Testing method of security of level-to-level management mode key management system

A technology of key management system and hierarchical management mode, which is applied to key distribution, can solve problems such as insufficient defense against system attacks, and achieve the effect of reducing security holes and improving security

Inactive Publication Date: 2012-07-11
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the currently widely used permission control method, that is, different organizations or personnel have different permissions for operations such as the generation, update, and use of different keys, plays a certain role in ensuring the security of keys, but with the continuous development of computer technology Improvement, only relying on the authority control method is not enough to prevent the system from possible attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Testing method of security of level-to-level management mode key management system
  • Testing method of security of level-to-level management mode key management system
  • Testing method of security of level-to-level management mode key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to have a more specific understanding of the technical content, characteristics and effects of the present invention, now in conjunction with the illustrated embodiment, the details are as follows:

[0024] The security testing method of the hierarchical management mode key management system in the embodiment of the present invention is mainly to test the security of the key management system in terms of key storage and transmission and security of key re-generation.

[0025] In the process of generating the next-level key from the upper-level key, when testing the security of key storage and transmission, first review the system design documents, from the perspective of system design, check whether the key is managed hierarchically, and The key is stored in a safe storage medium (that is, the corresponding key card), and the transmission mode of line protection (that is, cipher text with random number plus message authentication code MAC) is adopted for all key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a testing method of security of a level-to-level management mode key management system. The method comprises the following steps that: security of key storage and transmission is tested during a next-level key generation process; and security of repeated generation of a next-level key by a last-level key is tested. According to the security testing method of the key management system, from two perspectives of system design and system realization, security of key storage, key transmission and key repeated generation of the key management system employing a level-to-level management mode is tested; therefore, vulnerability that maybe exists in the key management system can be reduced; and security of an intelligent card application system can be improved.

Description

technical field [0001] The invention relates to a test technology of a key management system, in particular to a safety test method of a key management system in a hierarchical management mode. Background technique [0002] In the smart card project, the security of the application system depends on the security of the key, and the security control and management of the key is implemented by the Key Management System (KMS). [0003] The key management system in the hierarchical management mode mainly provides key production, storage, distribution and management services for production management and application services. Calculation rules are generated. For the relationship cards involved in the key management system of the hierarchical management mode and the relationship between each relationship card, please refer to figure 1 shown, including: [0004] Leader card, which stores the root key component and is used to generate the root key card; [0005] The root key car...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/26
Inventor 左捷符锐申晔
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products