Method for storing cipher key

A technology for key storage and key data, applied in the field of information security, can solve problems such as increasing the complexity of key management, and achieve the effects of reducing complexity, being less prone to leakage and theft, and improving security mechanisms

Inactive Publication Date: 2005-11-16
HUAWEI TECH CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Threshold cipher culture key management is suitable for applications that have special requireme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing cipher key
  • Method for storing cipher key
  • Method for storing cipher key

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050] The overall design idea of ​​the key storage method of the present invention is to realize distributed storage of key material information by performing simple transformation operations on the original key data, thereby improving the safety management mechanism of the original key data.

[0051] Reference figure 1 The figure is a brief process flow chart of the key storage method of the present invention, in which the main steps of the key storage process of the present invention include:

[0052] Step S10: Pre-set the key data transformation algorithm; this key data transformation algorithm can select different algorithms for transformation operation according to the specific situation, such as exclusive OR algorithm, or use common transformation algorithm based on symmetric cryptosystem .

[0053] Step S20, the original key data is generated by the key generator. The original key data is the key information that actually encrypts and transforms various information. It is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: setting up transformation algorithm for cipher key data in advance; generating original cipher key data by cipher key generator, random sequence generator generates several pieces of random numbers correlated to the original cipher key data at same time; carrying out transformation operation for original cipher key data and correlated several pieces of random numbers by using transformation algorithm for cipher key data setup before; storing up transformed cipher key data and each random number correlated to original cipher key data in storage media independent to each other. Comparing with prior art, the invention lowers complexity of cipher key storage step in cipher key management procedure, and raises security mechanism in storing cipher key.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key storage method. Background technique [0002] Key management is a key link in the key security system, and the entire life cycle of the key management process includes: [0003] Key registration _ the network node obtains or creates initial key material through security measures, and becomes an authorized member of the security domain; [0004] Key creation _ the network node generates key material by itself or obtains key material from the trusted system components of the key management center, where the key material generally includes key data and corresponding algorithm information, etc.; [0005] Key storage _ the network node stores the obtained key material in its own hard disk, ROM device, chip card, hardware token and other related storage media; [0006] Key distribution _ the process in which the network node sends the obtained key data to other network nodes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/12
Inventor 范云松何迎春孙伊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products