Unlock instant, AI-driven research and patent intelligence for your innovation.

A key management method and system supporting multiple key systems

A key management system and key management technology, applied in the field of key management methods and systems, can solve problems such as keys that cannot be leaked, use a key management system, etc., so as to improve security, prevent theft and tampering, and ensure security. sexual effect

Active Publication Date: 2022-02-25
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The encryption algorithm can be made public and the cryptographic device can be lost, but the key cannot be leaked. Once the key is leaked, the encrypted information can be completely known, and there is no secrecy at all; in addition, the way to steal the key is less expensive than deciphering the cryptographic algorithm Many, in many network attack incidents, key security management is a main part of the attack
[0003] Common key management systems mainly include symmetric key management, asymmetric key management, and identification key management. Asymmetric key management usually includes public keys and private keys. Public keys are usually used to encrypt session keys, To verify digital signatures or encrypt data that can be decrypted with the corresponding private key, usually the key pair is unique; currently, different key management systems are managed separately, which will result in symmetric keys, asymmetric keys, identification Keys, etc. need to set up a key management system, and it is impossible to use different key management systems through one key management system; in addition, the security of keys at all levels in the key management system is also particularly important

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method and system supporting multiple key systems
  • A key management method and system supporting multiple key systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0055] It should be noted that when a component is considered to be "connected" to another component, it may be directly connected to the other component or there may be an intervening component at the same time.

[0056] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a key management method and system supporting multiple key systems, wherein the method includes an initialization process: the root master key is randomly generated by a cryptographic device, and at the same time, the root master key threshold is backed up to all root master key mothers In the card; generate a first-level public and private key through a cryptographic device, and generate a first-level certificate through self-signature; generate a root identification key through a cryptographic device; symmetric key management includes: obtaining a first-level symmetric key after dispersing the root master key ; Obtain the second-level to N-level symmetric keys by dispersing the upper-level symmetric key in turn; obtain the user symmetric key by dispersing the N-level symmetric key; asymmetric key management includes: Generate secondary to N-level public and private keys and user public and private keys; generate secondary to N-level certificates and user certificates in turn through the issuance of the upper-level private key; identification key management includes: through the parameters including user identification and root identification key The information calculation generates the user key.

Description

technical field [0001] The invention relates to the technical field of key management, in particular to a key management method and system supporting multiple key systems. Background technique [0002] It is a basic principle of cryptography that all secrets reside in the key. The encryption algorithm can be made public and the cryptographic device can be lost, but the key cannot be leaked. Once the key is leaked, the encrypted information can be completely known, and there is no secrecy at all; in addition, the way to steal the key is less expensive than deciphering the cryptographic algorithm Many, in many network attack incidents, key security management is a main part of the attack. [0003] Common key management systems mainly include symmetric key management, asymmetric key management, and identification key management. Asymmetric key management usually includes public keys and private keys. Public keys are usually used to encrypt session keys, To verify digital sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0894H04L9/0825
Inventor 彭金辉何骏刘武忠乔绍虎廖正赟
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH