Key management method and device thereof, electronic equipment and readable storage medium

A key management and key seed technology, applied in the information field, can solve problems such as key security damage

Active Publication Date: 2021-05-07
成都质数斯达克科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the database storing the key seed is attacked and the key seed is leaked, it will damage the security of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method and device thereof, electronic equipment and readable storage medium
  • Key management method and device thereof, electronic equipment and readable storage medium
  • Key management method and device thereof, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] In related technologies, when registering a new account, the user usually needs to input a key seed into the system. The system generates a key based on the key seed entered by the user and stores the key persistently. This key can be used to encrypt other keys, and can also sign or encrypt and decrypt business data during business operations.

[0030] In addition, after the system generates the key, it also saves the key seed used to generate the key. The saved key se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key management method and a device thereof, electronic equipment and a readable storage medium, and aims to improve the security of key management. The key management method comprises the following steps: obtaining a key seed; under the cooperation of a memory, generating a first key according to the key seed, and encrypting the first key to obtain a first key ciphertext; reading the first key ciphertext from a memory, persistently storing the first key ciphertext, and deleting the key seed and the first key from the memory; obtaining a key alternation request, wherein the key alternation request carries an original key seed input by a user when the user requests for key alternation; and generating a second secret key according to an original secret key seed carried by the secret key alternation request under the cooperation of a memory, and determining whether the user has the permission to carry out alternation on the first secret key ciphertext or not according to the second secret key and the first secret key ciphertext.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a key management method, device, electronic equipment and readable storage medium. Background technique [0002] In related technologies, when registering a new account, the user usually needs to input a key seed into the system. The system generates a key based on the key seed entered by the user and stores the key persistently. This key can be used to encrypt other keys, and can also sign or encrypt and decrypt business data during business operations. Taking the financial system as an example, when a certain merchant (such as a bank, a securities company, or an insurance company, etc.) needs to register a merchant-level account in the financial system, one or more administrators of the merchant enter a key seed into the financial system. The financial system generates a key based on the key seed entered by each administrator, and stores the key persistently. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L63/06H04L9/0861H04L9/0643
Inventor 王锐邓柯陈策
Owner 成都质数斯达克科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products