Encryption machine key injection system based on cloud environment, method and device

An injection system and encryption machine technology, applied in computer security devices, transmission systems, digital transmission systems, etc., can solve the problems of cloud management security risks, complicated key injection operation steps, etc.

Active Publication Date: 2016-11-23
ALIBABA GRP HLDG LTD
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present application provides a cloud-based encryption machine key injection system to solve the problems of cumbersome key injection operations caused by the existing manual card insertion method and potential safety hazards for cloud management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption machine key injection system based on cloud environment, method and device
  • Encryption machine key injection system based on cloud environment, method and device
  • Encryption machine key injection system based on cloud environment, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0121] On the basis of the above implementation, in order to further ensure the security of the root key of the virtual encryption device, and also take into account the cloud user's trust in the cloud provider, this embodiment also provides a preferred implementation: the key The number of injection subsystems is the largest integer less than the preset number of root key components; the key generation device in each key injection subsystem is specifically used to generate a root key component of the virtual encryption device; The encryption machine is responsible for generating a root key component of the virtual encryption device, and synthesizes the root key component of the virtual encryption device according to the root key component received from each key injection subsystem and the generated root key component root key.

[0122] The above-mentioned preferred implementation of the system will be described in detail below in combination with the widely used traditional e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption machine key injection system based on the cloud environment, a key injection method for an encryption machine and a device, and a method and a device for realizing cloud-end trusteeship of the encryption machine. The system comprises at least one key injection subsystem and an encryption machine trusteeship subsystem arranged at a cloud end, wherein the at least one key injection subsystem and the encryption machine trusteeship subsystem are connected through respective quantum key distribution equipment, the quantum key distribution equipment is used for negotiating a shared key pair between key generation equipment and the encryption machine which are connected with the quantum key distribution equipment, the key generation equipment is used for generating a root key component of virtual encryption equipment and employing the negotiated shared keys to carry out encryption transmission to the encryption machine on which the virtual encryption equipment is borne, the encryption machine is used for synthesizing a root key of the virtual encryption equipment according to received root key components, and the root key is further stored. Through the system, remote safe injection of the root key of the encryption machine is realized, a cloud user is not necessary to manually insert a card, and the key injection operation process is simplified.

Description

technical field [0001] The present application relates to the technical field of encryption machines, in particular to a key injection system for encryption machines based on a cloud environment. The present application also relates to a key injection method and corresponding device for an encryption machine, and a method and corresponding device for hosting an encryption machine on the cloud. Background technique [0002] The encryption machine is a good traditional method to protect data privacy. One of its main functions is the key storage function. The encryption machine has been widely used in many fields, especially the banking industry. The key system standard of the banking industry is a three-layer key system: ansi x9.17, which imposes strict restrictions on the functions of different levels of keys. The first layer is the master key of the encryption machine (Master Key, also known as root key), the second layer is the bank master key (Bank Master Key, also known ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/06G06F21/602G06F21/6218H04L9/085H04L9/0852H04L63/061H04L63/0853
Inventor 付颖芳刘栓林
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products