Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Algorithm and key library generation and updating method

An update method and key store technology, which are applied in the field of algorithm key store generation and update, can solve the problems that data information cannot achieve high security, algorithm protocol identification, and low security, so as to increase the difficulty of cracking and improve security The effect of high sex and safety improvement

Active Publication Date: 2016-11-09
咪付(深圳)科技有限公司
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The management method of the security policy in the prior art is to set various solutions in each security policy, and to select and manage various stored security policies through a visual operation interface, so as to solve the algorithm key library switching And the updated problem, the storage medium adopted by the storage module of the security policy described in the above prior art is a magnetic disk, an optical disk, a read-only storage memory or a random storage memory, but the data information cannot meet the requirements of high security
A security policy configuration method is also disclosed in the prior art, which is to establish a security policy table according to each security element, use the determined security level and the current scene to determine the required algorithm protocol, and obtain the algorithm protocol in the security policy table, it can be seen that , the security level, current scene and algorithm protocol used in the security strategy of this method are all in a determined state, and its algorithm protocol is easily identified by attackers and leads to adverse consequences such as data information being intercepted, tampered with, forged, etc., and the security is relatively high. Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Algorithm and key library generation and updating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the examples, but the protection scope of the present invention is not limited to the following specific examples.

[0022] The new version of the algorithm key storehouse described in the embodiment of the present invention is generated by the initial version of the algorithm key storehouse, the increment factor and the PCode according to certain operation rules, and realizes real-time update, and the algorithm key storehouse can be according to the process Synchronize or enable the rule, and receive the feedback result of synchronization and activation. The state of the algorithm keystore is one or more of disabled, synchronizing, synchronizing, enabling, enabled, and deactivated. Further In other words, data that is not enabled or disabled in the stated status will be periodically deleted by the system.

[0023] This embodiment provides a method for generating and updating an algorithm keystore...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an algorithm and key library generation and updating method, and belongs to the technique of computer network communication and the field of information security. The method comprises the steps of generating an algorithm and key library through configuration of a safe management system, wherein the algorithm and key library is composed of an algorithm serial number, an algorithm, a key serial number, a key and a strategy identifier; calculating an increment factor according to the algorithm and key library and the initial version of the algorithm and key library, and issuing the increment factor to an encryption / decryption server; and generating the new version of the algorithm and key library by the encryption / decryption server through PCode operation according to the increment factor and the initial version of the algorithm and key library. The initial version of the algorithm and key library provided by the method is encrypted and then is stored in a database, the security is high and the storage quantity is high. According to the method, the increment factor can be generated randomly; the algorithm and key library can be updated flexibly; the algorithm and key library is safe and reliable; even if a key is intercepted by an attacker; data information contents will not be leaked; the cracking difficulty is increased; the security of data information transmission and user privacy is improved; and the method is high in popularization and implementation value.

Description

technical field [0001] The invention relates to the fields of computer network communication technology and information security, in particular to a method for generating and updating an algorithm key storehouse. Background technique [0002] With the wide application of computer networks, the importance of network information security has become increasingly prominent, and the issue of computer information security is becoming more and more important. Whether it is personal information communication or e-commerce development, it is urgent to ensure the security of information transmission on the Internet. User information security needs to be ensured. [0003] The management method of the security policy in the prior art is to set various solutions in each security policy, and to select and manage various stored security policies through a visual operation interface, so as to solve the algorithm key library switching And the newer problem, the storage medium used in the st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0891
Inventor 代豪杨绍军梁景策梁安宁
Owner 咪付(深圳)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products