Key management server, client, key distribution method, and key acquisition method

A key management and server technology, applied in the field of data encryption, can solve problems such as key leakage

Active Publication Date: 2021-09-07
QUANTUMCTEK
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a key management server, a client, a key distribution method, and a key acquisition method,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management server, client, key distribution method, and key acquisition method
  • Key management server, client, key distribution method, and key acquisition method
  • Key management server, client, key distribution method, and key acquisition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0045] figure 1 A schematic structural diagram of a key management server is shown, and the key management server includes:

[0046] Key source 100 and first processor 200.

[0047] Wherein, the information interaction process between the key source 100 and the first processor 200 includes:

[0048] S101: The first processor 200 generates a master key when receiving a key request sent by a key requester.

[0049] S102: The first processor 200 requests a key from the key source 10...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key management server, a client, a key distribution method and a key acquisition method. The client sends a key request to the key management server, the key management server receives the key request, the key management server acquires a key and an identifier of the key from a local key source, the key management server sends the identifier of the key to the client, and the client receives the identifier of the key because the client and the key management server are both provided with local key sources, and the local key sources at the two ends store the same corresponding relationship between the key and the identifier; therefore, the client can obtain the key plaintext corresponding to the identifier from the local key source. According to the method and the device, the key is transmitted between the key management server and the client through the identifier of the key and the local key source, so the network transmission of the key plaintext is avoided, the leakage of the key plaintext is avoided, and the security of the key transmission process is improved.

Description

technical field [0001] The present application relates to the technical field of data encryption, and in particular to a key management server, a client, a key distribution method and a key acquisition method. Background technique [0002] With the rapid development of Internet technology, various businesses are gradually realizing informatization and networking. While Internet technology brings convenience to the development of various businesses, it also brings security risks. These security risks may lead to leakage and tampering of users' sensitive data. It can be seen that in today's network era, data security is an important issue that cannot be easily ignored. [0003] Currently, in the Internet environment, users encrypt sensitive data and use a Key Management Service (Key Management Service, KMS) system to manage keys. In the key management process of the existing key management service system, the key management service system generates the key plaintext, encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0819H04L9/0852
Inventor 余刚王子蒙唐鹏毅孙媛媛
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products