Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for generating keys

A key and key generation technology, which is applied in the computer field, can solve the problems of enterprise economic loss and enterprise data loss, and achieve the effect of improving reliability

Active Publication Date: 2018-12-28
RICHFIT INFORMATION TECH +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in enterprises, encrypted devices are usually work devices configured by enterprises for employees. The data stored on them are not private data, but enterprise data. The ownership of these enterprise data belongs to the enterprise. Therefore, when the user forgets the key , the loss of enterprise data will cause significant economic losses to the enterprise

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for generating keys
  • Method and system for generating keys
  • Method and system for generating keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] An embodiment of the present invention provides a method for generating a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see figure 1 , where the method includes:

[0047]Step 101: The administrator's hardware device sends a key generation request to the key generation device through the administrator's trusted terminal, and the key generation request carries the device identification of the encryption device and the security certificate issued by the certificate server for the administrator's hardware device.

[0048] Step 102: The key generation device authenticates the administrator hardware device according to the security certificate carried in the key generation request and the stored security certificate issued by the certificate server for the administrator hardware device, and assigns key.

[0049] Step 103: The key generating device sen...

Embodiment 2

[0053] An embodiment of the present invention provides a method for generating a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see figure 2 , where the method includes:

[0054] Step 201: the certificate server issues a security certificate to the administrator's hardware device, and sends the security certificate to the key generation device.

[0055] In the embodiment of the present invention, a device management system and an administrator hardware device are newly added; the device management system includes a key generation device and a certificate server; the certificate server is used to issue a security certificate for the administrator hardware device, and the key generation device is used for management The hardware device of the administrator is authenticated, and when the authentication is passed, a key is generated for the encryption devic...

Embodiment 3

[0113] An embodiment of the present invention provides a method for recovering a key, which is applied between a certificate server, a key generation device, an administrator hardware device, an administrator trusted terminal, and an encryption device, see image 3 , where the method includes:

[0114] Step 301: When the encryption device fails to decrypt the encrypted data, the administrator hardware device sends a key recovery request to the key generation device through the administrator trusted terminal, and the key recovery request carries the device identification of the encryption device and the certificate server A security certificate issued for the administrator's hardware device.

[0115] The failure of the encryption device to decrypt the encrypted data includes at least two situations. The first situation is: when the user enters the wrong device password of the encryption device, the encryption device cannot decrypt the encrypted data; the second situation is: T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key generation method and a key generation system, and belongs to the technical field of computer. The method comprises the following steps: an administrator hardware device sends a key generation request to a key generation device through an administrator trusted terminal, wherein the key generation request carries the device identifier of an encryption device and a security certificate issued by a certificate server for the administrator hardware device; the key generation device authenticates the identity of the administrator hardware device according to the security certificate carried by the key generation request and a stored security certificate issued by the certificate server for the administrator hardware device, and allocates a key for the encryption device when the administrator hardware device passes authentication; the key generation device sends a key to the administrator hardware device, and stores the key and the device identifier in the corresponding relationship between device identifiers and backup keys; and the administrator hardware device initializes the device password of the encryption device through the administrator trusted terminal, calls a device interface of the encryption device, and imports the key into the encryption device through the device interface. The reliability of data is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for generating a key. Background technique [0002] With the increasingly serious data security situation, in order to deal with data leakage and information theft, people usually use encryption devices such as encrypted hard drives or encrypted U disks to encrypt data, and when using encryption devices to encrypt data, it is necessary to generate a key first . The encryption device encrypts the data to be encrypted with the key to obtain the encrypted data; when the user decrypts the encrypted data, the encryption device encrypts the encrypted data with the key to obtain the data. [0003] Currently, when generating a key, the user sets the key directly on the encryption device. However, in enterprises, encrypted devices are usually work devices configured by enterprises for employees. The data stored on them are not private data, but enterprise data. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0819H04L9/0861H04L9/0866H04L9/3263H04L63/062H04L63/08
Inventor 魏琪靖小伟张志伟滕征岑靳黎明孙祥明周喜吴翔李宠
Owner RICHFIT INFORMATION TECH