A key management method and related equipment

A key management and key technology, applied in the field of network security, can solve problems such as access control without keys

Active Publication Date: 2022-05-20
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of this application is to provide a key management method and related equipment, which solves the technical problem in the prior art that access control cannot be implemented for each key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key management method and related equipment
  • A key management method and related equipment
  • A key management method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the following will clearly and completely describe the technical solutions of the embodiments of the present application in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present application , but not all examples. Based on the embodiments in the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the embodiments of the present application.

[0058] The terms "including" and "having" mentioned in the embodiments of the present application and any variations thereof are intended to cover non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optional...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a key management method and related equipment, belonging to the field of network security technology, which solves the problem that access control cannot be effectively implemented for each key in the existing solutions, and it is inconvenient for users to manage keys flexibly. The method includes: receiving key generation request information; generating attribute access policy information based on the key generation request information, wherein the attribute access policy information is a set of attributes used to encrypt data keys; Encrypting the attribute set of the data key to encrypt the data key; receiving the key acquisition request information; verifying whether the attribute information of the key acquisition request information is included in the encryption key based on the attribute set used to encrypt the data key An attribute set of the data key; if the attribute information of the key acquisition request information is included in the attribute set used to encrypt the data key, the target data key is acquired based on the attribute information of the key acquisition request information.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network security, and in particular, to a key management method and related equipment. Background technique [0002] In the cloud computing environment, users no longer directly own the hardware resources of the infrastructure, but directly use the services in the cloud computing environment, that is, users cannot directly control the hardware resources, so in the cloud computing environment, user data security increasingly prominent. In order to ensure the security of data transmission, data storage, user access, and business operations in the cloud computing environment, cryptography, as the core technology to ensure the security of the cloud computing platform, is playing an increasingly important role in the cloud computing environment. The key management system (KMS) related to cryptography is the basis for ensuring the security of cloud computing platforms, and provides ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/06H04L63/105H04L63/20H04L9/0894H04L9/088H04L9/0822H04L9/0819H04L9/085H04L9/0861
Inventor 麻付强王瑾
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products