1280025 九、發明說明: 【發明所屬之技術領域】 本發明係屬於一種具備金鑰復原功能的檔案保密系統與方法, 特別是指一種利用公開金鑰智慧卡進行高安全性、高效率加解密的系統, 可保障檔案的機密性且在必要的時候可進行金鑰復原的作業,能夠解決私 密金鑰遺失時重要檔案無法解密的問題。 【先前技術】 在本案之前對於電腦檔案的加解密,一般僅依靠使用者選定的密碼作 為加解密金鑰,容綠字典攻擊法之下被破解,且當使用者忘記密碼之時, 所有的密文檔就無法觸,糊檔案資料的敎。紐許多重要檔案都需 要一個高安全度的保密措施,骑使用者的金鑰或密碼遺失之際,亦需要 一安全可靠_娜進行金敝原紅作,轉障重要觀之機密性與可 用性。 由此可見,上述習用方式仍有諸多不足,實非_良善之設計者,而亟 待加以改良。 ,乃亟思加以改良創 本案發明人鑑於上述制方式所触的各項缺點 新,並經料苦錄騎颂究後,終域功研發細树具備金錄復原 功能的檔案保密系統。 【發明内容】 本發明之目的即在於提供__種具備金瑜復原功能的標案保密系 統與方法’侧祕開金翁慧卡鱗綠錄、^鱗物職管理作 業,可保障電腦檔案的機密性。當使用者的密喝或私密金输遺失之際,經 1280025 過適當的授權認證後,金鑰復原伺服端可進行對稱金鑰的復原作業,能夠 解決密碼或金鑰遺失時重要檔案無法解密的問題。 此外本發明利用公開金鑰的特性支援數位信封式的保密措施,可以讓 機密的檔案雖經由不安全的管道來傳送也不致有被竄改、窺視及否認傳送 等的疑慮。1280025 IX. Description of the Invention: [Technical Field] The present invention belongs to a file security system and method with key recovery function, and particularly relates to a high security and high efficiency encryption and decryption using a public key smart card. The system can guarantee the confidentiality of the file and can perform the key recovery operation when necessary, and can solve the problem that the important file cannot be decrypted when the private key is lost. [Prior Art] In the previous case, the encryption and decryption of computer files generally relied only on the password selected by the user as the encryption and decryption key. The password was cracked under the green dictionary attack method, and when the user forgot the password, all the secrets were The document can't be touched, and the file information is ambiguous. Many important files in New Zealand require a high-security security measure. When the user's key or password is lost, it is also necessary to be safe and reliable. _ Na is doing the golden 敝 红, the confidentiality and availability of the important view. It can be seen that there are still many shortcomings in the above-mentioned methods of use, which are not the designers of goodness, but need to be improved. In the case of the inventor of the present invention, the inventors of the present invention, in view of the shortcomings of the above-mentioned system, have developed a file security system with a record-recovery function. SUMMARY OF THE INVENTION The object of the present invention is to provide a document security system and method with a golden yoga restoration function, and to protect the confidentiality of computer files. . When the user's secret drink or private gold loss is lost, after the appropriate authorization and authentication by 1280025, the key recovery server can perform the recovery of the symmetric key, which can solve the problem that the important file cannot be decrypted when the password or key is lost. problem. In addition, the present invention utilizes the characteristics of the public key to support digital envelope-type security measures, so that confidential files can be transmitted through unsecured channels without suspicion of tampering, peeping, and denying transmission.
而本發明採用密碼學上高安全等級的演算法,例如RSA 1〇24 位元以上的公開金鑰與AES 256位元以上的對稱金鑰,可有效 的增進檔案之保密性。有別於一般的加解密系統,當使用者遺 失其個人密碼或私密金鑰時,本發明可由金鑰復原伺服端經過 適當的認證授權以後,進行對稱金鑰的復原,不致於失去使用 者的重要檔案。此外本發明利用公開金鑰的特性以支援數位信 封式的保密措施,讓機密的檔案雖經由不安全的管道來傳送也 不會產生若干資訊安全上的疑慮。 【實施方式】 效為便於胃審查委員能更進一步對本發明之構造、使用及其特徵有 更深-層,明確、詳實的認識與瞭解,發明人舉A較佳之實施例,配合圖 式詳細說明如下: 本發明係為―種具備金鑰復原魏㈣靠密线與方法,係 採用物件導向(Gb je㈣rientatiGn,簡獅)技術進行系統分析、設計與實 作,其作業流程至少包括以下方法步驟: 〜產製密文樓案時利用金錄伺服端之公開金繪進行復原資訊的組裝與加 密;而該絲錢·資訊敝裝與域㈣,叹此—金鑰復原資訊的 1280025 組成格式。 金鑰復原作業之客戶端選取待復原的檔案,取出金鑰復原資訊;客戶 端與伺服端所進行的簽章與合法性驗證、封裝加解密及密文檔更新等步驟。 客戶端模組使用合法的公開金鑰智慧卡進行簽章、封裝後,上傳此一 金鑰復原的請求資訊至伺服端; 词服端解析驗證此-請求資訊及其簽章,確認使用者身分且為合法請 求之後進行金鑰解密、封裝回傳的作業; 客戶端模組解析取出新的金鑰復原資訊密文、進行槽案更新的作業。 請參關-’係為本㈣具備金鑰復原魏的齡絲祕之較佳實 方也例之系構不意圖,係包含有·· 一加密端1與一解密端2 ; -肋儲存金_且可執行其簽章、加解密運算之侧麵智禁卡3. 一智慧卡㈣介面4,加密以魏公開金麵解密端藉贿用 金鑰進行解密作業; 雄數位簽章驗證等各項密碼學運算; 金賴原作業之客戶触錬端模組6,透過客 傳'伺服端解析驗證、金 簽早上 更新等程序嫩物=細#、則_鴨、播索 一===Γ;Γ崎行瓣公物、數位信封簽 W碼驗邊、檔案解密等程序。 1280025 由圖中可知,本發明之較佳實施例係密碼學原理,以期達到: 使用RSA智慧卡作為私密金鍮載具、執行隐運算。 採AES演算法進行高安全性、高效率的加解密運算。 客戶端可利用合法的RSA智慧卡申請金餘復原,金紐原祠服端_ 適當的授權認證後,進行金鍮復原的作業。 支援數位信封式的簽章加密以保護傳送安全性。 如此在保障電腦標案的機密性與可用性上面,得到大幅度的改善。 請參_二,本發明所提供之職保密祕其加密作業流程圖,本系 統採用物件導向技術進行系統分析、設計與實作。所完成之密域案格式 為: AES演算法之密文 RSA金鑰加密金鑰(以使用者之公輪進行加密) 金鑰復原資訊密文(以金鑰復原伺服器之公鑰進行加密) 其中第三項的金鑰復原資訊格式為:The present invention adopts a cryptographically high security level algorithm, such as a public key of RSA 1〇24 bits or more and a symmetric key of AES 256 bits or more, which can effectively improve the confidentiality of the file. Different from the general encryption and decryption system, when the user loses his personal password or private key, the present invention can restore the symmetric key after the key recovery server is properly authenticated and authorized, without losing the user's Important file. In addition, the present invention utilizes the characteristics of the public key to support digitally sealed security measures, so that confidential files transmitted through unsecured channels do not create some information security concerns. [Embodiment] The effect is that the stomach reviewing committee can further deepen-layer, clear, and detailed understanding and understanding of the structure, use and characteristics of the present invention, and the inventors give a preferred embodiment, with the following detailed description The present invention is a system for analyzing, designing and implementing system-oriented (Gb je (four) rientatiGn, Jane lion) technology, and the following steps are included: In the case of producing the ciphertext building, the public information of the golden record server is used for the assembly and encryption of the restoration information; and the silk money and information armor and domain (4), sigh this - the 1280025 format of the key recovery information. The client of the key recovery operation selects the file to be restored, extracts the key recovery information, and performs the steps of signature and legality verification, encapsulation encryption and decryption, and confidential document update performed by the client and the server. After the client module uses the legal public key smart card for signature and encapsulation, upload the request information of the key recovery to the server; the vocabulary end parses and verifies the request information and its signature to confirm the user identity. And the operation of decrypting and encapsulating the key after the legal request; the client module parsing and extracting the new key to restore the information ciphertext and performing the slot update operation. Please refer to - 'system-based (four) with a key to restore Wei's age, the best example of the real side of the system is not intended, including: · an encryption end 1 and a decryption end 2; - rib storage gold _ and can execute its signature, encryption and decryption operations side of the forbidden card 3. A smart card (four) interface 4, encryption to use the Wei public gold face decryption end to use the bribe to decrypt the key; the male digital signature verification, etc. Key cryptography; Jin Laiyuan's customer touch terminal module 6, through the customer's 'servo end analysis and verification, gold sign morning update and other procedures tenders = fine #, then _ duck, soaring one ===Γ ; Miyazaki's petal public property, digital envelope signing W code inspection, file decryption and other procedures. 1280025 As can be seen from the figure, the preferred embodiment of the present invention is a cryptographic principle, in order to achieve: Using an RSA smart card as a private key vehicle and performing implicit operations. The AES algorithm is used for high security and high efficiency encryption and decryption operations. The client can use the legal RSA smart card to apply for the restoration of the gold balance, and the operation of the gold recovery after the appropriate authorization certification. Digital envelope-style signature encryption is supported to protect transmission security. This has greatly improved the confidentiality and usability of computer standards. Please refer to _ 2, the confidentiality secret file operation flowchart provided by the present invention, the system uses object-oriented technology for system analysis, design and implementation. The format of the completed secret domain is: AES algorithm ciphertext RSA key encryption key (encrypted by the user's public round) Key recovery information ciphertext (encrypted with the public key of the key recovery server) The third key recovery information format is:
請參閱圖三所示的解密流程,解密端讀取密文檔格式的第二項金鑰加 密金鑰資訊後,即利用使用者的私密金鑰進行解密取出隨機金鑰,得以解 開AES之密文。 圖四為金鑰復原作業流程圖,使用者透過金鑰復原之客戶端模組進行 1280025 申請資訊的封裝與簽章,再上傳至伺服端進行認證授獅程序。此—申靖 資訊的格式如下:Referring to the decryption process shown in FIG. 3, after the decryption end reads the second key encryption key information in the secret document format, the user decrypts the random key by using the private key of the user, thereby unlocking the AES secret. Text. Figure 4 is a flowchart of the key restoration operation. The user performs the encapsulation and signature of the 1280025 application information through the client module restored by the key, and then uploads it to the server for certification and lion-raising. This—the format of Shenjing Information is as follows:
φ 金鑰復原伺服端先解析此一申請資訊並根據使用者ID資訊找出相對的 憑證以驗證簽章之正確性。其次從中取出金鑰復原資訊並呼叫硬體高速保 密器,使用其私密金鑰解開每一份金鑰復原資訊,再比對申請資訊中的使 者ID與復原資訊中的ID是否—致以確定為合法之中請。再利用申請資 訊㈣制者公開金齡錢作絲新的錢城錢資訊,然後封裝回 傳給客戶端。 客戶端解析取出新的金鑰加密金鑰資訊後,依序對原先無法解密的稽 • 案進行金鍮加密金鑰部分新,如此即完成金鑰復原的作業。之後使用 者逕行依圖三所示的解密流程從事檔案解密作業。 ®五為數位信封之作業流程圖,姻二、三所述之加解密流程相似, 但可依使用者的選擇加上簽章與驗證的作業。 本發明所提供之具備金鑰復原功能_案保密祕與方法,與其他習 用技術相互比較時,更具有下列之優點: 採用公鑰智慧卡以及密碼學上高安全等級的演算法,例如rsa腦 位元以上的公開金矯與AES 256位元以上的對稱金输,可大幅提高播案之 1280025 保密性。 、身吏用者遺個人彳確金鑰時,本發明可*金鑰復原彳植端經過適 當_證_以後進行對稱麵的復原,不致於失去使用者之重要槽案。 本發明支她健封式的絲措施,賴密的齡雖經由不安全的管 道來傳送也可防止被竄改、窺視或否認製作等問題。 、上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例 並非用錄制本發明之專概圍,凡未麟本個技藝精神所為之等效實 知或變更,均應包含於本案之專利範圍中。 綜上所述,本案不但在技術思紅確屬綱,並能較f知方法增進上 述多項功效,應已充分符合新雜及進步性之法定發明專利要件,麦依法 提出申請,懇請貴局核准本件發明專利申請案,以勵發明,至感德便。 【圖式簡單說明】 一 請參閱以下有關本發明一較佳實施例之詳細說明及其附圖,將可進一 步瞭解本發狀技_容及其目的魏;有_實補之附圖為·· 圖-為本發明具備金鑰復原功能的檔案保密系統之架構示意圖; 圖二為該檔案保密系統之作業流程圖。 圖三為該檔案保密系統之作業流程圖。 圖四為金鑰復原作業流程圖。 圖五為數位信封作業流程圖。 【主要元件符號說明】 1 加密端 2 解密端 1280025The φ key recovery server first parses the application information and finds the relative credentials based on the user ID information to verify the correctness of the signature. Secondly, take out the key recovery information and call the hardware high-speed security device, use its private key to unlock each key recovery information, and then compare the ID of the messenger ID in the application information with the ID in the recovery information to determine whether Please be legal. Re-use the application for information (4) to disclose the new age money to the new Qiancheng money information, and then package it back to the client. After the client parses the new key encryption key information, it performs a new key to the original decryption key, so that the key recovery operation is completed. Afterwards, the user performs the file decryption operation according to the decryption process shown in FIG. ® Five is the operation flow chart of the digital envelope. The encryption and decryption process described in Marriage II and III is similar, but the signature and verification work can be added according to the user's choice. The key recovery method and method provided by the present invention have the following advantages when compared with other conventional technologies: using a public key smart card and a cryptographically high security level algorithm, such as rsa brain The public gold correction above the bit and the symmetrical gold loss of AES 256 or more can greatly improve the confidentiality of the broadcast of 1280025. When the user is responsible for verifying the key, the present invention can restore the symmetry plane after the appropriate key is restored, and the important slot of the user is not lost. The invention provides her with a tight-sealing silk measure, and the age of the Lai Mi can be prevented from being tampered with, peeped or denied by the unsafe pipe. The detailed description above is a detailed description of one of the possible embodiments of the present invention, but it is not intended to be a comprehensive description of the present invention. It is included in the patent scope of this case. To sum up, this case is not only in the technical thinking, but also can enhance the above-mentioned multiple functions. It should be fully in line with the new and progressive statutory invention patents. Mai applied for it and asked for approval. This invention patent application, in order to invent invention, to the sense of virtue. BRIEF DESCRIPTION OF THE DRAWINGS [0012] Please refer to the following detailed description of a preferred embodiment of the present invention and its accompanying drawings, which will further understand the present invention and its purpose. · Figure - is a schematic diagram of the architecture of the file security system with key recovery function of the present invention; Figure 2 is a flow chart of the operation of the file security system. Figure 3 is a flow chart of the operation of the file security system. Figure 4 is a flow chart of the key recovery operation. Figure 5 is a flow chart of the digital envelope operation. [Main component symbol description] 1 Encrypted end 2 Decrypted end 1280025
3 智慧卡 4 智慧卡控制介面 5 密碼模組 6 金錄復原作業之客戶端與祠服端模組 7 數位信封編解碼驗證模組 113 Smart Card 4 Smart Card Control Interface 5 Password Module 6 Client and Service Module of Golden Record Recovery Operation 7 Digital Envelope Codec Verification Module 11