Method and system for generating keys
A key and key generation technology, which is applied in the computer field, can solve the problems of enterprise economic loss and enterprise data loss, and achieve the effect of improving reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] An embodiment of the present invention provides a method for generating a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see figure 1 , where the method includes:
[0047]Step 101: The administrator's hardware device sends a key generation request to the key generation device through the administrator's trusted terminal, and the key generation request carries the device identification of the encryption device and the security certificate issued by the certificate server for the administrator's hardware device.
[0048] Step 102: The key generation device authenticates the administrator hardware device according to the security certificate carried in the key generation request and the stored security certificate issued by the certificate server for the administrator hardware device, and assigns key.
[0049] Step 103: The key generating device sen...
Embodiment 2
[0053] An embodiment of the present invention provides a method for generating a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see figure 2 , where the method includes:
[0054] Step 201: the certificate server issues a security certificate to the administrator's hardware device, and sends the security certificate to the key generation device.
[0055] In the embodiment of the present invention, a device management system and an administrator hardware device are newly added; the device management system includes a key generation device and a certificate server; the certificate server is used to issue a security certificate for the administrator hardware device, and the key generation device is used for management The hardware device of the administrator is authenticated, and when the authentication is passed, a key is generated for the encryption devic...
Embodiment 3
[0113] An embodiment of the present invention provides a method for recovering a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see image 3 , where the method includes:
[0114] Step 301: When the encryption device fails to decrypt the encrypted data, the administrator hardware device sends a key recovery request to the key generation device through the administrator trusted terminal, and the key recovery request carries the device identification of the encryption device and the certificate server A security certificate issued for the administrator's hardware device.
[0115] The failure of the encryption device to decrypt the encrypted data includes at least two situations. The first situation is: when the user enters the wrong device password of the encryption device, the encryption device cannot decrypt the encrypted data; the second situation is: T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


