Method of generating secret key possessing service life and system thereof

A key and key store technology, applied in the field of encryption, can solve the problems of high anti-tampering requirements and high hardware costs, and achieve the effect of improving reliability and security, and ensuring legitimate interests and legitimate rights and interests

Active Publication Date: 2015-12-02
刘奇 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of directly managing the time itself to realize the management and control of the key validity period has the defects of high hardware cost and high tamper-proof requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of generating secret key possessing service life and system thereof
  • Method of generating secret key possessing service life and system thereof
  • Method of generating secret key possessing service life and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings. However, those skilled in the art know that the present invention is not limited to the drawings and the following embodiments.

[0021] Such as figure 1 As shown, the method for generating a key with an expiration date proposed by the present invention comprises the following steps:

[0022] S1: Set the usage period of the key;

[0023] S2: According to the generation principle of the key, determine the minimum key expression or the minimum key expression group of the key covering the lifetime. Indicates the start time and end time of the key usage period in the form of year, month, day, hour, and second.

[0024] 1. The key generation principle is as follows:

[0025] The level of time is defined according to the orde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of generating a secret key possessing a service life. The method comprises the following steps of setting the service life of the secret key; according to a time grade and a generation principle of the secret key, determining a minimum secret key expression of the secret key or a minimum secret key expression group covering the service life; according to the minimum secret key expression of the secret key or a minimum secret key expression group covering the service life, extracting the secret key corresponding to each secret key expression from a secret key database so as to obtain all the secret keys of the service life. The invention also relates to a secret key generation system using the above method. A ciphertext obtained through using the encryption mode can not be decoded. The secret key is generated according to the time grade so that the secret key is irreversible on the aspect of the time grade. Therefore, reliability and safety of the secret key are increased.

Description

technical field [0001] The present invention relates to an encryption technology, in particular to a method and system for generating a key with an expiration date. Background technique [0002] The use of keys is becoming more and more common, and the fields and purposes of use are becoming more and more extensive. Taking software authorization as an example, authorized software generally has a certain period of use, beyond which the software cannot be used. At present, there are many ways to control the validity period of the key, such as increasing the hardware clock counter to prevent users from maliciously changing the system time or using a virtual machine to set the time, so as to avoid extending the key period of use. This method of directly managing the time itself to realize the management and control of the validity period of the key has the defects of high hardware cost and high tamper-proof requirements. [0003] Therefore, how to ensure the security of the ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 赵明
Owner 刘奇
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products