Unlock instant, AI-driven research and patent intelligence for your innovation.

A key management method, device and equipment

A key and equipment technology, applied in the information field, can solve the problem of high cost and achieve the effect of reducing storage cost

Active Publication Date: 2020-07-03
ADVANCED NEW TECH CO LTD
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this specification provides a key management method, device and equipment to solve the problem of high cost of existing key management methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method, device and equipment
  • A key management method, device and equipment
  • A key management method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In the prior art, the data storage party usually uses different keys to encrypt different data and stores the obtained encrypted data and the keys corresponding to each encrypted data. When the data decryption device requests the data encryption device to decrypt certain encrypted data, the data encryption device sends the key corresponding to the encrypted data to the data decryption device, and the data decryption device can use the received key to decrypt the encrypted data to obtain the original data .

[0056] However, the disadvantage of this mode is that as the data storage party stores more and more data, the keys it needs to store will correspondingly increase, resulting in higher storage costs for the data storage party.

[0057] In one or more embodiments of this specification, the key used by the data encryption device to encrypt certain data is obtained by using a one-way function according to the data identifier of the data and a pre-stored root key. this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification discloses a key management method, device and equipment. In the embodiment of this specification, according to the data identifier of the data and the pre-stored root key, a one-way function is used to calculate the key corresponding to the data, and the key corresponding to the data is used to encrypt the data. When it is necessary to authorize the data decryption device to decrypt certain data, the key corresponding to the data is calculated by using the one-way function again according to the data identifier and the root key of the data, and the key corresponding to the data is sent to the data decryption device.

Description

technical field [0001] This specification relates to the field of information technology, and in particular to a key management method, device and equipment. Background technique [0002] At present, it is common for the data storage party to disclose the stored data for use by the data acquirer. The data acquirer can access the device of the data storage party through the network to obtain the data stored on the device. [0003] Usually, in order to manage the data acquisition authority, the data storage party encrypts the data with the key corresponding to the data for each data, and obtains the encrypted data corresponding to the data. Wherein, keys corresponding to different data are different. If the data acquirer wants to decrypt some encrypted data, it must first request the key corresponding to the encrypted data from the data storage party, and then use the obtained key to decrypt the encrypted data and obtain the original text of the data. [0004] Based on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0643H04L9/08H04L63/0428H04L63/06H04L63/10H04L2463/061H04L63/123H04L9/0866G06F16/2246H04L9/0861G06F21/6272G06F21/602H04L2209/24H04L9/3242H04L9/50
Inventor 杜华兵
Owner ADVANCED NEW TECH CO LTD