A key management method and system

A key management and key technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem that private keys cannot be exported, and achieve the effect of ensuring security and increasing security.

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the key management scheme in the prior art is as follows: on the one hand, various keys are stored on the basis of an encryption card or an encryption chip hard disk, and when used, directly call the encryption card or encryption chip through the relevant interface; on the other hand, in order to ensure The security of the user's private key, the user's private key is usually stored in special cryptographic hardware, such as USB Key, SmartCard, and the private key cannot be derived from the cryptographic hardware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method and system
  • A key management method and system
  • A key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0072] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0073] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a key management method, including: during initial initialization, encrypting the master key with a white-box protection key to obtain the first ciphertext; encrypting the white-box protection key with a password-derived key to obtain the second Cipher text; use the master key to encrypt and save the user's private key component; when the secure channel is established, the client and the server obtain the communication key through negotiation to establish a secure channel; when the key is updated, the password of the current password is derived The key decrypts the second ciphertext to obtain the white-box protection key, and after encrypting the white-box protection key with the password-derived key of the new password, the ciphertext of the white-box protection key obtained by encryption is used to update the second ciphertext Ciphertext; when decrypting the local key, use the password-derived key of the new password to decrypt the second ciphertext to obtain the white-box protection key; decrypt the first ciphertext with the white-box protection key to obtain the master key; pass the master key Decrypt the ciphertext of the user key component to obtain the user key component.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a key management method and system. Background technique [0002] Cryptography technology is the basic technology of information security, and the key is the basis of secure application of cryptography technology and the core element of information security. With the rapid and comprehensive development of my country's information industry, the key management system based on the asymmetric key system and the symmetric key system has also entered the comprehensive construction stage. The security of the key management system depends on the security of the key. If the key is leaked, it no longer has the function of keeping secrets. In addition, the key is a variable part of the cryptosystem. When considering the design of the cryptosystem, the core problem that needs to be solved is the key management problem. [0003] At present, the key management scheme in the prior...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0869H04L9/0891H04L9/0822H04L9/0643H04L9/0861H04L9/0825H04L9/0838H04L9/3226H04L9/3247
Inventor 雷宗华穆佩红彭金辉李鑫周吉祥卫志刚
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products