Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key backup and recovery method based on integrated encryption technology

A recovery method and encryption algorithm technology, applied in the field of information security, can solve problems such as imperfect key storage methods

Active Publication Date: 2020-05-08
FUDAN UNIV
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a key backup and recovery method based on integrated encryption technology, which balances security and ease of use. Users can set passwords with different security levels according to their own needs to solve the problem of existing key encryption. The problem of imperfect storage method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key backup and recovery method based on integrated encryption technology
  • Key backup and recovery method based on integrated encryption technology
  • Key backup and recovery method based on integrated encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. Implementation is carried out on the premise of the technical solution of the present invention, so that those skilled in the art can better understand the technical characteristics and functional characteristics of the present invention, but the protection scope of the present invention is not limited to the following examples.

[0034] In this embodiment, the encrypted key is stored in a third-party escrow institution, and the escrow institution provides key storage and recovery services. The custodian provides functions such as user registration, key backup, key recovery, and password change.

[0035] First, the custodian agency provides a registration interface. Users register an account with the custodian agency. The account contains an account number and password. With an account, they can use the key backup and key recovery functions of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and particularly relates to a key backup and recovery method based on an integrated encryption technology. The method comprises the following steps: configuring a security level, and configuring different encryption algorithms and the number of information required to be input by a user according to the corresponding security level; obtaining an encryption key according to the biological characteristic information and the private information of the user, and encrypting the key to be backed up and stored by the user through an encryption algorithm; storing the information generated by the integrated encryption; decrypting and recovering the key stored in an encrypted mode when the key needs to be used for decryption or signature; obtaining all initial key plaintexts and re-encrypting when the password needs to be modified; and re-storing the encrypted key to cover the old data and finish the password modification operation. Safety and usability are weighed by the method, a user sets passwords of different safety levels according to needs, and the problem that an existing key storage method is incomplete is solvedthrough an integrated encryption algorithm.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a key backup and recovery method. Background technique [0002] Modern cryptography is mainly divided into symmetric cryptography and asymmetric cryptography (also known as public key cryptography). The correctness and security of cryptographic algorithms depend on mathematical problems: large integer decomposition problems, discrete logarithm problems, elliptic curve discrete logarithms Problems, these problems are based on large integers for calculation. In the environment of rapid development of computer hardware, academic research and production environments, the length of a secure cryptographic key must be at least 128 bits, and 256 bits is more commonly used. The more bits, the higher the security strength. Enterprises and general users have to memorize a 256-bit key when they produce and use secure password products on a daily basis. For example, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0866H04L9/088H04L9/0894
Inventor 阚海斌张如意刘百祥张新鹏吴小川
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products