Check patentability & draft patents in minutes with Patsnap Eureka AI!

Equipment secret key security management method and system

A security management and secret key technology, applied in the field of information security, can solve the problems of reducing the security of equipment secret keys, lack of management, etc., and achieve the effect of improving security, increasing security, and ensuring security.

Pending Publication Date: 2021-11-16
SHENZHEN KAIFA TECH (CHENGDU) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the encrypted storage of the device key is achieved in this way, the key used to encrypt the device key itself lacks good management, and some even exist directly in its code file, which greatly reduces the security of the device key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment secret key security management method and system
  • Equipment secret key security management method and system
  • Equipment secret key security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] as attached figure 1 As shown, it is a flow chart of a device key security management method provided in this embodiment, and the method is specifically as follows:

[0052] Get a set of first-level secret keys. The first-level secret key is the root key. The first-level secret key unit uses a hardware encryption machine to generate a unique set of first-level secret keys. There is only one copy of the first-level secret key in the entire system. Through the authority management of the hardware encryption machine And operation instructions, use the removable hardware encryption module to export the first-level secret key from the hardware encryption machine for backup or transfer. At the same time, import or restore to the hardware encryption machine through the encryption machine command when needed. Since the first-level key is the root key of the entire system, it is generally created when the system is initialized. If the system starts and finds that the first-lev...

Embodiment 2

[0064] as attached Figure 4 As shown, it is a schematic block diagram of a device key security management system provided by this embodiment. The system specifically includes a primary key management unit, a secondary key management unit, a device key management unit, and a database. The primary key unit uses a hardware encryption machine to generate a unique set of primary keys.

[0065] Wherein, the primary key management unit includes a creation subunit, a removal subunit, a backup subunit, a transfer subunit and a restoration subunit. Create a subunit, used to create a new first-level secret key; remove a subunit, used to remove a first-level secret key; backup subunit, used to back up a first-level secret key; transfer subunit, used to transfer a first-level secret key key; the recovery subunit is used to recover the primary key.

[0066] The backup, transfer, and recovery of the primary key managed by the primary key unit use a removable hardware encryption module. T...

Embodiment 3

[0071] In order to describe the implementation process and principle of the present invention in more detail, an application example is given below.

[0072] The system has:

[0073] Level 1 secret key K0;

[0074] Secondary secret key K1;

[0075] Business key K2, including a set of symmetric keys K21 and a set of asymmetric keys K22;

[0076] The equipment key K3, K3 includes the power generation equipment key K31, the power transmission equipment key K32, the power transformation equipment key K33 and the power distribution equipment key K34.

[0077] Among them, K1 is encrypted with K0 when stored, and K0 is stored in the physical encryption machine as the root key, which can only be used for encryption and cannot be viewed in plaintext. K1 uses the Key_wrap algorithm to encrypt K21 and K22. K21 is used to encrypt K31 and K32, and K22 is used to encrypt K33 and K34. The ciphertext obtained by encrypting K21 and the ciphertext obtained by encrypting K31 and K32 are sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an equipment secret key security management method and system. The method comprises the following steps: a group of first-level secret keys are obtained; the first-level secret key encrypts at least one group of second-level secret keys, and stores the encrypted second-level secret keys in a database; each group of secondary secret keys encrypts at least one group of service secret keys, each group of service secret keys encrypts at least one group of equipment secret keys, and each group of encrypted equipment secret keys and the service secret keys encrypting the equipment secret keys are stored in a database together. According to the invention, the secret key is managed, a person or a system irrelevant to the use of the secret key is isolated, the participation of the first-level secret key is needed during the encryption and decryption of the equipment secret key, and the first-level secret key is safely stored in the physical encryption machine, so that the security of the equipment secret key is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a device key security management method and system. Background technique [0002] Equipment includes general equipment and special equipment. General equipment includes mechanical equipment, electrical equipment, special equipment, office equipment, transportation vehicles, instruments and meters, computers and network equipment, etc. Special equipment includes mine special equipment, chemical special equipment, aerospace special equipment , Public security fire-fighting special equipment, etc. [0003] Taking power equipment as an example, the power system and its equipment, as the infrastructure of a country or region, have a decisive impact on national life. In particular, metering equipment such as smart meters is closely related to power operations and end users, and its most intuitive manifestation is electricity charges. In the design of modern s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/72
CPCG06F21/602G06F21/6218G06F21/72
Inventor 陶宁殷竹
Owner SHENZHEN KAIFA TECH (CHENGDU) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More