CN109922084A - Key management method, device and electronic equipment - Google Patents

Key management method, device and electronic equipment Download PDF

Info

Publication number
CN109922084A
CN109922084A CN201910287440.2A CN201910287440A CN109922084A CN 109922084 A CN109922084 A CN 109922084A CN 201910287440 A CN201910287440 A CN 201910287440A CN 109922084 A CN109922084 A CN 109922084A
Authority
CN
China
Prior art keywords
key
user terminal
ciphertext
private key
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910287440.2A
Other languages
Chinese (zh)
Other versions
CN109922084B (en
Inventor
胡坤歌
袁力
邸烁
徐磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Alshan Block Chain Alliance Technology Co Ltd
Original Assignee
Beijing Alshan Block Chain Alliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Alshan Block Chain Alliance Technology Co Ltd filed Critical Beijing Alshan Block Chain Alliance Technology Co Ltd
Priority to CN201910287440.2A priority Critical patent/CN109922084B/en
Publication of CN109922084A publication Critical patent/CN109922084A/en
Application granted granted Critical
Publication of CN109922084B publication Critical patent/CN109922084B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The technical issues of this application provides a kind of key management method, device and electronic equipments, are related to technical field of data administration, are just difficult to give for change after can solve the private key loss of user terminal preservation, and then are brought inconvenience to user using private key.This method comprises: being combined the private key of the public key of provider server and the user terminal by public key encryption algorithm, first key is generated, and carry out symmetric cryptography using private key of the first key to the user terminal, obtain the first ciphertext;The private key of the public key of third-party server and the user terminal is combined by public key encryption algorithm, the second key is generated, and carry out symmetric cryptography using the private key of user terminal described in second key pair, obtains the second ciphertext;First ciphertext is sent to the third-party server, and second ciphertext is sent to the provider server.

Description

Key management method, device and electronic equipment
Technical field
This application involves technical field of data administration, set more particularly, to a kind of key management method, device and electronics It is standby.
Background technique
Key is a kind of parameter, it is inputted in converting plaintext into ciphertext or the algorithm for converting ciphertext into plaintext Parameter.
The ciphering process of key is divided into symmetric key encryption (referred to as: symmetric cryptography) and asymmetric-key encryption (referred to as: non- Symmetric cryptography).Symmetric key encryption refers to the sender of information and recipient is to go encrypting and decrypting data using the same key, I.e. symmetric cryptography uses the same code key in encryption and decryption.And asymmetric-key encryption refers to that information is that needs two are close Key is encrypted and decrypted, the two code keys are public-key cryptography (public key, referred to as: public key) and private cipher key respectively (private key, referred to as: private key).
It is saved currently, the private key of user is generally stored in user terminal by user.But the case where using this preserving type Under, if the private key that user terminal saves is lost, just it is difficult to give for change, and then bring inconvenience to user using private key.
Summary of the invention
In view of this, the application's is designed to provide a kind of key management method, device and electronic equipment, to solve The private key that user terminal existing in the prior art saves just is difficult to give for change after losing, and then brought inconvenience to user using private key Technical problem.
In a first aspect, the embodiment of the present application provides a kind of key management method, it is applied to user terminal, comprising:
The private key of the public key of provider server and the user terminal is combined by public key encryption algorithm, it is raw Symmetric cryptography is carried out at first key, and using private key of the first key to the user terminal, obtains the first ciphertext;
The private key of the public key of third-party server and the user terminal is combined by public key encryption algorithm, it is raw Symmetric cryptography is carried out at the second key, and using the private key of user terminal described in second key pair, obtains the second ciphertext;
First ciphertext is sent to the third-party server, and second ciphertext is sent to the provider Server.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein institute State method further include:
If the user terminal receives private key and gives instruction for change, the first request is sent to the provider server, and The second request is sent to the third-party server;
Receive second ciphertext that the provider server is sent according to first request;
The third key that the third-party server is sent according to second request is received, the third key is to pass through The public key of the private key of the third-party server and the user terminal is combined and generates by public key encryption algorithm, described Third key is identical as second key;
It is decrypted using the second ciphertext described in the third key pair, obtains the private key of the user terminal.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein institute State method further include:
If the user terminal receives private key and gives instruction for change, third request is sent to the third-party server, and The 4th request is sent to the provider server;
Receive first ciphertext that the third-party server is sent according to third request;
The 4th key that the provider server is sent according to the 4th request is received, the 4th key is to pass through The public key of the private key of the provider server and the user terminal is combined and generates by public key encryption algorithm, described 4th key is identical as the first key;
It is decrypted using the first ciphertext described in the 4th key pair, obtains the private key of the user terminal.
With reference to first aspect, the embodiment of the present application provides the third possible embodiment of first aspect, wherein institute Stating first key and second key is symmetric key.
Second aspect, the embodiment of the present application also provide a kind of key management apparatus, are applied to user terminal, comprising:
First generation module, for passing through public key encryption algorithm for the public key of provider server and the user terminal Private key be combined, generate first key, and using the first key to the private key of user terminal progress symmetric cryptography, Obtain the first ciphertext;
Second generation module, for passing through public key encryption algorithm for the public key of third-party server and the user terminal Private key be combined, generate the second key, and using the private key of user terminal described in second key pair progress symmetric cryptography, Obtain the second ciphertext;
Sending module for first ciphertext to be sent to the third-party server, and second ciphertext is sent out It send to the provider server.
In conjunction with second aspect, the embodiment of the present application provides the first possible embodiment of second aspect, wherein institute Stating device further includes the first acquisition module, is specifically used for:
If the user terminal receives private key and gives instruction for change, the first request is sent to the provider server, and The second request is sent to the third-party server;
Receive second ciphertext that the provider server is sent according to first request;
The third key that the third-party server is sent according to second request is received, the third key is to pass through The public key of the private key of the third-party server and the user terminal is combined and generates by public key encryption algorithm, described Third key is identical as second key;
It is decrypted using the second ciphertext described in the third key pair, obtains the private key of the user terminal.
In conjunction with second aspect, the embodiment of the present application provides second of possible embodiment of second aspect, wherein institute Stating device further includes the second acquisition module, is specifically used for:
If the user terminal receives private key and gives instruction for change, third request is sent to the third-party server, and The 4th request is sent to the provider server;
Receive first ciphertext that the third-party server is sent according to third request;
The 4th key that the provider server is sent according to the 4th request is received, the 4th key is to pass through The public key of the private key of the provider server and the user terminal is combined and generates by public key encryption algorithm, described 4th key is identical as the first key;
It is decrypted using the first ciphertext described in the 4th key pair, obtains the private key of the user terminal.
In conjunction with second aspect, the embodiment of the present application provides the third possible embodiment of second aspect, wherein institute Stating first key and second key is symmetric key.
The third aspect, the embodiment of the present application also provide a kind of electronic equipment, including memory, processor, the memory In be stored with the computer program that can be run on the processor, the processor is realized when executing the computer program The step of stating method as described in relation to the first aspect.
Fourth aspect, the embodiment of the present application also provide a kind of meter of non-volatile program code that can be performed with processor Calculation machine readable medium, said program code make the method for the processor execution as described in relation to the first aspect.
Technical solution provided by the embodiments of the present application brings following the utility model has the advantages that in the present solution, since user terminal will add User terminal private key after close is respectively sent in provider server and third-party server, is saved by both servers, i.e., The private key for saving user terminal is lost, and the private key of user terminal can also be obtained by both servers.Also, due to user It is encrypted that end, which is sent to the user terminal private key of provider server, and the key of this encryption is by third-party server public affairs Made of key and user terminal private key combination, therefore provider server can not be detached from third-party server and individually obtain user terminal Private key.Similarly, third-party server can not also be detached from provider server and individually obtain the private key of user terminal, and then also protect The safety of user terminal private key is demonstrate,proved.
Other feature and advantage of the application will illustrate in the following description, also, partly become from specification It obtains it is clear that being understood and implementing the application.The purpose of the application and other advantages are in specification and attached drawing Specifically noted structure is achieved and obtained.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the application specific embodiment or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the application, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 shows the flow chart of key management method provided by the embodiment of the present application one;
Fig. 2 shows the flow charts of key management method provided by the embodiment of the present application two;
Fig. 3 shows a kind of structural schematic diagram of key management apparatus provided by the embodiment of the present application three;
Fig. 4 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application four.
Specific embodiment
The feature and exemplary embodiment of various aspects of the invention is described more fully below.In following detailed description In, many details are proposed, in order to provide complete understanding of the present invention.But to those skilled in the art It will be apparent that the present invention can be implemented in the case where not needing some details in these details.Below to implementation The description of example is used for the purpose of providing by showing example of the invention and better understanding of the invention.The present invention never limits In any concrete configuration set forth below and algorithm, but cover under the premise of without departing from the spirit of the present invention element, Any modification, replacement and the improvement of component and algorithm.In the the accompanying drawings and the following description, well known structure and skill is not shown Art is unnecessary fuzzy to avoid causing the present invention.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In addition, the term " includes " being previously mentioned in description of the invention and " having " and their any deformation, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of other are not listed or unit, or optionally It further include the other step or units intrinsic for these process, methods, product or equipment.
It is saved currently, the private key of user is generally stored in user terminal by user.But the case where using this preserving type Under, if the private key that user terminal saves is lost, just it is difficult to give for change, and then bring inconvenience to user using private key.Based on this, this Shen Please embodiment provide a kind of key management method, device and electronic equipment, can solve user existing in the prior art The technical issues of being just difficult to give for change after the private key loss that end saves, and then being brought inconvenience to user using private key.
For convenient for understanding the present embodiment, first to a kind of key management method disclosed in the embodiment of the present application, Device and electronic equipment describe in detail.
Embodiment one:
A kind of key management method provided by the embodiments of the present application is applied to user terminal, as shown in Figure 1, comprising:
The private key of the public key of provider server and user terminal: being combined by S11 by public key encryption algorithm, raw Symmetric cryptography is carried out at first key, and using private key of the first key to user terminal, obtains the first ciphertext.
In the present embodiment, provider server, user terminal, third-party server have a public private key pair, i.e., one respectively Public key and a private key.Wherein, third-party server can be the server of third party credit institution.As a preferred side The public key of user terminal is sent to provider server and third-party server first by case, user terminal.
In this step, user terminal passes through public key encryption algorithm, it will thus provide the private of the public key and user terminal of quotient's server Key is combined into a first key (provider server public key+user terminal private key).
It should be noted that public key encryption algorithm (public-key cryptography) is a kind of cryptography calculation Method type, common public key encryption algorithm have: knapsack algorithm, elliptic curve encryption algorithm (Elliptic Curve Cryptography, ECC), the public key encryption algorithm in graceful (Diffie-Hellman) Key Exchange Protocol of diffie-hellman.This In embodiment, utilize the public key encryption algorithm in the graceful Key Exchange Protocol of diffie-hellman, it will thus provide the public key of quotient's server and The private key of user terminal is combined, and then is combined into first key.
Then, user terminal carries out user terminal private key using first key (provider server public key+user terminal private key) Symmetric cryptography, to obtain the first ciphertext (M1).Specifically, by first key (provider server public key+user terminal private key) It, will using the key pair that will be encrypted using user terminal private key as by original text to be encrypted as the key that will be encrypted Encrypted original text carries out symmetric cryptography, and then obtains the first ciphertext (M1).
The private key of the public key of third-party server and user terminal: being combined by S12 by public key encryption algorithm, raw Symmetric cryptography is carried out at the second key, and using the private key of the second key pair user terminal, obtains the second ciphertext.
In this step, user terminal is by public key encryption algorithm, by the private of the public key of third-party server and user terminal Key is combined into second key (third-party server public key+user terminal private key).
Then, user terminal carries out user terminal private key using the second key (third-party server public key+user terminal private key) Symmetric cryptography, to obtain the second ciphertext (M2).Specifically, by the second key (third-party server public key+user terminal private key) It, will using the key pair that will be encrypted using user terminal private key as by original text to be encrypted as the key that will be encrypted Encrypted original text carries out symmetric cryptography, and then obtains the second ciphertext (M2).
S13: the first ciphertext is sent to third-party server, and the second ciphertext is sent to provider server.
In practical applications, user terminal sends third-party server for the first ciphertext (M1) and saves, and by the second ciphertext (M2) it is sent to provider server preservation.
For the prior art, the key of digital wallet application be all saved in client by user, once user Key is lost, and will be unable to give for change.This significantly increases user's assets security risk.Therefore, current user key storage side Case haves the defects that certain.If but be stored on the server of application program provider, provider will have the account of user Absolute control, this is apparently not what user wanted.
By the way that user key to be stored encrypted on provider server and third party credit institution server, by both Server saves, even if the private key that user terminal saves is lost, can also give the private key of user terminal for change by both servers. Since the user terminal private key that user terminal is sent to provider server is encrypted, and the key of this encryption is by third party Made of server public key and user terminal private key combination, therefore provider server can not be detached from third-party server and individually obtain Obtain the private key of user terminal.Similarly, third-party server can not also be detached from provider server and individually obtain the private key of user terminal, Therefore it provides quotient's server and third-party server either side can not all decrypt user key, even if a wherein number formulary evidence Leakage, can not still decrypt user key, and then ensure that the safety of user terminal private key.
Furthermore the update of key can also be carried out by key management method provided by the embodiments of the present application.User terminal will It is sent on provider server and third party credit institution server after the encryption of new user key after modification, is mentioned with substitution For user key old in quotient's server and third party credit institution server.New user key encryption after by that will modify It is stored on provider server and third party credit institution server, is saved by both servers, even if user terminal saves Modification after new private key lose, new private key after user terminal modification can also be given for change by both servers.By In the new private key of the user terminal that user terminal is sent to provider server be encrypted, and this encryption key be by third Made of square server public key and user terminal private key combination, therefore provider server can not be detached from third-party server and independent Obtain the new private key of user terminal.Similarly, third-party server can not also be detached from provider server and individually to obtain user terminal new Private key, therefore it provides quotient's server and third-party server either side can not all decrypt it is new close after user's modification Key can not still decrypt the new key of user, and then ensure that the safety of user terminal private key even if wherein side's data leak Property.
Embodiment two:
A kind of key management method provided by the embodiments of the present application is applied to user terminal, as shown in Figure 2, comprising:
The private key of the public key of provider server and user terminal: being combined by S21 by public key encryption algorithm, raw Symmetric cryptography is carried out at first key, and using private key of the first key to user terminal, obtains the first ciphertext.
The private key of the public key of third-party server and user terminal: being combined by S22 by public key encryption algorithm, raw Symmetric cryptography is carried out at the second key, and using the private key of the second key pair user terminal, obtains the second ciphertext.
Wherein, first key and the second key are symmetric key.
S23: the first ciphertext is sent to third-party server, and the second ciphertext is sent to provider server.
S24: when user terminal receives private key and gives instruction for change, then the first request, Yi Jixiang are sent to provider server Third-party server sends the second request.
The copy that a private key for user is had in user terminal, when the operations such as initiation transaction, signature need to use private key, directly It connects from local and reads.If private key for user is accidentally lost, can be given for change to provider server and third-party server initiation Key request.
Specifically, user terminal requests the second ciphertext (M2) to provider server, user terminal is requested to third-party server Third key, third key are that third-party server passes through public key encryption algorithm for the private key of third-party server and user The public key at end is combined and generates.
S25: the second ciphertext that provider server is sent according to the first request is received.
Provider server after to user terminal progress, the authentication is passed, request according to first to user by provider server End sends the second ciphertext (M2), and user terminal receives the second ciphertext that provider server is sent.
S26: the third key that third-party server is sent according to the second request is received, third key is to pass through public-key cryptography The public key of the private key of third-party server and user terminal is combined and generates by Encryption Algorithm, third key and the second key phase Together.
Third-party server by public key encryption algorithm by the public key of the private key of third-party server and user terminal into Row combination, and then generate third key (third-party server private key+user terminal public key).Third-party server is asked further according to second It asks and third key (third-party server private key+user terminal public key) is sent to user terminal.User terminal receives third-party server The third key of transmission.The third key is also symmetric key.
Based on the graceful Key Exchange Protocol of diffie-hellman in public key encryption algorithm it is found that third key (third party Privacy key+user terminal public key) and the second key (third-party server public key+user terminal private key) be equal.It needs It is bright, in the graceful Key Exchange Protocol of diffie-hellman, the key generated after the public key of the side A and the private key combination of the side B, with the side B Public key and the side A private key combination after the key that generates, the cipher key content of the two is identical.
For example, being the first shared key by the key generated after the public key of the side A and the private key combination of the side B, by the public key of the side B It is the second shared key with the key generated after the private key combination of the side A, the first shared key and the second shared key here Content is identical.Therefore, public/private keys are generated to rear, distribution public key, in the true of the mutual public key of acquisition in A, B each party After real copy, A and B can be with the identical shared keys of both off-line calculations.In the present embodiment, by this shared key (in i.e. Hold identical third key and the second key) it is used as the key of symmetric cryptography, symmetric cryptography is carried out to the private key of user terminal.
S27: it is decrypted using the second ciphertext of third key pair, obtains the private key of user terminal.
Since the content of third key and the second key is identical, user terminal can using the second ciphertext of third key pair into Row decryption.Specifically, user terminal utilizes third key (third-party server private key+user terminal public key), to the second ciphertext (M2) Ciphertext is obtained after carrying out symmetric cryptography to user terminal private key by the second key (third-party server public key+user terminal private key), It is decrypted, the private key of user can be obtained.
As the another embodiment of the present embodiment, if user terminal receives private key and gives instruction for change, can also carry out with Lower step:
User terminal sends third request to third-party server, and sends the 4th request to provider server.Then, User terminal receives the first ciphertext that third-party server is sent according to third request, and user terminal receives provider server according to the The 4th key that four requests are sent, wherein the 4th key is the private key by public key encryption algorithm by provider server It is combined and generates with the public key of user terminal, similarly, the 4th key is identical as first key.Finally, user terminal utilizes the 4th The first ciphertext of key pair is decrypted, and obtains the private key of user terminal.
In the present embodiment, more new key can also be modified using step S21 to step S23, specific:
Provider first authenticates user terminal.The new public key in user terminal upload user end is to provider server, in turn Replace the old public key of the user terminal saved in provider server.Same method updates the use saved on third-party server The old public key in family end is replaced with the new public key of user terminal.
The new private key of the public key of provider server and user terminal is carried out group by public key encryption algorithm by user terminal It closes, generates the 5th key, and carry out symmetric cryptography using the new private key of the 5th key pair user terminal, obtain third ciphertext.
The new private key of the public key of third-party server and user terminal is carried out group by public key encryption algorithm by user terminal It closes, generates the 6th key, and carry out symmetric cryptography using the new private key of the 6th key pair user terminal, obtain the 4th ciphertext.
Finally, third ciphertext is sent to third-party server by user terminal replaces the first old ciphertext, and close by the 4th Text is sent to provider server and replaces the second old ciphertext, and the update of key can be completed.
Embodiment three:
A kind of key management apparatus provided by the embodiments of the present application is applied to user terminal, as shown in figure 3, key management fills Setting 3 includes: the first generation module 31, the second generation module 32 and sending module 33.
First generation module is used to pass through public key encryption algorithm for the private of the public key of provider server and user terminal Key is combined, and generates first key, and carry out symmetric cryptography using private key of the first key to user terminal, it is close to obtain first Text.
Second generation module is used to pass through public key encryption algorithm for the private of the public key of third-party server and user terminal Key is combined, and generates the second key, and carry out symmetric cryptography using the private key of the second key pair user terminal, it is close to obtain second Text.Wherein, first key and the second key are symmetric key.
As the preferred embodiment of the present embodiment, sending module is used to the first ciphertext being sent to third-party server, And the second ciphertext is sent to provider server.
Key management apparatus further includes the first acquisition module, is specifically used for: if user terminal receives private key and gives instruction for change, The first request is sent to provider server, and sends the second request to third-party server;Receive provider server root The second ciphertext sent according to the first request;Receive the third key that third-party server is sent according to the second request, third key It is to be combined the public key of the private key of third-party server and user terminal by public key encryption algorithm to generate, third is close Key is identical as the second key;It is decrypted using the second ciphertext of third key pair, obtains the private key of user terminal.
Key management apparatus device further includes the second acquisition module, is specifically used for: if user terminal receives private key and gives finger for change It enables, then sends third request to third-party server, and send the 4th request to provider server;Receive third party's service The first ciphertext that device is sent according to third request;The 4th key that reception provider server is sent according to the 4th request, the 4th Key is to be combined the public key of the private key of provider server and user terminal by public key encryption algorithm to generate, the Four keys are identical as first key;It is decrypted using the 4th the first ciphertext of key pair, obtains the private key of user terminal.
It is provided by the embodiments of the present application that there is key management apparatus, have with key management method provided by the above embodiment Identical technical characteristic reaches identical technical effect so also can solve identical technical problem.
Example IV:
A kind of electronic equipment provided by the embodiments of the present application, as shown in figure 4, electronic equipment 4 includes memory 41, processor 42, the computer program that can be run on the processor is stored in the memory, the processor executes the calculating The step of method that above-described embodiment one or embodiment two provide is realized when machine program.
Referring to fig. 4, electronic equipment further include: bus 43 and communication interface 44, processor 42, communication interface 44 and memory 41 are connected by bus 43;Processor 42 is for executing the executable module stored in memory 41, such as computer program.
Wherein, memory 41 may include high-speed random access memory (RAM, Random Access Memory), It may further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at least One communication interface 44 (can be wired or wireless) realizes the communication between the system network element and at least one other network element Connection, can be used internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 43 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data Bus, control bus etc..Only to be indicated with a four-headed arrow convenient for indicating, in Fig. 4, it is not intended that an only bus or A type of bus.
Wherein, memory 41 is for storing program, and the processor 42 executes the journey after receiving and executing instruction Sequence, method performed by the device that the process that aforementioned the application any embodiment discloses defines can be applied in processor 42, Or it is realized by processor 42.
Processor 42 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 42 or the instruction of software form.Above-mentioned Processor 42 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, referred to as ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmable Logical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present application Disclosed each method, step and logic diagram.General processor can be microprocessor or the processor is also possible to appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processing Device executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located at Machine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originally In the storage medium of field maturation.The storage medium is located at memory 41, and processor 42 reads the information in memory 41, in conjunction with Its hardware completes the step of above method.
Embodiment five:
It is provided by the embodiments of the present application it is a kind of with processor can be performed non-volatile program code it is computer-readable Medium, said program code make the method that the processor executes above-described embodiment one or embodiment two provides.
Unless specifically stated otherwise, the opposite step of the component and step that otherwise illustrate in these embodiments, digital table It is not limited the scope of the application up to formula and numerical value.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In all examples being illustrated and described herein, any occurrence should be construed as merely illustratively, without It is as limitation, therefore, other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
The flow chart and block diagram in the drawings show system, method and the computer journeys according to multiple embodiments of the application The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, section or code of table, a part of the module, section or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually base Originally it is performed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule The dedicated hardware based system of fixed function or movement is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
The computer-readable medium of the non-volatile program code provided by the embodiments of the present application that can be performed with processor, With key management method provided by the above embodiment, device and electronic equipment technical characteristic having the same, so can also solve Certainly identical technical problem reaches identical technical effect.
In addition, term " first ", " second ", " third " are used for description purposes only, it is not understood to indicate or imply phase To importance.
The computer program product of key management method is carried out provided by the embodiment of the present application, including stores processor The computer readable storage medium of executable non-volatile program code, the instruction that said program code includes can be used for executing Previous methods method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of key management method is applied to user terminal characterized by comprising
The private key of the public key of provider server and the user terminal is combined by public key encryption algorithm, generates the One key, and symmetric cryptography is carried out using private key of the first key to the user terminal, obtain the first ciphertext;
The private key of the public key of third-party server and the user terminal is combined by public key encryption algorithm, generates the Two keys, and symmetric cryptography is carried out using the private key of user terminal described in second key pair, obtain the second ciphertext;
First ciphertext is sent to the third-party server, and second ciphertext is sent to the provider and is serviced Device.
2. the method according to claim 1, wherein the method also includes:
If the user terminal receives private key and gives instruction for change, the first request is sent to the provider server, and to institute It states third-party server and sends the second request;
Receive second ciphertext that the provider server is sent according to first request;
The third key that the third-party server is sent according to second request is received, the third key is to pass through disclosure The public key of the private key of the third-party server and the user terminal is combined and generates by secret key cryptographic algorithm, the third Key is identical as second key;
It is decrypted using the second ciphertext described in the third key pair, obtains the private key of the user terminal.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
If the user terminal receives private key and gives instruction for change, third request is sent to the third-party server, and to institute It states provider server and sends the 4th request;
Receive first ciphertext that the third-party server is sent according to third request;
The 4th key that the provider server is sent according to the 4th request is received, the 4th key is to pass through disclosure The public key of the private key of the provider server and the user terminal is combined and generates by secret key cryptographic algorithm, and the described 4th Key is identical as the first key;
It is decrypted using the first ciphertext described in the 4th key pair, obtains the private key of the user terminal.
4. the method according to claim 1, wherein the first key and second key are symmetrical close Key.
5. a kind of key management apparatus is applied to user terminal characterized by comprising
First generation module, for passing through public key encryption algorithm for the private of the public key of provider server and the user terminal Key is combined, and is generated first key, and carry out symmetric cryptography using private key of the first key to the user terminal, is obtained First ciphertext;
Second generation module, for passing through public key encryption algorithm for the private of the public key of third-party server and the user terminal Key is combined, and is generated the second key, and carry out symmetric cryptography using the private key of user terminal described in second key pair, is obtained Second ciphertext;
Sending module for first ciphertext to be sent to the third-party server, and second ciphertext is sent to The provider server.
6. device according to claim 5, which is characterized in that described device further includes the first acquisition module, is specifically used for:
If the user terminal receives private key and gives instruction for change, the first request is sent to the provider server, and to institute It states third-party server and sends the second request;
Receive second ciphertext that the provider server is sent according to first request;
The third key that the third-party server is sent according to second request is received, the third key is to pass through disclosure The public key of the private key of the third-party server and the user terminal is combined and generates by secret key cryptographic algorithm, the third Key is identical as second key;
It is decrypted using the second ciphertext described in the third key pair, obtains the private key of the user terminal.
7. device according to claim 5 or 6, which is characterized in that described device further includes the second acquisition module, specific to use In:
If the user terminal receives private key and gives instruction for change, third request is sent to the third-party server, and to institute It states provider server and sends the 4th request;
Receive first ciphertext that the third-party server is sent according to third request;
The 4th key that the provider server is sent according to the 4th request is received, the 4th key is to pass through disclosure The public key of the private key of the provider server and the user terminal is combined and generates by secret key cryptographic algorithm, and the described 4th Key is identical as the first key;
It is decrypted using the first ciphertext described in the 4th key pair, obtains the private key of the user terminal.
8. according to the method described in claim 5, it is characterized in that, the first key and second key are symmetrical close Key.
9. a kind of electronic equipment, including memory, processor, be stored in the memory to run on the processor Computer program, which is characterized in that the processor realizes that the claims 1 to 4 are any when executing the computer program The step of method described in item.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described Program code makes the processor execute described any the method for Claims 1-4.
CN201910287440.2A 2019-04-10 2019-04-10 Key management method and device and electronic equipment Active CN109922084B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910287440.2A CN109922084B (en) 2019-04-10 2019-04-10 Key management method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910287440.2A CN109922084B (en) 2019-04-10 2019-04-10 Key management method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN109922084A true CN109922084A (en) 2019-06-21
CN109922084B CN109922084B (en) 2021-08-03

Family

ID=66969434

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910287440.2A Active CN109922084B (en) 2019-04-10 2019-04-10 Key management method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109922084B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417553A (en) * 2019-08-07 2019-11-05 北京阿尔山区块链联盟科技有限公司 Secure Multi-Party communication means, device and user terminal
CN111327605A (en) * 2020-01-23 2020-06-23 北京无限光场科技有限公司 Method, terminal, server and system for transmitting private information
CN111953484A (en) * 2020-08-03 2020-11-17 上海移远通信技术股份有限公司 Communication method, device and client
CN112637230A (en) * 2020-12-29 2021-04-09 北京天融信网络安全技术有限公司 Instant messaging method and system
CN112740212A (en) * 2020-12-24 2021-04-30 华为技术有限公司 Key writing method and device
CN113169965A (en) * 2019-06-28 2021-07-23 Oppo广东移动通信有限公司 Resource allocation method, equipment and storage medium
CN113497778A (en) * 2020-03-18 2021-10-12 北京同邦卓益科技有限公司 Data transmission method and device
CN114050897A (en) * 2021-08-20 2022-02-15 北卡科技有限公司 Asynchronous key negotiation method and device based on SM9
CN114401102A (en) * 2021-11-29 2022-04-26 南威软件股份有限公司 HTTP request parameter encryption scheme based on cryptographic algorithm
CN116527261A (en) * 2023-07-03 2023-08-01 浙江大华技术股份有限公司 Key recovery method, electronic device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221446A (en) * 2006-09-29 2008-07-16 洛克威尔自动控制技术股份有限公司 Alarm/event encryption in an industrial environment
EP2291788A1 (en) * 2008-05-05 2011-03-09 Paysystem Sweden Ab Electronic payments in a mobile communication system
EP2629227A1 (en) * 2012-02-15 2013-08-21 Research In Motion Limited Key management on device for perimeters
WO2017097344A1 (en) * 2015-12-08 2017-06-15 Nec Europe Ltd. Method for re-keying an encrypted data file
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN109510820A (en) * 2018-11-01 2019-03-22 浙江仙草世家生物科技有限公司 A kind of block chain cryptographic methods that decentralization can customize

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101221446A (en) * 2006-09-29 2008-07-16 洛克威尔自动控制技术股份有限公司 Alarm/event encryption in an industrial environment
EP2291788A1 (en) * 2008-05-05 2011-03-09 Paysystem Sweden Ab Electronic payments in a mobile communication system
EP2629227A1 (en) * 2012-02-15 2013-08-21 Research In Motion Limited Key management on device for perimeters
WO2017097344A1 (en) * 2015-12-08 2017-06-15 Nec Europe Ltd. Method for re-keying an encrypted data file
CN107528688A (en) * 2017-09-30 2017-12-29 矩阵元技术(深圳)有限公司 A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN109510820A (en) * 2018-11-01 2019-03-22 浙江仙草世家生物科技有限公司 A kind of block chain cryptographic methods that decentralization can customize

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113169965B (en) * 2019-06-28 2023-06-13 Oppo广东移动通信有限公司 Resource allocation method, equipment and storage medium
CN113169965A (en) * 2019-06-28 2021-07-23 Oppo广东移动通信有限公司 Resource allocation method, equipment and storage medium
CN110417553A (en) * 2019-08-07 2019-11-05 北京阿尔山区块链联盟科技有限公司 Secure Multi-Party communication means, device and user terminal
CN110417553B (en) * 2019-08-07 2022-12-27 北京阿尔山区块链联盟科技有限公司 Multi-party secret communication method and device and user terminal
CN111327605A (en) * 2020-01-23 2020-06-23 北京无限光场科技有限公司 Method, terminal, server and system for transmitting private information
CN113497778A (en) * 2020-03-18 2021-10-12 北京同邦卓益科技有限公司 Data transmission method and device
CN111953484A (en) * 2020-08-03 2020-11-17 上海移远通信技术股份有限公司 Communication method, device and client
CN112740212B (en) * 2020-12-24 2022-08-09 华为技术有限公司 Key writing method and device
CN112740212A (en) * 2020-12-24 2021-04-30 华为技术有限公司 Key writing method and device
CN112637230A (en) * 2020-12-29 2021-04-09 北京天融信网络安全技术有限公司 Instant messaging method and system
CN114050897A (en) * 2021-08-20 2022-02-15 北卡科技有限公司 Asynchronous key negotiation method and device based on SM9
CN114050897B (en) * 2021-08-20 2023-10-03 北卡科技有限公司 SM 9-based asynchronous key negotiation method and device
CN114401102A (en) * 2021-11-29 2022-04-26 南威软件股份有限公司 HTTP request parameter encryption scheme based on cryptographic algorithm
CN116527261A (en) * 2023-07-03 2023-08-01 浙江大华技术股份有限公司 Key recovery method, electronic device and storage medium

Also Published As

Publication number Publication date
CN109922084B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN109922084A (en) Key management method, device and electronic equipment
US10547446B2 (en) Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items
AU2017352361B2 (en) Data transmission method, apparatus and system
US11082224B2 (en) Location aware cryptography
US11784801B2 (en) Key management method and related device
RU2718229C1 (en) Establishing secure channel
CN107294709A (en) A kind of block chain data processing method, apparatus and system
CN108377189A (en) User's communication encrypting method, device, terminal device and storage medium on block chain
US10609003B2 (en) Cryptography using multi-factor key system and finite state machine
CN109064324A (en) Method of commerce, electronic device and readable storage medium storing program for executing based on alliance's chain
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
WO2020253108A1 (en) Information hiding method, apparatus, device, and storage medium
CN109800588A (en) Bar code dynamic encrypting method and device, bar code dynamic decryption method and device
CN105099653A (en) Distributed data processing method, device and system
CN108696518A (en) User's communication encrypting method, device, terminal device and storage medium on block chain
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN109120399A (en) A kind of data ciphering method based on asymmetric encryption, decryption method and system
CN116308776A (en) Transaction supervision method and device based on blockchain, electronic equipment and storage medium
CN108347629A (en) Video file processing method, device, server and storage medium
CN111861462A (en) Financial product transaction method and device based on block chain
US20230028854A1 (en) System and method of cryptographic key management in a plurality of blockchain based computer networks
CN110166234A (en) A kind of creation of business cipher key and business datum encryption method, apparatus and system
CN109754254A (en) Key management method, device and electronic equipment
CN112352399A (en) Method for on-board generation of cryptographic keys using physically unclonable functions
CN108880793A (en) Information trading method, apparatus and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant