Method, device and electronic equipment for processing keys in multiple data centers
A multi-data center and data center technology, applied in the field of communication, can solve problems such as delay reliability and stability, affecting user data center access, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] like figure 2As shown, a method for processing keys under multiple data centers is applied to data centers, including:
[0056] S210, receiving a request message for the terminal user to obtain the temporary key;
[0057] S220, perform a first function operation on the root key and the first parameter to generate an encryption key, and generate a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and key content , the key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;
[0058] S230, return the temporary key to the terminal user;
[0059] The method also includes:
[0060] receiving an access request message from the terminal user, the access request message carrying the key identifier of the temporary key;
[0061] Extract the first parameter from the key identifier, perf...
Embodiment 2
[0118] like Figure 6 As shown, a device for processing keys in multiple data centers is applied to data centers, including:
[0119] An information receiving module 601, configured to receive a request message for a terminal user to obtain a temporary key;
[0120] A key generating module 602, configured to perform a first function operation on the root key and the first parameter to generate an encryption key, and generate a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and a key content, where the key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;
[0121] An information sending module 603, configured to return the temporary key to the terminal user.
[0122] In one embodiment, in order to ensure the security of the root key and prevent the root key from spreading out from ...
Embodiment 3
[0139] An electronic device for processing keys in multiple data centers, including: a memory and a processor;
[0140] The memory is used to save a program for processing keys in multiple data centers, and when the program for processing keys in multiple data centers is read and executed by the processor, it performs the following operations:
[0141] Receive a request message from an end user to obtain a temporary key;
[0142] performing a first function operation on the root key and the first parameter to generate an encryption key, and generating a temporary key according to the encryption key and the first parameter; the temporary key includes a key identifier and key content, so The key identifier carries the information of the first parameter, and the key content is generated by performing a second function operation on the key identifier and the encryption key;
[0143] A temporary key is returned to the end user.
[0144] When the program for processing keys in mul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


