Cloud native state secret key management method

A technology of key management and management methods, which is applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of technical unified key centralized management, etc., to improve security and confidentiality, realize security protection, and facilitate unified maintenance sexual effect

Pending Publication Date: 2022-06-07
SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the OpenStack cloud platform has not yet realized the unification of technology and the centralized management of keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud native state secret key management method
  • Cloud native state secret key management method
  • Cloud native state secret key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art may better understand the present invention and can be implemented, but the embodiments given are not intended as a qualification of the present invention.

[0035] The present invention provides a cloud-native state secret key management method, comprising managing the key of the cloud platform and the key of the product on the cloud,

[0036] The key of the management cloud platform, comprising: according to the user's business request, calling the back-end service transposing the underlying node, calling the Barbican component through the underlying node, transposing the KMS service by using the Barbican extension plug-in through the Barbican component, completing the data mapping with the underlying hardware device and other internal processing through the KMS service, and transposing different hardware devices ad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud native state secret key management method, which relates to the field of information security, and comprises the following steps: managing a secret key of a cloud platform and a secret key of a product on the cloud, calling a back-end service modulation bottom layer node according to a service request of a user, calling a Barbican component through the bottom layer node, and calling the Barbican component through the bottom layer node; modulating a KMS service by using a Barbican extension plug-in through a Barbican assembly, modulating different hardware devices adapted to a password facility through the KMS service, and obtaining specified key information to encrypt service storage data; and the management cloud product carries out message analysis of a service request according to the service request of a user, carries out service logic processing through an integrated SDK packet, modulates a KMS service, modulates different hardware devices adapted to a password facility through the KMS service, and obtains specified key information to carry out encryption operation on service application data.

Description

Technical field [0001] The present invention discloses a method involving the field of information security, specifically a cloud-native state secret key management method. Background [0002] With the promotion and implementation of data security, the data security requirements of cloud vendors for cloud platforms are getting higher and higher, and in this context, each service product of cloud platforms needs to meet the requirements of password evaluation to meet the requirements of data security. For cloud platforms based on OpenStack as the base, it supports the encryption requirements of components such as nova, cinder, and glance, while also meeting the key usage requirements of products on the cloud. At present, the OpenStack cloud platform has not yet realized the unification of technology and the centralized management of keys. Contents of the Invention [0003] The present invention is aimed at the problem of prior art, provides a cloud-native state secret key managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L69/22H04L67/51H04L9/40
CPCH04L69/22H04L63/0428H04L63/06
Inventor 徐士强高传集董玉全孙思清肖雪
Owner SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products