Unlock instant, AI-driven research and patent intelligence for your innovation.

Data key protection method, device and system

A technology of data key and key, which is applied in the field of trusted computing and can solve problems such as key leakage

Active Publication Date: 2018-10-16
ALIBABA GRP HLDG LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The embodiment of the present invention provides a data key protection method, device and system to at least solve the technical problem that the key is easy to leak in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data key protection method, device and system
  • Data key protection method, device and system
  • Data key protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] This application provides Figure 4 The protection method for the data key shown. On the server side of the user identity management subsystem, Figure 4 It is a flowchart of a data key protection method according to Embodiment 1 of the present invention.

[0077] According to an aspect of an embodiment of the present invention, a method for protecting a data key is provided, including:

[0078] Step S402, the user identity management subsystem server receives the first key acquisition request sent by the user terminal, wherein the first key acquisition request includes the user's identity verification information;

[0079] In the above step S402 of this application, the data key protection method provided by this embodiment can be applied to trusted computing, wherein the user identity management subsystem server can be used to interact with the mobile terminal used by the user, through the The mobile terminal receives various requests from the user and feeds back r...

Embodiment 2

[0121] This application provides Figure 5 The protection method for the data key shown. On the trusted chip side, Figure 5 It is a flowchart of a data key protection method according to Embodiment 2 of the present invention.

[0122] Step S502, the trusted chip receives a key acquisition request, where the key acquisition request includes: voiceprint features; where the trusted chip is a data processing chip that performs encryption or decryption calculations through a built-in independent processor and memory;

[0123] In the above S502 of this application, different from Embodiment 1, the data key protection method provided by this embodiment can be applied to a trusted chip, wherein the trusted chip can be located in the user identity management subsystem server, and can also be independent of the user The identity management subsystem server establishes a set of independent trusted chip voiceprint features and data key management subsystems.

[0124] Specifically, whe...

Embodiment 3

[0185] According to an embodiment of the present invention, an embodiment of a data key protection method is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0186] The method embodiment provided in Embodiment 3 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, Figure 6 It is a block diagram of the hardware structure of a computer terminal according to a method for protecting a data key in an embodiment of the present invention. Such as Figure 6 As shown, the computer terminal 60 may include one or more (only one is shown in the figure) proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data key protection method, device and system. The method comprises the following steps that a user identity management subsystem server receives a first key acquisition request sent by a user terminal, wherein the first key acquisition request comprises authentication information of a user; the user identity management subsystem server returns to-be-verified voice information to the user terminal according to the first key acquisition request; the user identity management subsystem server receives user voice uploaded by the user terminal according to the to-be-verified voice information; the user identity management subsystem server extracts voiceprint features of the user voice, and generates a second key acquisition request according to the voiceprint featuresand the authentication information; and the user identity management subsystem server sends the second key acquisition request to a trusted chip. The technical problem that a secret key is easy to leak in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of trusted computing, in particular to a data key protection method, device and system. Background technique [0002] Trusted computing can perform security protection while computing and computing, so that the computing results are always consistent with expectations, and the entire computing process is measurable and controllable without interference. [0003] At present, there are two types of trusted computing, the Trusted Platform Control Module (TPCM for short) in China and the Trusted Platform Module (TPM for short) of the international Trusted Computing Group (TCG) standards organization. technical route. [0004] The core elements of trusted computing are the trusted chain and trusted root. The Trusted Platform Module (TPM) in the TCG specification is the hardware trusted root of the trusted computing platform. TPM provides protected secure storage, A security chip with cryptographic compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCG06F21/32G06F21/57H04L9/0877H04L9/3231H04L9/0897H04L9/3239H04L2209/72H04L9/30H04L9/0866H04L9/0822H04L9/14H04L9/3242
Inventor 付颖芳
Owner ALIBABA GRP HLDG LTD