Identity-based closed key management method and system

A key management system and key management technology, applied in the field of identity-based closed key management methods and systems, can solve the problems of cumbersome use and poor scalability, so as to improve practicability, avoid tediousness and mistakes, and improve The effect of efficiency and safety

Active Publication Date: 2018-04-20
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The object of the present invention is to provide an identity-based closed key management method and system to solve the above technical problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based closed key management method and system
  • Identity-based closed key management method and system
  • Identity-based closed key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the present invention will be clearly and completely described below in conjunction with the drawings in the specific embodiments of the present invention.

[0055] Such as figure 1 As shown, the present invention provides an identity-based closed key management method, which is characterized in that it includes the following steps:

[0056] Step 1. Submit an identity authentication request to the identity authentication server when the user logs in, and return the user token after the identity authentication is passed;

[0057] Step 2. When the user needs encryption and decryption services, submit the token and user data to the encryption and decryption service module;

[0058] Step 3. The encryption and decryption service module submits the user token to the key management server, and requests the user data key;

[0059] Step 4. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity-based closed key management method and system. The method comprises the following steps: 1, an identity authentication request is submitted to an identity authentication server when a user logs in, and a user token is returned upon successful identity authentication; 2, when the user requires encryption/decryption service, the token and user data are submitted toan encryption/decryption service module; 3, the encryption/decryption service module submits the user token to a key management server, and requests a user data key; 4, the key management server requests the identity authentication server to verify the validity of the token, and the key management server searches for user data key ciphertext through a user ID upon successful verification; 5, thekey management server obtains user data key plaintext through decryption and returns the user data key plaintext to the encryption/decryption service module; and 6, the encryption/decryption service module carries out encryption/decryption operation on the user data through the user data key, and returns an encryption/decryption result. The system comprises the identity authentication server, thekey management server, a hardware security module, and the encryption/decryption service module.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an identity-based closed key management method and system. Background technique [0002] In recent years, with the rapid development and wide application of cloud computing, the data security of cloud computing services has become a huge obstacle to the application and promotion of cloud computing, which has attracted widespread attention. The cloud computing architecture is characterized by multi-tenant, distributed and shared resources, making it difficult to solve data security issues on cloud computing services. [0003] The traditional key management system and data encryption method are realized by hardware encryption machine. The user is directly responsible for the management of the key management system and the user IC key card. The key management is separated from the user management. The cost is high, the scalability is poor, and the deployment is not fl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/08H04L9/3234H04L63/0428H04L63/06H04L63/0815H04L63/0823H04L63/0876
Inventor 陈煜文
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products