CN102377564B - Method and device for encrypting private key - Google Patents
Method and device for encrypting private key Download PDFInfo
- Publication number
- CN102377564B CN102377564B CN201110361075.9A CN201110361075A CN102377564B CN 102377564 B CN102377564 B CN 102377564B CN 201110361075 A CN201110361075 A CN 201110361075A CN 102377564 B CN102377564 B CN 102377564B
- Authority
- CN
- China
- Prior art keywords
- key
- private key
- encryption
- private
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The embodiment of the invention provides a method and a device for encrypting a private key. The method for encrypting the private key comprises the following steps of: generating a key according to a key material by a preset symmetric key generating algorithm, encrypting a private key according to the key by a preset encryption algorithm, generating and storing an encrypted private key, and deleting the key and the private key. The device for encrypting the private key comprises a first key generating unit and a private key encrypting unit. The first key generating unit is used for generating the key according to the key material by the preset symmetric key generating algorithm. The private key encrypting unit is used for encrypting the private key according to the key by the preset encryption algorithm, generating and storing the encrypted private key and deleting the key and the private key. According to the method and the device for encrypting the private key, security of the private key is realized, additional security equipment is not needed, and the cost of the equipment can be reduced at the same time of improving the security of the private key.
Description
Technical field
The embodiment of the present invention relates to information security technology, particularly relates to a kind of encryption method and device of private key.
Background technology
Along with the development of network technology, the network activity of people is more and more frequent, and in thing followed network transmission process, the security requirement of information is also just more and more higher.Information encryption is the core technology of information security, so-called encryption, and exactly calling that the readable information of " expressly " converts the process of " ciphertext " to, deciphering is then the process " ciphertext " being reverted to " expressly ".Rivest, shamir, adelman, as one of conventional cryptographic algorithm, refers to that ciphering process and decrypting process use the cryptographic algorithm of two different keys.Encryption key for enciphered message is made public, and is called PKI, and the decruption key for decryption information is preserved by deciphering people's secret, is called private key.
The key of rivest, shamir, adelman is exactly private key, ensures the fail safe of private key, the fail safe of the whole encryption system of guarantee.In prior art, in order to ensure the fail safe of private key, available employing hardware-based cryptographic, such as, be kept in usb key (Universal Serial BUS Key, be called for short USBKey) equipment by private key, and USB Key equipment is independently hardware device.But use usb key device storage private key to increase cost, and also there is safety issue in usb key equipment.
Summary of the invention
The embodiment of the present invention provides a kind of encryption method and device of private key, to realize the fail safe of private key, and without the need to additionally increasing safety means, improves the convenience that private key fail safe realizes.
The embodiment of the present invention provides a kind of encryption method of private key, comprising:
Key is generated by presetting Symmetric key generation algorithm according to key material;
By predetermined encryption algorithm, private key is encrypted according to described key, generates the private key after encryption and store, described key and described private key are deleted.
The embodiment of the present invention provides a kind of encryption device of private key, comprising:
First Key generating unit, for generating key according to key material by presetting Symmetric key generation algorithm;
Encrypted private key unit, for being encrypted private key by predetermined encryption algorithm according to described key, being generated the private key after encryption and storing, and described key and described private key is deleted.
As shown from the above technical solution, the encryption method of the private key that the embodiment of the present invention provides and device, key is generated by presetting Symmetric key generation algorithm according to key material, private key is encrypted by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.The embodiment of the present invention, without the need to additionally increasing safety means, can reduce equipment cost while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the present invention;
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the present invention;
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the present invention;
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the present invention.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the present invention.As shown in Figure 1, in information security application, user is encrypted information by the private key in subscriber equipment, then gives other users, with the fail safe of guarantee information in transmitting procedure by the information transmission after encryption.The encryption method of the private key that the present embodiment provides specifically can be applied to the handling process to private key in information security technology, to improve the fail safe of private key.The encryption method of the private key that the present embodiment provides specifically is performed by encryption device, and this encryption device specifically can be integrated in the subscriber equipment be encrypted information by private key, also can arrange separately.
The encryption method of the private key that the present embodiment provides specifically comprises:
Step 10, according to key material by preset Symmetric key generation algorithm generate key.
Particularly, described key material is the material for generating key, and this key material can be arranged arbitrarily, meets the requirement of default Symmetric key generation algorithm.Specifically can arranging according to the information security sexual needs of reality of this default Symmetric key generation algorithm.
The double secret key private key that can be generated by described default Symmetric key generation algorithm according to this is encrypted, and also can be decrypted according to the private key after this key pair encryption.
Step 20, by predetermined encryption algorithm, private key to be encrypted according to described key, to generate the private key after encryption and also store, described key and described private key are deleted.
Alternatively, described predetermined encryption algorithm is specially symmetric encipherment algorithm, DEA (Data Encryption Algorithm, vehicle economy A), Advanced Encryption Standard (AdvancedEncryption Standard is called for short AES) etc. can be comprised.Predetermined encryption algorithm also specifically can be arranged according to the information security sexual needs of reality, is not limited with the present embodiment.
Be encrypted according to double secret key private key, generate the private key after encryption and store, then this key generated in step 10 and original private key are deleted.The private key after encryption is only stored in encryption device, and do not store original private key and for the key to this encrypted private key, therefore, even if the private key after encryption is obtained by hacker, hacker also cannot be decrypted the private key after this encryption, can ensure the fail safe of private key.When in information interactive process, needing to use this private key when information is encrypted, more corresponding decryption processing is carried out to the private key after this encryption, carrying out follow-up information encryption process with this private key by obtaining.
The encryption method of the private key that the present embodiment provides, key is generated by presetting Symmetric key generation algorithm according to key material, private key is encrypted by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.The embodiment of the present invention, without the need to additionally increasing safety means, can reduce equipment cost while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the present invention.As shown in Figure 2, the encryption method of the private key that the present embodiment provides, on the basis of embodiment described in Fig. 1, specifically can also comprise the steps:
Step 30, when receiving the CIPHERING REQUEST carrying information to be encrypted, generate described key according to described key material by described default Symmetric key generation algorithm.
This encryption device specifically can also perform the operation be encrypted data message by private key.Particularly, what described CIPHERING REQUEST was specifically as follows user's input treats in order to instruction the request that enciphered message is encrypted, and also can treat in order to instruction the request that enciphered message is encrypted for what sent by other functional units in business information processing procedure.Specifically information to be encrypted can be carried in this CIPHERING REQUEST.When this encryption device receives this CIPHERING REQUEST, generate described key according to key material by presetting Symmetric key generation algorithm.Key material is identical with the key material in step 10, preset Symmetric key generation algorithm also identical with the default Symmetric key generation algorithm in step 10, the key generated thus with generate in step 10 also identical for the key be encrypted private key.Therefore, can be decrypted by the private key after this key pair encryption.
Private key after step 40, encryption according to described double secret key is decrypted, and generates described private key, is deleted by described key.
Just obtain described private key after private key after encryption is decrypted, then the key generated in step 30 is deleted.
Step 50, according to described private key, described information to be encrypted to be encrypted, described private key is deleted.
Treat after enciphered message is encrypted according to this private key, then this private key is deleted, then the information after encryption is returned to the functional unit of request cryptographic operation, so that follow-up information processing.
Because the key for being decrypted the private key after encryption is also dynamically generate, just delete after the decryption oprerations being completed the private key after to encryption by this key, and thus obtained private key is also just deleted after completing the cryptographic operation treating enciphered message, still only preserve the private key after encryption in encryption device, further increase the fail safe of private key.
Alternatively, in the present embodiment, step 10, generating key according to key material by presetting Symmetric key generation algorithm, comprising:
Hash calculation and/or 64 character codes are carried out to described key material, generates described key.
Particularly, described key material can for the character string preset, also can using PKI corresponding for described private key as key material, and the setting of key material, to meet Hash calculation and 64 character codes require, is not limited with the present embodiment.64 character codes (Base64) are the coding method based on 64 characters, Hash (Hash) can be carried out to described key material and calculate the described key of generation, also can carry out 64 character codes to described key material and generate described key, described key is generated after can also carrying out above-mentioned two kinds of operations successively to described key material, operating sequence can be that Hash calculation is front, 64 character codes rear, also can be 64 based encodes front, Hash calculation is rear.Hash calculation and 64 character code computational efficiencies all higher, the speed of secret generating can be improved.The selection presetting Symmetric key generation algorithm is not limited with the present embodiment.
Alternatively, in the present embodiment, step 10, generating key according to key material by presetting Symmetric key generation algorithm, specifically can comprise:
Using the PKI corresponding with described private key as described key material, generate described key according to described PKI by described default Symmetric key generation algorithm.
In the information security application of reality, private key and PKI normally occur in pairs.Therefore, using PKI corresponding for described private key as described key material, not only can improve the reliability of key material, and the convenience of realization can be improved.
In the present embodiment, generate described key according to described PKI by described default Symmetric key generation algorithm, specifically can comprise the steps:
The partial content of described PKI is generated described key by described default Symmetric key generation algorithm.
Because the data message comprised in PKI is many, the basis generating described key is the partial content of described PKI, calculates the characteristic information of described PKI as described key according to the partial content of described PKI.Even if then described PKI is obtained by hacker, hacker also has no way of knowing that the basis as secret generating is which partial content in PKI, further increases the fail safe of private key.The partial content of described PKI specifically can set according to the action need of reality, also using the full content of PKI as the basis generating described key, can not be limited with the present embodiment.
Be example with PKI (Public Key Infrastructure, PKIX) system below, the encryption method of the private key that the present embodiment provides is described in detail.
At PKI (Public Key Infrastructure, PKIX) in system, adopt digital certificate management PKI, by third-party trusted authorities authentication center, other identity informations of the PKI of user and user are bundled, forms digital certificate.Digital certificate format and certificate content follow X.509 standard, and it is the proof of identification of online entity, prove the legitimacy of a certain entity identities and PKI and the binding relationship of entity and PKI.Digital certificate specifically can comprise: the information of sequence number, client public key, user subject information, visa mechanism, the information such as signature, validity period of certificate of visa mechanism.
The digital certificate of user and private key are stored in encryption device usually in the lump, and encryption device using the PKI in digital certificate as key material, can generate key to the specified portions content of PKI after Hash calculation and 64 character codes.By predetermined encryption algorithm, private key is encrypted according to this key, generates the private key after encryption and store, and this key and private key are deleted.Namely the private key after digital certificate and encryption is stored in encryption device.
When this secret device receives the CIPHERING REQUEST carrying information to be encrypted, calculate according to the specified portions content Hash of PKI in described digital certificate and generate key after 64 character codes, be decrypted according to the private key after this key pair encryption, generate private key, and this key is deleted.Treat enciphered message according to this private key to be encrypted, after completing encryption, this private key is deleted, and the information after encryption is returned to the main body sending this CIPHERING REQUEST, namely complete the ciphering process to interactive information.In the process, the key for deciphering is interim generation, and key and private key are all deleted after finishing using, and only preserves the private key after digital certificate and encryption, ensure that the fail safe of private key in encryption device.
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the present invention.As shown in Figure 3, the encryption device of the private key that the present embodiment provides specifically can realize each step of the encryption method of the private key that any embodiment of the present invention provides, and this repeats no more.The encryption device of the private key that the present embodiment provides specifically can be realized by the form of software and hardware.
The encryption device of the private key that the present embodiment provides specifically comprises the first Key generating unit 11 and encrypted private key unit 12.First Key generating unit 11 is for generating key according to key material by presetting Symmetric key generation algorithm.Encrypted private key unit 12, for being encrypted private key by predetermined encryption algorithm according to described key, being generated the private key after encryption and stores, and described key and described private key is deleted.
The encryption device of the private key that the present embodiment provides, first Key generating unit 11 generates key according to key material by presetting Symmetric key generation algorithm, encrypted private key unit 12 is encrypted private key by predetermined encryption algorithm according to described key, generate the private key after encryption and store, described key and described private key are deleted, realizes the fail safe of private key.And the embodiment of the present invention is without the need to additionally increasing safety means, equipment cost can be reduced while the fail safe of raising private key.Due to for just generating when needs use this key the key of encrypted private key, after completing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and avoid the safety problem that fixed key stores.
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the present invention.As shown in Figure 4, in the present embodiment, the encryption device of this private key specifically can also comprise the second Key generating unit 13, private key generation unit 14 and information encryption unit 15.Second Key generating unit 13, for when receiving the CIPHERING REQUEST carrying information to be encrypted, generates described key according to described key material by described default Symmetric key generation algorithm.Private key generation unit 14 is decrypted for the private key after encryption according to described double secret key, generates described private key, is deleted by described key.Described private key, for being encrypted described information to be encrypted according to described private key, is deleted by information encryption unit 15.
By described second Key generating unit 13, the setting of private key generation unit 14 and information encryption unit 15, realize the encryption treating enciphered message, in this implementation procedure, because the key for being decrypted the private key after encryption also just generates when needs use this key, just delete after the decryption oprerations being completed the private key after to encryption by this key, and thus obtained private key is also just deleted after completing the cryptographic operation treating enciphered message, the private key after encryption is still only preserved in the encryption device of private key, further increase the fail safe of private key.
In the present embodiment, described first Key generating unit 11 specifically can also be used for carrying out Hash calculation, 64 character codes or Hash calculation and 64 character codes to described key material, generates described key.Due to Hash calculation and 64 character code computational efficiencies all higher, the speed of secret generating can be improved.
In the present embodiment, described first Key generating unit 11 also for using the PKI corresponding with described private key as described key material, generate described key according to described PKI by described default Symmetric key generation algorithm.Because private key and PKI normally occur in pairs, using PKI corresponding for described private key as described key material, not only can improve the reliability of key material, and the convenience of realization can be improved.
In the present embodiment, described first Key generating unit 11 is also for generating described key by the partial content of described PKI by described default Symmetric key generation algorithm.Because the data message comprised in PKI is many, the basis generating described key is the partial content of described PKI, even if then described PKI is obtained by hacker, hacker also has no way of knowing that the basis as secret generating is which partial content in PKI, further increases the fail safe of private key.
The encryption method of the private key that the embodiment of the present invention provides and device, can solve the problem how private key is preserved safely in a device.The encryption method of the private key that the embodiment of the present invention provides and device, do not need to increase extra hardware cost, do not need manual intervention when equipment restarts and recovers private key yet.And the key of encryption key just calculates generation when needs use this key, there is not the problem that encryption key is preserved safely, substantially increase the convenience that private key fail safe realizes.The key material adopted in implementation procedure and default Symmetric key generation algorithm, and all can select flexibly the cryptographic algorithm of private key, applicability and extensibility are all stronger, and realize simple, are easy to promote.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that program command is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: ROM, RAM, magnetic disc or CD etc. various can be program code stored medium.
Last it is noted that above embodiment is only in order to illustrate technical scheme of the present invention, be not intended to limit; Although with reference to previous embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that: it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme.
Claims (4)
1. an encryption method for private key, is characterized in that, comprising:
Key is generated by presetting Symmetric key generation algorithm according to key material;
By predetermined encryption algorithm, private key is encrypted according to described key, generates the private key after encryption and store, described key and described private key are deleted;
Described according to key material by preset Symmetric key generation algorithm generate key, comprising:
Using the partial content of the PKI corresponding with described private key as described key material, the partial content according to described PKI generates described key by described default Symmetric key generation algorithm;
The setting of described key material meets Hash calculation and 64 character code requirements.
2. the encryption method of private key according to claim 1, is characterized in that, described method also comprises:
When receiving the CIPHERING REQUEST carrying information to be encrypted, generate described key according to described key material by described default Symmetric key generation algorithm;
Private key after encryption according to described double secret key is decrypted, and generates described private key, is deleted by described key;
According to described private key, described information to be encrypted is encrypted, described private key is deleted.
3. an encryption device for private key, is characterized in that, comprising:
First Key generating unit, for generating key according to key material by presetting Symmetric key generation algorithm;
Encrypted private key unit, for being encrypted according to described double secret key private key, generating the private key after encryption and storing, and described key and described private key is deleted;
Described first Key generating unit specifically for using the partial content of the PKI corresponding with described private key as described key material, the partial content according to described PKI generates described key by described default Symmetric key generation algorithm;
The setting of described key material meets Hash calculation and 64 character code requirements.
4. the encryption device of private key according to claim 3, is characterized in that, also comprises:
Second Key generating unit, for when receiving the CIPHERING REQUEST carrying information to be encrypted, generates described key according to described key material by described default Symmetric key generation algorithm;
Private key generation unit, for being decrypted the private key after described encryption by predetermined encryption algorithm according to described key, being generated described private key, being deleted by described key;
Information encryption unit, for being encrypted described information to be encrypted according to described private key, deletes described private key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110361075.9A CN102377564B (en) | 2011-11-15 | 2011-11-15 | Method and device for encrypting private key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110361075.9A CN102377564B (en) | 2011-11-15 | 2011-11-15 | Method and device for encrypting private key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102377564A CN102377564A (en) | 2012-03-14 |
CN102377564B true CN102377564B (en) | 2015-03-11 |
Family
ID=45795590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110361075.9A Expired - Fee Related CN102377564B (en) | 2011-11-15 | 2011-11-15 | Method and device for encrypting private key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102377564B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359994A (en) * | 2017-07-19 | 2017-11-17 | 国家电网公司 | The integrated encryption device that a kind of quantum cryptography blends with classical password |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9230091B2 (en) | 2012-06-20 | 2016-01-05 | Microsoft Technology Licensing, Llc | Managing use of a field programmable gate array with isolated components |
US9298438B2 (en) | 2012-06-20 | 2016-03-29 | Microsoft Technology Licensing, Llc | Profiling application code to identify code portions for FPGA implementation |
US9424019B2 (en) | 2012-06-20 | 2016-08-23 | Microsoft Technology Licensing, Llc | Updating hardware libraries for use by applications on a computer system with an FPGA coprocessor |
CN102857889A (en) * | 2012-09-12 | 2013-01-02 | 中兴通讯股份有限公司 | Method and device for encrypting short messages |
CN104270242B (en) * | 2014-09-27 | 2017-12-19 | 杭州电子科技大学 | A kind of ciphering and deciphering device for network data encryption transmission |
US10574459B2 (en) * | 2015-09-30 | 2020-02-25 | Microsoft Technology Licensing, Llc | Code signing service |
US20170126414A1 (en) * | 2015-10-28 | 2017-05-04 | Texas Instruments Incorporated | Database-less authentication with physically unclonable functions |
CN106656503B (en) * | 2016-10-13 | 2019-09-24 | 上海众人网络安全技术有限公司 | Method for storing cipher key, data encryption/decryption method, electric endorsement method and its device |
CN106487509B (en) * | 2016-11-09 | 2019-01-29 | 北京信安世纪科技股份有限公司 | A kind of method and host equipment generating key |
CN106549754A (en) * | 2016-11-24 | 2017-03-29 | 北京爱接力科技发展有限公司 | The method and apparatus of management key |
CN107359993A (en) * | 2017-08-29 | 2017-11-17 | 国家电网公司 | A kind of power information collection safety protecting method and system based on quantum cryptography |
CN107819571A (en) * | 2017-09-29 | 2018-03-20 | 广东中科南海岸车联网技术有限公司 | The generation method and device of private key |
CN108494551A (en) * | 2018-03-16 | 2018-09-04 | 数安时代科技股份有限公司 | Processing method, system, computer equipment and storage medium based on collaboration key |
CN108471352B (en) * | 2018-03-16 | 2022-03-04 | 数安时代科技股份有限公司 | Processing method, system, computer equipment and storage medium based on distributed private key |
CN109525396B (en) * | 2018-09-30 | 2021-02-23 | 华为技术有限公司 | Method and device for processing identity key and server |
WO2020076234A1 (en) * | 2018-10-12 | 2020-04-16 | Aioz Pte Ltd | Apparatus and method for controlling data access |
CN109547201B (en) * | 2018-12-14 | 2023-04-14 | 平安科技(深圳)有限公司 | Encryption method of root key, computer readable storage medium and terminal equipment |
CN110838909A (en) * | 2019-10-09 | 2020-02-25 | 核芯互联科技(青岛)有限公司 | Encryption and decryption method and system for key file |
CN110912920A (en) * | 2019-12-03 | 2020-03-24 | 望海康信(北京)科技股份公司 | Data processing method, apparatus and medium |
CN113094718A (en) * | 2019-12-23 | 2021-07-09 | 华为数字技术(苏州)有限公司 | File encryption method and related device |
CN112766962A (en) * | 2021-01-20 | 2021-05-07 | 中信银行股份有限公司 | Method for receiving and sending certificate, transaction system, storage medium and electronic device |
CN114531236B (en) * | 2022-03-02 | 2023-10-31 | 杭州华澜微电子股份有限公司 | Key processing method and device and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447870A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Safe storage method of private key based on technology of distributed password |
CN101778381A (en) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | Digital certificate generation method, user key acquisition method, mobile terminal and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6931133B2 (en) * | 2002-09-03 | 2005-08-16 | Verisign, Inc. | Method and system of securely escrowing private keys in a public key infrastructure |
-
2011
- 2011-11-15 CN CN201110361075.9A patent/CN102377564B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447870A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Safe storage method of private key based on technology of distributed password |
CN101778381A (en) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | Digital certificate generation method, user key acquisition method, mobile terminal and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359994A (en) * | 2017-07-19 | 2017-11-17 | 国家电网公司 | The integrated encryption device that a kind of quantum cryptography blends with classical password |
Also Published As
Publication number | Publication date |
---|---|
CN102377564A (en) | 2012-03-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102377564B (en) | Method and device for encrypting private key | |
US10785019B2 (en) | Data transmission method and apparatus | |
CN106548345B (en) | Method and system for realizing block chain private key protection based on key partitioning | |
US11930103B2 (en) | Method, user device, management device, storage medium and computer program product for key management | |
US20110145576A1 (en) | Secure method of data transmission and encryption and decryption system allowing such transmission | |
CN110868291B (en) | Data encryption transmission method, device, system and storage medium | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
CN103036880A (en) | Network information transmission method, transmission equipment and transmission system | |
CN104200176A (en) | System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal | |
WO2012154503A2 (en) | Certificate blobs for single sign on | |
CN109005184A (en) | File encrypting method and device, storage medium, terminal | |
CN109347923B (en) | Anti-quantum computing cloud storage method and system based on asymmetric key pool | |
CN109873699A (en) | A kind of voidable identity public key encryption method | |
CN112118113A (en) | Multi-party cooperative group signature method, device, system and medium based on SM2 algorithm | |
CN103108245B (en) | A kind of intelligent television pays cipher key system and method for payment based on intelligent television | |
US20130198524A1 (en) | Object with identity based encryption | |
JP5324813B2 (en) | Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program | |
CN109299618B (en) | Quantum-resistant computing cloud storage method and system based on quantum key card | |
CN116707778A (en) | Data hybrid encryption transmission method and device and electronic equipment | |
CN110750326A (en) | Disk encryption and decryption method and system for virtual machine | |
EP4283549A1 (en) | Payment service implementation method and device | |
CN107070648B (en) | Key protection method and PKI system | |
CN115499118A (en) | Message key generation method, message key generation device, file encryption method, message key decryption method, file encryption device, file decryption device and medium | |
KR101793528B1 (en) | Certificateless public key encryption system and receiving terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150311 Termination date: 20181115 |
|
CF01 | Termination of patent right due to non-payment of annual fee |