Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private key processing method based on SM2 algorithm, terminal and key center

A processing method and private key technology, applied in the field of information security

Active Publication Date: 2019-10-29
JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a private key processing method, terminal and key center based on the SM2 algorithm, which solves the security protection problem of the private key in the open environment in the prior art, and realizes the private key processing method under the virtualization technology system. Decentralized protection throughout the lifecycle of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key processing method based on SM2 algorithm, terminal and key center
  • Private key processing method based on SM2 algorithm, terminal and key center
  • Private key processing method based on SM2 algorithm, terminal and key center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0041] The embodiment of the present invention is based on the SM2 elliptic curve public key algorithm. In order to facilitate understanding of the symbols or terms in the embodiment of the present invention, an explanation is given below:

[0042] E(F q ): F q The set of all rational points (including the point O at infinity) on the upper elliptic curve E;

[0043] f q : a finite field containing q elements;

[0044] O: A special point on the elliptic curve, called the infinity point or zero point, is the identity element of the additive group of elliptic curves;

[0045] G: A base point of an elliptic curve whose order is a prime number;

[0046] Hash():...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, discloses a private key processing method based on an SM2 algorithm, a terminal and a key center, and solves the security protection problem of a private key in an open environment in the prior art. The method is applied to a key center, and comprises the following steps: receiving a key application message of a client, the keyapplication message comprising a key identifier and a first private key factor of the client; obtaining a private key corresponding to the key identifier according to a key generation rule; obtaininga second private key factor according to a private key corresponding to the key identifier and the first private key factor; and sending the second private key factor to a server, so that the server encrypts and stores the second private key factor. The embodiment of the invention is suitable for the decentralized storage and use process of the private key in the open environment.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a private key processing method based on the SM2 algorithm, a terminal and a key center. Background technique [0002] With the development of network technology, especially the rise of the Internet of Things, the security requirements for mobile terminals, embedded terminals and sensor terminals are strong, and traditional U-shields, smart IC cards and other security passwords cannot be used on these Internet of Things terminals The chip is a supported hardware encryption product. In recent years, the industry has proposed a non-hardware solution to adapt to the compatibility of terminal diversity in the Internet of Things field, and uses virtualization technology to realize the equivalent security function of a secure cryptographic chip. However, virtualization technology is almost equivalent to U-shield in function, but there is a greater security risk in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0869H04L9/0866H04L9/0894H04L9/0822H04L9/0825H04L9/3252H04L63/06
Inventor 段志勇李维刚卜异亚南相浩
Owner JIN SHANG BO CHUANG BEIJING SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products