Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Key management method, key use method, key management device, key use device and key use equipment

A key management and key technology, which is applied in the data encryption field of financial technology, can solve problems such as the inability to guarantee the security of user keys, network attacks, and inability to retrieve them

Active Publication Date: 2021-04-09
WEBANK (CHINA)
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found that the existing key management has at least the following technical problems: when the user key is stored locally, it is easy to lose, and it cannot be retrieved after being lost, resulting in easy loss of the user key; Trusted escrow organization, because the trusted escrow organization network may be attacked, causing user key leakage
That is to say, the traditional key management has been lost, and the security of user keys cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method, key use method, key management device, key use device and key use equipment
  • Key management method, key use method, key management device, key use device and key use equipment
  • Key management method, key use method, key management device, key use device and key use equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0189] Example 1. It is assumed that there are m=2 trusted institution nodes, key slice n=10, and the number of key slices stored by each key node is i=4.

[0190]Then, 2*4<10 satisfies the necessary conditions, and the number of client nodes needs to satisfy 16≤x≤208, then the complete user key can be obtained after obtaining the combination of key slices returned by at most 16 client nodes , key slices can be stored on 210 nodes (including two trusted institutions) in a non-repeating arrangement and combination.

[0191] Assuming that the probability of each key node losing the key segment is 50%, then at least 194 nodes and above will lose the key segment and the user key cannot be retrieved. The probability is about 50% to the 194th power, so basically It is impossible to lose the user key.

[0192] It can be seen from the above description that the number x of client nodes needs to meet the preset constraint range by setting, so as to ensure that the user key will not be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a secret key management method, a secret key use method, a secret key use device and equipment. The method comprises the steps: receiving a registration request sent by a user side, and enabling the registration request to comprise an identity identification of a user; generating a user key corresponding to the identity identifier; splitting the user key into a plurality of key slices; and combining the key slices according to a preset rule and then sending the key slices to each key node for storage, wherein each key node comprises a trusted mechanism node and a client node. According to the embodiment of the invention, the user key is split into the key slices, one part is stored in the credible institution node, and the other part is stored in the client node, so that the user key is not easy to lose; meanwhile, the user secret keys are dispersed in different secret key nodes, the possibility that all the nodes are attacked by the network is extremely low, the user secret keys are not prone to leakage, and the safety of the user secret keys is guaranteed.

Description

technical field [0001] Embodiments of the present disclosure relate to the technical field of data encryption in financial technology (Fintech), and in particular, to a key management method, key usage method, device, and equipment. Background technique [0002] With the development of computer technology, more and more technologies are applied in the financial field. The traditional financial industry is gradually transforming into Fintech, and data encryption technology is no exception. However, due to the security and real-time requirements of the financial industry, It also puts forward higher requirements for data encryption technology. [0003] At present, the key management of traditional financial-level data mainly includes two types: the first one is to encrypt and decrypt user data using the user key encryption institution key pair, and the user key client is stored locally, that is, the user key storage It is on the client side and is the unique user key; the use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06G06F21/60G06K9/62G06Q40/00
CPCH04L9/0897H04L63/06G06F21/602G06Q40/00G06F18/23
Inventor 顾俊
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products