A key management method, device and equipment
A key and equipment technology, applied in the information field, can solve the problem of high cost and achieve the effect of reducing storage cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0055] In the prior art, the data storage party usually uses different keys to encrypt different data and stores the obtained encrypted data and the keys corresponding to each encrypted data. When the data decryption device requests the data encryption device to decrypt certain encrypted data, the data encryption device sends the key corresponding to the encrypted data to the data decryption device, and the data decryption device can use the received key to decrypt the encrypted data to obtain the original data .
[0056] However, the disadvantage of this mode is that as the data storage party stores more and more data, the keys it needs to store will correspondingly increase, resulting in higher storage costs for the data storage party.
[0057] In one or more embodiments of this specification, the key used by the data encryption device to encrypt certain data is obtained by using a one-way function according to the data identifier of the data and a pre-stored root key. this...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


