CN102868521A - Method for enhancing secret key transmission of symmetrical secret key system - Google Patents

Method for enhancing secret key transmission of symmetrical secret key system Download PDF

Info

Publication number
CN102868521A
CN102868521A CN2012103358457A CN201210335845A CN102868521A CN 102868521 A CN102868521 A CN 102868521A CN 2012103358457 A CN2012103358457 A CN 2012103358457A CN 201210335845 A CN201210335845 A CN 201210335845A CN 102868521 A CN102868521 A CN 102868521A
Authority
CN
China
Prior art keywords
key
cipher machine
secret key
card
protective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103358457A
Other languages
Chinese (zh)
Other versions
CN102868521B (en
Inventor
李元正
廖成军
帅军军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201210335845.7A priority Critical patent/CN102868521B/en
Publication of CN102868521A publication Critical patent/CN102868521A/en
Application granted granted Critical
Publication of CN102868521B publication Critical patent/CN102868521B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method for enhancing the secret key transmission of a symmetrical secret key system. The method comprises the following steps of: (1) connecting a secret key management system with a main cipher machine and a target cipher machine respectively by a network; (2) calling the main cipher machine by the secret key management system through the network to randomly generate a shared protective secret key; (3) writing the protective secret key into a protective secret key IC (integrated circuit) card by the main cipher machine through a card reader per se; and (4) guiding secret key data in the protective secret key IC card into the target cipher machine, so that the share of the protective secret key between the main cipher machine and the target cipher machine can be realized. The secret key transmission method has the beneficial effects that all the secret keys can be directly issued to the cipher machines by the secret key management system, so that the safety of a secret key transmission process (guiding-in and guiding-out) can be guaranteed. According to the technology, the serious consequence caused by the decline of the whole safety of the symmetrical secret key system since the sensitive information in the IC card is leaked due to the executing related operations by the local card reader, the IC card and a data line can be avoided.

Description

A kind of cipher key transmission methods that strengthens the symmetric key system
Technical field
The present invention relates to information security cryptographic technique field, especially a kind of cipher key transmission methods that strengthens the symmetric key system.
Background technology
Cryptographic technique is the basic technology of information security, and key then is the basis of cryptographic technique Secure Application and the core element of informatization security.Along with the high speed of the information-based industry of China is all-round developing, also enter the comprehensive construction period based on the key management system of symmetric key system, the cipher key transmitting process that relates in the system is faced with more and more stricter security requirement.
Traditional cipher key delivery adopts IC-card to import the mode of cipher machine usually, finishes IC-card to the cipher key transmitting process between the cipher machine.During work in key management system input relevant information and the needed parameter of configuration, such as: the information such as IC-card type, IC-card password, key management system utilize card reader to read sensitive data and encapsulation format in the IC-card, by Internet Transmission to cipher machine; Cipher machine receives instruction, sensitive data and configuration parameter resolve and carry out after, with " return " key" management system as a result, finish the cipher key delivery operation.
Key management system utilizes card reader that the sensitive data in the IC-card is read usually in this locality, there is security risk in this process.The sensitive data that key management system reads in this locality is intercepted and captured and is revealed by backdoor programs such as wooden horse, viruses easily, causes sensitive data to be tampered.Simultaneously, IC-card sheet individuality is less, very easily causes card to lose in the card transmittance process, has brought potential safety hazard for related management department.Unauthorized person cracks the card of losing and attacks and analyze, and very easily causes the leakage of sensitive data, thereby causes serious consequence.
Summary of the invention
The purpose of this invention is to provide a kind of cipher key transmission methods that strengthens the symmetric key system, the method is directly carried out key distribution operation to cipher machine, can solve the security risk that exists in the above-mentioned cipher key transmitting process, improves the fail safe of cipher key delivery.
In order to achieve the above object, the technical solution used in the present invention is: a kind of cipher key transmission methods that strengthens the symmetric key system may further comprise the steps:
(1) key management system is connected with the target cipher machine with main cipher machine respectively by network;
(2) key management system produces shared Protective Key at random by network call master cipher machine;
(3) main cipher machine utilize self card reader with in the Protective Key write protection key IC-card;
(4) key data in the Protective Key IC-card is imported in the target cipher machine, realize the shared of Protective Key between main cipher machine and the target cipher machine;
(5) utilize main cipher machine to produce key authorization control IC-card 1, the target cipher machine produces key authorization control IC-card 2;
(6) key management system utilizes the Protective Key of main cipher machine that the inner key data of distribution that needs of main cipher machine is encrypted and exports to key management system, and key derivation process is subject to the control of key authorization control IC-card 1;
(7) key management system will import to from the key that main cipher machine obtains the target cipher machine again, and the target cipher machine utilizes the Protective Key of self to be decrypted data, and the key importing process is subject to the control of key authorization control IC-card 2.
Preferred steps: the inside of main cipher machine and target cipher machine is carried out the key zone and is divided.
Preferred steps: it is a-quadrant, B zone and C zone that the inside of main cipher machine and target cipher machine all is divided into Three regions.
In sum, owing to adopted technique scheme, the invention has the beneficial effects as follows:
1. cipher key delivery adopts point-to-point mode to transmit, and transmission course is in close attitude all the time;
2. key plain does not go out cipher machine, only has cipher machine inside clear text key could occur;
3. key distribution both sides palpus share protect key strengthens the fail safe that key imports;
4. the key zone of cipher machine storage inside is divided, the key in the zones of different scope has different cryptographic key protection export functions, strengthens the fail safe that key is derived;
5. when key management system is issued cipher machine, must insert key authorization control IC-card in cipher machine, this card is finished the authorization control that key imports (distribution) operation, guarantees to finish the key importing process in legal authorization control scope;
6. this technology has simple, safe, efficient advantage, has obvious intrinsic advantage in the fail safe that strengthens cipher key transmitting process;
Adopt technical method of the present invention, not only can when practical application, thoroughly avoid because this locality operates the security risk that IC-card brings by card reader, and strengthen the safety of cipher key transmitting process, improved the general safety of symmetric key system.Simultaneously, key management system adopts the mode of operation of invitation to subscribe cipher machine, avoid causing because of the IC-card mismanagement potential safety hazard of sensitive information leakage, reduced the specification requirement the when user is actual to be used, the actual input costs such as user's manpower and facility have been reduced, simplify the difficulty of cipher machine secret key distribution operation, greatly promoted the efficient of user's operation and maintenance.
Description of drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is traditional cipher key delivery mode schematic diagram;
Fig. 2 is cipher key delivery mode schematic diagram of the present invention.
Embodiment
Disclosed all features in this specification, or the step in disclosed all methods or the process except mutually exclusive feature and/or step, all can make up by any way.
Disclosed arbitrary feature in this specification (comprising any accessory claim, summary and accompanying drawing) is unless special narration all can be replaced by other equivalences or the alternative features with similar purpose.That is, unless special narration, each feature is an example in a series of equivalences or the similar characteristics.
Fig. 1 is current traditional cipher key delivery mode (IC-card importing cipher machine), and key management system reads sensitive information in the IC-card in this locality by card reader, and by network mode sensitive information is imported in the cipher machine and to store.This process is not carried out cryptographic key protection, key is not carried out partition management, does not have perfect authorization control mechanism, therefore has larger potential safety hazard.
Fig. 2 adopts the inventive method to strengthen the schematic diagram of cipher key delivery fail safe.Key management system and cipher machine share protect key; key after key management system will be protected utilizes network to import in the cipher machine; cipher machine utilizes the Protective Key decruption key data of self; obtain real key data; and be stored in the cipher machine, strengthened the safety of cipher key transmitting process.In the key importing process, be subject to the control of authority of strict key authorization card, guarantee the legitimacy of key import operation.
Cipher machine inside is carried out the key zone and is divided realization key partition management, the safety of assurance cryptographic key protection derivation process.Cipher machine internal condition cipher key index scope (0--999) is carried out the key zone and is divided (for example: A district (0--300), B district (301--600), C district (601--999)), and concrete regional division numbers can define according to the applicable cases of reality.Cipher machine imports the key of different attribute respectively or stores in the different key zones, and according to the rights of using of different key zone definitions, the scope of application of controlling key in the different keys zone (as: allows to import, allows to derive; Allow to import, forbid deriving; Allow to derive, forbid the performance constraints such as importing).Realized the security control of the cipher key delivery scope of application by key zone partition mechanism, guaranteed the use safety of cipher machine internal key, different attribute herein is self-defined, except being divided into Three regions, can also be divided into four zones, six zones, eight zones etc.
In addition, the inventive method has been removed local mode by card reader operation IC from, avoids causing because of IC-card misoperation or mismanagement the potential safety hazard of sensitive information leakage.
Each critical process is described in detail as follows:
(1) key management system is connected with the target cipher machine with main cipher machine respectively by network;
(2) key management system produces shared Protective Key at random by network call master cipher machine;
(3) main cipher machine utilize self card reader with in the Protective Key write protection key IC-card;
(4) key data in the Protective Key IC-card is imported in the target cipher machine, realize the shared of Protective Key between main cipher machine and the target cipher machine;
(5) utilize main cipher machine to produce key authorization control IC-card 1, the target cipher machine produces key authorization control IC-card 2;
(6) key management system utilizes the Protective Key of main cipher machine that the inner key data of distribution that needs of main cipher machine is encrypted and exports to key management system, and key derivation process is subject to the control of key authorization control IC-card 1;
(7) key management system will import to from the key that main cipher machine obtains the target cipher machine again, and the target cipher machine utilizes the Protective Key of self to be decrypted data, and the key importing process is subject to the control of key authorization control IC-card 2.
The key authorization control card is to be produced by cipher machine, is responsible for the cipher machine key and imports the authorization control operation.When key management system carries out the cipher key delivery operation to cipher machine, the key authorization control card need to be inserted in the cipher machine, carry out the control of authority of key import operation by the key authorization control card, the configuring cipher key management system is finished key distribution and the transmission between the cipher machine.
It is a-quadrant, B zone and C zone that the inside of main cipher machine and target cipher machine all is divided into Three regions.
The present invention is not limited to aforesaid embodiment.The present invention expands to any new feature or any new combination that discloses in this manual, and the arbitrary new method that discloses or step or any new combination of process.

Claims (3)

1. cipher key transmission methods that strengthens the symmetric key system is characterized in that: may further comprise the steps:
(1) key management system is connected with the target cipher machine with main cipher machine respectively by network;
(2) key management system produces shared Protective Key at random by network call master cipher machine;
(3) main cipher machine utilize self card reader with in the Protective Key write protection key IC-card;
(4) key data in the Protective Key IC-card is imported in the target cipher machine, realize the shared of Protective Key between main cipher machine and the target cipher machine;
(5) utilize main cipher machine to produce key authorization control IC-card 1, the target cipher machine produces key authorization control IC-card 2;
(6) key management system utilizes the Protective Key of main cipher machine that the inner key data of distribution that needs of main cipher machine is encrypted and exports to key management system, and key derivation process is subject to the control of key authorization control IC-card 1;
(7) key management system will import to from the key that main cipher machine obtains the target cipher machine again, and the target cipher machine utilizes the Protective Key of self to be decrypted data, and the key importing process is subject to the control of key authorization control IC-card 2.
2. a kind of cipher key transmission methods that strengthens the symmetric key system according to claim 1 is characterized in that: the inside of main cipher machine and target cipher machine is carried out the key zone and is divided.
3. a kind of cipher key transmission methods that strengthens the symmetric key system according to claim 1 and 2 is characterized in that: it is a-quadrant, B zone and C zone that the inside of main cipher machine and target cipher machine all is divided into Three regions.
CN201210335845.7A 2012-09-12 2012-09-12 Method for enhancing secret key transmission of symmetrical secret key system Active CN102868521B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210335845.7A CN102868521B (en) 2012-09-12 2012-09-12 Method for enhancing secret key transmission of symmetrical secret key system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210335845.7A CN102868521B (en) 2012-09-12 2012-09-12 Method for enhancing secret key transmission of symmetrical secret key system

Publications (2)

Publication Number Publication Date
CN102868521A true CN102868521A (en) 2013-01-09
CN102868521B CN102868521B (en) 2015-03-04

Family

ID=47447128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210335845.7A Active CN102868521B (en) 2012-09-12 2012-09-12 Method for enhancing secret key transmission of symmetrical secret key system

Country Status (1)

Country Link
CN (1) CN102868521B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729943A (en) * 2013-03-15 2014-04-16 福建联迪商用设备有限公司 Method and system for leading transmission secret key into KMS
CN104363090A (en) * 2014-11-19 2015-02-18 成都卫士通信息产业股份有限公司 Secret key distribution device and method for enhancing safety of banking terminal equipment
CN107070642A (en) * 2016-12-26 2017-08-18 贵州银行股份有限公司 Multi-brand cipher machine heterogeneous resource pond multiplexing technology
CN112115514A (en) * 2020-09-27 2020-12-22 浪潮云信息技术股份公司 Online request validity verification method for financial IC card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281585A (en) * 2008-05-07 2008-10-08 北京知安信科技有限公司 Intelligent cipher key and method for managing management password of intelligent IC card
CN101945099A (en) * 2010-07-27 2011-01-12 公安部第三研究所 Smart card external authentication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281585A (en) * 2008-05-07 2008-10-08 北京知安信科技有限公司 Intelligent cipher key and method for managing management password of intelligent IC card
CN101945099A (en) * 2010-07-27 2011-01-12 公安部第三研究所 Smart card external authentication method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103729943A (en) * 2013-03-15 2014-04-16 福建联迪商用设备有限公司 Method and system for leading transmission secret key into KMS
CN103729943B (en) * 2013-03-15 2015-12-30 福建联迪商用设备有限公司 A kind of method and system transmission security key being imported KMS system
CN104363090A (en) * 2014-11-19 2015-02-18 成都卫士通信息产业股份有限公司 Secret key distribution device and method for enhancing safety of banking terminal equipment
CN107070642A (en) * 2016-12-26 2017-08-18 贵州银行股份有限公司 Multi-brand cipher machine heterogeneous resource pond multiplexing technology
CN107070642B (en) * 2016-12-26 2020-07-21 贵州银行股份有限公司 Heterogeneous resource pool multiplexing technology for multi-brand cipher machine
CN112115514A (en) * 2020-09-27 2020-12-22 浪潮云信息技术股份公司 Online request validity verification method for financial IC card

Also Published As

Publication number Publication date
CN102868521B (en) 2015-03-04

Similar Documents

Publication Publication Date Title
CN105871558B (en) A kind of digital control system right management method based on USB flash disk physical serial numbers
CN101815291A (en) Method and system for logging on client automatically
CN101894235B (en) Smart card security session system
CN106452764A (en) Method for automatically updating identification private key and password system
CN104463016B (en) Data safety storing method suitable for IC cards and two-dimension codes
CN103077467A (en) Method and system for verifying product authenticity
CN103093365A (en) Method and system for verifying authenticity of product
WO2014149490A4 (en) Secure end-to-end permitting system for device operations
CN102932140A (en) Key backup method for enhancing safety of cipher machine
CN111768523B (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
CN107784207A (en) Display methods, device, equipment and the storage medium at financial APP interfaces
CN102868521B (en) Method for enhancing secret key transmission of symmetrical secret key system
CN104376631A (en) Commercial cipher algorithm based security access control system and implementation method thereof
CN103152425A (en) Safety management system for mobile device based on cloud technology
CN105608775B (en) A kind of method of authentication, terminal, access card and SAM card
CN116662957A (en) Identity authentication method, identity authentication device, computer readable storage medium and computer equipment
CN203276284U (en) Key control system
CN102831335A (en) Safety protecting method and safety protecting system of Windows operating system
CN102983969B (en) Security login system and security login method for operating system
CN105516210A (en) System and method for terminal security access authentication
CN102651079A (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN102801743B (en) Based on the SAP security sensitive information system of multi-party authorization and dynamic password
CN101369891A (en) Dynamic cipher authentication method and double-matrix dynamic password card
CN101266639A (en) Computer-aided design data encrypted protecting method based on hardware environment
CN102315944A (en) Seed key multi-time injection dynamic token, dynamic password authentication system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 333, Yunhua Road, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: 610041, No. 8, pioneering Road, hi tech Zone, Sichuan, Chengdu

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.

CP03 Change of name, title or address