Key management system

A key management system and key management technology, which is applied in the transmission system and key distribution, can solve the problems of cumbersome operation, low efficiency, and insufficient information encryption protection, so as to protect information security, prevent leakage, and facilitate timely transmission Effect

Inactive Publication Date: 2019-05-14
西安得安信息技术有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, the main problem is key security management, involving key generation, key update, etc. Traditional key management is not only inefficient, but also cumbersome to operate, and it is not comprehensive enough in terms of encryption and protection of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] like figure 1 As shown, the key management system disclosed in the present invention includes a data cipher machine that provides the highest key, an operation server that provides the basis for decryption and encryption operations, a database server for storing keys and related data, and a platform server that provides system services , a key management service system deployed on a platform server for providing key services to smart terminals and application systems; the data cipher machine, computing server, and database server are respectively connected to the key management service system, and the platform The server is provided with an interface for connecting the key management service system with the smart terminal and the application system;

[0029] The key management service system includes a key management module for key generation, update, and application, for managing the smart terminal connected to the interface and a peripheral system management module fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key management system. The method is characterized in that the method is characterized by comprising, The system comprises a data cipher machine providing the highest secretkey, an operation server providing decryption encryption operation basis, a database server used for storing the secret key and related data of the secret key, a platform server providing system service, and a secret key management service system arranged on the platform server and used for providing secret key service for an intelligent terminal and an application system. Wherein the data ciphermachine, the operation server and the database server are respectively connected with the key management service system, and the platform server is provided with an interface used for connecting the key management service system with the intelligent terminal and the application system; According to the invention, a systematic perfect key management service is provided for the intelligent terminaland the application system, comprehensive encryption protection is provided for the information, and the information security is ensured not to be leaked.

Description

technical field [0001] The present invention relates to the technical field of information security management, in particular to a key management system. Background technique [0002] With the continuous development of information technology, while bringing high efficiency and information sharing to people, it also brings many problems to information security. Information security on the network has gradually become particularly important. Especially in smart terminals, application systems, and the financial industry, any leakage of important business information, such as user account passwords and personal data, to financial statements, R&D data, etc., will cause serious consequences. At the same time, due to the increasing number of IT applications within the enterprise, the enterprise's dependence on IT has increased, which has greatly increased the channels for information leakage, and security risks are ubiquitous. Accordingly, there is an increasing demand for technol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 宋博米鹏伟刘瑶景博丽刘伟
Owner 西安得安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products