CN1320798C - Cipher key creating and distributing method and the computer network system therewith - Google Patents

Cipher key creating and distributing method and the computer network system therewith Download PDF

Info

Publication number
CN1320798C
CN1320798C CNB031138888A CN03113888A CN1320798C CN 1320798 C CN1320798 C CN 1320798C CN B031138888 A CNB031138888 A CN B031138888A CN 03113888 A CN03113888 A CN 03113888A CN 1320798 C CN1320798 C CN 1320798C
Authority
CN
China
Prior art keywords
key
computer
level
grades
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031138888A
Other languages
Chinese (zh)
Other versions
CN1527532A (en
Inventor
杜震波
周力棠
田国文
李华明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGDONG YIYE TECHNOLOGY Co Ltd
Original Assignee
GUANGDONG YIYE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGDONG YIYE TECHNOLOGY Co Ltd filed Critical GUANGDONG YIYE TECHNOLOGY Co Ltd
Priority to CNB031138888A priority Critical patent/CN1320798C/en
Publication of CN1527532A publication Critical patent/CN1527532A/en
Application granted granted Critical
Publication of CN1320798C publication Critical patent/CN1320798C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention relates to a method for generating and distributing cipher keys and a computer network system applying the method. The method comprises the following steps: a root cipher key generating step: a computer (FO) of a root cipher key and first level cipher keys utilizes a cipher generating program in the computer to generate a root cipher key; a primary key generating step: the root cipher key is used as an encryption factor, the computer (FO) of the root cipher key and the primary cipher keys generates the primary cipher keys through a scheduled algorithm; a primary key distributing step: through a computer communication network or an information carrier, the computer (FO) of the root cipher key and the primary cipher keys distributes / transmits the primary cipher keys to computers (Si) of secondary cipher keys; a secondary cipher key generating step: the received primary cipher keys are used as an encryption factor, the computers (Si) of the secondary cipher keys generate secondary cipher keys through a scheduled algorithm; a secondary cipher key distributing step: through the computer communication network or the information carrier, the computers (Si) of the secondary cipher keys distribute / transmit the secondary cipher keys to computers (Ti) of tertiary cipher keys or cipher key users (Ui).

Description

Key generation and distribution method and the computer network system of using this method
Invention field
The present invention relates to come with key the technical field of control data safety, specifically, the present invention is key generation and distribution method and the computer network system of using this method.
Background technology
Traditional key produces with the method for distributing and manage two kinds: (one) directly is stored in key with plaintext or ciphertext and comes broadcast key in the information carrier, when using key, carries out encryption and decryption by predetermined algorithm again after directly key being read or read; (2) form with key generator produces key, that is to say the algorithm stores that will produce key in certain hardware, relies on hardware to produce key.More than be two kinds of common key generations and distribution and management control method, for first method, it directly is stored in the form of key with plaintext or ciphertext in the information carrier, if in a single day key algorithm is cracked in this carrier or the carrier, then the effect of key just loses; For second method, it is to rely on the fail safe of hardware to strengthen the fail safe of key, the too high problem of implementation cost that so directly to bring a problem be exactly key, moreover this method directly is stored in the algorithm of key in the hardware, if hardware is cracked, then the security mechanism of key is also disintegrated immediately.
Summary of the invention
Purpose of the present invention is exactly the computer network system that key generation and distribution method will be provided and use this method, and it utilizes computer to realize the generation of key, and key is carried out safety management and control.
According to an aspect of of the present present invention, provide first kind of key to generate and distribution method, it is characterized in that it comprises: root key produces step, and root key and the utilization of one-level cipher key calculation machine password generating routine wherein produces root key; The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine generate the one-level key by pre-defined algorithm; One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine are with this one-level encryption key distribution/be transferred to secondary key computer; Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and the secondary key computer generates secondary key by pre-defined algorithm; The secondary key allocation step, by computer communication network or information carrier, the secondary key computer distributes/is transferred to three grades of cipher key calculation machines or key user with this secondary key.
Generate and distribution method according to above-mentioned key, it is characterized in that, also comprise: three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines generate three grades of keys by pre-defined algorithm; Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines are with this three grades of encryption key distribution/be transferred to next stage or key user; M key generates step and M encryption key distribution step, and wherein, M is the positive integer that equals greater than 1.
After above-mentioned one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., further comprise: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.Described key passback step can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Described key at different levels generates step and further comprises: key storage substep is about to generate the key that generates in the step at this key and stores in the corresponding key database;
According to an aspect of of the present present invention, also provide second kind of key to generate and distribution method, it is characterized in that it comprises: root key produces step, and primary centre computer utilization password generating routine wherein produces root key; The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each region, secondary center computer place is condition code, the primary centre computer is that a plurality of secondary center computers generate corresponding a plurality of one-level key by pre-defined algorithm, and this one-level key is stored in the primary centre database; One-level encryption key distribution step, by computer communication network or information carrier, the primary centre computer is with this one-level encryption key distribution/be transferred to secondary center computer; Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer place is condition code, the secondary center computer is that a plurality of tertiary centre computers generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in the secondary center database; The secondary key allocation step, by computer communication network or information carrier, the secondary center computer distributes/is transferred to next stage or key user with this secondary key; Secondary key passback step, by computer communication network or information carrier, the secondary center computer passes back to primary centre database the primary centre computer with the secondary key in its central database with from subordinate's key of its subordinate central computer passback.
Generate and distribution method according to above-mentioned key, it is characterized in that, it further comprises: three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, the tertiary centre computer generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in the tertiary centre database; Three grades of encryption key distribution steps, by computer communication network or information carrier, the tertiary centre computer is with this three grades of encryption key distribution/be transferred to key user; Three grades of keys passback steps, by computer communication network or information carrier, the tertiary centre computer passes back to secondary center database in the secondary center computer with these three grades of keys; M key generates step, a M encryption key distribution step and M key passback step, and wherein, M is the positive integer that equals greater than 1.
In the central database of above-mentioned each grade, all be provided with one or more zones, be used to store and manage the database area of the key and the corresponding data of next stage or all subordinates.
According to another aspect of the present invention, first kind of computer network system is provided, its uses and only to state first kind of key and generate and distribution method, it is characterized in that it comprises: root key and one-level cipher key calculation machine; A plurality of secondary key computers; A plurality of three grades of cipher key calculation machines.
Computer network system according to above-mentioned is characterized in that, further comprises: a plurality of level Four cipher key calculation machines; A plurality of Pyatyi cipher key calculation machines.Each cipher key calculation machine all comprises corresponding key database.
According to another aspect of the present invention, second kind of computer network system is provided, it uses described second kind of key to generate and distribution method, it is characterized in that it comprises: a primary centre computer; A plurality of secondary center computers; A plurality of tertiary centre computers.
Computer network system according to above-mentioned is characterized in that, further comprises: a plurality of quaternary center computers; A plurality of quinary center computers.Each central computer all comprises corresponding central database.
Description of drawings
Fig. 1 is according to the block diagram of key generation of the present invention with first embodiment of distribution method.
Fig. 2 is according to the block diagram of key generation of the present invention with second embodiment of distribution method.
Fig. 3 is according to the block diagram of key generation of the present invention with the 3rd embodiment of distribution method.
Fig. 4 is a schematic diagram, and it has shown the computer network system on the other hand, that use key generation of the present invention and distribution method according to the present invention.
The detailed description of embodiment
Below with reference to Fig. 1 to Fig. 4 explanation according to a kind of key generation of the present invention and distribution method and use the computer network system of this method.
Fig. 1 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and first embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and root key and one-level cipher key calculation machine F0 utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine F0 generate the one-level key by pre-defined algorithm;
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine F0 are with this one-level encryption key distribution/be transferred to secondary key computer Si;
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and secondary key computer Si generates secondary key by pre-defined algorithm;
The secondary key allocation step, by computer communication network or information carrier, secondary key computer Si distributes/is transferred to three grades of cipher key calculation machine Ti with this secondary key;
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machine Ti generate three grades of keys by pre-defined algorithm;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machine Ti are with this three grades of encryption key distribution/be transferred to key user Ui.Herein, three grades of keys are user key.
Generate and distribution method according to above-mentioned key, after above-mentioned one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., can comprise further: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.In Fig. 1, this passback step dots.
Above-mentioned key passback step, also can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
In the second embodiment of the present invention,, just must store each issue key for dynamic management and the periodic replacement that realizes key.Therefore, be necessary in each cipher key calculation machine, to increase corresponding key database.Fig. 2 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and second embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and root key and one-level cipher key calculation machine F0 utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine F0 generate the one-level key by pre-defined algorithm, and store this one-level key among the one-level key database FD0 (key storage substep);
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine F0 are with this one-level encryption key distribution/be transferred to secondary key computer Si;
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and the secondary key computer generates secondary key by pre-defined algorithm, and this secondary key is stored in (key storage substep) among the secondary key database SDi;
The secondary key allocation step, by computer communication network or information carrier, the secondary key computer distributes/is transferred to three grades of cipher key calculation machine Ti with this secondary key;
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines generate three grades of keys by pre-defined algorithm, and these three grades of keys are stored in (key storage substep) among three grades of key database TDi;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines are with this three grades of encryption key distribution/be transferred to key user Ui.
Generate and distribution method according to above-mentioned key, after one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., can comprise further: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.In Fig. 2, this passback step dots.In the key database of each grade, all be provided with one or more zones, be used to store and manage the database area (not shown) of the key of next stage or all subordinates.
Above-mentioned key passback step, also can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
Further, in the third embodiment of the present invention, key is being carried out on dynamic management and the periodic replacement basis, monitor for the ease of encryption key distribution and operating position subordinate, the function of above-mentioned cipher key calculation machine must be expanded, make it to have data management and analytic statistics function, thereby become central computer.The also corresponding central database that becomes of key database wherein is to receive key data and other corresponding data of subordinate's passback.Fig. 3 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and the 3rd embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and primary centre computer FC0 utilizes password generating routine wherein to produce root key;
The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each region, secondary center computer place is condition code, primary centre computer FC0 is that a plurality of secondary center computer SC0-SCn generate corresponding a plurality of one-level key by pre-defined algorithm, and stores this one-level key among the primary centre database FCD0 (key storage substep);
One-level encryption key distribution step, by computer communication network or information carrier, primary centre computer FC0 is with this one-level encryption key distribution/be transferred to secondary center computer SCi;
Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer place is condition code, secondary center computer SCi is that a plurality of tertiary centre computer TC0-TCn generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in (key storage substep) among the secondary center database SCDi;
The secondary key allocation step, by computer communication network or information carrier, secondary center computer SCi distributes/is transferred to tertiary centre computer TCi with this secondary key;
Three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, tertiary centre computer TCi generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in (key storage substep) among the tertiary centre database TCDi;
Three grades of encryption key distribution steps, by computer communication network or information carrier, tertiary centre computer (TCi) is with this three grades of encryption key distribution/be transferred to key user Ui;
Three grades of keys passback steps, by computer communication network or information carrier, tertiary centre computer TCi passes back to secondary center database SCDi among the secondary center computer SCi with these three grades of keys;
Secondary key passback step, by computer communication network or information carrier, secondary center computer SCi passes back to primary centre database FCDi the primary centre computer FCi with the secondary key in its central database with from three grades of keys of its tertiary centre computer TCi passback.
In the key database of above-mentioned each grade, all be provided with one or more zones, be used to store and manage the database area (not shown) of the key and the corresponding data of next stage or all subordinates.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
In Fig. 1 to 3, for simplicity, only show a secondary key computer, three grades of cipher key calculation machines.But, in practice, except root key and one-level cipher key calculation machine, a plurality of secondary key computers, a plurality of three grades of cipher key calculation machines (referring to Fig. 4) and corresponding key database or central database can be set as required.
Above-mentioned pre-defined algorithm can be present existing key schedule, also can be user-defined key schedule.Certainly, self-defining key schedule has more confidentiality than existing disclosed key schedule.
Can find out that from above-mentioned embodiment generating with distribution method according to key of the present invention is the key generation and the distribution method of a kind of " tree " type hierarchical structure.Wherein, key is to pass down step by step from top layer by network to distribute Zhongdao key user.Described level even be two layers according to actual needs, can be any multilayer.
And, generate and distribution method according to key of the present invention, key is to descend father's key of biography and subordinate's computer regional feature sign indicating number of living in or key user's log-on message condition code to be generated automatically by computer by special algorithm according to upper level, therefore, the key that is generated has high confidentiality.Wherein, subordinate's computer regional feature sign indicating number of living in, key user's log-on message condition code and described special algorithm are all maintained secrecy.And father's key that upper level passes down is directly to be imported into by higher level's computer directly to be received by the key generator in this grade computer, and described father's key is all formed by the root key procreation at first, and root key is produced by the key generator automatically by computer, therefore, the generation of whole key and assigning process all are promptly unmannedly to be produced automatically under for the situation of interfering maintaining secrecy for the computer operator by computer, and its confidentiality is high.In addition, because each key produces computer, each node in promptly described " tree " type architecture, resulting father's key all is different, therefore, even the key of certain key user or certain node is cracked, can not have influence on other key user and other node yet.Therefore, the fail safe of whole system is very high.
In addition, owing to generate and distribution method, be to adopt the method for software to implement according to key of the present invention, can change root key extremely easily at any time or termly.Because the replacing of root key, i.e. each key of replaceable whole network is so can further improve the confidentiality of this network.And, also provide a kind of reply solution easily and fast for the network that cracks.Further, this key dynamic, classification can be stored in the Database Systems of computer, can be for inquiry, statistics, tabulation usefulness.
Below in conjunction with Fig. 4 to being described in detail according to the present invention embodiment on the other hand, that use key of the present invention to generate with the computer network system of distribution method.
As shown in Figure 4, comprise: root key and one-level cipher key calculation machine F0, a plurality of secondary key computer S0-Sn, a plurality of three grades of cipher key calculation machine T0-Tn according to the computer network system of this embodiment of the invention.
As required, also can comprise a plurality of level Four cipher key calculation machines, a plurality of Pyatyi cipher key calculation machines or the like according to computer network system of the present invention.
For dynamic management and the periodic replacement that realizes key, just must store each issue key.Therefore, can in each cipher key calculation machine, increase corresponding key database.
Key is being carried out on dynamic management and the periodic replacement basis, monitor for the ease of encryption key distribution and operating position subordinate, the function of above-mentioned cipher key calculation machine must be expanded, and makes it to have data management and analytic statistics function, thereby becomes central computer.The also corresponding central database that becomes of key database wherein is to receive key data and other corresponding data of subordinate's passback.
According to key generation of the present invention and distribution method and the computer network system of using this method, can be used for the computer system that various needs use keys, such as: the tax control computer system, bank finance card computer system, or the like.It has strong security, safe, advantages such as cost is low, easy care, manageability.
The present invention is applicable to intelligent CPU card and manages certain application key of control.Especially need carry out large tracts of land at key propagates on a large scale, distributes under the situation, more can embody superiority of the present invention, therefore because it can utilize existing computer network system to finish the management control key, all has very big advantage aspect the fail safe of key and the popularization cost.

Claims (19)

1. a key generates and distribution method, it is characterized in that it comprises:
Root key produces step, and root key and one-level cipher key calculation machine (F0) utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine (F0) generate the one-level key by pre-defined algorithm;
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine (F0) are with this one-level encryption key distribution/be transferred to secondary key computer (Si);
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and secondary key computer (Si) generates secondary key by pre-defined algorithm;
The secondary key allocation step, by computer communication network or information carrier, secondary key computer (Si) distributes/is transferred to three grades of cipher key calculation machines (Ti) or key user (Ui) with this secondary key.
2. the key according to claim 1 generates and distribution method, it is characterized in that, also comprises:
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines (Ti) generate three grades of keys by pre-defined algorithm;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines (Ti) are with this three grades of encryption key distribution/be transferred to next stage or key user (Ui).
3. the key according to claim 1 generates and distribution method, it is characterized in that, after described secondary key allocation step, further comprise: secondary key passback step, promptly secondary key computer (Si) passes back to the secondary key that is generated in root key and the one-level cipher key calculation machine (F0) by computer communication network or information carrier.
4. the key according to claim 2 generates and distribution method, it is characterized in that, after described three grades of encryption key distribution steps, further comprise: three grades of key passback steps, promptly three grades of cipher key calculation machines (Ti) pass back to three grades of keys that generated in the computer of upper level by computer communication network or information carrier.
5. the key according to claim 3 or 4 generates and distribution method, it is characterized in that, in key passback steps at different levels, cipher key calculation machines at different levels pass back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
6. the key according to claim 1 or 2 generates and distribution method, it is characterized in that:
Described computer communication network is internet, telephone communication network or specific computer network.
7. the key according to claim 1 or 2 generates and distribution method, it is characterized in that:
Described information carrier is floppy disk, CD, removable hard disk, UBS moveable magnetic disc, magnetic card, IC-card or CPU card.
8. the key according to claim 1 or 2 generates and distribution method, it is characterized in that: keys at different levels generate step and further comprise: key storage substep is about to generate the key that generates in the step at this key and stores in the corresponding key database (FD0, SDi, TDi).
9. a key generates and distribution method, it is characterized in that it comprises:
Root key produces step, and primary centre computer (FC0) utilizes password generating routine wherein to produce root key;
The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each secondary center computer (SC0-SCn) region, place is condition code, primary centre computer (FC0) is that a plurality of secondary center computers (SC0-SCn) generate corresponding a plurality of one-level keys by pre-defined algorithm, and this one-level key is stored in the primary centre database (FCD0);
One-level encryption key distribution step, by computer communication network or information carrier, primary centre computer (FC0) is with this one-level encryption key distribution/be transferred to secondary center computer (SCi);
Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer (TC0-TCn) place is condition code, secondary center computer (SCi) is that a plurality of tertiary centre computers (TC0-TCn) generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in the secondary center database (SCDi);
The secondary key allocation step, by computer communication network or information carrier, secondary center computer (SCi) distributes/is transferred to next stage or key user (Ui) with this secondary key;
Secondary key passback step, by computer communication network or information carrier, secondary center computer (SCi) passes back to primary centre database (FCDi) the primary centre computer (FCi) with the secondary key in its central database with from subordinate's key of its subordinate central computer passback.
10. the key according to claim 9 generates and distribution method, it is characterized in that, it further comprises: three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, tertiary centre computer (TCi) generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in the tertiary centre database (TCDi);
Three grades of encryption key distribution steps, by computer communication network or information carrier, tertiary centre computer (TCi) is with this three grades of encryption key distribution/be transferred to key user (Ui);
Three grades of keys passback steps, by computer communication network or information carrier, tertiary centre computer (TCi) passes back to secondary center database (SCDi) in the secondary center computer (Sci) with these three grades of keys.
11. generate and distribution method according to the key of claim 9 or 10, it is characterized in that, in the central database of each grade, all be provided with one or more zones, be used to store and manage the database area of the key and the corresponding data of next stage or all subordinates.
12. the key according to claim 9 or 10 generates and distribution method, it is characterized in that:
Described computer communication network is internet, telephone communication network or specific computer network.
13. the key according to claim 9 or 10 generates and distribution method, it is characterized in that:
Described information carrier is floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card or CPU card.
14. a computer network system, it uses, and arbitrary described key generates and distribution method in the claim 1 to 8, it is characterized in that it comprises:
One-level cipher key calculation machine (F0) wherein is provided with a root key;
A plurality of secondary key computers under described root key and one-level computer level;
A plurality of three grades of cipher key calculation machines under described a plurality of secondary key computer levels.
15. the computer network system according to claim 14 is characterized in that, further comprises:
A plurality of level Four cipher key calculation machines under described a plurality of three grades of cipher key calculation machine levels;
A plurality of Pyatyi cipher key calculation machines under described a plurality of level Four cipher key calculation machine levels.
16. the computer network system according to claim 14 or 15 is characterized in that, each cipher key calculation machine all comprises corresponding key database.
17. a computer network system, it uses, and arbitrary described key generates and distribution method in the claim 9 to 13, it is characterized in that it comprises:
A primary centre computer (FC0);
A plurality of secondary center computers under described primary centre computer level;
A plurality of tertiary centre computers under described a plurality of secondary center computer levels.
18. the computer network system according to claim 17 is characterized in that, further comprises:
A plurality of quaternary center computers under described a plurality of tertiary centre computer levels;
A plurality of quinary center computers under described a plurality of quaternary center computer levels.
19. the computer network system according to claim 17 or 18 is characterized in that, each central computer all comprises corresponding central database.
CNB031138888A 2003-03-07 2003-03-07 Cipher key creating and distributing method and the computer network system therewith Expired - Fee Related CN1320798C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031138888A CN1320798C (en) 2003-03-07 2003-03-07 Cipher key creating and distributing method and the computer network system therewith

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031138888A CN1320798C (en) 2003-03-07 2003-03-07 Cipher key creating and distributing method and the computer network system therewith

Publications (2)

Publication Number Publication Date
CN1527532A CN1527532A (en) 2004-09-08
CN1320798C true CN1320798C (en) 2007-06-06

Family

ID=34283839

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031138888A Expired - Fee Related CN1320798C (en) 2003-03-07 2003-03-07 Cipher key creating and distributing method and the computer network system therewith

Country Status (1)

Country Link
CN (1) CN1320798C (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929303B (en) * 2013-01-11 2018-06-26 华立科技股份有限公司 A kind of key management apparatus of metering automation system
CN104022886B (en) * 2014-06-27 2018-04-27 深圳市捷顺科技实业股份有限公司 Safety certifying method, relevant apparatus and system applied to parking lot
CN104615942A (en) * 2015-02-25 2015-05-13 山东超越数控电子有限公司 Solid-state drive encryption key generation method
CN105893830B (en) * 2016-03-31 2018-08-21 成都银事达信息技术有限公司 Student's IC card business management method
CN106059771A (en) * 2016-05-06 2016-10-26 上海动联信息技术股份有限公司 Intelligent POS machine secret key management system and method
CN107070881B (en) * 2017-02-20 2020-11-27 北京古盘创世科技发展有限公司 Key management method, system and user terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4881264A (en) * 1987-07-30 1989-11-14 Merkle Ralph C Digital signature system and method based on a conventional encryption function
CN1159112A (en) * 1995-10-16 1997-09-10 索尼公司 Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4881264A (en) * 1987-07-30 1989-11-14 Merkle Ralph C Digital signature system and method based on a conventional encryption function
CN1159112A (en) * 1995-10-16 1997-09-10 索尼公司 Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium

Also Published As

Publication number Publication date
CN1527532A (en) 2004-09-08

Similar Documents

Publication Publication Date Title
Namasudra et al. Securing multimedia by using DNA-based encryption in the cloud computing environment
CN1949238A (en) Method and system for providing drm license
CN105160210B (en) A kind of software authorization method and system, software terminal and software manager
CN1694555A (en) Dynamic cipher system and method based on mobile communication terminal
CN1787431A (en) Apparatus, system, and method for transparent end-to-end security of storage data
CN1421000A (en) Generating key hierarchy for use in isolated execution environment
CN1879072A (en) System and method providing disconnected authentication
WO2012075446A2 (en) Attribute-based access-controlled data-storage system
US10862872B1 (en) Message-based database replication
CN101035135A (en) Digital certificate system applicable to the no/weak local storage client system
CN105656864A (en) TCM-based key management system and management method
CN1851724A (en) Business data operation coutrol method and business system
CN103294958A (en) Kernel-level virtual polymerization and parallel encryption method for class-oriented Linux system
CN101262352B (en) Uniform data accelerated processing method in integrated secure management
CN1320798C (en) Cipher key creating and distributing method and the computer network system therewith
Wang et al. ABACUS: Address-partitioned bloom filter on address checking for uniqueness in IoT blockchain
CN103139143A (en) Method, system and server for digital rights management (DRM)
CN1928936A (en) POS machine
CN1991800A (en) Fingerprint identification storage device and fingerprint identification method
CN101060398A (en) A new safety group safety certificate generating method, communication method, and network system
CN1892667A (en) Method and apparatus for managing DRM rights object in low-performance storage device
CN1992714A (en) Authority principal method based on trusted computing platform
CN1599313A (en) Password dynamic enciphering inputmethod of public emipering mode
CN1627275A (en) Method and system for storing divided files and restoring treatment
CN1633070A (en) A data encryption/decryption method and encryption/decryption apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070606

Termination date: 20200307

CF01 Termination of patent right due to non-payment of annual fee