System and method for generating and managing secret key

A key generation and key technology, applied in the field of information security

Active Publication Date: 2014-02-12
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF6 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a method and system for key generation and management, which solves the problem of key generation and managem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for generating and managing secret key
  • System and method for generating and managing secret key
  • System and method for generating and managing secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Embodiments of the present invention provide a method and device for a key management system. In this embodiment, a smart card is used as a secure hardware device, and the specific methods include:

[0070] When the system starts up, check whether the two card readers are connected correctly and whether the encryption machine is connected correctly, otherwise it will provide an error message and exit the system after providing the error message.

[0071] The configuration information of the encryption machine used in the system is stored in the database.

[0072] When the system starts, check whether the system administrator card is inserted in the card reader (including whether it is connected, whether it is the required card in the system, and whether the PIN has been locked), otherwise it will provide an error message and allow the operator to try again or not Exit system. During this self-test process, the following abnormal situations may occur:

[0073] (1) The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and method for generating and managing a secrete key. When the system is started, identity recognition is carried out through an intelligent device. A plurality of sets of initial data are input and are mutually independent, and the initial data are stored in a safety hardware device which has the anti-fake and anti-decoding functions. A system root secrete key is generated through the safety hardware device according to a computation rule, and is encrypted to be stored in the safety hardware device. The root secrete key is dispersed through secrete key scattering factors to obtain the needed application secrete key. The application secrete key is stored in the safety hardware device, and the root secrete key is restored from the safety hardware device. In the whole system, the plaintext numerical value of the secrete key is only stored in the safety hardware device. Before having access to all safety hardware devices, the system identifies the true or fake of the safety devices. Operators are recognized by the system in the procedures of starting and operating. The generating rule of the secrete key cannot be known by laymen. The secret key data needed in the operation process exist in a cryptograph form. The system is high in safety.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a system and method for key generation and management. Background technique [0002] The key generation and management system (hereinafter referred to as the key management system) is widely used in the field of information security and is one of the basic systems of information security in modern society. In various fields where keys are used, all keys in the entire system need to be obtained through different levels of key distribution processes. In this process, the top key, the system root key, is the most important and core key in the entire key management system. The security and reliability of the root key generation and management process directly determine the security and reliability of the entire system. All other keys in the system are obtained from the system root key through several key distributions. [0003] Because it is used in the field of information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 丁勇周朋
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products