Data key protection method, device and system
A technology of data keys and keys, which is applied in the field of trusted computing, can solve the problems of key leaks and other problems, and achieve the effect of securely obtaining keys and solving easy leaks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] This application provides Figure 4 The protection method for the data key shown. On the server side of the user identity management subsystem, Figure 4 It is a flowchart of a data key protection method according to Embodiment 1 of the present invention.
[0077] According to an aspect of an embodiment of the present invention, a method for protecting a data key is provided, including:
[0078] Step S402, the user identity management subsystem server receives the first key acquisition request sent by the user terminal, wherein the first key acquisition request includes the user's identity verification information;
[0079] In the above step S402 of this application, the data key protection method provided by this embodiment can be applied to trusted computing, wherein the user identity management subsystem server can be used to interact with the mobile terminal used by the user, through the The mobile terminal receives various requests from the user and feeds back r...
Embodiment 2
[0121] This application provides Figure 5 The protection method for the data key shown. On the trusted chip side, Figure 5 It is a flowchart of a data key protection method according to Embodiment 2 of the present invention.
[0122] Step S502, the trusted chip receives a key acquisition request, where the key acquisition request includes: voiceprint features; where the trusted chip is a data processing chip that performs encryption or decryption calculations through a built-in independent processor and memory;
[0123] In the above S502 of this application, different from Embodiment 1, the data key protection method provided by this embodiment can be applied to a trusted chip, wherein the trusted chip can be located in the user identity management subsystem server, and can also be independent of the user The identity management subsystem server establishes a set of independent trusted chip voiceprint features and data key management subsystems.
[0124] Specifically, whe...
Embodiment 3
[0185] According to an embodiment of the present invention, an embodiment of a data key protection method is also provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0186] The method embodiment provided in Embodiment 3 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, Figure 6 It is a block diagram of the hardware structure of a computer terminal according to a method for protecting a data key in an embodiment of the present invention. Such as Figure 6 As shown, the computer terminal 60 may include one or more (only one is shown in the figure) proc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


