Key management system

A key management system and key management technology, which is applied in the field of data encryption, can solve problems such as key theft, no key classification, user privacy data leakage, etc., to achieve stable and reliable equipment, ensure cryptographic operations, and secure storage of keys Effect

Active Publication Date: 2020-11-27
湖南天琛信息科技有限公司
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that using software to encrypt, and the key is immutable, there is a risk that the key will be stolen by the attacker, resulting in the risk of user privacy data leakage
[0003] The reason for the above problems is mainly because the existing technology does not classify keys according to different purposes, and does not use a set of methods for generating, storing, updating, backing up, restoring and destroying keys, making it easier for attackers to crack keys access to sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management system
  • Key management system
  • Key management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] First, the present invention divides keys into multiple types, and different encryption methods are used for different keys; different algorithms are used to generate and store each type of key, and different strategies are used to update, backup, restore, and destroy the key , so as to reduce the risk of key leakage and ensure that the key information is not illegally obtained; even if the attacker uses brute force cracking methods and spends a lot of time and money to crack a key, it can only be a certain user at a certain point in time. Type of key, it is impossible to obtain other time points, other users, and other types of sensitive data by changing the key.

[0062] The technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0063] Such as figure 1 As shown, the present invention proposes a key management system. The system includes: a key management server, a Linux embedded business process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key management system. The system comprises a key management server, Linux embedded service processing equipment and an encryption card arranged in the Linux embedded serviceprocessing equipment, the secret key management server is used for generating a signature public and private key pair, an encryption public and private key pair and a storage secret key, storing, encrypting through a public key of the equipment public and private key pair and sending to the encryption card, and is used for re-sending according to an introduction application; the encryption card is used for storing the received signature public and private key pair, the encryption public and private key pair and the storage key, generating a file key, a storage key, a session key or a key encryption key respectively according to a service request of the service processing equipment, storing and sending the file key, the storage key, the session key or the key encryption key, updating, recovering and destroying a stored key, and generating equipment public and private key pairs when leaving the factory; the service processing equipment is used for receiving service requests of other terminals, sending a service key corresponding to the encryption card to the encryption card, sending the service key to the corresponding terminal, and self-checking of a cryptographic algorithm.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a key management system. Background technique [0002] When encrypting data in the prior art, the encryption algorithm used is usually a fixed key that cannot be easily modified, and this key is mixed with a software program and encrypted by software. An attacker can easily crack this fixed key by simulating data. When the key is mixed with the software program and stored together, the attacker can obtain the key by decompiling the software program. Once the key is obtained, the encrypted data can be decrypted, so that a large amount of originally encrypted sensitive data will be stolen, and even the entire system will be cracked. It can be seen that the software is used for encryption, and the key is immutable, which has the risk of being stolen by an attacker, resulting in the leakage of user privacy data. [0003] The reason for the above problems is mainly because the existi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/64
CPCG06F21/602G06F21/64
Inventor 李高峰彭东江旭
Owner 湖南天琛信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products