TW202312707A - Data backup carrier and backup system having the same - Google Patents

Data backup carrier and backup system having the same Download PDF

Info

Publication number
TW202312707A
TW202312707A TW110134262A TW110134262A TW202312707A TW 202312707 A TW202312707 A TW 202312707A TW 110134262 A TW110134262 A TW 110134262A TW 110134262 A TW110134262 A TW 110134262A TW 202312707 A TW202312707 A TW 202312707A
Authority
TW
Taiwan
Prior art keywords
data
signature
public key
backup
carrier
Prior art date
Application number
TW110134262A
Other languages
Chinese (zh)
Other versions
TWI790745B (en
Inventor
何俊炘
王智濃
陳建州
吳金璋
Original Assignee
太思科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 太思科技股份有限公司 filed Critical 太思科技股份有限公司
Priority to TW110134262A priority Critical patent/TWI790745B/en
Application granted granted Critical
Publication of TWI790745B publication Critical patent/TWI790745B/en
Publication of TW202312707A publication Critical patent/TW202312707A/en

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Maintenance And Management Of Digital Transmission (AREA)
  • Communication Control (AREA)

Abstract

A data backup carrier and backup system having the same are disclosed. The backup carrier stores an encrypted public key, an encrypted private key corresponding to the encrypted public key, a signature public key, a signature private key corresponding to the signature public key, and a signature data. The backup carrier has a hardware security module. When the backup carrier is installed in a host and activated by the host, the host decrypts the signature data with the signature private key through the hardware security module, and confirms the obtained decrypted data whether it is the encrypted public key. If the decrypted data is the encrypted public key, the host obtains a stored data from a third party, decrypts with the encrypted private key through the hardware security module to obtain a protected data, and stores the obtained protected data in the backup carrier.

Description

數據的備援載體及包含該數據的備援載體的備援系統Data backup carrier and backup system including the data backup carrier

本發明關於一種備援載體與備援系統,特別是一種機密而無法任意複製數據的備援載體及包含該備援載體的備援系統。The present invention relates to a backup carrier and a backup system, in particular to a backup carrier that is confidential and cannot copy data arbitrarily and a backup system including the backup carrier.

在數據即市場的今日,許多實體活動、商業交易與身分認證都以不同型態的數據,在全球範圍內迅速流通。其中的一些機密數據,可能牽涉巨大金額,如果失竊或被竄改,會有無可承受的損失。這些機密數據,比如數字貨幣密鑰,通常會被妥善的保存。亦即,該些機密數據可能還會經過其它加密程序,或者是儲存於無法被任意取得的硬體中,待需要使用時解密,或經由特定解鎖方式開啟儲存硬體取得。舉例來說,數字貨幣密鑰可能會經過特定的加密程序而儲存於智慧型手機的使用者身分模組(Subscriber Identity Module,SIM)卡中,且該手機針對SIM卡晶片組實施了以密碼控制的存取控制。可以想見的是,如果智慧型手機或SIM卡壞掉了,那數字貨幣密鑰就可能永沉大海。為了預防這種情況發生,一般機密數據還可能以唯一取得的方式備份於第三方硬體中,比如私有雲伺服器。當原儲存硬體損壞時,備份硬體便可依照該唯一取得的方式,由第三方硬體處取回該機密數據。In today's world where data is the market, many physical activities, business transactions and identity verification are rapidly circulated around the world in different types of data. Some of the confidential data may involve a huge amount of money, and if it is stolen or tampered with, there will be unbearable losses. These confidential data, such as digital currency keys, are usually kept in a safe place. That is to say, these confidential data may also go through other encryption procedures, or be stored in hardware that cannot be obtained arbitrarily, and be decrypted when needed, or obtained by opening the storage hardware through a specific unlocking method. For example, a digital currency key may be stored in a smartphone's Subscriber Identity Module (SIM) card through a specific encryption program, and the phone implements password-controlled access to the SIM card chipset. access control. It is conceivable that if the smartphone or SIM card fails, the digital currency key may be lost forever. In order to prevent this from happening, generally confidential data may also be backed up in third-party hardware, such as a private cloud server, in a uniquely obtained manner. When the original storage hardware is damaged, the backup hardware can retrieve the confidential data from the third-party hardware according to the only way to obtain it.

在前述的備援過程中有兩個問題。第一、如何確認取回的是原始備份的機密數據;第二、備份硬體是否經過認證,與原儲存硬體具有相同的功能與保護級別(也就是確保備份硬體的來源安全,不至於被有心人是置入惡意軟體來竊取機密數據)。為了解決前述問題,從而有本發明的濫觴。There are two problems in the aforementioned backup process. First, how to confirm that the retrieved confidential data is the original backup; second, whether the backup hardware has been certified and has the same function and protection level as the original storage hardware (that is, to ensure that the source of the backup hardware is safe, so as not to malicious software to steal confidential data). In order to solve the aforementioned problems, there is the origin of the present invention.

本段文字提取和編譯本發明的某些特點。其它特點將被揭露於後續段落中。其目的在涵蓋附加的申請專利範圍之精神和範圍中,各式的修改和類似的排列。This paragraph extracts and compiles certain features of the present invention. Other features will be disclosed in subsequent paragraphs. It is intended to cover various modifications and similar arrangements within the spirit and scope of the appended claims.

為了解決前述問題,本發明揭露一種數據的備援載體。該數據的備援載體可為一工作主機所啟用後,備援一主載體中儲存的一保護數據,該保護數據亦使用一加密公鑰加密為一儲存數據後儲存於一第三方,其特徵在於:該備援載體儲存該加密公鑰、對應該加密公鑰的一加密私鑰、一簽章公鑰、對應該簽章公鑰的一簽章私鑰,及一簽章資料;該備援載體具有一硬體安全模組;當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密,並確認取得的一解密資料是否為該加密公鑰;及若該解密資料為該加密公鑰,將該工作主機自該第三方取得的該儲存數據,透過該硬體安全模組以該加密私鑰解密以獲得該保護數據,並將獲得的該保護數據儲存於該備援載體中。In order to solve the foregoing problems, the present invention discloses a data backup carrier. The backup carrier of the data can be activated by a working host to back up a protected data stored in a main carrier, and the protected data is also encrypted with an encryption public key into stored data and then stored in a third party, its characteristics In that: the backup carrier stores the encryption public key, an encryption private key corresponding to the encryption public key, a signature public key, a signature private key corresponding to the signature public key, and a signature data; the backup The backup carrier has a hardware security module; when the backup carrier is installed in the working host and enabled for the working host, the working host uses the hardware security module to use the signature private key to the signature data perform decryption, and confirm whether the obtained decrypted data is the encrypted public key; and if the decrypted data is the encrypted public key, use the hardware security module to obtain the stored data obtained by the working host from the third party The encrypted private key is decrypted to obtain the protected data, and the obtained protected data is stored in the backup carrier.

該備援載體可進一步儲存一數位簽章及可驗證該數位簽章的一認證公鑰,該數位簽章為使用該認證公鑰對應的一認證私鑰所生成;當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機進一步透過該硬體安全模組對該數位簽章與該認證公鑰進行一數位簽章驗證程序,若該數位簽章驗證程序成功,該工作主機才透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密。The backup carrier can further store a digital signature and a certification public key that can verify the digital signature, and the digital signature is generated using a certification private key corresponding to the certification public key; when the backup carrier is installed in After the working host is activated for the working host, the working host further performs a digital signature verification process on the digital signature and the certification public key through the hardware security module, and if the digital signature verification process is successful, The working host decrypts the signature data with the signature private key through the hardware security module.

依照本發明,該硬體安全模組可進一步包含:一密鑰產生單元,產生複數對加密私鑰及對應的加密公鑰;一加密單元,以任一公鑰對一明文進行加密,以獲得一密文;一解密單元,以執行加密之公鑰對應的私鑰解密該密文,以獲得該明文;及一數位簽章解密單元,對該數位簽章與該認證公鑰進行該數位簽章驗證程序。According to the present invention, the hardware security module may further include: a key generation unit that generates a plurality of pairs of encrypted private keys and corresponding encrypted public keys; an encryption unit that encrypts a plaintext with any public key to obtain A ciphertext; a decryption unit, which decrypts the ciphertext with the private key corresponding to the public key performing the encryption to obtain the plaintext; and a digital signature decryption unit, which performs the digital signature on the digital signature and the authentication public key Chapter Verifier.

最好,複數個備援載體的簽章私鑰與簽章公鑰間形成一環簽名(Ring Signature)結構。該主載體與該備援載體為SIM卡。該工作主機可為智慧型手機、平板電腦或穿戴式電子裝置。該第三方可為伺服器、雲端備份平台或區塊鏈儲存架構。該保護數據可為數字貨幣密鑰或受保護的私鑰。該數位簽章之認證公鑰可受一認證簽章所簽章。Preferably, a ring signature (Ring Signature) structure is formed between the signature private key and the signature public key of the plurality of backup carriers. The main carrier and the backup carrier are SIM cards. The working host can be a smart phone, a tablet computer or a wearable electronic device. The third party can be a server, a cloud backup platform or a blockchain storage framework. This protected data may be a digital currency key or a protected private key. The certification public key of the digital signature can be signed by a certification signature.

本發明亦揭露一種備援系統,其包含:前述的備援載體;及一認證主機,儲存該認證私鑰與該認證公鑰、生成該數位簽章,並提供生成的該數位簽章與該認證公鑰給該備援載體。該認證主機可為一公開金鑰基礎建設架構中的任一伺服器。The present invention also discloses a backup system, which includes: the aforementioned backup carrier; and an authentication host that stores the authentication private key and the authentication public key, generates the digital signature, and provides the generated digital signature and the authentication host. The authentication public key is given to the backup carrier. The authentication host can be any server in a public key infrastructure.

由於備援載體在取得保護數據前會先確認加密公鑰是否為簽章公鑰加密,進而取回的主載體中原始的保護數據。另外,配合認證主機提供的數位簽章與認證公鑰,備援載體的身分也可被確認。Because the backup carrier will first confirm whether the encrypted public key is encrypted with the signature public key before obtaining the protected data, and then retrieve the original protected data in the primary carrier. In addition, with the digital signature and authentication public key provided by the authentication host, the identity of the backup carrier can also be confirmed.

本發明將藉由參照下列的實施方式而更具體地描述。The present invention will be described more specifically by referring to the following embodiments.

本發明提出之數據的備援載體可為一工作主機所啟用後,備援一主載體中儲存的一保護數據。關於備援的主載體儲存保護數據的態樣,請見圖1。依照本發明,主載體可以是任何可以透過加密或硬體設定手段,儲存保護數據,比如數字貨幣密鑰或受保護的私鑰等的具有儲存功能的裝置。在本實施方式中,主載體是個SIM卡1。備援載體是和主載體相同的硬體,所以備援載體也是個SIM卡。工作主機是安裝SIM卡1,透過SIM卡1執行特定工作的硬體。在本實施方式中,工作主機是個智慧型手機2。在其它實施例中,工作主機也可是個平板電腦或穿戴式電子裝置。因為SIM卡1安裝在智慧型手機2內部而無法由外部直視,所以以虛線方式繪示之。The backup carrier of the data proposed by the present invention can backup a protected data stored in a main carrier after a working host is enabled. Please refer to FIG. 1 for the state of storing and protecting data on the backup primary carrier. According to the present invention, the main carrier can be any device with a storage function that can store protected data, such as digital currency keys or protected private keys, through encryption or hardware configuration means. In this embodiment, the main carrier is a SIM card 1 . The backup carrier is the same hardware as the main carrier, so the backup carrier is also a SIM card. The working host is installed with the SIM card 1, and executes specific tasks through the SIM card 1. In this embodiment, the working host is a smart phone 2 . In other embodiments, the working host can also be a tablet computer or a wearable electronic device. Because the SIM card 1 is installed inside the smart phone 2 and cannot be viewed directly from the outside, it is shown in a dotted line.

SIM卡1的架構如圖1右下方所示,其包含了一處理器11、一硬體安全模組12及一儲存模組13。處理器11通過與智慧型手機2的介面(SIM卡1的接腳,未繪示),處理來自智慧型手機2的指令,並回傳結果。儲存模組13儲存了一個保護數據133,該保護數據133透過SIM卡1本身或智慧型手機2的設定,無法自由地訪問取得。此外,儲存模組13還儲存了一加密公鑰131與對應該加密公鑰131的一加密私鑰132。為了確保保護數據133不會因為SIM卡1壞掉而就此無法取得,保護數據133可藉由硬體安全模組12使用加密公鑰131加密為一儲存數據134後,儲存(比如透過行動網路)於一第三方3。依照本發明,第三方3可以是個伺服器、雲端備份平台(基於資料備份目的而形成的伺服器群組與儲存裝置群),甚至是個區塊鏈儲存架構。本實施方式中以一個雲端備份平台為例來說明。由於雲端備份平台有對應的回存程序,且即便由雲端備份平台被惡意洩漏,該儲存數據134也有加密私鑰132解密的限制。因此,保護數據133還是處於安全狀態,不會被竊取。The structure of the SIM card 1 is shown in the bottom right of FIG. 1 , which includes a processor 11 , a hardware security module 12 and a storage module 13 . The processor 11 processes instructions from the smart phone 2 through an interface with the smart phone 2 (the pin of the SIM card 1 , not shown), and returns a result. The storage module 13 stores a protected data 133 , which cannot be freely accessed through the settings of the SIM card 1 itself or the smart phone 2 . In addition, the storage module 13 also stores an encrypted public key 131 and an encrypted private key 132 corresponding to the encrypted public key 131 . In order to ensure that the protection data 133 cannot be obtained because the SIM card 1 is broken, the protection data 133 can be encrypted into a storage data 134 by using the encryption public key 131 through the hardware security module 12, and then stored (such as through a mobile network) ) to a third party3. According to the present invention, the third party 3 can be a server, a cloud backup platform (server group and storage device group formed based on data backup), or even a block chain storage structure. In this implementation manner, a cloud backup platform is taken as an example for illustration. Since the cloud backup platform has a corresponding restore program, and even if the cloud backup platform is maliciously leaked, the stored data 134 is also restricted by the encrypted private key 132 to decrypt. Therefore, the protection data 133 is still in a safe state and cannot be stolen.

當意外發生,SIM卡1(主載體)損壞時,由於沒有加密私鑰132,無法取得儲存數據134來解密取回保護數據133,因此便需要使用本發明所提出的備援載體4(也是一個和SIM卡1一樣結構的另一張SIM卡)。同樣地,備援載體4也具有相同的硬體: 處理器11、硬體安全模組12與儲存模組13。和SIM卡1不一樣的地方在於,備援載體4除了儲存加密公鑰131與加密私鑰132外,還多儲存了一簽章公鑰135、對應簽章公鑰135的一簽章私鑰136,及一簽章資料137。簽章公鑰135與簽章私鑰136是另一組用來加解密的密鑰組,而簽章資料137便是使用簽章公鑰135對特定資料加密後形成的。這些儲存的資料是為了有朝一日SIM卡1損毀或遺失,事先儲存於備援載體4中的。此外,為了確保簽章資料137的安全性,簽章私鑰135與簽章公鑰136間也可形成一環簽名(Ring Signature)結構。環簽名結構藉由與其它備援載體中擁有的簽章私鑰與簽章公鑰同源生成,保證了備援載體4中簽章私鑰135與簽章公鑰136的無條件匿名性、正確性及不可偽造性。When an accident occurs and the SIM card 1 (main carrier) is damaged, since there is no encrypted private key 132, the stored data 134 cannot be obtained to decrypt and retrieve the protected data 133, so it is necessary to use the backup carrier 4 proposed by the present invention (also a Another SIM card with the same structure as SIM card 1). Likewise, the redundant carrier 4 also has the same hardware: a processor 11 , a hardware security module 12 and a storage module 13 . The difference from the SIM card 1 is that in addition to storing the encryption public key 131 and the encryption private key 132, the backup carrier 4 also stores a signature public key 135 and a signature private key corresponding to the signature public key 135 136, and a signature material 137. The signature public key 135 and the signature private key 136 are another set of keys used for encryption and decryption, and the signature material 137 is formed by encrypting specific materials with the signature public key 135 . These stored data are stored in the backup carrier 4 in advance in order to damage or lose the SIM card 1 one day. In addition, in order to ensure the security of the signature material 137 , a ring signature (Ring Signature) structure may also be formed between the signature private key 135 and the signature public key 136 . The ring signature structure is generated from the same source as the signature private key and signature public key in other backup carriers, which ensures the unconditional anonymity and correctness of the signature private key 135 and the signature public key 136 in the backup carrier 4. sex and unforgeability.

由於前述特定資料的內容不限,只有一種資料才可用於備援載體4後續的保護數據133取得的作業:加密公鑰131。也就是說,將加密公鑰131當作明文,以簽章公鑰135將之加密的簽章資料137才是本發明所使用的。以下詳細說明其細節。Since the content of the above-mentioned specific data is not limited, only one kind of data can be used for subsequent operations of obtaining the protected data 133 of the backup carrier 4 : the encrypted public key 131 . That is to say, the signature material 137 encrypted with the signature public key 135 using the encryption public key 131 as plaintext is used in the present invention. The details thereof are explained in detail below.

當備援載體4安裝於智慧型手機2內並為智慧型手機2啟用後,智慧型手機2便透過硬體安全模組12,以簽章私鑰136對簽章資料137進行解密。解密後,硬體安全模組12可以取得一解密資料,解密資料還不一定是前述的加密公鑰131。此時,智慧型手機2可以執行判斷工作,確認取得的解密資料是否為該加密公鑰131。如果解密資料就是加密公鑰131,由於加密公鑰131是SIM卡1的擁有者,也只有他知道並使用加密公鑰131並將之加密保存,所以備援載體4便沒有被安裝惡意程式以竊取保護數據133的風險。反之,如果不是,就表示備援載體4在保管的過程中遭到資料竄改,該備援載體4有風險而必須廢棄。若該解密資料為加密公鑰131,智慧型手機2便如同圖3所示,自第三方3取得的儲存數據134。之後,將智慧型手機2自第三方3取得的儲存數據134,透過硬體安全模組12以加密私鑰132解密,就可以獲得保護數據133,並將獲得的保護數據133儲存於備援載體4的儲存模組13中。When the backup carrier 4 is installed in the smart phone 2 and enabled for the smart phone 2, the smart phone 2 decrypts the signature data 137 with the signature private key 136 through the hardware security module 12 . After decryption, the hardware security module 12 can obtain a decrypted data, which is not necessarily the aforementioned encryption public key 131 . At this point, the smart phone 2 can perform judgment work to confirm whether the obtained decryption data is the encrypted public key 131 . If the decrypted data is the encrypted public key 131, since the encrypted public key 131 is the owner of the SIM card 1, only he knows and uses the encrypted public key 131 and encrypts it for storage, so the backup carrier 4 is not installed with a malicious program. Risk of stealing protected data 133 . On the contrary, if not, it means that the backup carrier 4 has been tampered with during the storage process, and the backup carrier 4 is risky and must be discarded. If the decrypted data is the encrypted public key 131 , the smart phone 2 will obtain the stored data 134 from the third party 3 as shown in FIG. 3 . Afterwards, the stored data 134 obtained by the smart phone 2 from the third party 3 is decrypted with the encryption private key 132 through the hardware security module 12 to obtain the protected data 133, and the obtained protected data 133 is stored in a backup carrier 4 in the storage module 13.

為了要方便加密公鑰131、加密私鑰132、簽章公鑰135與簽章私鑰136的取得,以及進行加密與解密的作業,前述的硬體安全模組12可進一步包含:一密鑰產生單元121、一加密單元122及一解密單元123。密鑰產生單元121的工作在產生複數對加密私鑰及對應的加密公鑰,也可包含簽章公鑰135與簽章私鑰136。加密單元122可以任一公鑰對一明文進行加密,以獲得一密文。解密單元123和加密單元122相反,可以執行加密之公鑰對應的私鑰解密該密文,以獲得該明文。In order to facilitate the acquisition of the encryption public key 131, the encryption private key 132, the signature public key 135 and the signature private key 136, as well as the operations of encryption and decryption, the aforementioned hardware security module 12 may further include: a key A generating unit 121 , an encryption unit 122 and a decryption unit 123 . The key generation unit 121 works to generate a plurality of pairs of encrypted private keys and corresponding encrypted public keys, which may also include a signature public key 135 and a signature private key 136 . The encryption unit 122 can encrypt a plaintext with any public key to obtain a ciphertext. In contrast to the encryption unit 122, the decryption unit 123 can decrypt the ciphertext with the private key corresponding to the public key performing encryption to obtain the plaintext.

以上實施方式中揭露的備援載體及其運作方式,可以確保取得的保護數據之正確性。然而,確認備援載體是否經過認證,是否受到保護而不被置入惡意軟體來竊取保護數據,無法單就備援載體為之。以下的另一實施方式將揭露解決前述問題的技術特徵。The backup carrier and its operation mode disclosed in the above embodiments can ensure the correctness of the obtained protection data. However, it is not possible to confirm whether the backup carrier is authenticated and protected from malicious software to steal protected data. The following another embodiment will disclose technical features to solve the aforementioned problems.

請見圖4,該圖繪示依照本發明實施例的一種備援系統。備援系統中包含了前述的備援載體4,另外還有認證主機5。Please refer to FIG. 4 , which shows a backup system according to an embodiment of the present invention. The backup system includes the aforementioned backup carrier 4 and an authentication host 5 in addition.

在本備援系統中,備援載體4內除了儲存加密公鑰131、加密私鑰132、簽章公鑰135、簽章私鑰136及簽章資料137外,還進一步儲存了一數位簽章138及可驗證數位簽章138的一認證公鑰139。數位簽章為使用認證公鑰139對應的一認證私鑰139’所生成。當備援載體4安裝於智慧型手機2內並為智慧型手機2啟用後,智慧型手機2不直接進行對簽章資料137的解密作業,反而是先透過硬體安全模組12對數位簽章138與認證公鑰139進行一數位簽章驗證程序,確認簽章資料137的完整性(未被竄改)。若該數位簽章驗證程序成功,智慧型手機2才透過硬體安全模組12以簽章私鑰136對簽章資料137進行解密。因此,為了完成前述作業,硬體安全模組12也配合包含了一數位簽章解密單元124。數位簽章解密單元124可對數位簽章138與認證公鑰139進行前述的數位簽章驗證程序。In this backup system, in addition to storing the encryption public key 131, the encryption private key 132, the signature public key 135, the signature private key 136 and the signature data 137, the backup carrier 4 further stores a digital signature 138 and an authentication public key 139 that can verify the digital signature 138. The digital signature is generated using an authentication private key 139' corresponding to the authentication public key 139. When the backup carrier 4 is installed in the smart phone 2 and enabled for the smart phone 2, the smart phone 2 does not directly decrypt the signature data 137, but first signs the digital signature through the hardware security module 12. The chapter 138 and the certification public key 139 perform a digital signature verification procedure to confirm the integrity of the signature material 137 (not tampered with). If the digital signature verification procedure is successful, the smart phone 2 decrypts the signature data 137 with the signature private key 136 through the hardware security module 12 . Therefore, in order to complete the aforementioned tasks, the hardware security module 12 also includes a digital signature decryption unit 124 . The digital signature decryption unit 124 can perform the aforementioned digital signature verification procedure on the digital signature 138 and the authentication public key 139 .

在此,數位簽章138簽章程序使用的認證公鑰139與認證私鑰139’都是由認證主機5所產生。認證主機5是與智慧型手機2通過網路相連的伺服器,可儲存認證私鑰139’與認證公鑰139、生成數位簽章138,並提供生成的數位簽章138與認證公鑰139給備援載體4。數位簽章138的明文內容不限定,可由認證主機5所屬方決定。當備援載體4由製造商生產完成後,便由認證主機5(可以是屬於製造商的,或授權使用的)提供數位簽章138與認證公鑰139儲存於備援載體4中,以證明備援載體4的身分及不可竄改性。Here, the authentication public key 139 and the authentication private key 139' used by the digital signature 138 signing program are both generated by the authentication host 5. The authentication host 5 is a server connected to the smart phone 2 through the network, which can store the authentication private key 139' and the authentication public key 139, generate a digital signature 138, and provide the generated digital signature 138 and authentication public key 139 to Backup carrier 4. The plaintext content of the digital signature 138 is not limited, and can be determined by the owner of the authentication host 5 . After the backup carrier 4 is produced by the manufacturer, the authentication host 5 (which may belong to the manufacturer or be authorized to use) provides a digital signature 138 and an authentication public key 139 stored in the backup carrier 4 to prove The identity of the backup carrier 4 and cannot be tampered with.

依照本發明,數位簽章138之認證公鑰139受一認證簽章所簽章,該認證簽章不為認證主機5所產生,而是由其它的憑證伺服器所產生。重複簽章的目的在於由一公開金鑰基礎建設架構(Public Key Infrastructure,PKI)更高階憑證中心的憑證伺服器來認證認證公鑰139的身分。請見圖5,該圖繪示一種公開金鑰基礎架構。認證主機5可以是屬於製造商的,其發行的認證公鑰139受設計廠商憑證伺服器的認證簽章所簽章。設計廠商的認證簽章,由次級證認證機構的憑證伺服器的認證簽章所簽章。最終,次級證認證機構的認證簽章,由根憑證認證機構(比如國家發展委員會委託中華電信管理的政府憑證管理中心)的憑證伺服器的認證簽章所簽章。因此,依照本發明,認證主機5也可以是公開金鑰基礎建設架構中的任一伺服器。According to the present invention, the authentication public key 139 of the digital signature 138 is signed by an authentication signature which is not generated by the authentication host 5 but by other certificate servers. The purpose of re-signing is to verify the identity of the authentication public key 139 by the certificate server of a higher-level certificate center of a Public Key Infrastructure (PKI). Please refer to FIG. 5, which shows a public key infrastructure. The authentication host 5 may belong to the manufacturer, and the authentication public key 139 issued by it is signed by the authentication signature of the certificate server of the design manufacturer. The certification seal of the design manufacturer is signed by the certification seal of the certificate server of the secondary certification authority. Ultimately, the certification seal of the secondary certificate certification body is signed by the certification seal of the certificate server of the root certificate certification body (such as the government certificate management center entrusted by the National Development Commission to manage Chunghwa Telecom). Therefore, according to the present invention, the authentication host 5 can also be any server in the public key infrastructure.

雖然本發明已以實施方式揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。Although the present invention has been disclosed above in terms of implementation, it is not intended to limit the present invention. Anyone with ordinary knowledge in the technical field may make some changes and modifications without departing from the spirit and scope of the present invention. Therefore, The scope of protection of the present invention should be defined by the scope of the appended patent application.

1:SIM卡 2:智慧型手機 3:第三方 4:備援載體 5:認證主機 11:處理器 12:硬體安全模組 121:密鑰產生單元 122:加密單元 123:解密單元 124:數位簽章解密單元 13:儲存模組 131:加密公鑰 132:加密私鑰 133:保護數據 134:儲存數據 135:簽章公鑰 136:簽章私鑰 137:簽章資料 138:數位簽章 139:認證公鑰 139’:認證私鑰 1: SIM card 2: Smartphone 3: Third party 4: backup carrier 5: Authentication host 11: Processor 12: Hardware Security Module 121: key generation unit 122: encryption unit 123: decryption unit 124: Digital signature decryption unit 13: Storage module 131: encrypted public key 132: encrypted private key 133:Protect Data 134: Store data 135: signature public key 136: Signature private key 137: Signature information 138: Digital signature 139: Authentication public key 139': authentication private key

圖1繪示本發明備援的主載體儲存保護數據的態樣。FIG. 1 shows the state of storing and protecting data in a redundant main carrier of the present invention.

圖2繪示依照本發明實施例的一種備援載體的態樣及運作方式。FIG. 2 illustrates the appearance and operation of a backup carrier according to an embodiment of the present invention.

圖3為備援載體的又一運作方式。FIG. 3 is another operation mode of the redundant carrier.

圖4繪示依照本發明實施例的一種備援系統。FIG. 4 illustrates a backup system according to an embodiment of the present invention.

圖5繪示一種公開金鑰基礎架構。FIG. 5 illustrates a public key infrastructure.

2:智慧型手機 2: Smartphone

3:第三方 3: Third party

4:備援載體 4: backup carrier

11:處理器 11: Processor

12:硬體安全模組 12: Hardware Security Module

121:密鑰產生單元 121: key generation unit

122:加密單元 122: encryption unit

123:解密單元 123: decryption unit

13:儲存模組 13: Storage module

131:加密公鑰 131: encrypted public key

132:加密私鑰 132: encrypted private key

134:儲存數據 134: Store data

135:簽章公鑰 135: signature public key

136:簽章私鑰 136: Signature private key

137:簽章資料 137: Signature information

Claims (11)

一種數據的備援載體,為一工作主機所啟用後,備援一主載體中儲存的一保護數據,該保護數據亦使用一加密公鑰加密為一儲存數據後儲存於一第三方,其特徵在於: 該備援載體儲存該加密公鑰、對應該加密公鑰的一加密私鑰、一簽章公鑰、對應該簽章公鑰的一簽章私鑰,及一簽章資料; 該備援載體具有一硬體安全模組; 當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密,並確認取得的一解密資料是否為該加密公鑰;及 若該解密資料為該加密公鑰,將該工作主機自該第三方取得的該儲存數據,透過該硬體安全模組以該加密私鑰解密以獲得該保護數據,並將獲得的該保護數據儲存於該備援載體中。 A data backup carrier, which is activated by a working host, backs up a protected data stored in a main carrier, and the protected data is also encrypted with an encryption public key into stored data and then stored in a third party, its features in: The backup carrier stores the encryption public key, an encryption private key corresponding to the encryption public key, a signature public key, a signature private key corresponding to the signature public key, and a signature data; The backup carrier has a hardware security module; When the backup carrier is installed in the working host and activated for the working host, the working host decrypts the signature data with the signature private key through the hardware security module, and confirms the obtained decrypted data whether it is the encryption public key; and If the decrypted data is the encrypted public key, the storage data obtained by the working host from the third party is decrypted with the encrypted private key through the hardware security module to obtain the protected data, and the obtained protected data stored in the backup carrier. 如請求項1所述的數據的備援載體,其中該備援載體進一步儲存一數位簽章及可驗證該數位簽章的一認證公鑰,該數位簽章為使用該認證公鑰對應的一認證私鑰所生成;當該備援載體安裝於該工作主機內並為該工作主機啟用後,該工作主機進一步透過該硬體安全模組對該數位簽章與該認證公鑰進行一數位簽章驗證程序,若該數位簽章驗證程序成功,該工作主機才透過該硬體安全模組以該簽章私鑰對該簽章資料進行解密。The backup carrier of data as described in claim 1, wherein the backup carrier further stores a digital signature and a certification public key that can verify the digital signature, and the digital signature is a certificate corresponding to the certification public key. The authentication private key is generated; when the backup carrier is installed in the working host and enabled for the working host, the working host further performs a digital signature on the digital signature and the authentication public key through the hardware security module. If the digital signature verification procedure is successful, the working host will decrypt the signature data with the signature private key through the hardware security module. 如請求項2所述的數據的備援載體,其中該硬體安全模組進一步包含: 一密鑰產生單元,產生複數對加密私鑰及對應的加密公鑰; 一加密單元,以任一公鑰對一明文進行加密,以獲得一密文; 一解密單元,以執行加密之公鑰對應的私鑰解密該密文,以獲得該明文;及 一數位簽章解密單元,對該數位簽章與該認證公鑰進行該數位簽章驗證程序。 The data backup carrier as described in claim 2, wherein the hardware security module further includes: A key generating unit, which generates plural pairs of encrypted private keys and corresponding encrypted public keys; An encryption unit, which encrypts a plaintext with any public key to obtain a ciphertext; a decryption unit, which decrypts the ciphertext with the private key corresponding to the public key performing encryption to obtain the plaintext; and A digital signature decryption unit performs the digital signature verification procedure on the digital signature and the authentication public key. 如請求項1或請求項2所述的數據的備援載體,其中複數個備援載體的簽章私鑰與簽章公鑰間形成一環簽名(Ring Signature)結構。The backup carrier of data as described in claim 1 or claim 2, wherein a ring signature (Ring Signature) structure is formed between the signature private key and the signature public key of the plurality of backup carriers. 如請求項1或請求項2所述的數據的備援載體,其中該主載體與該備援載體為SIM卡。The data backup carrier as described in claim 1 or claim 2, wherein the main carrier and the backup carrier are SIM cards. 如請求項1或請求項2所述的數據的備援載體,其中該工作主機為智慧型手機、平板電腦或穿戴式電子裝置。The data backup carrier as described in claim 1 or claim 2, wherein the working host is a smart phone, a tablet computer or a wearable electronic device. 如請求項1或請求項2所述的數據的備援載體,其中該第三方為伺服器、雲端備份平台或區塊鏈儲存架構。The data backup carrier as described in claim 1 or claim 2, wherein the third party is a server, a cloud backup platform or a blockchain storage framework. 如請求項1或請求項2所述的數據的備援載體,其中該保護數據為數字貨幣密鑰或受保護的私鑰。The backup carrier of data according to claim 1 or claim 2, wherein the protected data is a digital currency key or a protected private key. 如請求項2所述的數據的備援載體,其中該數位簽章之認證公鑰受一認證簽章所簽章。The backup carrier of data as claimed in item 2, wherein the authentication public key of the digital signature is signed by an authentication signature. 一種備援系統,包含: 請求項2至9中任一項所述的數據的備援載體;及 一認證主機,儲存該認證私鑰與該認證公鑰、生成該數位簽章,並提供生成的該數位簽章與該認證公鑰給該備援載體。 A backup system comprising: a redundant carrier for the data described in any one of claims 2 to 9; and An authentication host, storing the authentication private key and the authentication public key, generating the digital signature, and providing the generated digital signature and the authentication public key to the backup carrier. 如請求項10所述的備援系統,其中該認證主機為一公開金鑰基礎建設架構中的任一伺服器。The backup system as claimed in claim 10, wherein the authentication host is any server in a public key infrastructure.
TW110134262A 2021-09-14 2021-09-14 Data backup carrier and backup system having the same TWI790745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW110134262A TWI790745B (en) 2021-09-14 2021-09-14 Data backup carrier and backup system having the same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW110134262A TWI790745B (en) 2021-09-14 2021-09-14 Data backup carrier and backup system having the same

Publications (2)

Publication Number Publication Date
TWI790745B TWI790745B (en) 2023-01-21
TW202312707A true TW202312707A (en) 2023-03-16

Family

ID=86670130

Family Applications (1)

Application Number Title Priority Date Filing Date
TW110134262A TWI790745B (en) 2021-09-14 2021-09-14 Data backup carrier and backup system having the same

Country Status (1)

Country Link
TW (1) TWI790745B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10891384B2 (en) * 2017-10-19 2021-01-12 Koninklijke Kpn N.V. Blockchain transaction device and method
CN111385084A (en) * 2018-12-27 2020-07-07 中国电信股份有限公司 Key management method and device for digital assets and computer readable storage medium
CN111628864A (en) * 2020-06-05 2020-09-04 微位(深圳)网络科技有限公司 Method for carrying out secret key safety recovery by using SIM card

Also Published As

Publication number Publication date
TWI790745B (en) 2023-01-21

Similar Documents

Publication Publication Date Title
US7639819B2 (en) Method and apparatus for using an external security device to secure data in a database
US10880100B2 (en) Apparatus and method for certificate enrollment
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
KR20140126787A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN111971929B (en) Secure distributed key management system
WO2016086788A1 (en) Method and apparatus for encrypting/decrypting data on mobile terminal
CN110806919B (en) Method and system for protecting virtual machine image in cloud environment
CN102646077A (en) Method for full-disk encryption based on trusted cryptography module
US20130124860A1 (en) Method for the Cryptographic Protection of an Application
WO2024139273A1 (en) Federated learning method and apparatus, readable storage medium, and electronic device
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
TWI476629B (en) Data security and security systems and methods
CN112906041A (en) Dynamic multi-party signature encryption and decryption method and system
CN110837634B (en) Electronic signature method based on hardware encryption machine
CN114942729A (en) Data safety storage and reading method for computer system
CN111628864A (en) Method for carrying out secret key safety recovery by using SIM card
CN110855429A (en) Software key protection method based on TPM
CN103577771A (en) Virtual desktop data leakage-preventive protection technology on basis of disk encryption
CN111190694A (en) Virtualization security reinforcement method and device based on Roc platform
TWI790745B (en) Data backup carrier and backup system having the same
CN101478538B (en) Storage method, apparatus or system for safety management device
CN111542050B (en) TEE-based method for guaranteeing remote initialization safety of virtual SIM card
KR101947408B1 (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
CN113672973A (en) Database system of embedded equipment based on RISC-V architecture of trusted execution environment