CN103312500A - Methods for protecting universal serial bus (USB) key information - Google Patents

Methods for protecting universal serial bus (USB) key information Download PDF

Info

Publication number
CN103312500A
CN103312500A CN2012100658430A CN201210065843A CN103312500A CN 103312500 A CN103312500 A CN 103312500A CN 2012100658430 A CN2012100658430 A CN 2012100658430A CN 201210065843 A CN201210065843 A CN 201210065843A CN 103312500 A CN103312500 A CN 103312500A
Authority
CN
China
Prior art keywords
key
pin code
random number
ciphertext
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100658430A
Other languages
Chinese (zh)
Other versions
CN103312500B (en
Inventor
陈猛豪
胡伯良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201210065843.0A priority Critical patent/CN103312500B/en
Publication of CN103312500A publication Critical patent/CN103312500A/en
Application granted granted Critical
Publication of CN103312500B publication Critical patent/CN103312500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method for protecting universal serial bus (USB) key information. The method comprises the following steps of A, allocating a protective key to a USB key; B, encrypting sensitive information in the USB key by utilizing the protective key; and C, encrypting the protective key by utilizing a PIN (personal identification number) code of the USB key. The invention also provides another method for protecting the USB key information. The invention also provides a third method for protecting the USB key information. The sensitive information in the USB key is encrypted through the protective key, and the PIN code of a user and a randomly generated random number are used as keys for encrypting the protective key, so that the condition that the user is required to decrypt the sensitive information and then re-encrypt the sensitive information by utilizing a new PIN code when modifying the PIN code; the amount of the sensitive information is greater than the information amount of the protective key, so that operation is reduced, and the system efficiency and user experiences are improved.

Description

A kind of method of protecting intelligent code key information
Technical field
The present invention relates to the information encryption field, particularly a kind of method of protecting intelligent code key information.
Background technology
Intelligent code key (USB KEY) is a kind of and PKI (Public Key Infrastructure; PKIX) portable terminal device of system perfect adaptation; security performance is high; be widely used in Net silver, certificate verification, e-commerce field, provide for the user in the service fields such as authentication, digital certificate, Electronic Signature, data protection.
Store user's sensitive information in the safety chip of intelligent code key, for example certificate although the used safety chip of intelligent code key has the mechanism of anti-multiple detection means, guarantees the fail safe of its storage information.But along with the raising of various attack means, the safety chip internal data faces certain risk and threatens.
In order to tackle these risks; a kind of general solution is by PIN (Personal Identification Number; individual's recognition code) and random number composition Protective Key; and utilize this Protective Key that the sensitive information in the safety chip is encrypted, then ciphertext is stored in assigned address.The defective of this method is when revising the pin code, all to utilize former PIN code and random number that sensitive information is decrypted, to obtain sensitive information expressly, the key that then forms with new PIN code and new random number expressly is encrypted sensitive information, stores at last ciphertext.Because the common data volume of sensitive information is huge, this method efficient is low, and user experience is poor.
How a kind of highly effective and safe mechanism is provided, and is a problem demanding prompt solution.
Summary of the invention
For addressing the above problem, the invention provides a kind of method of protecting intelligent code key information.
The embodiment of the invention provides a kind of method of protecting intelligent code key information, may further comprise the steps: A. is that described intelligent code key distributes Protective Key; B. utilize described Protective Key, the sensitive information in the described intelligent code key is encrypted; C. utilize the PIN code of described intelligent code key, this Protective Key is encrypted.
By Protective Key the sensitive information in the intelligent code key is encrypted; recycling user's PIN code and the random random number that produces are encrypted Protective Key as key; thereby in the time of can avoiding the user to revise PIN code; need to be decrypted sensitive information; the new PIN code of recycling is to the sensitive information re-encrypted, because therefore the sensitive information amount is former greater than Protective Key, after the deciphering; reduce operand, improved efficient and the user experience of system.
Wherein, described Protective Key is random the first random number that generates.
Random number by random generation is as Protective Key, thus the fail safe that can improve intelligent code key.
Wherein, also comprise after the step B: the ciphertext (the first ciphertext) that will obtain after will being encrypted the sensitive information in the described intelligent code key stores in the assigned address of described intelligent code key.
Store in the assigned address of described intelligent code key by the ciphertext that will obtain after will being encrypted the sensitive information in the described intelligent code key, use during in order to this ciphertext of deciphering, improved the efficient of system.
Wherein, step C specifically comprises:, as key described Protective Key is encrypted with the PIN code of described intelligent code key and random the second random number that generates; Encrypted result (the second ciphertext) and described the second random number are stored in the assigned address.
By using PIN code and random the second random number that generates as key; described Protective Key is encrypted, in the time of can avoiding PIN code to revise sensitive information is decrypted, but can realize by the deciphering Protective Key; reduce operand, improved efficient and the user experience of system.
The embodiment of the invention also provides a kind of method of protecting intelligent code key information, may further comprise the steps: D. receives the former PIN code of user's input, and described former PIN code is authenticated; If E. described former PIN code has been passed through authentication, judge then whether the user revises PIN code; If F. the user has revised PIN code, then receive new PIN code; And from assigned address, take out the second ciphertext and the second random number, and utilize simultaneously described the second random number and former PIN code as key, described the second ciphertext is decrypted, key is protected; G. utilize random the 3rd random number that generates and described new PIN code as key, described Protective Key is encrypted.
By Protective Key the sensitive information in the intelligent code key is encrypted; recycling user's PIN code and the random random number that produces are encrypted Protective Key as key; thereby in the time of can avoiding the user to revise PIN code; need to be decrypted sensitive information; the new PIN code of recycling is to the sensitive information re-encrypted, because therefore the sensitive information amount is former greater than Protective Key, after the deciphering; reduce operand, improved efficient and the user experience of system.
Wherein, also comprise after the step F: store the content of the second ciphertext in the assigned address into the content replacement of described the 3rd ciphertext, the 3rd random number is replaced the second random number that stores in the assigned address, and new PIN code substitutes former PIN code.
By changing above-mentioned parameter, can make the user be easy to the key that is protected, improved the efficient of system.
The embodiment of the invention provides again a kind of method of protecting intelligent code key information, may further comprise the steps: H. receives the PIN code of user's input, and described PIN code is authenticated; If I. described PIN code has been passed through authentication, then take out the second ciphertext and the second random number from assigned address, utilize simultaneously described the second random number and PIN code as key, described the second ciphertext is decrypted, obtain the first Protective Key (former Protective Key); J. utilize the Protective Key (the second Protective Key) of new (after revising), resulting sensitive information expressly is encrypted, replace the first ciphertext that stores in the assigned address with the ciphertext that obtains; K. utilize PIN code and the random random number that generates that described the second Protective Key is encrypted, and resulting ciphertext is replaced the second ciphertext that stores in the assigned address, described random number is replaced the second random number that stores in the assigned address.
Generate intelligent code key by revising Protective Key, increased the flexibility of system, improved the fail safe of intelligent code key.
Description of drawings
A kind of particular flow sheet of protecting the method for intelligent code key information that Fig. 1 provides for the embodiment of the invention.
The particular flow sheet of the method for another protection intelligent code key information that Fig. 2 provides for the embodiment of the invention.
The particular flow sheet of the method for the another protection intelligent code key information that Fig. 3 provides for the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of method of protecting intelligent code key information.Below in conjunction with accompanying drawing, the embodiment of the invention is described in detail.Referring to Fig. 1, may further comprise the steps:
S100: for intelligent code key distributes Protective Key, and utilize this Protective Key, the sensitive information in the intelligent code key is encrypted;
The present invention utilizes Protective Key rather than PIN code, is encrypted the ciphertext that generates intelligent code key for the sensitive information in the intelligent code key.
Intelligent code key is supported many certificates, large capacity storage, and in this example, the sensitive information of storing in the intelligent code key is certificate information, for example, stores 1000 certificate informations in the intelligent code key.
Utilize hardware module to generate a random number; with this random number (the first random number) as Protective Key; and utilize this Protective Key; by discussing close algorithm; sensitive information in the intelligent code key is encrypted the ciphertext (the first ciphertext) that generates intelligent code key, and the first ciphertext is stored into the assigned address of intelligent code key.
S110: as key, this Protective Key is encrypted, and this encrypted result (the second ciphertext) and the second random number are stored in assigned address with user's PIN code and random the second random number that generates;
Utilize user's PIN code and the random random number that produces as key Protective Key to be encrypted; thereby when the user revises PIN code; the information that need only decrypt by user's former PIN code Protective Key gets final product, and need not the sensitive information in the intelligent code key be decrypted.
The embodiment of the invention also provides a kind of method of protecting intelligent code key information.Referring to Fig. 2, may further comprise the steps:
S200: receive the PIN code of user's input, and this PIN code is authenticated;
After the user inputs PIN code, at first this PIN code is authenticated, for example, can pass through CSP (Cryptographic Service Providers, cryptographic services supplier) and authenticate.
S210: if this PIN code has been passed through authentication, judge whether the user revises PIN code;
If the PIN code that the user uses has been passed through, for example authentication of CSP, system will provide the chance of revising PIN code for the user, if user selection the modification PIN code, system receives the PIN code of the modification of user's input.
S220: if the user does not select to revise PIN code, then proceed the authentication of intelligent code key.
If the user does not select to revise PIN code, need not revise the second ciphertext and the second random number that are stored in the assigned address.
S230: if user selection the modification PIN code, then system receives the new PIN code of user's input; And take out the second ciphertext and the second random number from assigned address, and utilize simultaneously the second random number and former PIN code as key, the second ciphertext is decrypted, key is protected.
If the user has revised PIN code; need this moment again Protective Key to be encrypted, take out the second ciphertext and the second random number by the assigned address from intelligent code key so, utilize former PIN code and the second random number; the second ciphertext is decrypted, and key is protected.
S240: utilize random the 3rd random number that generates and new PIN code as key, Protective Key is encrypted.
After deciphering; key is protected; then utilize new PIN code that this Protective Key is re-started encryption; because after the PIN code change; the ciphertext of just Protective Key being encrypted is decrypted, and the Protective Key that then deciphering is obtained re-starts encryption and gets final product, and need not decipher sensitive information; usually the amount of information of sensitive information can reach the 100K byte, and the byte number of Protective Key is generally the 6-16 byte.Therefore, greatly reduce operand, improved efficient and the user experience of system.
S250: with the content of content replacement second ciphertext of the 3rd ciphertext, the 3rd random number is replaced the second random number, and amended PIN code substitutes former PIN code.
Utilizing new PIN code that this Protective Key is re-started the ciphertext (the 3rd ciphertext) that obtains after the encryption replaces in the second ciphertext that stores in the assigned address; namely; replace the second ciphertext with the 3rd ciphertext, replace the former PIN code that stores in the assigned address with amended PIN code (new PIN code).
The embodiment of the invention also provides a kind of method of protecting intelligent code key information.Referring to Fig. 3, may further comprise the steps:
S300: receive the PIN code of user's input, and this PIN code is authenticated;
S310: if this PIN code has been passed through authentication, take out the second ciphertext and the second random number from assigned address, utilize simultaneously the second random number and PIN code as key, the second ciphertext is decrypted, obtain the first Protective Key (former Protective Key).
S320: utilize the first Protective Key, the first ciphertext (sensitive information ciphertext) is decrypted, obtain sensitive information expressly.
The first ciphertext (sensitive information ciphertext) is encrypted sensitive information by the first Protective Key and obtains; after obtaining the first Protective Key, take out the first ciphertext from assigned address, then utilize the first Protective Key; the first ciphertext is decrypted, obtains sensitive information expressly.
S330: utilize the Protective Key (the second Protective Key) of new (after revising), resulting sensitive information expressly is encrypted, replace the first ciphertext that stores in the assigned address with the ciphertext that obtains.
In the situation of the applicable modification of the method that the present embodiment provides Protective Key, the method for protection intelligent code key information.The user need to utilize PIN code to obtain original Protective Key, obtains sensitive information by original Protective Key, and the Protective Key that recycling is revised carries out re-encrypted to resulting sensitive information.
S340: utilize PIN code and the random random number that generates that the Protective Key (the second Protective Key) of revising is encrypted; and resulting ciphertext replaced the second ciphertext that stores in the assigned address, this random number is replaced the second random number that stores in the assigned address.
The above only is preferred embodiment of the present invention; not in order to limit the present invention; for example; the module of difference in functionality can be realized by an integrated chip etc.; all within the spirit and principles in the present invention; any modification of doing, be equal to replacement, improvement etc., all should be included within the protection range of the present utility model.

Claims (7)

1. a method of protecting intelligent code key information is characterized in that, may further comprise the steps:
A. be that described intelligent code key distributes Protective Key;
B. utilize described Protective Key, the sensitive information in the described intelligent code key is encrypted;
C. utilize the PIN code of described intelligent code key, this Protective Key is encrypted.
2. method according to claim 1 is characterized in that, described Protective Key is random the first random number that generates.
3. method according to claim 1 is characterized in that, also comprises after the step B:
The ciphertext that will obtain after will being encrypted the sensitive information in the described intelligent code key stores in the assigned address of described intelligent code key.
4. method according to claim 1 is characterized in that, step C specifically comprises:
, as key described Protective Key is encrypted with the PIN code of described intelligent code key and random the second random number that generates;
Encrypted result and described the second random number are stored in the assigned address.
5. a method of protecting intelligent code key information is characterized in that, may further comprise the steps:
D. receive the former PIN code of user's input, and described former PIN code is authenticated;
If E. described former PIN code has been passed through authentication, judge then whether the user revises PIN code;
If F. the user has revised PIN code, then receive new PIN code; And from assigned address, take out the second ciphertext and the second random number, and utilize simultaneously described the second random number and former PIN code as key, described the second ciphertext is decrypted, key is protected;
G. utilize random the 3rd random number that generates and described new PIN code as key, described Protective Key is encrypted.
6. method according to claim 5 is characterized in that, also comprises after the step F:
Store the content of the second ciphertext in the assigned address into the content replacement of described the 3rd ciphertext, the 3rd random number is replaced the second random number that stores in the assigned address, and new PIN code substitutes former PIN code.
7. a method of protecting intelligent code key information is characterized in that, may further comprise the steps:
H. receive the PIN code of user's input, and described PIN code is authenticated;
If I. described PIN code has been passed through authentication, then take out the second ciphertext and the second random number from assigned address, utilize simultaneously described the second random number and PIN code as key, described the second ciphertext is decrypted, obtain the first Protective Key;
J. utilize the second Protective Key, resulting sensitive information expressly is encrypted, replace the first ciphertext that stores in the assigned address with the ciphertext that obtains;
K. utilize PIN code and the random random number that generates that described the second Protective Key is encrypted, and resulting ciphertext is replaced the second ciphertext that stores in the assigned address, described random number is replaced the second random number that stores in the assigned address.
CN201210065843.0A 2012-03-13 2012-03-13 A kind of method protecting intelligent code key information Active CN103312500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210065843.0A CN103312500B (en) 2012-03-13 2012-03-13 A kind of method protecting intelligent code key information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210065843.0A CN103312500B (en) 2012-03-13 2012-03-13 A kind of method protecting intelligent code key information

Publications (2)

Publication Number Publication Date
CN103312500A true CN103312500A (en) 2013-09-18
CN103312500B CN103312500B (en) 2016-10-05

Family

ID=49137311

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210065843.0A Active CN103312500B (en) 2012-03-13 2012-03-13 A kind of method protecting intelligent code key information

Country Status (1)

Country Link
CN (1) CN103312500B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN104519063A (en) * 2014-12-17 2015-04-15 飞天诚信科技股份有限公司 Method for reexamining signatures
CN104917763A (en) * 2015-06-08 2015-09-16 飞天诚信科技股份有限公司 PIN code caching method
CN110474768A (en) * 2019-08-22 2019-11-19 上海豆米科技有限公司 A kind of information safety transmission system and method having the control of group's decrypted rights

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1495666A (en) * 2002-09-11 2004-05-12 ��ʽ���������Ƽ� Storage card
CN101494541A (en) * 2009-03-06 2009-07-29 中国工商银行股份有限公司 System and method for implementing security protection of PIN code
CN101645124A (en) * 2009-09-03 2010-02-10 北京飞天诚信科技有限公司 Method for unlocking PIN code and intelligent secret key device
CN102170357A (en) * 2011-05-31 2011-08-31 北京虎符科技有限公司 Combined secret key dynamic security management system
CN102215108A (en) * 2010-11-17 2011-10-12 北京曙光天演信息技术有限公司 Encryption card certification and authority method adopting USB intelligent secret key and encryption card

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1495666A (en) * 2002-09-11 2004-05-12 ��ʽ���������Ƽ� Storage card
CN101494541A (en) * 2009-03-06 2009-07-29 中国工商银行股份有限公司 System and method for implementing security protection of PIN code
CN101645124A (en) * 2009-09-03 2010-02-10 北京飞天诚信科技有限公司 Method for unlocking PIN code and intelligent secret key device
CN102215108A (en) * 2010-11-17 2011-10-12 北京曙光天演信息技术有限公司 Encryption card certification and authority method adopting USB intelligent secret key and encryption card
CN102170357A (en) * 2011-05-31 2011-08-31 北京虎符科技有限公司 Combined secret key dynamic security management system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103560892A (en) * 2013-11-21 2014-02-05 深圳中兴网信科技有限公司 Secret key generation method and secret key generation device
CN104519063A (en) * 2014-12-17 2015-04-15 飞天诚信科技股份有限公司 Method for reexamining signatures
CN104519063B (en) * 2014-12-17 2017-07-14 飞天诚信科技股份有限公司 A kind of implementation method for checking signature
CN104917763A (en) * 2015-06-08 2015-09-16 飞天诚信科技股份有限公司 PIN code caching method
CN104917763B (en) * 2015-06-08 2018-04-27 飞天诚信科技股份有限公司 A kind of PIN cache method
CN110474768A (en) * 2019-08-22 2019-11-19 上海豆米科技有限公司 A kind of information safety transmission system and method having the control of group's decrypted rights

Also Published As

Publication number Publication date
CN103312500B (en) 2016-10-05

Similar Documents

Publication Publication Date Title
WO2021013245A1 (en) Data key protection method and system, electronic device and storage medium
CN105144626B (en) The method and apparatus of safety is provided
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN106301774B (en) Safety chip, its encryption key generation method and encryption method
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN103067170B (en) encrypting method based on EXT2 file system
US11424919B2 (en) Protecting usage of key store content
CN1708942A (en) Secure implementation and utilization of device-specific security data
CN101828357A (en) Credential provisioning
CN102156843B (en) Data encryption method and system as well as data decryption method
CN104506504B (en) A kind of storage method and safety device of card-free terminal classified information
US20120284534A1 (en) Memory Device and Method for Accessing the Same
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN102163267A (en) Solid state disk as well as method and device for secure access control thereof
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN109687966A (en) Encryption method and its system
CN103138932B (en) The collocation method of a kind of Mifare card sector key and system
CN104574652A (en) Method for increasing and deducting pollution discharge data of IC card and IC card
CN103312500A (en) Methods for protecting universal serial bus (USB) key information
CN102612025B (en) Protective system and protective method for mobile phone documents
CN103370718B (en) Use the data guard method of distributed security key, equipment and system
CN101174941A (en) Off-line digital copyright protection method and device for mobile terminal document
CN103501220A (en) Encryption method and device
KR101318668B1 (en) Portable memory card having information security function
CN114491481B (en) Safety calculation method and device based on FPGA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100094, Beijing, Haidian District, West Road, No. 8, Zhongguancun Software Park, building 9, international software building E, one floor, two layers

Applicant after: BEIJING HAITAI FANGYUAN HIGH TECHNOLOGY CO., LTD.

Address before: 100094, Beijing, Haidian District, West Road, No. 8, Zhongguancun Software Park, building 9, international software building E, one floor, two layers

Applicant before: Beijing Haitai Fangyuan High Technology Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant