Secret key management method, device and system

A key management and key technology, applied in the field of information security, can solve the problem of large resource consumption of servers, and achieve the effect of saving processing and storage resources, saving resources, and simplifying the complexity of management

Active Publication Date: 2017-05-24
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problem in the prior art that the server needs to consume a lot of resources to manage the symmetric key, the embodiment of the present invention provides a key management method, device and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key management method, device and system
  • Secret key management method, device and system
  • Secret key management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the embodiments of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0051] Please refer to figure 1 , Which shows a schematic diagram of an implementation environment provided by an embodiment of the present invention. Taking the business scenario of the C / S architecture as an example, the implementation environment includes: at least one terminal 11 and a back-end server 12.

[0052] The terminal 11 can install and run a client. In the embodiment of the present invention, the type of the client is not limited. For example, the client may be an instant messaging client, a social application client, a payment application client, a video playback client, and so on. The terminal 11 may be an electronic device such as a mobile phone, a tablet computer, an e-book reader, a multimedia playback device, a laptop porta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key management method, device and system, and belongs to the technical field of information security. The method comprises the steps that a client side generates a temporary secret key, and the temporary secret key is encrypted by using a public key provided by a background server so that a first cryptograph is obtained and transmitted to the background server; the background server applies a private key corresponding to the public key to decrypt the first cryptograph so as to obtain the temporary secret key, a session key and a key identifier are acquired, and the session key and the key identifier are encrypted by using the temporary secret key so that a second cryptograph is obtained and transmitted to the client side; and the client side applies the temporary secret key to decrypt the second cryptograph so as to obtain the session key and the key identifier, wherein the key identifier is used for identifying the session key, and the session key is used for encrypting the session data. The management complexity of the background server for the secret key can be simplified under the premise of considering the security of the secret key and the efficiency of encryption and decryption so that the processing and storage resources of the background server can be saved.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to a key management method, device and system. Background technique [0002] Currently, data encryption methods include symmetric encryption (Symmetric Cryptography) and asymmetric encryption (Asymmetric Cryptography). [0003] Symmetric encryption is a fast and simple encryption method. The encryption (encryption) and decryption (decryption) use the same secret key. Symmetric encryption usually uses a relatively small key, generally less than 256 bits (bits). Because the larger the key, the stronger the encryption, but the slower the encryption and decryption process. The size of the key needs to weigh security and efficiency. Typically, AES (Advanced Encryption Standard, Advanced Encryption Standard) adopts a symmetric encryption method, which is also called Rijndael encryption in cryptography. In 256Byte (byte) plaintext, the estimated speed is 900,000 times per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0822H04L9/0825H04L9/0863H04L9/08
Inventor 陈凯
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products