Unlock instant, AI-driven research and patent intelligence for your innovation.

Key management method, device and system and storage medium

A key management and key technology, applied in the field of information security, can solve problems such as poor usability, achieve the effect of improving security, satisfying usability, and increasing the difficulty of stealing keys

Active Publication Date: 2021-12-17
CHINA MOBILE COMM LTD RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The software method is to save the key in the configuration file or database, and directly read the key for decryption when it needs to be decrypted. This method has potential security risks
The hardware method is to save the key in the hardware medium, for example, U disk (USB flash disk). When decrypting data, insert the U disk to read the key to perform the decryption operation. After the decryption is completed, unplug the U disk. This method is safe Performance can be guaranteed, but ease of use is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method, device and system and storage medium
  • Key management method, device and system and storage medium
  • Key management method, device and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0037] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field of the invention. The terms used herein in the description of the present invention are for the purpose of describing specific embodiments only, and are not intended to limit the present invention.

[0038] In related technologies, in order to solve the problem that key management cannot balance ease of use and security, keys may be generated based on secure multi-party computation (Secure Multi-Party Computation, MPC). For example, CN 110752924A discloses a key security management method based on secure multi-party computing, wherein the master key is obtained by the multi-party computing system, and the master key controls the key plaintext and ciphertext state conversion...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key management method, device and system and a storage medium. The key management method comprises the following steps: based on a data service request sent by a data service terminal, confusing a first key generation algorithm to obtain a confused second key generation algorithm; sending a second key generation algorithm to the key server; performing cooperative calculation with the key server based on a second key generation algorithm, the first key fragment stored by the data storage server and the second key fragment stored by the key server, and performing anti-confusion on a calculation result of the cooperative calculation to obtain a key corresponding to the data service request. Therefore, only the data storage server can obtain the key corresponding to the data service request, and the first key generation algorithm is confused, so that the second key generation algorithm corresponding to the cooperative calculation can dynamically change, the difficulty of stealing the key by an attacker is increased, and while the usability of the key is met, the security of the key is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a key management method, device, system and storage medium. Background technique [0002] In related technologies, if user privacy data is stored in a database in clear text, once it is dragged into the database, it will directly threaten user privacy data. Data encryption storage technology is a technology that can effectively protect private data. Its principle is to encrypt sensitive information in user data and store it in a database or file system, and decrypt it when it needs to be read. Even if the attacker implements a database dragging attack, as long as the key is not leaked, the attacker cannot obtain user privacy data. [0003] Key management is the core of encrypted storage technology. If the key is leaked, the encrypted data will no longer be safe. Traditional solutions are implemented through software or hardware. The software method is to save the ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0816H04L9/0819H04L9/3297
Inventor 耿慧拯张星米婧张恒
Owner CHINA MOBILE COMM LTD RES INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More