Method for restoring encrypted information in encryption card

A technology for encrypting information and implementing methods, applied in the field of encrypted cards, can solve the problems of inability to decrypt sensitive data, administrators unable to log in to start the encrypted card, unable to use data, etc.

Active Publication Date: 2011-04-06
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps keep an encrypting device working properly by allowing two or more users update their keys with each other without updating any important parts like passwords.

Problems solved by technology

This technical problem addressed by this patented technology relates to improving secure access control systems against managing secret passwords on electronic devices like smartphones. These programs require users' personal identification numbers (PINs) along their usernames when accessing them over networks like internet connections. However, current methods have limitations where only one person can open up all accounts at once without being able to verify if someone else uses another account. Additionally, existing solutions involve storing different types of PIN codes throughout memory within each device itself, making maintenance difficult due to large amounts of storage space required.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for restoring encrypted information in encryption card
  • Method for restoring encrypted information in encryption card
  • Method for restoring encrypted information in encryption card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] specific implementation plan

[0014] The method of the present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0015] Such as figure 1 As shown, if administrator A wants to update the protection key, he must first create a backup file senbak of the sensitive ciphertext information sen in the card; secondly, if figure 2 As shown, the administrator A reads the content of the sen file into the memory, we use S1 to identify it, decrypt S1 with the original protection key PK1, and obtain the plaintext data D1, and then administrator A saves the newly generated protection key PK2 in the IC card or In the USB Key, encrypt D1 with PK2 to get a new ciphertext S2, administrator A writes S2 into the file sen, overwrites the original content of sen, and identifies himself in the file attribute to update the file, so far administrator A has completed The update work of the protection key. Administrator B needs to use the

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for restoring encrypted information in an encryption card. Based on a backup mechanism, the method ensures that in an environment of a plurality of administrators, when one administrator updates a protection key in a card, the function that other administrators without updated protection keys still can descript sensitive data, start the service function of the encryption card and guarantee that the normal work of the encryption card is realized.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner DAWNING CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products