Key management method, device, medium and terminal equipment based on power gateway
A key management and power network technology, which is applied in the direction of secure communication devices, electrical components, network connections, etc., can solve problems such as decryption failure, encryption failure, loss, etc., and achieve the effect of improving stability and avoiding errors
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Please refer to figure 1 , is a schematic flowchart of an embodiment of a power gateway-based key management method provided by the present invention, the method includes steps 101 to 105, and each step is specifically as follows:
[0033] In step 101, the management terminal sends a signature key pair generation instruction to the security gateway, so that the security gateway generates a signature key pair in response to the signature key pair generation instruction.
[0034] Step 102: Encrypt the certificate request file through an encryption algorithm according to the signature key to obtain an encrypted certificate request file, and send the encrypted certificate request file to the CA system, so that the CA system responds to the encryption The certificate request file obtains the corresponding signature certificate from the certificate management server, and sends the signature certificate to the security gateway; in this embodiment, the encryption algorithm incl...
Embodiment 2
[0046] Please refer to figure 2 , is a schematic structural diagram of an embodiment of a power gateway-based key management device provided by the present invention, the device includes: a first generation module, a first processing module, a second generation module, a second processing module and a gateway Initialize the module; each module is as follows:
[0047] The first generation module is configured to send a signature key pair generation instruction to the security gateway through the management terminal, so that the security gateway generates a signature key pair in response to the signature key pair generation instruction.
[0048] The first processing module is used to encrypt the certificate request file through an encryption algorithm according to the signature key to obtain an encrypted certificate request file, and send the encrypted certificate request file to the CA system, so that the CA system responds Based on the encrypted certificate request file, obt...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

