CN105429752A - Processing method and system of user key in cloud environment - Google Patents
Processing method and system of user key in cloud environment Download PDFInfo
- Publication number
- CN105429752A CN105429752A CN201510764378.3A CN201510764378A CN105429752A CN 105429752 A CN105429752 A CN 105429752A CN 201510764378 A CN201510764378 A CN 201510764378A CN 105429752 A CN105429752 A CN 105429752A
- Authority
- CN
- China
- Prior art keywords
- key
- user
- equipment
- encrypted
- request instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510764378.3A CN105429752B (en) | 2015-11-10 | 2015-11-10 | The processing method and system of user key under a kind of cloud environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510764378.3A CN105429752B (en) | 2015-11-10 | 2015-11-10 | The processing method and system of user key under a kind of cloud environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105429752A true CN105429752A (en) | 2016-03-23 |
CN105429752B CN105429752B (en) | 2019-10-22 |
Family
ID=55507705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510764378.3A Active CN105429752B (en) | 2015-11-10 | 2015-11-10 | The processing method and system of user key under a kind of cloud environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105429752B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106059767A (en) * | 2016-08-17 | 2016-10-26 | 王树栋 | Terminal private data protection system and method based on Internet |
CN107070879A (en) * | 2017-02-15 | 2017-08-18 | 北京深思数盾科技股份有限公司 | Data guard method and system |
CN110264354A (en) * | 2019-05-31 | 2019-09-20 | 阿里巴巴集团控股有限公司 | It creates block chain account and verifies the method and device of block chain transaction |
CN110543764A (en) * | 2019-09-11 | 2019-12-06 | 天津飞腾信息技术有限公司 | System-on-chip memory protection method, password acceleration engine and memory protection device |
CN111213340A (en) * | 2017-10-16 | 2020-05-29 | 微软技术许可有限责任公司 | Selecting and securing attestation delegations for cryptographic functions |
WO2020182151A1 (en) * | 2019-03-11 | 2020-09-17 | 上海唯链信息科技有限公司 | Methods for splitting and recovering key, program product, storage medium, and system |
CN107302546B (en) * | 2017-08-16 | 2021-05-21 | 北京奇虎科技有限公司 | Big data platform security access system and method and electronic equipment |
US11108545B2 (en) | 2019-05-31 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Creating a blockchain account and verifying blockchain transactions |
CN114268435A (en) * | 2022-03-03 | 2022-04-01 | 南京易科腾信息技术有限公司 | Cloud password service communication method and device, electronic equipment and storage medium |
CN114697007A (en) * | 2020-12-29 | 2022-07-01 | 华为技术有限公司 | Method, corresponding device and system for managing secret key |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1939028A (en) * | 2004-02-13 | 2007-03-28 | 诺基亚有限公司 | Accessing protected data on network storage from multiple devices |
EP1835654A1 (en) * | 2006-02-28 | 2007-09-19 | Samsung Electronics Co., Ltd. | Method and apparatus for configuring key of groups contained in domain |
CN101346928A (en) * | 2006-01-19 | 2009-01-14 | 三星电子株式会社 | Method and apparatus for transmitting content to device which does not join domain |
CN103107994A (en) * | 2013-02-06 | 2013-05-15 | 中电长城网际系统应用有限公司 | Vitualization environment data security partition method and system |
CN104662870A (en) * | 2012-09-10 | 2015-05-27 | 云深系统有限公司 | Data security management system |
-
2015
- 2015-11-10 CN CN201510764378.3A patent/CN105429752B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1939028A (en) * | 2004-02-13 | 2007-03-28 | 诺基亚有限公司 | Accessing protected data on network storage from multiple devices |
CN101346928A (en) * | 2006-01-19 | 2009-01-14 | 三星电子株式会社 | Method and apparatus for transmitting content to device which does not join domain |
EP1835654A1 (en) * | 2006-02-28 | 2007-09-19 | Samsung Electronics Co., Ltd. | Method and apparatus for configuring key of groups contained in domain |
CN104662870A (en) * | 2012-09-10 | 2015-05-27 | 云深系统有限公司 | Data security management system |
CN103107994A (en) * | 2013-02-06 | 2013-05-15 | 中电长城网际系统应用有限公司 | Vitualization environment data security partition method and system |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106059767A (en) * | 2016-08-17 | 2016-10-26 | 王树栋 | Terminal private data protection system and method based on Internet |
CN107070879A (en) * | 2017-02-15 | 2017-08-18 | 北京深思数盾科技股份有限公司 | Data guard method and system |
WO2018149225A1 (en) * | 2017-02-15 | 2018-08-23 | 北京深思数盾科技股份有限公司 | Data protection method and system |
CN107070879B (en) * | 2017-02-15 | 2018-12-07 | 北京深思数盾科技股份有限公司 | Data guard method and system |
CN107302546B (en) * | 2017-08-16 | 2021-05-21 | 北京奇虎科技有限公司 | Big data platform security access system and method and electronic equipment |
CN111213340B (en) * | 2017-10-16 | 2023-05-09 | 微软技术许可有限责任公司 | Selecting attestation delegation for cryptographic functions and making it secure |
CN111213340A (en) * | 2017-10-16 | 2020-05-29 | 微软技术许可有限责任公司 | Selecting and securing attestation delegations for cryptographic functions |
WO2020182151A1 (en) * | 2019-03-11 | 2020-09-17 | 上海唯链信息科技有限公司 | Methods for splitting and recovering key, program product, storage medium, and system |
CN110264354A (en) * | 2019-05-31 | 2019-09-20 | 阿里巴巴集团控股有限公司 | It creates block chain account and verifies the method and device of block chain transaction |
CN110264354B (en) * | 2019-05-31 | 2020-09-01 | 阿里巴巴集团控股有限公司 | Method and device for creating block chain account and verifying block chain transaction |
US11108545B2 (en) | 2019-05-31 | 2021-08-31 | Advanced New Technologies Co., Ltd. | Creating a blockchain account and verifying blockchain transactions |
CN110543764B (en) * | 2019-09-11 | 2021-07-23 | 飞腾信息技术有限公司 | System-on-chip memory protection method, password acceleration engine and memory protection device |
CN110543764A (en) * | 2019-09-11 | 2019-12-06 | 天津飞腾信息技术有限公司 | System-on-chip memory protection method, password acceleration engine and memory protection device |
CN114697007A (en) * | 2020-12-29 | 2022-07-01 | 华为技术有限公司 | Method, corresponding device and system for managing secret key |
WO2022143358A1 (en) * | 2020-12-29 | 2022-07-07 | 华为技术有限公司 | Key management method, and corresponding apparatus and system |
CN114268435A (en) * | 2022-03-03 | 2022-04-01 | 南京易科腾信息技术有限公司 | Cloud password service communication method and device, electronic equipment and storage medium |
CN114268435B (en) * | 2022-03-03 | 2022-05-13 | 南京易科腾信息技术有限公司 | Cloud password service communication method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105429752B (en) | 2019-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105429752A (en) | Processing method and system of user key in cloud environment | |
CN110278078B (en) | Data processing method, device and system | |
CN103259651B (en) | A kind of method and system to terminal data encryption and decryption | |
CN103107995B (en) | A kind of cloud computing environment date safety storing system and method | |
CN105812332A (en) | Data protection method | |
CN105450620A (en) | Information processing method and device | |
CN106161402A (en) | Encryption equipment key injected system based on cloud environment, method and device | |
CN106209739A (en) | Cloud storage method and system | |
CN204360381U (en) | mobile device | |
JP2016513840A (en) | Method, server, host, and system for protecting data security | |
WO2022199290A1 (en) | Secure multi-party computation | |
CN106027503A (en) | Cloud storage data encryption method based on TPM | |
CN103107994A (en) | Vitualization environment data security partition method and system | |
KR101615137B1 (en) | Data access method based on attributed | |
CN110162998B (en) | Identity encryption equivalence test method, device, system and medium based on user group | |
CN103457932A (en) | Data safety storage method and system under cloud computing environment | |
CN105262590A (en) | Method and system for safely insulating keys in virtual environment | |
Yadav et al. | Mobile cloud computing issues and solution framework | |
Thilakanathan et al. | Secure multiparty data sharing in the cloud using hardware-based TPM devices | |
CN105721393A (en) | Data security encryption method and data security encryption device | |
CN102999710A (en) | Method, equipment and system for safely sharing digital content | |
CN105827411A (en) | Information processing method and apparatus | |
CN103873245A (en) | Virtual machine system data encryption method and apparatus | |
Reedy et al. | A Secure Framework for Ensuring EHR's Integrity Using Fine-Grained Auditing and CP-ABE | |
CN112822021B (en) | Key management method and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Lei Bo Inventor after: Chen Deyong Inventor after: Dong Guishan Inventor after: Wang Yunbing Inventor after: Hou Jianning Inventor after: Lei Zhenyu Inventor after: Leng Qingsong Inventor after: Liu Junbo Inventor after: Wang Feng Inventor after: Tang Zhongqian Inventor before: Lei Bo Inventor before: Dong Guishan Inventor before: Wang Yunbing Inventor before: Xia Fan Inventor before: Huang Bin Inventor before: Li Linxiao Inventor before: Deng Zijian Inventor before: Tang Zhongqian Inventor before: Yang Hong |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant |