Unlock instant, AI-driven research and patent intelligence for your innovation.

Key management system

A key management system and root key technology, applied in the field of key management, can solve problems such as difficult to guarantee the security of data ciphertext, and achieve the effect of enhancing security

Active Publication Date: 2020-11-17
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the envelope encryption method needs to transmit the ciphertext of the data encryption key and the ciphertext of the data together at the business network level, with the increase of computing power, especially the development of quantum computers, only the ciphertext of the data encryption key needs to be cracked to decrypt the data. The ciphertext is decrypted, so the security of the data ciphertext will be difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management system
  • Key management system
  • Key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0034] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are to distinguish two entities with the same name but different parameters or parameters that are not the same, see "first" and "second" It is only for the convenience of expression, and should not be construed as a limitation on the embodiments of the present invention, which will not be described one by one in the subsequent embodiments.

[0035] It should be noted that, in the embodiment of the present invention, the quantum key is a symmetric key generated through quantum key distribution (English: quantum key distribution, QKD for short) using the characteristics of quantum mechanic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key management system. The key management system comprises: a control node; a plurality of computing nodes which are connected with the control node; and a plurality of quantum key distribution nodes which are all connected with the control node, wherein each quantum key distribution node is connected with one of the computing nodes. Each quantum key distribution node isconfigured to generate a root key, generate a key encryption key between the quantum key distribution node and other quantum key distribution nodes according to a first instruction sent by the controlnode, and generate a data encryption key corresponding to a user on the connected computing node according to a second instruction sent by the control node. According to the key management system based on the quantum key provided by the invention, plaintext data before encryption and after decryption are transmitted between the computing nodes and the key distribution nodes, so that the plaintextdata cannot be transmitted on a management plane and a service plane, and the security is further enhanced.

Description

technical field [0001] The invention relates to the field of key management, in particular to a key management system. Background technique [0002] Such as figure 1 As shown, the traditional OpenStack deployment architecture may include one control node, m computing nodes, and n storage nodes. There are a large number of key usage scenarios in OpenStack, such as login passwords, certificates, key pairs, cloud disk encryption, file encryption, image encryption, log encryption, and encryption during data transmission. The encryption component in OpenStack is Barbican, which implements lifecycle management including symmetric keys, asymmetric keys, certificates, and raw binary data. Northbound supports different software and hardware (HSM) cryptographic devices through plugin design, and southbound through API interfaces. Provides key management services for other components of OpenStack. [0003] The traditional OpenStack deployment architecture is aimed at scenarios that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0855H04L9/083H04L9/0861H04L9/0822H04L9/14
Inventor 高光辉
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD