Method for storing cipher key

A key storage and key data technology, which is applied in the field of information security, can solve problems such as increasing the complexity of key management, achieve the effects of reducing complexity, improving security mechanisms, and preventing leakage and theft

Inactive Publication Date: 2009-08-19
HUAWEI TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Threshold cipher culture key management is suitable for applications that have special requirements for key recovery, but this key storage method will increase the complexity of key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing cipher key
  • Method for storing cipher key
  • Method for storing cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The overall design idea of ​​the key storage method of the present invention is: through simple transformation operation on the original key data, the distributed storage of key material information is realized, thereby improving the security management mechanism of the original key data.

[0048] refer to figure 1 , which is a brief process flowchart of the key storage method of the present invention, wherein the main steps of the key storage process of the present invention include:

[0049] Step S10, pre-setting the key data transformation algorithm; this key data transformation algorithm can be selected according to the specific situation, and a different algorithm can be selected for the transformation operation, such as an XOR operation algorithm can be selected, or a commonly used transformation algorithm based on a symmetric cryptosystem can be used .

[0050] Step S20, the original key data is generated by the key generator, where the original key data is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a key storage method, including the steps of presetting the key data transformation algorithm; generating the original key data by the key generator, and simultaneously generating several key data related to the original key data by the random sequence generator random number; use the set key data transformation algorithm to perform transformation operations on the original key data and related random numbers to obtain the transformed key data corresponding to the original key data; and convert the transformed key data and Each random number related to the original key data is stored in independent storage media. The key storage method of the present invention reduces the complexity of key storage in the prior art key management process, and improves the security mechanism of key storage.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key storage method. Background technique [0002] Key management is a key link in the key security system, and the entire life cycle of the key management process includes: [0003] The key registration network node obtains or creates initial key material through security measures and becomes an authorized member of the security domain; [0004] The key creation network node generates key material by itself or obtains key material from the trusted system components of the key management center, where the key material generally includes key data and corresponding algorithm information, etc.; [0005] The key storage network node stores the obtained key material in its own hard disk, ROM device, chip card, hardware token and other related storage media; [0006] The key distribution network node sends the obtained key data to other network nodes respectively, and the key dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/12H04L9/26
Inventor 范云松何迎春孙伊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products