invention, further, the method further includes step S101: the database analysis module reads records in the asset information database, reads non-sensitive information in an original data format, reads corresponding encrypted and stored cipher texts of the asset passwords, transmits the cipher texts to the cipher text splitting module, and splits the cipher texts by adopting a Shamir secret sharing algorithm to obtain n sub-cipher texts.
In order to better implement the invention, further, the non-sensitive information comprises information of plaintext storage of asset names, asset IP addresses and remark information; the format of the password export file in step S102 may be a txt plain text file or an excel form file or a database record.
In order to better implement the present invention, further, in step S103, the user includes a department administrator and a plurality of password administrators, and the total file of the department administrator and one password administrator or the total file of all password administrators may complete password import recovery.
In order to better implement the present invention, further, the number of the password export files n is 5, the number of the department administrators is 1, and the number of the password administrators is 3; the department administrator holds 2 sub-passwords, and the password administrator respectively holds 1 sub-password; 3 sub-passwords are needed for importing the password.
The permission division settings are as follows:
1. the role of the password export function in the operation and maintenance auditing system is as follows: system administrators, department administrators, and password administrators. The system administrator is an administrator of the operation and maintenance auditing system and has the highest authority of the operation and maintenance auditing system. The department manager is a sub-manager and is responsible for operation and maintenance auditors for managing partial assets. And the password manager is responsible for managing and maintaining the asset passwords in the operation and maintenance auditing system.
2. The authority division of the password export function is set by a system administrator, but the role is not responsible for importing and exporting the password and saving the password file. The department administrator should hold the export password with a large specific gravity, and the password administrators should hold the passwords with the same specific gravity. A department administrator needs to cooperate with a password administrator to complete the password import recovery process; all password administrators can cooperate together to complete the password import recovery process.
3. In the default configuration, one department has 1 department administrator, 3 password administrators. The total number of the sub-passwords is 5, the department administrator holds 2 sub-passwords, and the password administrator holds 1 sub-password respectively. When the password is imported, 3 sub-passwords are needed, and a department administrator can cooperate with a 1-bit password administrator to complete the operation; or the operation can be done jointly by a 3-digit password administrator.
4. The password division scheme supports customization, can be configured on a page by a system administrator, is stored in the operation and maintenance auditing system, is encrypted by adopting a public Shamir secret sharing algorithm, and divides the sub-passwords.
5. Password export may be initiated manually by a department administrator clicking a button or automatically exported according to a configuration for a period of time.
The asset password derivation process is as follows:
the first step is as follows: after the password export operation is initiated, the database analysis module reads records stored in an asset information database in the operation and maintenance auditing system, reads information stored in plain texts such as non-sensitive information, asset names, asset IP addresses, remark information and the like in an original data format, reads corresponding encrypted and stored asset password ciphertext and transmits the ciphertext to the ciphertext splitting module.
The second step is that: the ciphertext splitting module divides the ciphertext according to parameters set by a system administrator by adopting a Shamir secret sharing algorithm to generate n parts of sub-ciphertexts. By default 5 sub-ciphertexts are generated.
The third step: the cipher sharing module matches the information of the divided sub-cipher text and the plaintext part according to assets, and transmits the information as a record to the file analysis module, the file analysis module encapsulates data and outputs the data as n different cipher export files in the file formats such as common txt plain text files, excel table files, database records and the like.
The fourth step: and attaching a user name to the generated file, taking a hash value, and digitally signing the key pair generated by the operation and maintenance design system for each user.
The fifth step: and dividing according to the preset authority, distributing files for each user, and carrying out reversible file encryption on the files of the user by using the login password of the user.
And a sixth step: the file is transmitted to the subscriber host using an encrypted channel.
After the password import recovery operation is initiated, a system administrator and 1 password administrator or all password administrators need to be found, and files held by the system administrators and 1 password administrator are uploaded to an operation and maintenance auditing system through an encrypted channel. And decrypting the file by using the password of the user logging in the operation and maintenance auditing system to obtain the file and the digital signature. And verifying the digital signature, if the digital signature is wrong, not performing the next operation, recording and feeding back to the operation and maintenance auditing system. After a file of a user is decrypted by using a login password of the user, the file analysis module reads records in the file one by one as data, reads sub ciphertext parts of corresponding assets in the imported file, and transmits the sub ciphertext parts to the ciphertext recovery module together. And the ciphertext recovery module acquires the sub ciphertext, calculates and restores the sub ciphertext through a sharer secret sharing algorithm to obtain a complete original ciphertext, and transmits the ciphertext to the database analysis module. And the database analysis module correspondingly combines the plaintext transmission information and the ciphertext of the asset into a database record, and writes the database record into an asset database of the operation and maintenance auditing system until the asset password is imported into the recovery process.
As shown in fig. 4, the key sharing and recovering module includes the following specific steps:
the first step is as follows: the number n of copies of the file when the password is derived is set by the user. And setting the minimum file copy number k required when the asset password is imported. Optionally, the number of files held by users with different permissions is set, n users can be defaulted to respectively hold one different file, and the files can be automatically distributed according to permission configuration requirements (but the situation that a single user holds more than or equal to k files cannot occur). The more files the number of which is held, the higher authority is provided when the asset password is recovered, more sub-ciphertexts can be provided, and the greater responsibility is also required to be borne.
The second step is that: since the sharer secret sharing algorithm requires that the secret be an integer, the ciphertext is read and converted into binary code S.
The third step: and initializing parameters. And setting the number n of ciphertext distribution and a threshold value k. Randomly selecting n different non-zero elements x from the order finite field gf (p) (which may for convenience be of the same value as q in the next step)1,x2,…,xnAnd n holders U of sub-ciphertextsr={U1,U2,UnAnd the corresponding relations are stored in the interior.
The fourth step: and a ciphertext distribution stage. The operation and maintenance auditing system takes a large prime number q to satisfy q>n and q is larger than or equal to the theoretical maximum value of S. Optionally selecting (k-1) elements a in GF (p)i(i ═ 1, 2, …, k-1) constitutes a polynomial of order (k-1):
Figure BDA0001832279750000041
original cipher text S (0) a0. For all ciphertext holders UrE.g. U, generates n sub-ciphertexts:
Figure BDA0001832279750000042
and mixing SrCorresponding UrAnd transmitting the file to a file analysis module to be used as a sub ciphertext to generate n asset secret export files. And randomly distributing files according to the number of copies that the user should hold according to the previous optional configuration, and defaulting that each user holds one file.
The fifth step: and a ciphertext recovery stage. When the user needs to import the asset password file for recovery, a plurality of users with the total number of the file shares reaching k are found, and the file is uploaded to an operation and maintenance auditing system. The operation and maintenance auditing system reads the sub-ciphertext and uses a Lagrange interpolation formula:
Figure BDA0001832279750000043
and recovering the ciphertext S.
The principle of the invention is that the encrypted data is divided by user-defined authority division, setting the hierarchical authority of an administrator. Exporting the asset password as a file, encrypting and storing the file, and backing up the file; meanwhile, the files are guaranteed not to be tampered by the digital signature. And uploading files by a plurality of administrators, restoring the asset passwords after verification, and importing recovery asset information. The invention solves the problems of exporting and backing up the asset password in the operation and maintenance auditing system, importing the backup file into the operation and maintenance auditing system to restore the asset password, and solves the problems of password security and authority division in the exporting process.
And recording the export password and the import password through the system log. The purpose of tracing the source is achieved by recording and tracing the behavior history of each user. Further accountability checking can be performed by recording files and administrators with digital signature verification errors. The system administrator is responsible for configuration setting, but does not have the authority of directly managing password import and export according to the requirement of authority division. The department administrator has a greater proportion of sub-passwords and accordingly needs to assume greater responsibility.
The invention has the beneficial effects that:
(1) adding a user name to the generated file, taking a hash value, and digitally signing a key pair generated for each user; dividing according to a preset authority, distributing files for each user, and carrying out reversible file encryption on the files of the users by using login passwords of the users; the file is transmitted to the subscriber host using an encrypted channel. The invention solves the problem of solving the password security in the exporting process, ensures that the file is not falsified through the digital signature, realizes the security protection of the exported file, and has better practicability.
(2) In the step S103, firstly, the legal identities of the department administrator and the password administrator are ensured through the identity authentication system; and in the operation and maintenance auditing system, generating a pair of public key and private key keys for each user for managing the passwords by adopting a public key encryption system, storing the pair of public key and private key keys in the system and performing digital signature on the exported file. The method firstly carries out online verification based on the identity system and then carries out offline security protection on the exported file, thereby realizing security protection on the exported file and having better practicability.
(3) Reversible file encryption is performed on the generated file by using a password of a password manager for logging in the operation and maintenance auditing system in the step S103; and sending the file to a machine backed up by a password manager by using an sftp protocol, and avoiding man-in-the-middle attack by adopting an encrypted channel. The file encryption ensures that only an administrator can read the file and effectively protects the safety of the exported file. The encrypted channel is used to avoid potential attacks which may exist in an intranet environment, and the files are protected from being intercepted and leaked.
(4) The invention distributes and manages the exported files and realizes the authority division of the asset information export. And the credibility of the user is realized through identity authentication. By means of a digital signature mechanism, traceable sources and tamper resistance are achieved. And the exported file can be imported into the system to realize the function of recovering the asset information. The safety of asset information backup is guaranteed, possible attackers in an intranet are effectively resisted, the responsibility of operation and maintenance personnel is determined through authority division, and management is facilitated.
(5) The invention ensures that a single user cannot hold complete asset password information by segmenting the asset password, realizes authority segmentation and traceability and conveniently manages the asset password. And a universal file format is adopted, so that better transportability and readability are provided, and the maintenance and recovery of asset information are facilitated.
Drawings
FIG. 1 is a functional block diagram of rights partitioning;
FIG. 2 is a flow diagram of a password export and import process;
FIG. 3 is a schematic block diagram of password-derived security protection;
fig. 4 is a functional block diagram of a key sharing and recovery module.
Detailed Description
Example 1:
an asset password derivation method for an operation and maintenance auditing system mainly comprises the following steps:
step S102: the cipher sharing module matches the information of the divided sub-ciphertext and the plaintext part according to assets, and transmits the information as a record to the file analysis module, and the file analysis module encapsulates data and outputs n different cipher export files;
step S103: adding a user name to the generated file, taking a hash value, and digitally signing a key pair generated for each user; dividing according to a preset authority, distributing files for each user, and carrying out reversible file encryption on the files of the users by using login passwords of the users; the file is transmitted to the subscriber host using an encrypted channel.
As in the export process of fig. 2, reading asset information from the asset information database, and then importing the asset information into the database parsing module to obtain plaintext partial information and encrypted and stored asset password ciphertext; importing the asset cipher text into a cipher text splitting module, and splitting the asset cipher text into n cipher texts according to configuration; then, the plaintext part information and the ciphertext are combined through a file analysis module, then a digital signature and a file encryption are set, and finally n files are output through an encryption channel.
The invention solves the problem of solving the password security in the exporting process, ensures that the file is not falsified through the digital signature, realizes the security protection of the exported file, and has better practicability. The invention distributes and manages the exported files and realizes the authority division of the asset information export. By means of a digital signature mechanism, traceable sources and tamper resistance are achieved. And the exported file can be imported into the system to realize the function of recovering the asset information. The safety of asset information backup is guaranteed, possible attackers in an intranet are effectively resisted, the responsibility of operation and maintenance personnel is determined through authority division, and management is facilitated.
Example 2:
in this embodiment, optimization is performed on the basis of embodiment 1, as shown in fig. 3, in step S103, firstly, legal identities of a department administrator and a password administrator are ensured through an identity verification system; and in the operation and maintenance auditing system, generating a pair of public key and private key keys for each user for managing the passwords by adopting a public key encryption system, storing the pair of public key and private key keys in the system and performing digital signature on the exported file. Reversible file encryption is performed on the generated file by using a password of a password manager for logging in the operation and maintenance auditing system in the step S103; and sending the file to a machine backed up by a password manager by using an sftp protocol, and avoiding man-in-the-middle attack by adopting an encrypted channel.
Through the multiple-time identity authentication system, the user derived by using the asset password is ensured to be a legal user. The method realizes strict identity verification, has a good authentication mechanism, and ensures the safety of the system. The invention distributes and manages the exported files and realizes the authority division of the asset information export. And the credibility of the user is realized through identity authentication. By means of a digital signature mechanism, traceable sources and tamper resistance are achieved. And the exported file can be imported into the system to realize the function of recovering the asset information. The safety of asset information backup is guaranteed, possible attackers in an intranet are effectively resisted, the responsibility of operation and maintenance personnel is determined through authority division, and management is facilitated.
Other parts of this embodiment are the same as embodiment 1, and thus are not described again.
Example 3:
in this embodiment, optimization is performed based on embodiment 1 or 2, as shown in fig. 1, in step S103, the user includes a department administrator and a plurality of password administrators, and a total file of the department administrator and one password administrator or a total file of all password administrators may complete password import recovery. The number of the password export files n is 5, the number of department administrators is 1, and the number of password administrators is 3; the department administrator holds 2 sub-passwords, and the password administrator respectively holds 1 sub-password; 3 sub-passwords are needed for importing the password.
As shown in fig. 1, the system administrator sets the authority partition, and the default setting is that each department has a department administrator and 3 password administrators, the department administrator holds 2 sub-passwords, and the password administrators hold 1 sub-password respectively; then a system administrator logs in a management page, appoints a department administrator and sets a password division scheme; the password division scheme is stored in the operation and maintenance auditing system; automatically carrying out password export backup according to the configuration, and manually carrying out password export; and finally, distributing the asset password according to the scheme.
And recording the export password and the import password through the system log. The purpose of tracing the source is achieved by recording and tracing the behavior history of each user. Further accountability checking can be performed by recording files and administrators with digital signature verification errors. The system administrator is responsible for configuration setting, but does not have the authority of directly managing password import and export according to the requirement of authority division. The department administrator has a greater proportion of sub-passwords and accordingly needs to assume greater responsibility.
The rest of this embodiment is the same as embodiment 1 or 2, and therefore, the description thereof is omitted.
Example 4:
the embodiment is optimized on the basis of the embodiment 2, and further comprises the following password importing steps:
step S201: uploading the held file to an operation and maintenance auditing system through an encrypted channel; decrypting the file by using a password of a user logging in an operation and maintenance auditing system to obtain the file and a digital signature; verifying the digital signature, if the digital signature is wrong, finishing the operation, recording and feeding back the operation and maintenance audit system;
step S202: after a file of a user is decrypted by using a login password of the user, a file analysis module reads records in the file one by one to form data, reads sub ciphertext parts of corresponding assets in the imported file, and transmits the sub ciphertext parts to a ciphertext recovery module together; the ciphertext recovery module obtains the sub ciphertext, calculates and restores the sub ciphertext through a sharer secret sharing algorithm to obtain a complete original ciphertext, and transmits the ciphertext to the database analysis module;
step S203: and the database analysis module correspondingly combines the plaintext transmission information and the ciphertext of the asset into a database record and writes the database record into an asset database of the operation and maintenance auditing system, and the asset password is led in and recovered.
As shown in the importing process in fig. 2, an exported file is input through an encrypted channel, then the file is decrypted and the digital signature is verified, if the verification is successful, the decrypted file is obtained, then the file is imported into a file parsing module to obtain plaintext part information and asset password ciphertext, the asset password ciphertext is imported into a ciphertext recovery module to obtain an original ciphertext, then the original ciphertext and the plaintext part information are together imported into a data parsing module, and the original ciphertext and the plaintext part information are imported into an operation and maintenance auditing system to recover data.
Through a digital signature mechanism, in the process of importing and recovering the asset password, whether a file uploaded by a user with the asset password is tampered or not is identified. The method has the advantages that the tamper resistance of the file is guaranteed, malicious users tampering the file are identified, the password recovery process is prevented from being invalid due to the fact that the internal malicious users tamper the file, the method has the traceability characteristic, and the external security is protected so that the internal malicious users are avoided.
The other parts of this embodiment are the same as those of embodiment 2, and thus are not described again.
Example 5:
the present embodiment is optimized on the basis of embodiment 1, and further includes step S101: the database analysis module reads records in the asset information database, reads non-sensitive information in an original data format, reads corresponding encrypted and stored cipher texts of the asset passwords, transmits the cipher texts to the cipher text splitting module, and splits the cipher texts by adopting a Shamir secret sharing algorithm to obtain n sub-cipher texts. The non-sensitive information comprises the information of the plaintext storage of the asset name, the asset IP address and the remark information; the format of the password export file in step S102 may be a txt plain text file or an excel form file or a database record.
The invention solves the problem of solving the password security in the exporting process, ensures that the file is not falsified through the digital signature, realizes the security protection of the exported file, and has better practicability. Non-sensitive information is presented in a plaintext form, and resources occupied by encryption are reduced. And a universal file format is generated, so that the method has better portability and better readability. The splitting of the ciphertext ensures that a single user may not obtain a complete asset password.
Other parts of this embodiment are the same as those of embodiment 1, and thus are not described again.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (6)

1. An asset password derivation method for an operation and maintenance auditing system, which is characterized by comprising the following steps:
step S101: the database analysis module reads records in the asset information database, reads non-sensitive information in an original data format, reads a corresponding encrypted and stored cipher text of the asset password, transmits the cipher text to the cipher text splitting module, and splits the cipher text by adopting a Shamir secret sharing algorithm to obtain n sub-cipher texts;
step S102: the password sharing module matches the sub-ciphertext obtained by segmentation in the step S101 with information stored in a plaintext of non-sensitive information according to asset information, and transmits the information as a record to the file analysis module, and the file analysis module encapsulates data and outputs the data as n different password export files;
step S103: a hash value is taken for the file attached with the user name exported in the step S102, and a key pair generated for each user is used for carrying out digital signature; dividing according to the preset authority, distributing the file exported in the step S102 to each user, and carrying out reversible encryption on the file distributed by the user by using the login password of the user; transmitting the encrypted distributed file to the user host by using an encryption channel;
in the step S103, firstly, the legal identities of the department administrator and the password administrator are ensured through the identity authentication system; and in the operation and maintenance auditing system, generating a pair of public key and private key keys for each user for managing the passwords by adopting a public key encryption system, storing the pair of public key and private key keys in the system and performing digital signature on the exported file.
2. The asset password exporting method for the operation and maintenance auditing system according to claim 1, wherein in step S103, the generated file is subjected to reversible file encryption by using a password of a password administrator logging in the operation and maintenance auditing system; and sending the file to a machine backed up by a password manager by using an sftp protocol, and avoiding man-in-the-middle attack by adopting an encrypted channel.
3. The asset password exporting method for the operation and maintenance auditing system according to claim 1, wherein the user in step S103 comprises a department administrator and a plurality of password administrators, and the total file of the department administrator and one password administrator or the total file of all password administrators can complete password import recovery.
4. The asset password derivation method for the operation and maintenance auditing system according to claim 3, wherein the number of copies n of the password derivation file is 5, the number of department administrators is 1, and the number of password administrators is 3; the department administrator holds 2 sub-passwords, and the password administrator respectively holds 1 sub-password; 3 sub-passwords are needed for importing the password.
5. The asset password export method for the operation and maintenance auditing system according to any one of claims 1-4, characterized by further comprising the steps of password import:
step S201: uploading the held file to an operation and maintenance auditing system through an encrypted channel; decrypting the file by using a password of a user logging in an operation and maintenance auditing system to obtain the file and a digital signature; verifying the digital signature, if the digital signature is wrong, finishing the operation, recording and feeding back the operation and maintenance audit system;
step S202: after a file of a user is decrypted by using a login password of the user, a file analysis module reads records in the file one by one to form data, reads sub ciphertext parts of corresponding assets in the imported file, and transmits the sub ciphertext parts to a ciphertext recovery module together; the ciphertext recovery module obtains the sub ciphertext, calculates and restores the sub ciphertext through a sharer secret sharing algorithm to obtain a complete original ciphertext, and transmits the ciphertext to the database analysis module;
step S203: and the database analysis module correspondingly combines the plaintext transmission information and the ciphertext of the asset into a database record and writes the database record into an asset database of the operation and maintenance auditing system, and the asset password is led in and recovered.
6. The asset password derivation method for the operation and maintenance auditing system according to claim 1, characterized in that the non-sensitive information comprises the information of the plain text storage of the asset name, asset IP address, remark information; the format of the password export file in step S102 is txt plain text file or excel table file or database record.
CN201811210286.0A 2018-10-17 2018-10-17 Asset password exporting method for operation and maintenance auditing system Active CN109302400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811210286.0A CN109302400B (en) 2018-10-17 2018-10-17 Asset password exporting method for operation and maintenance auditing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811210286.0A CN109302400B (en) 2018-10-17 2018-10-17 Asset password exporting method for operation and maintenance auditing system

Publications (2)

Publication Number Publication Date
CN109302400A CN109302400A (en) 2019-02-01
CN109302400B true CN109302400B (en) 2021-09-03

Family

ID=65163082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811210286.0A Active CN109302400B (en) 2018-10-17 2018-10-17 Asset password exporting method for operation and maintenance auditing system

Country Status (1)

Country Link
CN (1) CN109302400B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110580406B (en) * 2019-07-23 2021-08-10 中国航天系统科学与工程研究院 Internet file self-help importing system and method
CN112651214B (en) * 2020-08-28 2023-03-28 成都格斗科技有限公司 Method for converting data table plaintext into binary ciphertext convenient for program to read

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7565527B2 (en) * 2005-02-14 2009-07-21 Tricipher, Inc. Technique for asymmetric crypto-key generation
US8151333B2 (en) * 2008-11-24 2012-04-03 Microsoft Corporation Distributed single sign on technologies including privacy protection and proactive updating
CN107171796A (en) * 2017-06-27 2017-09-15 济南浪潮高新科技投资发展有限公司 A kind of many KMC key recovery methods
CN107623569A (en) * 2017-09-30 2018-01-23 矩阵元技术(深圳)有限公司 Block chain key escrow and restoration methods, device based on Secret sharing techniques
CN107979461B (en) * 2017-10-27 2020-07-17 财付通支付科技有限公司 Key retrieving method, device, terminal, key escrow server and readable medium

Also Published As

Publication number Publication date
CN109302400A (en) 2019-02-01

Similar Documents

Publication Publication Date Title
Hur et al. Secure data deduplication with dynamic ownership management in cloud storage
CA2623141C (en) Content cryptographic firewall system
US9852300B2 (en) Secure audit logging
US20100005318A1 (en) Process for securing data in a storage unit
US11936776B2 (en) Secure key exchange electronic transactions
US11683158B1 (en) Database encryption key management
US20210119781A1 (en) Systems and methods for re-using cold storage keys
US20110276490A1 (en) Security service level agreements with publicly verifiable proofs of compliance
CN105103488A (en) Policy enforcement with associated data
HU225077B1 (en) Method and apparatus for providing for the recovery of a cryptographic key
JP6049914B2 (en) Cryptographic system, key generation device, and re-encryption device
Virvilis et al. A cloud provider-agnostic secure storage protocol
CN109302400B (en) Asset password exporting method for operation and maintenance auditing system
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
Rawat et al. A survey of various techniques to secure cloud storage
US10892892B1 (en) Method and apparatus for end-to-end secure sharing of information with multiple recipients without maintaining a key directory
Kamboj et al. DEDUP: Deduplication system for encrypted data in cloud
CN112673591B (en) System and method for providing authorized third parties with secure key escrow access to a secret public ledger
US20220086000A1 (en) Cryptographic systems
Albeshri et al. A security architecture for cloud storage combining proofs of retrievability and fairness
Devaki Re-encryption model for multi-block data updates in network security
Karani et al. Secure File Storage Using Hybrid Cryptography
Contiu Applied Cryptographic Access Control for Untrusted Cloud Storage
Shah et al. Third party public auditing scheme for security in cloud storage
Sirsat et al. Deduplication in cloud storage on the basis of proof of ownership

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Guo Jiayi

Inventor after: Huang Hai

Inventor after: Fan Yuan

Inventor after: Wu Yongyue

Inventor after: Zheng Xuexin

Inventor after: Liu Tao

Inventor before: Guo Jiayi

Inventor before: Fan Yuan

Inventor before: Wu Yongyue

Inventor before: Zheng Xuexin

Inventor before: Liu Tao

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant