Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and electronic equipment for processing keys in multiple data centers

A multi-data center and data center technology, applied in the field of communication, can solve problems such as delay reliability and stability, affecting user data center access, etc.

Active Publication Date: 2021-06-29
ALIBABA GRP HLDG LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the geographical dispersion of each data center, there may be delays in the key synchronization between data centers and it is highly dependent on the reliability and stability of the network. Therefore, the temporary key generated by a data center may not be recognized. Identified by other data centers, affecting user access to other data centers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and electronic equipment for processing keys in multiple data centers
  • Method, device and electronic equipment for processing keys in multiple data centers
  • Method, device and electronic equipment for processing keys in multiple data centers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] like figure 2As shown, a method for processing keys under multiple data centers is applied to data centers, including:

[0056] S210, receiving a request message for the terminal user to obtain the temporary key;

[0057] S220, perform a first function operation on the root key and the first parameter to generate an encryption key, and generate a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and key content , the key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;

[0058] S230, return the temporary key to the terminal user;

[0059] The method also includes:

[0060] receiving an access request message from the terminal user, the access request message carrying the key identifier of the temporary key;

[0061] Extract the first parameter from the key identifier, perf...

Embodiment 2

[0118] like Figure 6 As shown, a device for processing keys in multiple data centers is applied to data centers, including:

[0119] An information receiving module 601, configured to receive a request message for a terminal user to obtain a temporary key;

[0120] A key generating module 602, configured to perform a first function operation on the root key and the first parameter to generate an encryption key, and generate a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and a key content, where the key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;

[0121] An information sending module 603, configured to return the temporary key to the terminal user.

[0122] In one embodiment, in order to ensure the security of the root key and prevent the root key from spreading out from ...

Embodiment 3

[0139] An electronic device for processing keys in multiple data centers, including: a memory and a processor;

[0140] The memory is used to save a program for processing keys in multiple data centers, and when the program for processing keys in multiple data centers is read and executed by the processor, it performs the following operations:

[0141] Receive a request message from an end user to obtain a temporary key;

[0142] performing a first function operation on the root key and the first parameter to generate an encryption key, and generating a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and key content, so The key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;

[0143] A temporary key is returned to the end user.

[0144] When the program for processing keys in mul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This paper discloses a method, device and electronic equipment for processing keys in multiple data centers. The method for processing keys under multiple data centers is applied to a data center, including: receiving a request message from an end user to obtain a temporary key; performing a first function operation on the root key and a first parameter to generate an encryption key, according to the The encryption key and the first parameter generate a temporary key; the temporary key includes a key identifier and a key content, the key identifier carries the information of the first parameter, and the key content is the The key identifier and the encryption key are generated by performing a second function operation; and the temporary key is returned to the terminal user. The technical solution in this paper can realize that the key generated by one data center can be quickly recognized by other data centers without relying on the key synchronization between data centers.

Description

technical field [0001] The invention relates to communication technology, in particular to a method, device and electronic equipment for processing keys in multiple data centers. Background technique [0002] Cloud computing technology and service providers (for example, Alibaba Cloud) can open various cloud services to cloud customers who rent computing resources by distributing keys. The keys distributed to users by cloud computing technology and service providers include long-term keys and temporary keys. The long-term key is generally used by the server (administrator) of the cloud client, and the temporary key is generally used by the client (end user) of the cloud client. Cloud computing technology and service providers usually provide cloud customers with multiple data centers, and these data centers may be distributed in different regions. [0003] like figure 1 As shown, after obtaining a temporary key from a data center (for example, a data center located in Chi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0822H04L9/085H04L9/0863
Inventor 刘博洋
Owner ALIBABA GRP HLDG LTD