Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
A key management center and authorization data technology, applied in the TPM key management center to protect the key authorization data field, can solve the problems of insecure storage of key authorization data and low security performance, so as to improve security and reduce leakage. , the effect of reducing the possibility of damage by tampering
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0068] Embodiments of the present invention provide a method, device, and TPM key management center (English: TPM Key Management Center, TPM-KMC for short) for protecting key authorization data. By saving the key authorization data to the TPM-KMC, Temporarily apply for authorization data to TPM-KMC when accessing the key is needed, and then delete the applied authorization data after accessing the key, thereby improving the security of the key authorization data and reducing the possibility of authorization data leakage and tampering.
[0069] The technical solutions of the present invention will be described below in conjunction with the accompanying drawings and various embodiments.
[0070] refer to figure 2 As shown, the embodiment of the present invention provides a system for protecting key authorization data, including TPM-KMC and host (English: Host) / virtual machine (English: Virtual Machine, abbreviated: VM) / terminal (English: Terminal) , where Host / VM / Terminal is a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 