Equipment secret key security management method and system
A security management and secret key technology, applied in the field of information security, can solve the problems of reducing the security of equipment secret keys, lack of management, etc., and achieve the effect of improving security, increasing security, and ensuring security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] as attached figure 1 As shown, it is a flow chart of a device key security management method provided in this embodiment, and the method is specifically as follows:
[0052] Get a set of first-level secret keys. The first-level secret key is the root key. The first-level secret key unit uses a hardware encryption machine to generate a unique set of first-level secret keys. There is only one copy of the first-level secret key in the entire system. Through the authority management of the hardware encryption machine And operation instructions, use the removable hardware encryption module to export the first-level secret key from the hardware encryption machine for backup or transfer. At the same time, import or restore to the hardware encryption machine through the encryption machine command when needed. Since the first-level key is the root key of the entire system, it is generally created when the system is initialized. If the system starts and finds that the first-lev...
Embodiment 2
[0064] as attached Figure 4 As shown, it is a schematic block diagram of a device key security management system provided by this embodiment. The system specifically includes a primary key management unit, a secondary key management unit, a device key management unit, and a database. The primary key unit uses a hardware encryption machine to generate a unique set of primary keys.
[0065] Wherein, the primary key management unit includes a creation subunit, a removal subunit, a backup subunit, a transfer subunit and a restoration subunit. Create a subunit, used to create a new first-level secret key; remove a subunit, used to remove a first-level secret key; backup subunit, used to back up a first-level secret key; transfer subunit, used to transfer a first-level secret key key; the recovery subunit is used to recover the primary key.
[0066] The backup, transfer, and recovery of the primary key managed by the primary key unit use a removable hardware encryption module. T...
Embodiment 3
[0071] In order to describe the implementation process and principle of the present invention in more detail, an application example is given below.
[0072] The system has:
[0073] Level 1 secret key K0;
[0074] Secondary secret key K1;
[0075] Business key K2, including a set of symmetric keys K21 and a set of asymmetric keys K22;
[0076] The equipment key K3, K3 includes the power generation equipment key K31, the power transmission equipment key K32, the power transformation equipment key K33 and the power distribution equipment key K34.
[0077] Among them, K1 is encrypted with K0 when stored, and K0 is stored in the physical encryption machine as the root key, which can only be used for encryption and cannot be viewed in plaintext. K1 uses the Key_wrap algorithm to encrypt K21 and K22. K21 is used to encrypt K31 and K32, and K22 is used to encrypt K33 and K34. The ciphertext obtained by encrypting K21 and the ciphertext obtained by encrypting K31 and K32 are sto...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



