Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for storing cipher key

A technology for key storage and key data, applied in the field of information security, can solve problems such as increasing the complexity of key management, and achieve the effects of reducing complexity, being less prone to leakage and theft, and improving security mechanisms

Inactive Publication Date: 2005-11-16
HUAWEI TECH CO LTD
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Threshold cipher culture key management is suitable for applications that have special requirements for key recovery, but this key storage method will increase the complexity of key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for storing cipher key
  • Method for storing cipher key
  • Method for storing cipher key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The overall design idea of ​​the key storage method of the present invention is: through simple transformation operation on the original key data, the distributed storage of key material information is realized, thereby improving the security management mechanism of the original key data.

[0051] refer to figure 1 , which is a brief process flowchart of the key storage method of the present invention, wherein the main steps of the key storage process of the present invention include:

[0052] Step S10, pre-setting the key data transformation algorithm; this key data transformation algorithm can be selected according to the specific situation, and a different algorithm can be selected for the transformation operation, such as an XOR operation algorithm can be selected, or a commonly used transformation algorithm based on a symmetric cryptosystem can be used .

[0053] Step S20, the original key data is generated by the key generator, where the original key data is the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes steps: setting up transformation algorithm for cipher key data in advance; generating original cipher key data by cipher key generator, random sequence generator generates several pieces of random numbers correlated to the original cipher key data at same time; carrying out transformation operation for original cipher key data and correlated several pieces of random numbers by using transformation algorithm for cipher key data setup before; storing up transformed cipher key data and each random number correlated to original cipher key data in storage media independent to each other. Comparing with prior art, the invention lowers complexity of cipher key storage step in cipher key management procedure, and raises security mechanism in storing cipher key.

Description

technical field [0001] The invention relates to the field of information security, in particular to a key storage method. Background technique [0002] Key management is a key link in the key security system, and the entire life cycle of the key management process includes: [0003] Key registration _ the network node obtains or creates initial key material through security measures, and becomes an authorized member of the security domain; [0004] Key creation _ the network node generates key material by itself or obtains key material from the trusted system components of the key management center, where the key material generally includes key data and corresponding algorithm information, etc.; [0005] Key storage _ the network node stores the obtained key material in its own hard disk, ROM device, chip card, hardware token and other related storage media; [0006] Key distribution _ the process in which the network node sends the obtained key data to other network nodes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/12
Inventor 范云松何迎春孙伊
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products