Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and medium for generating a root key

A root key and key pair technology, applied in the field of key management, can solve problems such as high device cost and difficult maintenance

Active Publication Date: 2021-10-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem of high cost and difficult maintenance of the root key management hardware device, and obtain the technical effect of low-cost safe management of the root key, the present invention provides a root key generation method, device and medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and medium for generating a root key
  • Method, device and medium for generating a root key
  • Method, device and medium for generating a root key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] In the description of the present invention, it should be understood that the terms "first" and "second" are used for description purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features. Also, the terms "first", "second", et...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and medium for generating a root key. The method distributes the steps of generating the root key to a first server, a second server and a third server. Wherein, the first server generates an encryption key and a decryption key, and compiles and packages the key management execution program. The second server generates the initial root key, and uses the encryption key sent by the first server to encrypt the initial root key to obtain the ciphertext of the initial root key. The third server decrypts and converts the initial root key ciphertext according to the key management execution program sent by the first server and the initial root key ciphertext sent by the second server, so as to obtain the target root key. The third server cannot obtain the initial root key and the decryption key, and the first server and the second server have no authority to log in to the third server, thus ensuring the security of root key management and improving root key security. Reliability of the safety management system.

Description

technical field [0001] The invention relates to the field of key management, in particular to a method, device and medium for generating a root key. Background technique [0002] Since the key is the core element of information security, the generation of the root key is strictly required in key security management. The root key is the topmost key and has a high value. Once leaked, it will cause serious consequences. [0003] In a commonly used key management solution, a hardware security module (hardware security module, HSM) is used for key security management. A hardware security module is a computer hardware device used to protect and manage the keys used in a strong authentication system and provide related cryptographic operations at the same time. Hardware security modules are generally directly connected to computers or network servers in the form of expansion cards or external devices. By injecting three sections of initial keys into the hardware security module r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/14
CPCH04L9/0863H04L9/14H04L63/0428H04L63/06
Inventor 彭佑辉吴俊彦米成锦宋平波林伟兵
Owner TENCENT TECH (SHENZHEN) CO LTD