Unlock instant, AI-driven research and patent intelligence for your innovation.

Key management method, device, computer equipment and storage medium

A key management and master key technology, applied in the field of computer processing, can solve the problems of low flexibility and security

Active Publication Date: 2021-06-15
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cloud API layer (that is, the access module) in traditional KMS is coupled with the underlying key, and directly exposes the underlying key ID to the user, resulting in low flexibility and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method, device, computer equipment and storage medium
  • Key management method, device, computer equipment and storage medium
  • Key management method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0077] figure 1 It is an application environment diagram of the key management method in an embodiment. refer to figure 1 , the key management method is applied to the key management system. The key management system includes a terminal 110 and a key management server 120 . The terminal 110 and the key management server 120 are connected via a network. The terminal 110 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The key man...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a key management method. The method includes: receiving an encryption request, the encryption request carrying a target key identifier and information to be encrypted, obtaining a key identifier mapping relationship, and obtaining a key identifier mapping relationship according to the key identifier mapping relationship The original key identifier corresponding to the target key identifier, and sending the information to be encrypted and the original key identifier to the encryption and decryption module, so that the encryption and decryption module obtains the primary key identifier corresponding to the original key identifier. A key, using the master key to encrypt the information to be encrypted to obtain encrypted data, and receiving the encrypted data returned by the encryption and decryption module. The above key management method improves the flexibility and security of key management. In addition, a key management device, computer equipment and storage medium are also proposed.

Description

technical field [0001] The present application relates to the field of computer processing technology, in particular to a key management method, device, computer equipment and storage medium. Background technique [0002] KMS (Key Management Service, Key Management Service) is a service that provides key security management and packet data encryption and decryption. The cloud API layer (that is, the access module) in the traditional KMS is coupled with the underlying key, and directly exposes the underlying key ID to the user, resulting in low flexibility and security. Contents of the invention [0003] Based on this, it is necessary to address the above problems and propose a key management method, device, computer equipment and storage medium with high flexibility and security. [0004] A key management method, the method comprising: [0005] receiving an encryption request, the encryption request carrying a target key identifier and information to be encrypted; [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/088H04L9/0891
Inventor 谢家提周维跃张晓宇
Owner TENCENT TECH (SHENZHEN) CO LTD