Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Trusted cryptographic module security management method and system

A cryptographic module and security management technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve the leakage of key security parameters in the module, the lack of a perfect management system for multiple types of keys, and the existence of trusted cryptographic modules. Security and other issues, to achieve the effect of improving credibility, generating security, and achieving encryption protection

Active Publication Date: 2021-06-01
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the management of trusted cryptographic modules, administrators and users are usually set up, only data and access rights are set, simple password authentication and other operations are performed for users and operators, and in terms of key management, multi-type keys are usually Without a sound management system, there are potential security risks in the trusted cryptographic module, which will lead to malicious login and access by illegal users, and the risk of leakage and theft of key security parameters such as keys in the module

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted cryptographic module security management method and system
  • Trusted cryptographic module security management method and system
  • Trusted cryptographic module security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0034] Embodiment of the present invention, see figure 1 As shown, a trusted cryptographic module security management method is provided, including:

[0035] S1. Set up the trusted cryptographic module authorization role, which includes the cryptographic supervisor for generating the trusted cryptographic module key and setting the working mode and administrator authorization data, and the management for generating and storing the master key and user setting authorization data members and users of password services;

[0036] S2. When logging in to the trusted cryptographic module, physically authorize the cryptographic supervisor in a safe environment; perform encryption and decryption of corresponding data through t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, in particular to a trusted cryptographic module security management method and system. The authorization role comprises a password manager used for generating a trusted password module key and setting a working mode and administrator authorization data, an administrator used for generating a storage main key and user setting authorization data, and a user used for using password service; when the trusted password module is logged in, physical authorization is carried out on a password manager in a safe environment, and role identification is carried out on an administrator and a user by executing data encryption and decryption through the trusted password module. Authorization roles of the trusted password module are set as the password manager, the administrator and the user, different role tasks are distinct, and physical identification under a safe environment is carried out on the password manager, so that role setting and task distinct can be effectively ensured, illegal users are prevented from logging in and accessing the trusted password module, and role and identification security management in the trusted cryptographic module is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for security management of a trusted cryptographic module. Background technique [0002] At present, trusted computing technology has become one of the main development trends in the field of computer security. At the same time, as an information security technology recognized by the industry, it has also become the development direction of the IT industry. Compared with the passive defense of traditional security solutions that focus on defending outside and inside, and defending service facilities first and then terminal facilities, Trusted Computing realizes active defense, firstly ensuring the security of terminals, and building through components that ensure security Stronger security system. The full English name of TCM trusted cryptography module is "Trusted Cryptography Module". TCM is a hardware module of trusted computing platform, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/46
CPCG06F21/602G06F21/46
Inventor 彭金辉雷宗华张磊乔绍虎刘武忠
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products