Secure storage-oriented key management protocol design method and system

A key management protocol and key management technology, which is applied in the key management protocol design method and system field for secure storage, can solve the problems of large memory usage and low processing efficiency, reduce maintenance costs, and protect user privacy and security , The effect of improving the efficiency of key generation

Active Publication Date: 2021-05-14
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This application solves the technical problems of low processing efficiency and large memory usage in the data processing method of the distributed storage system in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure storage-oriented key management protocol design method and system
  • Secure storage-oriented key management protocol design method and system
  • Secure storage-oriented key management protocol design method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, specific implementations of the present invention are now described. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0059] This embodiment provides a secure storage-oriented key management protocol design method and system, details are as follows.

[0060] 1. System architecture

[0061] The secure storage-oriented key management system consists of a key management client (KC), a key management center (KMC), and a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key management protocol design method and system oriented to secure storage. The method comprises the steps: constructing a secret key request message through a secret key management client, transmitting the secret key request message to a secret key management center, receiving and analyzing a response message of the secret key management center, and providing a processing result of the request message for an application program; when the key management client obtains the key, the key is loaded into the password card to realize password operation; centralized password management is provided through a key management center, services which comprises key registration, query and revocation are provided, a key resource pool is partitioned, configured and managed, and administrator access, log recording and audit tracking are provided; secret keys are respectively generated and stored through a secret key generator and a secret key storage center in the secret key resource pool. According to the invention, the safety of the whole life cycle of key generation, distribution, storage, updating and destruction in the storage environment can be ensured.

Description

technical field [0001] The invention relates to the technical field of key management, in particular to a method and system for designing a security storage-oriented key management protocol. Background technique [0002] With the rise of cloud computing and big data, data storage has developed rapidly, but related security issues have not been well resolved. The core of storage security is to use modern cryptographic algorithms to protect the confidentiality and integrity of data information during storage and to provide good usability guarantees for user applications. Now mainstream cryptographic algorithms are mainly based on keys, and the security of keys It is the premise and foundation to ensure data security, and key management has also become the core of storage security. Therefore, the design of the key management protocol is particularly important, and its security and efficiency are related to the security and performance of the entire storage system. [0003] Cu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/602G06F21/46
Inventor 赵越易仲强苏宏郝尧陈宇翔
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products