Key generation method and system and key distribution method and system based on group
A key generation and key distribution technology, which is applied in the direction of public key for secure communication, can solve problems such as large key update cost, failure to meet customer needs well, lack of pertinence, etc., to achieve encryption The effect of low key update cost and eliminating the risk of forward security and backward security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] This embodiment provides a group-based key generation method, such as figure 1 shown, including the following steps:
[0047] S11: Generate a public-private key pair, where the public-private key pair includes a public key and a private key.
[0048] S12: Configure a key pair ID for each public-private key pair.
[0049] S13: Export the public-private key pair, and store the public-private key pair after encrypting the public key.
[0050] In this embodiment, in the step S11, the encryption machine uses the RSA algorithm to generate a public-private key pair. In the step S13, an encryption machine is used to derive the public-private key pair, and the encryption machine encrypts the public key. The encryption machine is a domestically developed host encryption device that has been identified and approved by the national commercial cryptography authority. The encryption machine and the host use TCP / IP protocol communication, so the encryption machine has no special re...
Embodiment 2
[0054] This embodiment provides a group-based key generation system, such as figure 2 shown, including:
[0055] The key generation unit is used to generate a public-private key pair, and the public-private key pair includes a public key and a private key.
[0056] The ID configuration unit is configured to configure a key pair ID for each public-private key pair.
[0057] The key storage unit is used to derive the public-private key pair, and store the public-private key pair after encrypting the public key.
[0058] In the above scheme, when the group key (that is, the public-private key pair) is generated, the key pair ID is generated. This key pair ID is the unique identifier of each key pair. Through this key pair ID, you can easily find Different group keys, when the group members change or the group key changes, the corresponding public-private key pair can be quickly found and updated through the key pair ID, so that the group members can normally encrypt and decryp...
Embodiment 3
[0062] This embodiment provides a group-based key distribution method, such as image 3 shown, including the following steps:
[0063] S21: Receive the key request information sent by the client.
[0064] S22: Determine the intensive use authority of the user terminal.
[0065] S23: Decrypt the stored public-private key pair configured with the key pair ID, encrypt the public-private key pair with the user public key, and send the public-private key pair to the client.
[0066] In this embodiment, the client or SDK requests the group key with its own identity authentication public key; the group key is sent to the client or SDK according to the user's needs as the policy is issued, and the user needs to be authenticated in the process Identity, this process needs to judge the user's group key usage authority, then use the decryption machine to unlock the stored group key, and finally use the user's public key to encrypt the group key and distribute it to the user's local. S...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 