Unlock instant, AI-driven research and patent intelligence for your innovation.

A system and method for key generation and management

A key generation, key technology, applied in the field of information security

Active Publication Date: 2016-12-07
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a method and system for key generation and management, which solves the problem of key generation and management by generating each key in a secure hardware device from initial data according to key calculation rules and storing it in an encryption machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for key generation and management
  • A system and method for key generation and management
  • A system and method for key generation and management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Embodiments of the present invention provide a method and device for a key management system. In this embodiment, a smart card is used as a secure hardware device, and the specific methods include:

[0070] When the system starts up, check whether the two card readers are connected correctly and whether the encryption machine is connected correctly, otherwise it will provide an error message and exit the system after providing the error message.

[0071] The configuration information of the encryption machine used in the system is stored in the database.

[0072] When the system starts, check whether the system administrator card is inserted in the card reader (including whether it is connected, whether it is the required card in the system, and whether the PIN has been locked), otherwise it will provide an error message and allow the operator to try again or not Exit system. During this self-test process, the following abnormal situations may occur:

[0073] (1) The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a system and method for key generation and management. When the system is started, it needs to be identified by an intelligent device; multiple sets of initial data are input; each data is independent of each other; the initial data is stored in a secure hardware device; Secure hardware devices have anti-counterfeiting and anti-cracking functions; use secure hardware devices to generate system root keys according to certain calculation rules; encrypt and store system root keys in secure hardware devices; disperse root keys through key dispersion factors , to obtain the required application key; the application key is stored in the secure hardware device; and the root key is recovered from the secure hardware device. Throughout the system, the plain text value of the key is only stored in the secure hardware device; before the system accesses all secure hardware devices, the authenticity of the secure device is verified; Identification; the key generation rules cannot be known to the outside world; the key data required in the operation process are all in the form of ciphertext; the system security is high.

Description

technical field [0001] The invention belongs to the field of information security, in particular to a system and method for key generation and management. Background technique [0002] The key generation and management system (hereinafter referred to as the key management system) is widely used in the field of information security and is one of the basic systems of information security in modern society. In various fields where keys are used, all keys in the entire system need to be obtained through different levels of key distribution processes. In this process, the top key, the system root key, is the most important and core key in the entire key management system. The security and reliability of the root key generation and management process directly determine the security and reliability of the entire system. All other keys in the system are obtained from the system root key through several key distributions. [0003] Because it is used in the field of information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 丁勇周朋
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST