Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Key factor generation method of root key

A root key and key technology, applied in the field of information security cryptography, can solve problems such as danger, insecure key transmission, and insecurity, and achieve the effect of improving security and avoiding malicious use.

Inactive Publication Date: 2018-11-30
上海声联网络科技股份有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] On the other hand, when the leader changes, because the existing system works well and the cards are issued to users, it is often impossible to rebuild the key system. However, since the outgoing leader knows the root key factor, it will appear more Not safe, although the old leader handed over the password letter to the new leader, this factor is still known to the old leader, which is very dangerous
[0007] 2. The hidden danger of key transmission
[0008] Usually, the operation and maintenance personnel of the parent company have the authority to read and write the equipment electronic tags of the parent company and all subsidiaries, while the operation and maintenance personnel of the subsidiary company can only read and write the equipment electronic labels of their own company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key factor generation method of root key
  • Key factor generation method of root key
  • Key factor generation method of root key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] In this embodiment, three levels of equipment asset management are taken as an example to illustrate the application process of the method of the present invention. When there are more levels, the application idea is the same. The SAM card that controls the read and write permissions of asset electronic tags is placed in the readers held by the operation and maintenance personnel at each level. The SAM card can read and write the electronic tags of the current level and the lower level, but cannot read and write the electronic tags of the upper level. The important basic information commonly used in the operation and maintenance of the equipment is placed in each equipment asset electronic label, including the configuration information of the network to which the equipment belongs, the manufacturer information of the equipment, and the past operation and maintenance records of the equipment.

[0046] In this embodiment, the equipment asset electronic tags of a typical en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key factor generation method of a root key. Key factors are generated one by one by a key factor generation device and are input into an encryption machine, the key factor generation device comprises an opaque rectangular box, a first axle and a second axle are arranged in the rectangular box side by side, a paper tape coil printed with continuous characters is installedon the first axle, a starting end of the paper tape coil is wound on the second axle, a first button and a second button, and a first hole and a second hole aligned to the upper side of the first axle are arranged on a top face of the rectangular box, the first hole just exposes one character on the paper tape coil, and the second hole exposes a blank part between the character aligned to the first hole and the next character. Compared with the prior art, the method provided by the invention has the advantages that the sufficient randomness of the key factors of the root key is determined bymultiple randomness, it can be ensures that the root key and all keys are established without anyone knowing the factor values, and meanwhile a mechanism is provided to guarantee that the root key canbe rebuilt when a disaster occurs.

Description

technical field [0001] The invention relates to the technical field of information security encryption, in particular to a method for generating key factors of a root key. Background technique [0002] In recent years, the application of smart cards has become more and more extensive, and with the continuous improvement of semiconductor technology, the chip can be packaged smaller and thinner, and the cost is also continuously reduced. Therefore, electronic tags have been widely used, such as in commodity To prevent counterfeit and shoddy products in the circulation link, there is a system that uses electronic tags for commodity traceability. For the equipment asset management of large enterprises with multiple management levels or national enterprises with many subsidiaries, how to carry out equipment operation and maintenance management business efficiently and safely is very important. For example, the operation and maintenance personnel of the parent company have the au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0863H04L9/0869H04L9/3297
Inventor 林景明杨小林
Owner 上海声联网络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products