CN1320798C - Cipher key creating and distributing method and the computer network system therewith - Google Patents
Cipher key creating and distributing method and the computer network system therewith Download PDFInfo
- Publication number
- CN1320798C CN1320798C CNB031138888A CN03113888A CN1320798C CN 1320798 C CN1320798 C CN 1320798C CN B031138888 A CNB031138888 A CN B031138888A CN 03113888 A CN03113888 A CN 03113888A CN 1320798 C CN1320798 C CN 1320798C
- Authority
- CN
- China
- Prior art keywords
- key
- computer
- level
- grades
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention relates to a method for generating and distributing cipher keys and a computer network system applying the method. The method comprises the following steps: a root cipher key generating step: a computer (FO) of a root cipher key and first level cipher keys utilizes a cipher generating program in the computer to generate a root cipher key; a primary key generating step: the root cipher key is used as an encryption factor, the computer (FO) of the root cipher key and the primary cipher keys generates the primary cipher keys through a scheduled algorithm; a primary key distributing step: through a computer communication network or an information carrier, the computer (FO) of the root cipher key and the primary cipher keys distributes / transmits the primary cipher keys to computers (Si) of secondary cipher keys; a secondary cipher key generating step: the received primary cipher keys are used as an encryption factor, the computers (Si) of the secondary cipher keys generate secondary cipher keys through a scheduled algorithm; a secondary cipher key distributing step: through the computer communication network or the information carrier, the computers (Si) of the secondary cipher keys distribute / transmit the secondary cipher keys to computers (Ti) of tertiary cipher keys or cipher key users (Ui).
Description
Invention field
The present invention relates to come with key the technical field of control data safety, specifically, the present invention is key generation and distribution method and the computer network system of using this method.
Background technology
Traditional key produces with the method for distributing and manage two kinds: (one) directly is stored in key with plaintext or ciphertext and comes broadcast key in the information carrier, when using key, carries out encryption and decryption by predetermined algorithm again after directly key being read or read; (2) form with key generator produces key, that is to say the algorithm stores that will produce key in certain hardware, relies on hardware to produce key.More than be two kinds of common key generations and distribution and management control method, for first method, it directly is stored in the form of key with plaintext or ciphertext in the information carrier, if in a single day key algorithm is cracked in this carrier or the carrier, then the effect of key just loses; For second method, it is to rely on the fail safe of hardware to strengthen the fail safe of key, the too high problem of implementation cost that so directly to bring a problem be exactly key, moreover this method directly is stored in the algorithm of key in the hardware, if hardware is cracked, then the security mechanism of key is also disintegrated immediately.
Summary of the invention
Purpose of the present invention is exactly the computer network system that key generation and distribution method will be provided and use this method, and it utilizes computer to realize the generation of key, and key is carried out safety management and control.
According to an aspect of of the present present invention, provide first kind of key to generate and distribution method, it is characterized in that it comprises: root key produces step, and root key and the utilization of one-level cipher key calculation machine password generating routine wherein produces root key; The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine generate the one-level key by pre-defined algorithm; One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine are with this one-level encryption key distribution/be transferred to secondary key computer; Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and the secondary key computer generates secondary key by pre-defined algorithm; The secondary key allocation step, by computer communication network or information carrier, the secondary key computer distributes/is transferred to three grades of cipher key calculation machines or key user with this secondary key.
Generate and distribution method according to above-mentioned key, it is characterized in that, also comprise: three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines generate three grades of keys by pre-defined algorithm; Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines are with this three grades of encryption key distribution/be transferred to next stage or key user; M key generates step and M encryption key distribution step, and wherein, M is the positive integer that equals greater than 1.
After above-mentioned one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., further comprise: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.Described key passback step can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Described key at different levels generates step and further comprises: key storage substep is about to generate the key that generates in the step at this key and stores in the corresponding key database;
According to an aspect of of the present present invention, also provide second kind of key to generate and distribution method, it is characterized in that it comprises: root key produces step, and primary centre computer utilization password generating routine wherein produces root key; The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each region, secondary center computer place is condition code, the primary centre computer is that a plurality of secondary center computers generate corresponding a plurality of one-level key by pre-defined algorithm, and this one-level key is stored in the primary centre database; One-level encryption key distribution step, by computer communication network or information carrier, the primary centre computer is with this one-level encryption key distribution/be transferred to secondary center computer; Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer place is condition code, the secondary center computer is that a plurality of tertiary centre computers generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in the secondary center database; The secondary key allocation step, by computer communication network or information carrier, the secondary center computer distributes/is transferred to next stage or key user with this secondary key; Secondary key passback step, by computer communication network or information carrier, the secondary center computer passes back to primary centre database the primary centre computer with the secondary key in its central database with from subordinate's key of its subordinate central computer passback.
Generate and distribution method according to above-mentioned key, it is characterized in that, it further comprises: three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, the tertiary centre computer generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in the tertiary centre database; Three grades of encryption key distribution steps, by computer communication network or information carrier, the tertiary centre computer is with this three grades of encryption key distribution/be transferred to key user; Three grades of keys passback steps, by computer communication network or information carrier, the tertiary centre computer passes back to secondary center database in the secondary center computer with these three grades of keys; M key generates step, a M encryption key distribution step and M key passback step, and wherein, M is the positive integer that equals greater than 1.
In the central database of above-mentioned each grade, all be provided with one or more zones, be used to store and manage the database area of the key and the corresponding data of next stage or all subordinates.
According to another aspect of the present invention, first kind of computer network system is provided, its uses and only to state first kind of key and generate and distribution method, it is characterized in that it comprises: root key and one-level cipher key calculation machine; A plurality of secondary key computers; A plurality of three grades of cipher key calculation machines.
Computer network system according to above-mentioned is characterized in that, further comprises: a plurality of level Four cipher key calculation machines; A plurality of Pyatyi cipher key calculation machines.Each cipher key calculation machine all comprises corresponding key database.
According to another aspect of the present invention, second kind of computer network system is provided, it uses described second kind of key to generate and distribution method, it is characterized in that it comprises: a primary centre computer; A plurality of secondary center computers; A plurality of tertiary centre computers.
Computer network system according to above-mentioned is characterized in that, further comprises: a plurality of quaternary center computers; A plurality of quinary center computers.Each central computer all comprises corresponding central database.
Description of drawings
Fig. 1 is according to the block diagram of key generation of the present invention with first embodiment of distribution method.
Fig. 2 is according to the block diagram of key generation of the present invention with second embodiment of distribution method.
Fig. 3 is according to the block diagram of key generation of the present invention with the 3rd embodiment of distribution method.
Fig. 4 is a schematic diagram, and it has shown the computer network system on the other hand, that use key generation of the present invention and distribution method according to the present invention.
The detailed description of embodiment
Below with reference to Fig. 1 to Fig. 4 explanation according to a kind of key generation of the present invention and distribution method and use the computer network system of this method.
Fig. 1 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and first embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and root key and one-level cipher key calculation machine F0 utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine F0 generate the one-level key by pre-defined algorithm;
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine F0 are with this one-level encryption key distribution/be transferred to secondary key computer Si;
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and secondary key computer Si generates secondary key by pre-defined algorithm;
The secondary key allocation step, by computer communication network or information carrier, secondary key computer Si distributes/is transferred to three grades of cipher key calculation machine Ti with this secondary key;
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machine Ti generate three grades of keys by pre-defined algorithm;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machine Ti are with this three grades of encryption key distribution/be transferred to key user Ui.Herein, three grades of keys are user key.
Generate and distribution method according to above-mentioned key, after above-mentioned one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., can comprise further: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.In Fig. 1, this passback step dots.
Above-mentioned key passback step, also can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
In the second embodiment of the present invention,, just must store each issue key for dynamic management and the periodic replacement that realizes key.Therefore, be necessary in each cipher key calculation machine, to increase corresponding key database.Fig. 2 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and second embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and root key and one-level cipher key calculation machine F0 utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine F0 generate the one-level key by pre-defined algorithm, and store this one-level key among the one-level key database FD0 (key storage substep);
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine F0 are with this one-level encryption key distribution/be transferred to secondary key computer Si;
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and the secondary key computer generates secondary key by pre-defined algorithm, and this secondary key is stored in (key storage substep) among the secondary key database SDi;
The secondary key allocation step, by computer communication network or information carrier, the secondary key computer distributes/is transferred to three grades of cipher key calculation machine Ti with this secondary key;
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines generate three grades of keys by pre-defined algorithm, and these three grades of keys are stored in (key storage substep) among three grades of key database TDi;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines are with this three grades of encryption key distribution/be transferred to key user Ui.
Generate and distribution method according to above-mentioned key, after one-level encryption key distribution step, secondary key allocation step, three grades of encryption key distribution steps etc., can comprise further: key passback step, promptly each rank cipher key calculation machine passes back to the key at the corresponding levels that is generated in the computer of upper level by computer communication network or information carrier.In Fig. 2, this passback step dots.In the key database of each grade, all be provided with one or more zones, be used to store and manage the database area (not shown) of the key of next stage or all subordinates.
Above-mentioned key passback step, also can change into: the cipher key calculation machine in each rank passes back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
Further, in the third embodiment of the present invention, key is being carried out on dynamic management and the periodic replacement basis, monitor for the ease of encryption key distribution and operating position subordinate, the function of above-mentioned cipher key calculation machine must be expanded, make it to have data management and analytic statistics function, thereby become central computer.The also corresponding central database that becomes of key database wherein is to receive key data and other corresponding data of subordinate's passback.Fig. 3 is a schematic diagram, and it has shown that a kind of key according to the present invention generates and the 3rd embodiment of distribution method.A kind of key according to present embodiment generates and distribution method, comprising:
Root key produces step, and primary centre computer FC0 utilizes password generating routine wherein to produce root key;
The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each region, secondary center computer place is condition code, primary centre computer FC0 is that a plurality of secondary center computer SC0-SCn generate corresponding a plurality of one-level key by pre-defined algorithm, and stores this one-level key among the primary centre database FCD0 (key storage substep);
One-level encryption key distribution step, by computer communication network or information carrier, primary centre computer FC0 is with this one-level encryption key distribution/be transferred to secondary center computer SCi;
Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer place is condition code, secondary center computer SCi is that a plurality of tertiary centre computer TC0-TCn generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in (key storage substep) among the secondary center database SCDi;
The secondary key allocation step, by computer communication network or information carrier, secondary center computer SCi distributes/is transferred to tertiary centre computer TCi with this secondary key;
Three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, tertiary centre computer TCi generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in (key storage substep) among the tertiary centre database TCDi;
Three grades of encryption key distribution steps, by computer communication network or information carrier, tertiary centre computer (TCi) is with this three grades of encryption key distribution/be transferred to key user Ui;
Three grades of keys passback steps, by computer communication network or information carrier, tertiary centre computer TCi passes back to secondary center database SCDi among the secondary center computer SCi with these three grades of keys;
Secondary key passback step, by computer communication network or information carrier, secondary center computer SCi passes back to primary centre database FCDi the primary centre computer FCi with the secondary key in its central database with from three grades of keys of its tertiary centre computer TCi passback.
In the key database of above-mentioned each grade, all be provided with one or more zones, be used to store and manage the database area (not shown) of the key and the corresponding data of next stage or all subordinates.
Above-mentioned computer communication network can be internet, telephone communication network, specific computer network or the like.
Above-mentioned information carrier can be floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card, CPU card or the like.
In Fig. 1 to 3, for simplicity, only show a secondary key computer, three grades of cipher key calculation machines.But, in practice, except root key and one-level cipher key calculation machine, a plurality of secondary key computers, a plurality of three grades of cipher key calculation machines (referring to Fig. 4) and corresponding key database or central database can be set as required.
Above-mentioned pre-defined algorithm can be present existing key schedule, also can be user-defined key schedule.Certainly, self-defining key schedule has more confidentiality than existing disclosed key schedule.
Can find out that from above-mentioned embodiment generating with distribution method according to key of the present invention is the key generation and the distribution method of a kind of " tree " type hierarchical structure.Wherein, key is to pass down step by step from top layer by network to distribute Zhongdao key user.Described level even be two layers according to actual needs, can be any multilayer.
And, generate and distribution method according to key of the present invention, key is to descend father's key of biography and subordinate's computer regional feature sign indicating number of living in or key user's log-on message condition code to be generated automatically by computer by special algorithm according to upper level, therefore, the key that is generated has high confidentiality.Wherein, subordinate's computer regional feature sign indicating number of living in, key user's log-on message condition code and described special algorithm are all maintained secrecy.And father's key that upper level passes down is directly to be imported into by higher level's computer directly to be received by the key generator in this grade computer, and described father's key is all formed by the root key procreation at first, and root key is produced by the key generator automatically by computer, therefore, the generation of whole key and assigning process all are promptly unmannedly to be produced automatically under for the situation of interfering maintaining secrecy for the computer operator by computer, and its confidentiality is high.In addition, because each key produces computer, each node in promptly described " tree " type architecture, resulting father's key all is different, therefore, even the key of certain key user or certain node is cracked, can not have influence on other key user and other node yet.Therefore, the fail safe of whole system is very high.
In addition, owing to generate and distribution method, be to adopt the method for software to implement according to key of the present invention, can change root key extremely easily at any time or termly.Because the replacing of root key, i.e. each key of replaceable whole network is so can further improve the confidentiality of this network.And, also provide a kind of reply solution easily and fast for the network that cracks.Further, this key dynamic, classification can be stored in the Database Systems of computer, can be for inquiry, statistics, tabulation usefulness.
Below in conjunction with Fig. 4 to being described in detail according to the present invention embodiment on the other hand, that use key of the present invention to generate with the computer network system of distribution method.
As shown in Figure 4, comprise: root key and one-level cipher key calculation machine F0, a plurality of secondary key computer S0-Sn, a plurality of three grades of cipher key calculation machine T0-Tn according to the computer network system of this embodiment of the invention.
As required, also can comprise a plurality of level Four cipher key calculation machines, a plurality of Pyatyi cipher key calculation machines or the like according to computer network system of the present invention.
For dynamic management and the periodic replacement that realizes key, just must store each issue key.Therefore, can in each cipher key calculation machine, increase corresponding key database.
Key is being carried out on dynamic management and the periodic replacement basis, monitor for the ease of encryption key distribution and operating position subordinate, the function of above-mentioned cipher key calculation machine must be expanded, and makes it to have data management and analytic statistics function, thereby becomes central computer.The also corresponding central database that becomes of key database wherein is to receive key data and other corresponding data of subordinate's passback.
According to key generation of the present invention and distribution method and the computer network system of using this method, can be used for the computer system that various needs use keys, such as: the tax control computer system, bank finance card computer system, or the like.It has strong security, safe, advantages such as cost is low, easy care, manageability.
The present invention is applicable to intelligent CPU card and manages certain application key of control.Especially need carry out large tracts of land at key propagates on a large scale, distributes under the situation, more can embody superiority of the present invention, therefore because it can utilize existing computer network system to finish the management control key, all has very big advantage aspect the fail safe of key and the popularization cost.
Claims (19)
1. a key generates and distribution method, it is characterized in that it comprises:
Root key produces step, and root key and one-level cipher key calculation machine (F0) utilize password generating routine wherein to produce root key;
The one-level key generates step, serves as to encrypt the factor with above-mentioned root key, and root key and one-level cipher key calculation machine (F0) generate the one-level key by pre-defined algorithm;
One-level encryption key distribution step, by computer communication network or information carrier, root key and one-level cipher key calculation machine (F0) are with this one-level encryption key distribution/be transferred to secondary key computer (Si);
Secondary key generates step, serves as to encrypt the factor with the one-level key that receives, and secondary key computer (Si) generates secondary key by pre-defined algorithm;
The secondary key allocation step, by computer communication network or information carrier, secondary key computer (Si) distributes/is transferred to three grades of cipher key calculation machines (Ti) or key user (Ui) with this secondary key.
2. the key according to claim 1 generates and distribution method, it is characterized in that, also comprises:
Three grades of keys generate step, serve as to encrypt the factor with the secondary key that receives, and three grades of cipher key calculation machines (Ti) generate three grades of keys by pre-defined algorithm;
Three grades of encryption key distribution steps, by computer communication network or information carrier, three grades of cipher key calculation machines (Ti) are with this three grades of encryption key distribution/be transferred to next stage or key user (Ui).
3. the key according to claim 1 generates and distribution method, it is characterized in that, after described secondary key allocation step, further comprise: secondary key passback step, promptly secondary key computer (Si) passes back to the secondary key that is generated in root key and the one-level cipher key calculation machine (F0) by computer communication network or information carrier.
4. the key according to claim 2 generates and distribution method, it is characterized in that, after described three grades of encryption key distribution steps, further comprise: three grades of key passback steps, promptly three grades of cipher key calculation machines (Ti) pass back to three grades of keys that generated in the computer of upper level by computer communication network or information carrier.
5. the key according to claim 3 or 4 generates and distribution method, it is characterized in that, in key passback steps at different levels, cipher key calculation machines at different levels pass back to all key datas in its key database in the computer of upper level by computer communication network or information carrier termly.
6. the key according to claim 1 or 2 generates and distribution method, it is characterized in that:
Described computer communication network is internet, telephone communication network or specific computer network.
7. the key according to claim 1 or 2 generates and distribution method, it is characterized in that:
Described information carrier is floppy disk, CD, removable hard disk, UBS moveable magnetic disc, magnetic card, IC-card or CPU card.
8. the key according to claim 1 or 2 generates and distribution method, it is characterized in that: keys at different levels generate step and further comprise: key storage substep is about to generate the key that generates in the step at this key and stores in the corresponding key database (FD0, SDi, TDi).
9. a key generates and distribution method, it is characterized in that it comprises:
Root key produces step, and primary centre computer (FC0) utilizes password generating routine wherein to produce root key;
The one-level key generates step, with above-mentioned root key serves as to encrypt the factor, with each secondary center computer (SC0-SCn) region, place is condition code, primary centre computer (FC0) is that a plurality of secondary center computers (SC0-SCn) generate corresponding a plurality of one-level keys by pre-defined algorithm, and this one-level key is stored in the primary centre database (FCD0);
One-level encryption key distribution step, by computer communication network or information carrier, primary centre computer (FC0) is with this one-level encryption key distribution/be transferred to secondary center computer (SCi);
Secondary key generates step, with the one-level key that receives serves as to encrypt the factor, with each sub-region, tertiary centre computer (TC0-TCn) place is condition code, secondary center computer (SCi) is that a plurality of tertiary centre computers (TC0-TCn) generate a plurality of secondary keys by pre-defined algorithm, and this secondary key is stored in the secondary center database (SCDi);
The secondary key allocation step, by computer communication network or information carrier, secondary center computer (SCi) distributes/is transferred to next stage or key user (Ui) with this secondary key;
Secondary key passback step, by computer communication network or information carrier, secondary center computer (SCi) passes back to primary centre database (FCDi) the primary centre computer (FCi) with the secondary key in its central database with from subordinate's key of its subordinate central computer passback.
10. the key according to claim 9 generates and distribution method, it is characterized in that, it further comprises: three grades of keys generate step, with the secondary key that receives serves as to encrypt the factor, log-on message with each key user is a condition code, tertiary centre computer (TCi) generates a plurality of three grades of keys by pre-defined algorithm, and these three grades of keys are stored in the tertiary centre database (TCDi);
Three grades of encryption key distribution steps, by computer communication network or information carrier, tertiary centre computer (TCi) is with this three grades of encryption key distribution/be transferred to key user (Ui);
Three grades of keys passback steps, by computer communication network or information carrier, tertiary centre computer (TCi) passes back to secondary center database (SCDi) in the secondary center computer (Sci) with these three grades of keys.
11. generate and distribution method according to the key of claim 9 or 10, it is characterized in that, in the central database of each grade, all be provided with one or more zones, be used to store and manage the database area of the key and the corresponding data of next stage or all subordinates.
12. the key according to claim 9 or 10 generates and distribution method, it is characterized in that:
Described computer communication network is internet, telephone communication network or specific computer network.
13. the key according to claim 9 or 10 generates and distribution method, it is characterized in that:
Described information carrier is floppy disk, CD, removable hard disk, USB moveable magnetic disc, magnetic card, IC-card or CPU card.
14. a computer network system, it uses, and arbitrary described key generates and distribution method in the claim 1 to 8, it is characterized in that it comprises:
One-level cipher key calculation machine (F0) wherein is provided with a root key;
A plurality of secondary key computers under described root key and one-level computer level;
A plurality of three grades of cipher key calculation machines under described a plurality of secondary key computer levels.
15. the computer network system according to claim 14 is characterized in that, further comprises:
A plurality of level Four cipher key calculation machines under described a plurality of three grades of cipher key calculation machine levels;
A plurality of Pyatyi cipher key calculation machines under described a plurality of level Four cipher key calculation machine levels.
16. the computer network system according to claim 14 or 15 is characterized in that, each cipher key calculation machine all comprises corresponding key database.
17. a computer network system, it uses, and arbitrary described key generates and distribution method in the claim 9 to 13, it is characterized in that it comprises:
A primary centre computer (FC0);
A plurality of secondary center computers under described primary centre computer level;
A plurality of tertiary centre computers under described a plurality of secondary center computer levels.
18. the computer network system according to claim 17 is characterized in that, further comprises:
A plurality of quaternary center computers under described a plurality of tertiary centre computer levels;
A plurality of quinary center computers under described a plurality of quaternary center computer levels.
19. the computer network system according to claim 17 or 18 is characterized in that, each central computer all comprises corresponding central database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031138888A CN1320798C (en) | 2003-03-07 | 2003-03-07 | Cipher key creating and distributing method and the computer network system therewith |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031138888A CN1320798C (en) | 2003-03-07 | 2003-03-07 | Cipher key creating and distributing method and the computer network system therewith |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1527532A CN1527532A (en) | 2004-09-08 |
CN1320798C true CN1320798C (en) | 2007-06-06 |
Family
ID=34283839
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031138888A Expired - Fee Related CN1320798C (en) | 2003-03-07 | 2003-03-07 | Cipher key creating and distributing method and the computer network system therewith |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1320798C (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929303B (en) * | 2013-01-11 | 2018-06-26 | 华立科技股份有限公司 | A kind of key management apparatus of metering automation system |
CN104022886B (en) * | 2014-06-27 | 2018-04-27 | 深圳市捷顺科技实业股份有限公司 | Safety certifying method, relevant apparatus and system applied to parking lot |
CN104615942A (en) * | 2015-02-25 | 2015-05-13 | 山东超越数控电子有限公司 | Solid-state drive encryption key generation method |
CN105893830B (en) * | 2016-03-31 | 2018-08-21 | 成都银事达信息技术有限公司 | Student's IC card business management method |
CN106059771A (en) * | 2016-05-06 | 2016-10-26 | 上海动联信息技术股份有限公司 | Intelligent POS machine secret key management system and method |
CN107070881B (en) * | 2017-02-20 | 2020-11-27 | 北京古盘创世科技发展有限公司 | Key management method, system and user terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
CN1159112A (en) * | 1995-10-16 | 1997-09-10 | 索尼公司 | Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium |
-
2003
- 2003-03-07 CN CNB031138888A patent/CN1320798C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4881264A (en) * | 1987-07-30 | 1989-11-14 | Merkle Ralph C | Digital signature system and method based on a conventional encryption function |
CN1159112A (en) * | 1995-10-16 | 1997-09-10 | 索尼公司 | Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium |
Also Published As
Publication number | Publication date |
---|---|
CN1527532A (en) | 2004-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Namasudra et al. | Securing multimedia by using DNA-based encryption in the cloud computing environment | |
CN1949238A (en) | Method and system for providing drm license | |
CN105160210B (en) | A kind of software authorization method and system, software terminal and software manager | |
CN1694555A (en) | Dynamic cipher system and method based on mobile communication terminal | |
CN1787431A (en) | Apparatus, system, and method for transparent end-to-end security of storage data | |
CN1421000A (en) | Generating key hierarchy for use in isolated execution environment | |
CN1879072A (en) | System and method providing disconnected authentication | |
WO2012075446A2 (en) | Attribute-based access-controlled data-storage system | |
US10862872B1 (en) | Message-based database replication | |
CN101035135A (en) | Digital certificate system applicable to the no/weak local storage client system | |
CN105656864A (en) | TCM-based key management system and management method | |
CN1851724A (en) | Business data operation coutrol method and business system | |
CN103294958A (en) | Kernel-level virtual polymerization and parallel encryption method for class-oriented Linux system | |
CN101262352B (en) | Uniform data accelerated processing method in integrated secure management | |
CN1320798C (en) | Cipher key creating and distributing method and the computer network system therewith | |
Wang et al. | ABACUS: Address-partitioned bloom filter on address checking for uniqueness in IoT blockchain | |
CN103139143A (en) | Method, system and server for digital rights management (DRM) | |
CN1928936A (en) | POS machine | |
CN1991800A (en) | Fingerprint identification storage device and fingerprint identification method | |
CN101060398A (en) | A new safety group safety certificate generating method, communication method, and network system | |
CN1892667A (en) | Method and apparatus for managing DRM rights object in low-performance storage device | |
CN1992714A (en) | Authority principal method based on trusted computing platform | |
CN1599313A (en) | Password dynamic enciphering inputmethod of public emipering mode | |
CN1627275A (en) | Method and system for storing divided files and restoring treatment | |
CN1633070A (en) | A data encryption/decryption method and encryption/decryption apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070606 Termination date: 20200307 |
|
CF01 | Termination of patent right due to non-payment of annual fee |