Unlock instant, AI-driven research and patent intelligence for your innovation.

A key management method and device

A key management and key technology, which is applied in the Internet field, can solve problems such as background server security risks, and achieve the effects of preventing key leakage, ensuring security, and improving security

Active Publication Date: 2019-12-13
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing public key and private key are static and will not change. Once the private key is leaked, criminals can directly operate the background server, which will cause hidden dangers to the security of the background server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method and device
  • A key management method and device
  • A key management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0048] In order to solve the problems existing in the prior art, the embodiment of the present invention provides a key management method and device, so as to implement dynamic management of public keys and private keys, and improve the security of the background server.

[0049] First, a prior art operation and maintenance management system is introduced, such as figure 1 As shown, the system includes: a client 101 , an operation and maintenance bastion machi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a key management method and apparatus. The method comprises the following steps: obtaining identity information of operation and maintenance personnel sent by an operation and maintenance fortress machine; generating a first key pair corresponding to the identity information of operation and maintenance personnel; and sending a first private key to the operation and maintenance fortress machine, and sending a first public key to a server cluster corresponding to the operation authority of the operation and maintenance personnel. According to the key management method and apparatus provided by the embodiment of the invention, the key pair corresponding to the identity information is generated in combination with the identity information of the operation and maintenance personnel, the operation and maintenance personnel perform login through the first key pair or a second key pair, after the operation and maintenance personnel is offline or after the first key pair reaches the key validity, the key pair is destroyed in time to prevent the leakage of the key and protect the security of a background server, and the key pair contains the operation authority of the operation and maintenance personnel when being generated, therefore the operation authority of the operation and maintenance personnel can be limited so as to improve the security of the background server.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a key management method and device. Background technique [0002] Today's era is an information society, and information systems have become the basis for the business operations of various enterprises and institutions. Since the operation and maintenance personnel have the highest authority over the information system, once a security problem occurs in the operation and maintenance operation, it will bring huge losses to the enterprise or unit. Strengthening the operation management and auditing of operation and maintenance personnel is an inevitable trend in the development of information security. Therefore, the operation and maintenance bastion machine for the operation management and audit of operation and maintenance personnel came into being. The operation and maintenance bastion host provides a set of multi-dimensional operation and maintenance operation control and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/28H04L63/06H04L63/0815H04L63/0838
Inventor 冯浩
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD