Data encryption key management method, system and terminal

A technology of data encryption key and encryption key, which is applied in the management method and system of data encryption key, encryption business management system and terminal field, and can solve problems such as poor independence of encryption business and repeated investment of CA

Inactive Publication Date: 2013-08-14
HUAWEI DIGITAL TECH SUZHOU
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Using the above encryption scheme, the enterprise needs to modify the interface of the enterprise's existing CA to connect with the above data encryption system, or re-purchase a CA that meets the above functions, which will cause repeated investment in the CA, and the encryption business is not independent. The cloud service provider needs to follow the Connect with CAs of various enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption key management method, system and terminal
  • Data encryption key management method, system and terminal
  • Data encryption key management method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0044] figure 1 It is a schematic structural diagram of a data encryption key management system according to an embodiment of the present invention. figure 1 The data encryption key management system includes an encryption service management system 110, a terminal A120 and a terminal B130. The above-mentioned terminal uses an electronic key to encrypt and protect the data encryption key, and the certificate of the electronic key is issued by a CA.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data encryption key management method, a system and a terminal. The method comprises the following steps: receiving a data encryption key escrow request sent by a first terminal, wherein the data encryption key escrow request carries a first encryption key, the first encryption key is obtained by encrypting a third encryption key with a second public key, the second public key is a public key of encryption equipment, and the third encryption key is the data encryption key of the first terminal; and saving the first encryption key. According to the embodiment of the invention, as the data encryption key of the terminal is escrowed to an encryption service management system, when the electronic encryption key of the terminal is lost, the data encryption key of the terminal can be restored through the encryption service management system, so that the encryption system of the terminal is decoupled from a CA (Certificate Authority), the problem of repeated investment of the CA is improved, and the independency of encryption service is enhanced.

Description

technical field [0001] Embodiments of the present invention relate to the field of information security, and more specifically, relate to a data encryption key management method and system, an encryption service management system, and a terminal. Background technique [0002] Cloud computing is a revolution in the development of information technology. It is characterized by dynamic allocation of computing and storage resources, which improves the efficiency of resource use and facilitates unified management of resources. However, in the cloud computing scenario, users relocate computing and storage resources to the cloud computing server provided by the operator, losing the security control of their data, which will lead to data security problems. For example, an administrator can mount any user's virtual disk to spy on user privacy. [0003] In order to improve the security of data in the cloud, operators provide an encryption scheme for data in the cloud. The encryption...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
Inventor 王鹏苏延刚
Owner HUAWEI DIGITAL TECH SUZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products