Unlock instant, AI-driven research and patent intelligence for your innovation.

Service key information processing method, encryption machine and information processing system

An information processing method and business key technology, which is applied in the field of encryption machines and information processing systems, and business key information processing methods, can solve hidden business key security risks, business key economic risks, and failure to ensure normal business keys Authorize the use of confidentiality status and other issues to achieve the effect of improving security and avoiding damage to interests

Active Publication Date: 2021-04-30
BEIJING SENSESHIELD TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the owner of the service key authorizes the service key to others, the service key cannot be controlled by him, and the service key may be illegally used by others or a third party
Moreover, after the business key is handed over, it cannot be guaranteed that the business key is normally authorized for use while ensuring that it is kept in a confidential state
This will bring great security risks to the business key itself, and also bring economic risks to the owner of the business key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service key information processing method, encryption machine and information processing system
  • Service key information processing method, encryption machine and information processing system
  • Service key information processing method, encryption machine and information processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0068] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0069] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0070] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service key information processing method, an encryption machine and an information processing system, and the method is applied to the encryption machine, and comprises the steps: obtaining first request information sent by a first client through a server, the first request information being used for requesting the encryption machine to call a service key to process to-be-processed data, Wherein the service key is stored in the server after being encrypted, and the first request information comprises at least one of user information, personal key information and a service key identifier in the first client; Obtaining permission information which is sent by the server and corresponds to the service key so as to analyze the permission information; Under the condition that the permission information is determined to meet a first preset condition, decrypting the service key acquired from the server by utilizing the stored specific key; And processing the to-be-processed data based on the decrypted service key to generate a corresponding processing result. According to the method, the security of the service key is improved while the service key is ensured to be flexibly used by a request user.

Description

technical field [0001] The present application relates to the field of information security, in particular to an information processing method of a service key, an encryption machine and an information processing system. Background technique [0002] In the field of information security, users need to use business keys to process target tasks, such as using business keys for digital signatures or data decryption. However, if the owner of the service key authorizes the service key to others, the service key cannot be controlled by him, and the service key may be illegally used by others or a third party. Moreover, after the service key is handed over, it cannot be guaranteed that the service key is normally authorized to be used while ensuring that it is in a confidential state. This will bring great security risks to the service key itself, and also bring economic risks to the owner of the service key. Contents of the invention [0003] The purpose of the embodiment of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/64G06F21/602
Inventor 孙吉平念龙龙王健豪
Owner BEIJING SENSESHIELD TECH