Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key management method and system

A key management and key technology, which is applied in the field of information security, can solve problems such as easy readout, fraudulent use of signatures, and insecure key generation mechanisms

Active Publication Date: 2011-04-13
FEITIAN TECHNOLOGIES
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, the disadvantages of the existing technology are: the key generation mechanism is not safe, and the key is stored in plain text in the smart key device, which is easy to be read out and the signature to be used fraudulently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management method and system
  • Secret key management method and system
  • Secret key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0181] This embodiment provides a key management method. In this embodiment, the smart key device is described using USBKey as an example. Through the process from power-on to application of the USB Key, the main key in the USB Key and explain the process of key generation, storage, use and destruction, and participate in figure 1 , specifically as follows:

[0182] Step 101, the USB Key is connected to the host computer and powered on;

[0183] Step 102, COS judges whether the USB Key is powered on for the first time, if yes, execute step 103, if not, execute step 104;

[0184] In this embodiment, COS (Chip Operating System) is an operating system in the card, which is stored in the ROM in the above-mentioned USB Key;

[0185] The method for COS to judge whether the USB Key is powered on for the first time is as follows: COS judges whether the data storage area of ​​the above USB Key is all 0 or all F, when the data storage area of ​​the USB Key is all 0 or all F, it means ...

Embodiment 2

[0329] This embodiment provides a key management method. In this embodiment, the smart key device is described using USBKey as an example. Through the process from power-on to application of the USB Key, the main key in the USB Key The process of generating, storing, using and destroying the key is described. It is different from embodiment 1. In this embodiment, the USB Key first judges the APDU type according to the received APDU, and then judges the usage status of the USBKey. Figure 4 ,details as follows:

[0330] Step 201, the USB Key is connected to the host computer and powered on;

[0331] Step 202: COS judges whether the USB Key is powered on for the first time, if yes, execute step 203, if not, execute step 204;

[0332] In this embodiment, COS (Chip Operating System) is an operating system in the card, which is stored in the ROM in the above-mentioned USB Key;

[0333] The method for COS to judge whether the USB Key is powered on for the first time is as follows:...

Embodiment 3

[0438] This embodiment provides a key management method. The process of key management includes multiple processes, mainly four processes of key generation, key storage, key use and key destruction. In the embodiment of the present invention , the smart key device is described by taking the USB Key as an example, and the management process of various keys in the USB Key is illustrated by taking the USB Key from power-on to the completion of the application of the USB Key as an example.

[0439] join Figure 5 ,Specific steps are as follows:

[0440] Step 301, the USB Key is connected to the host computer and powered on;

[0441] Step 302, COS judges whether the USB Key is powered on for the first time, if yes, execute step 303, if not, execute step 304;

[0442] In this embodiment, COS is an operating system in the card, which is stored in the ROM in the above-mentioned USB Key;

[0443] The method for COS to judge whether the USB Key is powered on for the first time is as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses key management method and system, belonging to the field of information safety. The method comprises the following steps of: generating a random number as a management key when an intelligent key device is electrified for the first time, wherein the management key can not be read out, and the intelligent key device is provided with a transmission key in advance; when receiving an APDU (Application Protocol Data Unit) for writing a master control key, deciphering by using the transmission key; encrypting the master control key by using the management key and then storing the encrypted master control key in the intelligent key device; deciphering the APDU by using the management key in the process of creating a file system; setting the intelligent key device into an application state after the process of creating the file system is ended; and erasing the management key when the intelligent key is ended.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key management method and system. Background technique [0002] A key is a parameter. Through the key and the encryption and decryption algorithm, it is possible to convert plaintext into ciphertext, or convert ciphertext into plaintext. Divided from encryption and decryption methods, keys can be divided into symmetric keys and asymmetric keys. Symmetric key encryption is also called private key encryption, that is, both parties sending and receiving data must use the same key to encrypt and decrypt plaintext. Decryption operation. Symmetric key encryption algorithms mainly include: DES, 3DES, IDEA, FEAL, BLOWFISH, etc. The public key is also called an asymmetric key. Everyone has a pair of unique keys: a public key (referred to as the public key) and a private key (referred to as the private key). The public key is public and the private key is kept secret by the individu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products