Key management method and related device

A key management and key technology, which is applied to secure communication devices and key distribution, can solve problems such as easy damage or loss of external modules, reduced security of key confidentiality, and increased complexity of key management to achieve enhanced Confidentiality Security, Complexity Reduction, Effect of Complexity Reduction

Active Publication Date: 2020-09-11
JIANGSU XINSHENG INTELLIGENT TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005]The above two existing key management schemes are aimed at keys with high confidentiality requirements that need to be carried out in accordance with confidentiality standards. When there is a key requirement, the two Both schemes use external modules to generate keys, and then the external modules are responsible for key distribution and storage, which increases the complexity of key management, and the external modules are easily damaged or lost, making the keys confidential and safe decreased sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method and related device
  • Key management method and related device
  • Key management method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] In order to solve the above technical problems, see figure 1 , figure 1 A key management system provided by the present invention, the system can be applied to distributed clusters, the key management system 10 includes: a first service module 11, a second service module 12 and a third service module 13, wherein the first A service module 11 includes a key management unit 111, a second service module 12 includes a key management unit 121, and a third service module 13 includes a key management unit 131; the first service module 11 is used for the second service module 12 and the second service module 12 The third service module 13 provides key management services; the second service module 12 is used to provide key management services for the third service module 13 when the first service module 11 fails.

[0054] The first service module 11 is used to generate and store the key through the first key management unit 111 after the key demand module joins the distributed...

Embodiment 2

[0095] The following will combine the above image 3 and Figure 4 The example shown in the key management system and server architecture provides a key management method, and the execution subject of the method can be image 3 master server 110A in , where, image 3 The master server 110A in contains internally the Figure 4 For the first system disk 110A-1 of the shown structure, refer to Figure 7 , Figure 7 It is a flowchart of a key management method provided by an embodiment of the present invention, and the method specifically includes:

[0096] Step 701: In response to a new data disk joining the distributed cluster, generate a key in the first controller chip, and save the key in the first memory.

[0097] Specifically, the first controller chip is used to generate a key, encrypt and decrypt the key, and the first memory is used to store the key generated by the first controller chip.

[0098] Step 702, Synchronize the key to the new data disk.

[0099] Specif...

Embodiment 3

[0131] The following will combine the above Figure 5 and Figure 6 An example of the key management system and server architecture shown, and another key management method is given, and the execution subject of this method is Figure 5 The main server 110B in, wherein, image 3 The master server 110B in the internally contains the Figure 4 For the first encryption card 110B-1 of the shown structure, see Figure 8 , Figure 8 Another key management method flowchart provided by the embodiment of the present invention, the method may specifically include:

[0132] Step 801, in response to a new encryption card joining the distributed cluster, generate a key in the first controller chip, and save the key in the first memory.

[0133] Specifically, the first controller chip is used to generate a key, encrypt and decrypt the key, and the first memory is used to store the key generated by the first controller chip.

[0134] Step 802, Synchronize the key to the new encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The key management method and the related device provided by the embodiment of the invention are applied to a main server in a distributed cluster, the main server comprises a first system disk, and the first system disk comprises a first controller chip and a first memory and is used for storing an operating system of the main server; the main server responds to the new data disk to join the distributed cluster, generates a secret key through the first controller chip, and stores the secret key in the first memory; and the secret key is synchronized to the new data disk. Compared with the prior art, the secret key can be generated, stored and synchronized in the main server, and the beneficial effect of reducing the complexity of secret key management is achieved on the premise of havingconfidentiality.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to a Chinese patent application with application number 2019112046013 entitled "Key Management Method, Device, Server, System, and Storage Medium" filed with the China Patent Office on November 29, 2019, the entire contents of which are incorporated by reference incorporated in this application. technical field [0003] The present invention relates to the field of distributed storage, in particular to a key management method and a related device. Background technique [0004] In a distributed storage system using encrypted hard disks, when there is a need for a key, two solutions are usually adopted to manage the key. The first solution is that the external key management center KMC (Key Management Center) is responsible for the unified management of the distributed cluster nodes. Key generation, distribution and backup; the second option is to use an external USB to insert into the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0861H04L9/0894H04L67/1095H04L67/1097H04L63/06
Inventor 薛迎春竹贝芬叶霖
Owner JIANGSU XINSHENG INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products