CN102377564A - Method and device for encrypting private key - Google Patents

Method and device for encrypting private key Download PDF

Info

Publication number
CN102377564A
CN102377564A CN2011103610759A CN201110361075A CN102377564A CN 102377564 A CN102377564 A CN 102377564A CN 2011103610759 A CN2011103610759 A CN 2011103610759A CN 201110361075 A CN201110361075 A CN 201110361075A CN 102377564 A CN102377564 A CN 102377564A
Authority
CN
China
Prior art keywords
key
private key
private
encrypted
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103610759A
Other languages
Chinese (zh)
Other versions
CN102377564B (en
Inventor
邵官阁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110361075.9A priority Critical patent/CN102377564B/en
Publication of CN102377564A publication Critical patent/CN102377564A/en
Application granted granted Critical
Publication of CN102377564B publication Critical patent/CN102377564B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention provides a method and a device for encrypting a private key. The method for encrypting the private key comprises the following steps of: generating a key according to a key material by a preset symmetric key generating algorithm, encrypting a private key according to the key by a preset encryption algorithm, generating and storing an encrypted private key, and deleting the key and the private key. The device for encrypting the private key comprises a first key generating unit and a private key encrypting unit. The first key generating unit is used for generating the key according to the key material by the preset symmetric key generating algorithm. The private key encrypting unit is used for encrypting the private key according to the key by the preset encryption algorithm, generating and storing the encrypted private key and deleting the key and the private key. According to the method and the device for encrypting the private key, security of the private key is realized, additional security equipment is not needed, and the cost of the equipment can be reduced at the same time of improving the security of the private key.

Description

The encryption method of private key and device
Technical field
The embodiment of the invention relates to information security technology, relates in particular to a kind of encryption method and device of private key.
Background technology
Along with development of internet technology, people's network activity is more and more frequent, and the security requirement of information is also just increasingly high in the thing followed network transmission process.Information encryption is the core technology of information security, and so-called the encryption converts the readable information that calls " expressly " to the process of " ciphertext " exactly, and deciphering then is the process that reverts to " expressly " to " ciphertext ".Rivest, shamir, adelman is meant that as one of AES commonly used ciphering process and decrypting process use the cryptographic algorithm of two different keys.The encryption key that is used for enciphered message is made public, and is called PKI, and the decruption key that is used for decryption information is preserved by deciphering people secret, is called private key.
The key of rivest, shamir, adelman is exactly a private key, guarantees the fail safe of private key, could guarantee the fail safe of whole encryption system.In the prior art, in order to guarantee the fail safe of private key, available employing hardware-based cryptographic for example is kept at private key in usb key (Universal Serial BUS Key the is called for short USB Key) equipment, and USB Key equipment is hardware device independently.But be to use usb key device storage private key must increase cost, and also there is safety issue in usb key equipment.
Summary of the invention
The embodiment of the invention provides a kind of encryption method and device of private key, with the fail safe of realization private key, and need not extra increase safety means, improves the convenience that the private key fail safe realizes.
The embodiment of the invention provides a kind of encryption method of private key, comprising:
Generate key according to key material through preset symmetric key generating algorithm;
Private key is encrypted through preset AES according to said key, generated private key and storage after encrypting, with said key and the deletion of said private key.
The embodiment of the invention provides a kind of encryption device of private key, comprising:
The first key generation unit is used for generating key according to key material through preset symmetric key generating algorithm;
The encrypted private key unit is used for private key being encrypted through preset AES according to said key, generates private key and storage after encrypting, with said key and the deletion of said private key.
Can know by technique scheme; The encryption method of the private key that the embodiment of the invention provides and device; Generate key according to key material through preset symmetric key generating algorithm, through preset AES private key is encrypted, generate private key and storage after encrypting according to said key; With said key and the deletion of said private key, realize the fail safe of private key.The embodiment of the invention need not extra increase safety means, can when improving the private key fail safe, reduce equipment cost.Because be used for the key of encrypted private key is just generated when needs use this key, after accomplishing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and have avoided the safety problem of fixed key storage.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art; To do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply; Obviously, the accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills; Under the prerequisite of not paying creative work property, can also obtain other accompanying drawing according to these accompanying drawings.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the invention;
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the invention;
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the invention;
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the invention.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
The encryption method flow chart of a kind of private key that Fig. 1 provides for the embodiment of the invention.As shown in Figure 1, in information security was used, the user encrypted information through the private key in the subscriber equipment, and the message transmission after will encrypting is again given other users, with the fail safe of guarantee information in transmission course.The encryption method of the private key that present embodiment provides specifically can be applied in the information security technology handling process to private key, to improve the fail safe of private key.The encryption method of the private key that present embodiment provides is specifically carried out by encryption device, and this encryption device specifically can be integrated in through private key and information carried out also can be provided with separately in the subscriber equipment of encryption.
The encryption method of the private key that present embodiment provides specifically comprises:
Step 10, generate key through preset symmetric key generating algorithm according to key material.
Particularly, said key material is the material that is used to generate key, and this key material can be provided with arbitrarily, and the requirement that meets preset symmetric key generating algorithm gets final product.That should preset the symmetric key generating algorithm can come concrete the setting according to the information security sexual needs of reality.
Can encrypt private key through the key that said preset symmetric key generating algorithm generates according to this, also can decipher the private key after encrypting according to this key.
Step 20, through preset AES private key is encrypted, generated private key and storage after encrypting, said key and the deletion of said private key according to said key.
Alternatively, said preset AES is specially symmetric encipherment algorithm, can comprise DEA (Data Encryption Algorithm, vehicle economy A), Advanced Encryption Standard (Advanced Encryption Standard is called for short AES) etc.Preset AES also can come concrete the setting according to the information security sexual needs of reality, does not exceed with present embodiment.
According to key private key is encrypted, generated private key and storage after encrypting, again with this key that generates in the step 10 and original private key deletion.Only store the private key after the encryption in the encryption device; And do not store original private key and be used for the key to this encrypted private key, therefore, even the private key after encrypting is obtained by the hacker; The hacker also can't decipher the private key after this encryption, can guarantee the fail safe of private key.When in information interactive process, in the time of need using this private key information is encrypted, again the private key after this encryption is carried out corresponding decryption processing, handle to carry out follow-up information encryption through this private key that obtains.
The encryption method of the private key that present embodiment provides; Generate key according to key material through preset symmetric key generating algorithm; Private key is encrypted through preset AES according to said key; Generate private key and storage after encrypting,, realize the fail safe of private key said key and the deletion of said private key.The embodiment of the invention need not extra increase safety means, can when improving the private key fail safe, reduce equipment cost.Because be used for the key of encrypted private key is just generated when needs use this key, after accomplishing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and have avoided the safety problem of fixed key storage.
The encryption method flow chart of the another kind of private key that Fig. 2 provides for the embodiment of the invention.As shown in Figure 2, the encryption method of the private key that present embodiment provides specifically can also comprise the steps: on the basis of the said embodiment of Fig. 1
Step 30, when receiving the enciphering request that carries information to be encrypted, generate said key according to said key material through said preset symmetric key generating algorithm.
This encryption device specifically can also be carried out the operation of data message being encrypted through private key.Particularly, said enciphering request specifically can be treated the request that enciphered message is encrypted in order to indication for what the user imported, also can be for treating the request that enciphered message is encrypted by what other functional units sent in order to indication in the business information processing procedure.Specifically can carry information to be encrypted in this enciphering request.When this encryption device receives this enciphering request, generate said key through preset symmetric key generating algorithm according to key material.Key material is identical with key material in the step 10, and preset symmetric key generating algorithm is also identical with preset symmetric key generating algorithm in the step 10, and generation is used for that private key is carried out encrypted secret key is also identical in the key that generates thus and the step 10.Therefore, can decipher the private key after encrypting through this key.
Step 40, decipher, generate said private key, said key deletion according to the private key of said key after to said encryption.
Just obtain said private key after private key after encrypting deciphered, again with the key deletion that generates in the step 30.
Step 50, said information to be encrypted is encrypted, with said private key deletion according to said private key.
After treating enciphered message and carry out encryption according to this private key, with this private key deletion, the information after will encrypting then returns to the functional unit of asking cryptographic operation, so that follow-up information processing again.
Because being used for the key that the private key after encrypting is deciphered also is dynamically to generate; Just deletion when accomplish through this key after to the decryption oprerations of the private key after encrypting; And also just deletion after the cryptographic operation of enciphered message is treated in completion of thus obtained private key; Still only preserve the private key after encrypting in the encryption device, the fail safe that has further improved private key.
Alternatively, in the present embodiment, step 10 generates key according to key material through preset symmetric key generating algorithm, comprising:
Said key material is carried out hash calculation and/or 64 character codes, generate said key.
Particularly, said key material can be preset character string, and PKI that also can said private key is corresponding is as key material, and the setting of key material is not exceeded with present embodiment to meet hash calculation and 64 character codes require to get final product.64 character codes (Base64) are the coding method based on 64 characters; Can carry out Hash (Hash) to said key material and calculate the said key of generation, also can carry out 64 character codes and generate said key, can also carry out successively generating said key after above-mentioned two kinds of operations said key material to said key material; Operating sequence can for hash calculation preceding; 64 character codes after, also can for 64 based encodes preceding, hash calculation after.Hash calculation and 64 character code computational efficiencies can improve the speed that key generates all than higher.The selection of preset symmetric key generating algorithm is not exceeded with present embodiment.
Alternatively, in the present embodiment, step 10 generates key according to key material through preset symmetric key generating algorithm, specifically can comprise:
PKI that will be corresponding with said private key generates said key according to said PKI through said preset symmetric key generating algorithm as said key material.
In the information security of reality was used, private key and PKI normally occurred in pairs.Therefore, the PKI that said private key is corresponding not only can improve the reliability of key material, and can improve the convenience of realization as said key material.
In the present embodiment, generate said key through said preset symmetric key generating algorithm, specifically can comprise the steps: according to said PKI
The partial content of said PKI is generated said key through said preset symmetric key generating algorithm.
Because the data message that comprises in the PKI is many, the basis that generates said key is the partial content of said PKI, and the characteristic information that calculates said PKI according to the partial content of said PKI is as said key.Even then said PKI is obtained by the hacker, the hacker has no way of also knowing that the basis that generates as key is which partial content in the PKI, the fail safe that has further improved private key.The partial content of said PKI can come concrete the setting according to the action need of reality, also can not exceed with present embodiment with the full content of PKI as the basis that generates said key.
Below be example with PKI (Public Key Infrastructure, PKIX) system, the encryption method of the private key that present embodiment is provided is elaborated.
At PKI (Public Key Infrastructure; PKIX) in the system, adopts the digital certificate management PKI, through authentication center of third-party trusted mechanism; Bundle other identity informations of user's PKI and user, form digital certificate.Digital certificate format and certificate content are followed X.509 standard, and it is that online identity of entity proves, prove the legitimacy of a certain entity identities and PKI and the binding relationship of entity and PKI.Digital certificate specifically can comprise: information such as the information of sequence number, client public key, user subject information, visa mechanism, the signature of visa mechanism, validity period of certificate.
User's digital certificate and private key are stored in the encryption device usually in the lump, and encryption device can be with the PKI in the digital certificate as key material, and the specified portions content of PKI is generated key after through hash calculation and 64 character codes.Private key is encrypted through preset AES according to this key, generated private key and storage after encrypting, and with this key and private key deletion.It is the private key after storing digital certificate in the encryption device and encrypting.
When this secret device receives the enciphering request that carries information to be encrypted; According to the specified portions content hash of PKI in the said digital certificate calculate and 64 character codes after generate key; According to this key the private key after encrypting is deciphered, generated private key, and with this key deletion.Treat enciphered message according to this private key and encrypt, with this private key deletion, and the information after will encrypting returns to the main body of this enciphering request of transmission, promptly accomplished the ciphering process to interactive information after accomplish encrypting.In this process, the key that is used to decipher is interim the generation, and key and private key are all deleted after finishing using, and the private key after only preserving digital certificate in the encryption device and encrypting has guaranteed the fail safe of private key.
The encryption device structural representation of a kind of private key that Fig. 3 provides for the embodiment of the invention.As shown in Figure 3, the encryption device of the private key that present embodiment provides specifically can be realized each step of the encryption method of the private key that any embodiment of the present invention provides, and this repeats no more.The encryption device of the private key that present embodiment provides specifically can be realized through the form of software and hardware.
The encryption device of the private key that present embodiment provides specifically comprises the first key generation unit 11 and encrypted private key unit 12.The first key generation unit 11 is used for generating key according to key material through preset symmetric key generating algorithm.Encrypted private key unit 12 is used for private key being encrypted through preset AES according to said key, generates private key and storage after encrypting, with said key and the deletion of said private key.
The encryption device of the private key that present embodiment provides; The first key generation unit 11 generates key according to key material through preset symmetric key generating algorithm; Encrypted private key unit 12 is encrypted private key through preset AES according to said key; Generate private key and storage after encrypting,, realize the fail safe of private key said key and the deletion of said private key.And the embodiment of the invention need not extra increase safety means, can when improving the private key fail safe, reduce equipment cost.Because be used for the key of encrypted private key is just generated when needs use this key, after accomplishing the cryptographic operation to private key according to this key, this key and private key are not all preserved, and have avoided the safety problem of fixed key storage.
The encryption device structural representation of the another kind of private key that Fig. 4 provides for the embodiment of the invention.As shown in Figure 4, in the present embodiment, the encryption device of this private key specifically can also comprise the second key generation unit 13, private key generation unit 14 and information encryption unit 15.The second key generation unit 13 is used for when receiving the enciphering request that carries information to be encrypted, generates said key according to said key material through said preset symmetric key generating algorithm.Private key generation unit 14 is used for deciphering according to the private key of said key after to said encryption, generates said private key, with said key deletion.Information encryption unit 15 is used for according to said private key said information to be encrypted being encrypted, with said private key deletion.
Setting through the said second key generation unit 13, private key generation unit 14 and information encryption unit 15; The encryption of enciphered message is treated in realization; In this implementation procedure; Because the key that is used for the private key after encrypting is deciphered also just generates when needs use this key, just deletion when accomplish through this key after to decryption oprerations of the private key after encrypting, and also thus obtained private key is also just deleted after the cryptographic operation of enciphered message is treated in completion; Still only preserve the private key after encrypting in the encryption device of private key, the fail safe that has further improved private key.
In the present embodiment, the said first key generation unit 11 specifically can also be used for said key material is carried out hash calculation, 64 character codes or hash calculation and 64 character codes, generates said key.Because hash calculation and 64 character code computational efficiencies all than higher, can improve the speed that key generates.
In the present embodiment, the said first key generation unit 11 also is used for the PKI corresponding with said private key generating said key according to said PKI through said preset symmetric key generating algorithm as said key material.Because private key and PKI normally occur in pairs, the PKI that said private key is corresponding not only can improve the reliability of key material, and can improve the convenience of realization as said key material.
In the present embodiment, the said first key generation unit 11 also is used for the partial content of said PKI is generated said key through said preset symmetric key generating algorithm.Because the data message that comprises in the PKI is many; The basis that generates said key is the partial content of said PKI; Even then said PKI is obtained by the hacker, the hacker has no way of also knowing that the basis that generates as key is which partial content in the PKI, the fail safe that has further improved private key.
The encryption method of the private key that the embodiment of the invention provides and device can solve the private key problem how safety is preserved in equipment.The encryption method of the private key that the embodiment of the invention provides and device need not increase extra hardware, and restarting at equipment does not need manual intervention yet when startup recovers private key.And the key of encryption key just calculates generation when needs use this key, and the problem that does not exist encryption key safety to preserve has improved the convenience that the private key fail safe realizes greatly.Key material that in implementation procedure, is adopted and preset symmetric key generating algorithm, and all can select flexibly the AES of private key, applicability and extensibility are all more intense, and realize simply, are easy to promote.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.

Claims (10)

1. the encryption method of a private key is characterized in that, comprising:
Generate key according to key material through preset symmetric key generating algorithm;
Private key is encrypted through preset AES according to said key, generated private key and storage after encrypting, with said key and the deletion of said private key.
2. the encryption method of private key according to claim 1 is characterized in that, said method also comprises:
When receiving the enciphering request that carries information to be encrypted, generate said key through said preset symmetric key generating algorithm according to said key material;
Decipher according to the private key of said key after, generate said private key, with said key deletion said encryption;
According to said private key said information to be encrypted is encrypted, with said private key deletion.
3. the encryption method of private key according to claim 1 and 2 is characterized in that, saidly generates key according to key material through preset symmetric key generating algorithm, comprising:
PKI that will be corresponding with said private key generates said key according to said PKI through said preset symmetric key generating algorithm as said key material.
4. the encryption method of private key according to claim 3 is characterized in that, saidly generates said key according to said PKI through said preset symmetric key generating algorithm, comprising:
The partial content of said PKI is generated said key through said preset symmetric key generating algorithm.
5. the encryption method of private key according to claim 1 and 2 is characterized in that, saidly generates key according to key material through preset symmetric key generating algorithm, comprising:
Said key material is carried out hash calculation, 64 character codes or hash calculation and 64 character codes, generate said key.
6. the encryption device of a private key is characterized in that, comprising:
The first key generation unit is used for generating key according to key material through preset symmetric key generating algorithm;
The encrypted private key unit is used for according to said key private key being encrypted, and generates private key and storage after encrypting, with said key and the deletion of said private key.
7. the encryption device of private key according to claim 6 is characterized in that, also comprises:
The second key generation unit is used for when receiving the enciphering request that carries information to be encrypted, generates said key according to said key material through said preset symmetric key generating algorithm;
The private key generation unit is used for deciphering through the private key of preset AES after to said encryption according to said key, generates said private key, with said key deletion;
The information encryption unit is used for according to said private key said information to be encrypted being encrypted, with said private key deletion.
8. according to the encryption device of claim 6 or 7 described private keys; It is characterized in that: the said first key generation unit also is used for the PKI corresponding with said private key generating said key according to said PKI through said preset symmetric key generating algorithm as said key material.
9. the encryption device of private key according to claim 8 is characterized in that, the said first key generation unit also is used for the partial content of said PKI is generated said key through said preset symmetric key generating algorithm.
10. according to the encryption device of claim 6 or 7 described private keys, it is characterized in that: the said first key generation unit also be used for to said key material carry out, 64 character codes or hash calculation and 64 character codes, generate said key.
CN201110361075.9A 2011-11-15 2011-11-15 Method and device for encrypting private key Expired - Fee Related CN102377564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110361075.9A CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110361075.9A CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Publications (2)

Publication Number Publication Date
CN102377564A true CN102377564A (en) 2012-03-14
CN102377564B CN102377564B (en) 2015-03-11

Family

ID=45795590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110361075.9A Expired - Fee Related CN102377564B (en) 2011-11-15 2011-11-15 Method and device for encrypting private key

Country Status (1)

Country Link
CN (1) CN102377564B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857889A (en) * 2012-09-12 2013-01-02 中兴通讯股份有限公司 Method and device for encrypting short messages
CN103488958A (en) * 2012-06-20 2014-01-01 微软公司 Managing use of field programmable gate array with isolated components
CN104270242A (en) * 2014-09-27 2015-01-07 杭州电子科技大学 Encryption and decryption device used for network data encryption transmission
US9298438B2 (en) 2012-06-20 2016-03-29 Microsoft Technology Licensing, Llc Profiling application code to identify code portions for FPGA implementation
US9424019B2 (en) 2012-06-20 2016-08-23 Microsoft Technology Licensing, Llc Updating hardware libraries for use by applications on a computer system with an FPGA coprocessor
CN106487509A (en) * 2016-11-09 2017-03-08 北京信安世纪科技有限公司 A kind of method for generating key and host equipment
CN106549754A (en) * 2016-11-24 2017-03-29 北京爱接力科技发展有限公司 The method and apparatus of management key
CN106656503A (en) * 2016-10-13 2017-05-10 上海众人网络安全技术有限公司 Key storage method, data encryption and decryption method, electronic signature method and devices thereof
CN106778205A (en) * 2015-10-28 2017-05-31 德州仪器公司 Verified with the no data storehouse of physics unclonable function
CN107359993A (en) * 2017-08-29 2017-11-17 国家电网公司 A kind of power information collection safety protecting method and system based on quantum cryptography
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN108141367A (en) * 2015-09-30 2018-06-08 微软技术许可有限责任公司 Code signing service
CN108471352A (en) * 2018-03-16 2018-08-31 数安时代科技股份有限公司 Processing method, system, computer equipment based on distributed private key and storage medium
CN108494551A (en) * 2018-03-16 2018-09-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on collaboration key
CN109525396A (en) * 2018-09-30 2019-03-26 华为技术有限公司 A kind of processing method, device and the server of identity code key
CN109547201A (en) * 2018-12-14 2019-03-29 平安科技(深圳)有限公司 A kind of encryption method of root key, computer readable storage medium and terminal device
CN110838909A (en) * 2019-10-09 2020-02-25 核芯互联科技(青岛)有限公司 Encryption and decryption method and system for key file
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium
WO2020076234A1 (en) * 2018-10-12 2020-04-16 Aioz Pte Ltd Apparatus and method for controlling data access
WO2021129557A1 (en) * 2019-12-23 2021-07-01 华为技术有限公司 File encryption method and related apparatus
CN114531236A (en) * 2022-03-02 2022-05-24 杭州华澜微电子股份有限公司 Key processing method and device and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107359994A (en) * 2017-07-19 2017-11-17 国家电网公司 The integrated encryption device that a kind of quantum cryptography blends with classical password

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040042620A1 (en) * 2002-09-03 2004-03-04 Andrews Richard F. Method and system of securely escrowing private keys in a public key infrastructure
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101778381A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Digital certificate generation method, user key acquisition method, mobile terminal and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040042620A1 (en) * 2002-09-03 2004-03-04 Andrews Richard F. Method and system of securely escrowing private keys in a public key infrastructure
CN101447870A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Safe storage method of private key based on technology of distributed password
CN101778381A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Digital certificate generation method, user key acquisition method, mobile terminal and device

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488958A (en) * 2012-06-20 2014-01-01 微软公司 Managing use of field programmable gate array with isolated components
US9230091B2 (en) 2012-06-20 2016-01-05 Microsoft Technology Licensing, Llc Managing use of a field programmable gate array with isolated components
US9298438B2 (en) 2012-06-20 2016-03-29 Microsoft Technology Licensing, Llc Profiling application code to identify code portions for FPGA implementation
US9424019B2 (en) 2012-06-20 2016-08-23 Microsoft Technology Licensing, Llc Updating hardware libraries for use by applications on a computer system with an FPGA coprocessor
CN108595985A (en) * 2012-06-20 2018-09-28 微软技术许可有限责任公司 Manage the use of the field programmable gate array with barrier assembly
CN102857889A (en) * 2012-09-12 2013-01-02 中兴通讯股份有限公司 Method and device for encrypting short messages
CN104270242B (en) * 2014-09-27 2017-12-19 杭州电子科技大学 A kind of ciphering and deciphering device for network data encryption transmission
CN104270242A (en) * 2014-09-27 2015-01-07 杭州电子科技大学 Encryption and decryption device used for network data encryption transmission
CN108141367A (en) * 2015-09-30 2018-06-08 微软技术许可有限责任公司 Code signing service
CN106778205A (en) * 2015-10-28 2017-05-31 德州仪器公司 Verified with the no data storehouse of physics unclonable function
CN106656503A (en) * 2016-10-13 2017-05-10 上海众人网络安全技术有限公司 Key storage method, data encryption and decryption method, electronic signature method and devices thereof
CN106656503B (en) * 2016-10-13 2019-09-24 上海众人网络安全技术有限公司 Method for storing cipher key, data encryption/decryption method, electric endorsement method and its device
CN106487509B (en) * 2016-11-09 2019-01-29 北京信安世纪科技股份有限公司 A kind of method and host equipment generating key
CN106487509A (en) * 2016-11-09 2017-03-08 北京信安世纪科技有限公司 A kind of method for generating key and host equipment
CN106549754A (en) * 2016-11-24 2017-03-29 北京爱接力科技发展有限公司 The method and apparatus of management key
CN107359993A (en) * 2017-08-29 2017-11-17 国家电网公司 A kind of power information collection safety protecting method and system based on quantum cryptography
CN107819571A (en) * 2017-09-29 2018-03-20 广东中科南海岸车联网技术有限公司 The generation method and device of private key
CN108471352A (en) * 2018-03-16 2018-08-31 数安时代科技股份有限公司 Processing method, system, computer equipment based on distributed private key and storage medium
CN108494551A (en) * 2018-03-16 2018-09-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on collaboration key
CN108471352B (en) * 2018-03-16 2022-03-04 数安时代科技股份有限公司 Processing method, system, computer equipment and storage medium based on distributed private key
CN109525396A (en) * 2018-09-30 2019-03-26 华为技术有限公司 A kind of processing method, device and the server of identity code key
WO2020076234A1 (en) * 2018-10-12 2020-04-16 Aioz Pte Ltd Apparatus and method for controlling data access
CN109547201A (en) * 2018-12-14 2019-03-29 平安科技(深圳)有限公司 A kind of encryption method of root key, computer readable storage medium and terminal device
CN109547201B (en) * 2018-12-14 2023-04-14 平安科技(深圳)有限公司 Encryption method of root key, computer readable storage medium and terminal equipment
CN110838909A (en) * 2019-10-09 2020-02-25 核芯互联科技(青岛)有限公司 Encryption and decryption method and system for key file
CN110912920A (en) * 2019-12-03 2020-03-24 望海康信(北京)科技股份公司 Data processing method, apparatus and medium
WO2021129557A1 (en) * 2019-12-23 2021-07-01 华为技术有限公司 File encryption method and related apparatus
CN114531236A (en) * 2022-03-02 2022-05-24 杭州华澜微电子股份有限公司 Key processing method and device and electronic equipment
CN114531236B (en) * 2022-03-02 2023-10-31 杭州华澜微电子股份有限公司 Key processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN102377564B (en) 2015-03-11

Similar Documents

Publication Publication Date Title
CN102377564B (en) Method and device for encrypting private key
US10785019B2 (en) Data transmission method and apparatus
CN107086915B (en) Data transmission method, data sending end and data receiving end
US20110145576A1 (en) Secure method of data transmission and encryption and decryption system allowing such transmission
CN101515319B (en) Cipher key processing method, cipher key cryptography service system and cipher key consultation method
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
CN112929172A (en) System, method and device for dynamically encrypting data based on key bank
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN104821944A (en) Hybrid encrypted network data security method and system
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN108632296B (en) Dynamic encryption and decryption method for network communication
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN104200176A (en) System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN103036880A (en) Network information transmission method, transmission equipment and transmission system
CN102024123A (en) Method and device for importing mirror image of virtual machine in cloud calculation
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN105468940A (en) Software protection method and apparatus
CN104660590A (en) Cloud storage scheme for file encryption security
CN104396182A (en) Method of encrypting data
JP5324813B2 (en) Key generation apparatus, certificate generation apparatus, service provision system, key generation method, certificate generation method, service provision method, and program
WO2017126571A1 (en) Ciphertext management method, ciphertext management device, and program
CN109299618B (en) Quantum-resistant computing cloud storage method and system based on quantum key card
CN107342862B (en) Method and system for realizing key generation and protection by cloud plus-end triple-authority separation
Gunasekaran et al. A review on enhancing data security in cloud computing using rsa and aes algorithms

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150311

Termination date: 20181115