Method, device and server for processing identity secret key

A technology of a processing device and a processing method, which is applied in the computer field, can solve problems such as the inability to guarantee the security of the identity key and the complexity of the system, and achieve the effect of ensuring security and improving security

Active Publication Date: 2021-02-23
HUAWEI TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complexity of the public cloud system, there are many objects that can be attacked. Once the server is maliciously attacked by the attacker, the identity key stored in the memory can be obtained, and then any device can pretend to be the user of the server to read the data. The security of the identity key cannot be guaranteed, and there are security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and server for processing identity secret key
  • Method, device and server for processing identity secret key
  • Method, device and server for processing identity secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following describes in detail the processing method of the identity key provided by the embodiment of the present application with reference to the accompanying drawings.

[0031] figure 1 It is a schematic structural diagram of a communication system to which the identity key processing method provided in the embodiment of the present application is applicable. As shown in the figure, the communication system includes a server 20 , an identity management server 21 and a terminal 22 . Wherein, the combination of the server 20 and the identity management server 21 may also be called a cloud platform. The user remotely logs into the cloud platform through the terminal 22, and after the user's identity is authenticated, the function of the virtual machine on the server 20 can be used.

[0032]The terminal 22 may be a computer, such as a desktop computer, a notebook computer, a tablet computer, etc., or may only include a user interaction and operation interface (such...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, device, and server for processing an identity key, comprising: a processing device for an identity key obtains a first identity key of a virtual machine, the first identity key is used for identity authentication of the virtual machine, and the processing device passes The high-speed serial computer expansion bus standard PCIe is connected to the server, and the virtual machine is deployed in the server; the first identity key is encrypted with the device key to obtain the second identity key, and the device key is generated according to the identification of the processing device The globally unique key, the device key is stored in the storage area of ​​the processing device; the processing device stores the second identity key in the first storage area; the processing device signs the access request of the virtual machine according to the second identity key to This can solve the problem of low security of the identity key.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a method, device and server for processing identity keys. Background technique [0002] With the development of cloud computing technology, especially the rapid development of public cloud, operators provide various types of cloud services to enterprises to meet the needs of enterprise users. For a server deployed with multiple virtual machines (virtual machine, VM), when a certain VM accesses cloud services, the server needs to use the identity key of the VM to sign the access request to determine the legitimacy of the access request . Therefore, the security of the VM's identity key is of paramount importance. [0003] In the traditional technology, when a server deployed with multiple VMs obtains the identity key of each VM, it directly stores the identity key of the VM in its memory. When a certain VM accesses the cloud service, the server obtains the identity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08G06F21/57G06F9/455
CPCG06F9/45558G06F21/57G06F2009/45587G06F2009/45595H04L9/0822H04L9/0866H04L9/0894H04L9/3242H04L9/3247H04L9/3252
Inventor 殷鑫蔡恒
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products