CN109462474A - The generation method and relevant apparatus of Fernet key in a kind of Keystone - Google Patents

The generation method and relevant apparatus of Fernet key in a kind of Keystone Download PDF

Info

Publication number
CN109462474A
CN109462474A CN201811353659.XA CN201811353659A CN109462474A CN 109462474 A CN109462474 A CN 109462474A CN 201811353659 A CN201811353659 A CN 201811353659A CN 109462474 A CN109462474 A CN 109462474A
Authority
CN
China
Prior art keywords
key
random value
fernet
keystone
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811353659.XA
Other languages
Chinese (zh)
Inventor
许鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811353659.XA priority Critical patent/CN109462474A/en
Publication of CN109462474A publication Critical patent/CN109462474A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The generation method of Fernet key in a kind of Keystone provided herein, comprising: after the key request for receiving Keystone, send the corresponding key of key request to credible chip and generate instruction;After credible chip generates instruction generation random value according to key, random value is received;Keystone is back to using random value as Fernet key.By deficiency of the existing system stochastic source in terms of the randomness and efficiency for generating random value being solved, improving the randomness of random value using credible chip as the stochastic source of Fernet key, be conducive to the safety and working performance that improve Fernet key.Present invention also provides the generation system of Fernet key, a kind of computer readable storage medium and a kind of servers in a kind of Keystone, have above-mentioned beneficial effect.

Description

The generation method and relevant apparatus of Fernet key in a kind of Keystone
Technical field
This application involves cloud service field, in particular to the generation method of Fernet key, generation in a kind of Keystone System, a kind of computer readable storage medium and a kind of server.
Background technique
OpenStack is one it is intended that public and private clound construction provides the open source projects of software with management, by several A main component, which combines, completes specific works.OpenStack supports that almost all kinds of cloud environment, project objective are Offer implementation is simple, can extend, enrich on a large scale, the cloud computing management platform that standard is unified.OpenStack passes through various complementations The service facility that provides the foundation service the solution of (IaaS), each service provides API to be integrated.KeyStone It is the Identity Management component in OpenStack, provides the service such as authorization, certification for other assemblies.KeyStone is available Fernet token is verified the Fernet that rear other assemblies can be issued using KeyStone as the mark after authentication Token accesses other assemblies or service.
Currently, the Fernet key in KeyStone is generated using the pseudorandom source of system offer, linux system Used in be /dev/unrandom equipment as stochastic source generate Fernet key.And/dev/unrandom equipment is random Property is poor, is subject to attack.
Summary of the invention
The purpose of the application is to provide generation method, the generation system, Yi Zhongji of Fernet key in a kind of Keystone Calculation machine readable storage medium storing program for executing and a kind of server, solve in the prior art using pseudorandom source generate Fernet key bring with The problem of machine difference.
In order to solve the above technical problems, the application provides a kind of generation method of Fernet key in Keystone, specifically Technical solution is as follows:
After the key request for receiving Keystone, the corresponding key generation of the key request is sent to credible chip and is referred to It enables;
After the credible chip generates instruction generation random value according to the key, the random value is received;
The Keystone is back to using the random value as the Fernet key.
Wherein, after receiving the random value, further includes:
The random value is stored to key warehouse.
Wherein, the random value is stored to before key warehouse, further includes:
Character format conversion is carried out to the Fernet key using Base64 coding.
Wherein, when the random value includes level-one random value and second level random value, using the random value as described in Fernet key is back to the Keystone
The second level random value is encrypted using the level-one random value, and using the encrypted second level random value as The Fernet key is back to the Keystone.
Wherein, the credible chip is TPM2.0 chip.
The application also provides a kind of generation system of Fernet key in Keystone, comprising:
Request sending module after the key request for receiving Keystone, sends the key to credible chip and asks Corresponding key is asked to generate instruction;
Random value receiving module, for connecing after the credible chip generates instruction generation random value according to the key Receive the random value;
Key return module, for being back to the Keystone for the random value as the Fernet key.
Wherein, further includes:
Key storage module, for storing the random value to key warehouse.
Wherein, when the random value includes level-one random value and second level random value, the key return module be for It is used to encrypt the second level random value using the level-one random value, and using the encrypted second level random value as described in Fernet key is back to the module of the Keystone.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey The step of generation method as described above is realized when sequence is executed by processor.
The application also provides a kind of server, including memory and processor, has computer program in the memory, The step of processor realizes generation method as described above when calling the computer program in the memory.
The generation method of Fernet key in a kind of Keystone provided herein, comprising: receive Keystone Key request after, send the corresponding key of the key request to credible chip and generate instruction;The credible chip according to After the key generates instruction generation random value, the random value is received;It is returned the random value as the Fernet key It is back to the Keystone.
In terms of the application utilizes the quality and efficiency that generate random value using system random device for current KeyStone Deficiency, using virtual credible root as the method for Fernet key stochastic source in KeyStone, specifically, utilizing credible chip As the stochastic source of Fernet key, solve existing system stochastic source i.e./dev/unrandom equipment generating random value Randomness and efficiency in terms of deficiency, improve the randomness of random value, be conducive to improve Fernet key safety and Working performance.Present invention also provides the generation systems of Fernet key, a kind of computer-readable storage in a kind of Keystone Medium and a kind of server have above-mentioned beneficial effect, and details are not described herein again.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the generation method of Fernet key in a kind of Keystone provided by the embodiment of the present application;
Fig. 2 is the structural representation of the generation system of Fernet key in a kind of Keystone provided by the embodiment of the present application Figure.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, generation method of the Fig. 1 for Fernet key in a kind of Keystone provided by the embodiment of the present application Flow chart, which includes:
S101: after the key request for receiving Keystone, the corresponding key of the key request is sent to credible chip Generate instruction;
When this step is intended to need to generate Fernet key, the key request of Keystone is received, and send out to credible chip The corresponding key of the key request is sent to generate instruction.It should be noted that the subject of each step is credible in the present embodiment Root module functions as the information exchange intermediary between Keystone and credible chip, therefore credible root module is actually For another processor for being different from processor in system, only it is only used between control processing Keystone and credible chip Information exchange and relevant function realize.Below by taking " credible root module " as an example as the subject of implementation of each step to respectively into Row explanation.
Fernet key is identified as authentication and is used, and usually accesses remaining component or service Shi Huili in other assemblies The Fernet key for using Keystone to authorize is as the essential mark of authentication.In other words, when other assemblies need When the access of progress component or service, it will to Keystone request Fernet key.However in order to each in guarantee system Service and component between exchange be it is safe, Fernet key cannot be fixed form password, therefore this step need to Credible root module sends key request.It should be noted that being responsible for Fernet key dependent instruction usually in Keystone Module is FernetUtil, then other need Fernet key component can between to FernetUtil send key request, with Request Fernet key.
The form of instruction is generated for key herein and particular content is not construed as limiting, it is to be understood that key generation refers to It enables for requesting Keystone to authorize Fernet key, the inside may include the information such as the component Name of requesting party.Likewise, right In Fernet key concrete form and digit and use coding mode without limitation, such as can be 128 ASCII character etc..
Credible chip generates the random number when needing to generate random number.And information exchange is carried out as with credible chip Credible root module usually can also include the associated drives etc. for being connected with components such as Keystone.Herein for credible Chip is not construed as limiting, it is preferred that can be TPM2.0 chip etc..It is understood that the related drive for including in credible root module It is dynamic to match with credible chip, such as when using TPM2.0 chip, then should be driven using TPM2.0.TPM(Trusted Platform Module) safety chip refers to and meets TPM (Trusted Platform Module, credible platform module) standard Safety chip, it can be effectively protected PC, prevent unauthorized users to access.
S102: after the credible chip generates instruction generation random value according to the key, the random value is received;
Specifically, when credible root module includes credible chip, before generating random value, it usually needs send and accord with to credible chip The instructions such as the dependent instruction, such as TPM2_CC_GetRandom of generation key of credible chip instruction standard are closed, hereafter credible core Piece generates random value.
This step is intended to receive the random value of credible chip generation, and random value is back to Keystone for S103 and does standard It is standby.
S103: the Keystone is back to using the random value as the Fernet key.
The random value that this step is intended to generate credible root module is as Fernet key.Herein such as credible root module What, which generates random value, is not especially limited, it is preferred that provides a kind of preferred generation method herein:
It is random using the level-one after regenerating second level random value in described credible Mr. root module at level-one random value It is worth for being encrypted to the second level random value, and using the encrypted second level random value as the Fernet key.
It is intended to indicate that credible root module can be generated two random values in the generating process of above-mentioned random value, and one of them Random value is for encrypting another random value, another encrypted random value is as Fernet key.And it is easy reason Solution is specifically to be encrypted with level-one random value to second level random value in two random values or is with second level random value to level-one Random value encryption is feasible.
Certainly, the generating process based on above-mentioned random value can also use a random value and other cipher mode phases In conjunction with mode random value is encrypted, or using similar multistage random value method, to improve the safety of random value Property.
It is easily understood that the credible chip in credible root module also needs to return to random value after generating random value Keystone, then the random value is back to key request side as Fernet key.
If random value is used the generation method comprising ciphering process described above, close using random value as Fernet When key, need complete Fernet key being sent to key request side, key request side also needs after receiving Fernet key Fernet key is decrypted.
Based on the above embodiment, as a preferred embodiment, after receiving random value in above-described embodiment step S102, may be used also To include:
The random value is stored to key warehouse.
The effect in key warehouse is storage Fernet key, is commonly referred to as the catalogue of storage Fernet key, and is distributed Certain memory space.In the present embodiment, Fernet key is identical as the meaning of random value, can be substituted for each other.It needs to illustrate It is, even if random value includes even multistage random value of level-one random value described in above-described embodiment, second level random value etc., To be stored in key warehouse.
In order to avoid other assemblies to Keystone request Fernet key when must also generate random value in real time, cause be In system between each component information exchange efficiency decline, can use key warehouse store in advance preset quantity Fernet it is close Key.Certainly preset quantity is not especially limited herein, it can be according to the package count for needing to request Fernet key in system Amount makees corresponding setting.
Correspondingly, key warehouse should be generated before generating random value when needing key warehouse.Key warehouse can be with It is interpreted as one configurable " file ", for there are Fernet keys.Storage for key warehouse in systems herein Position is not construed as limiting.In general, can FernetUtil module creation key warehouse by mentioned earlier.
When there are key warehouse, needed for being read under catalogue KeyStone can directly arrive key warehouse when running where Fernet key improves the letter in system between each component without generating Fernet key to trusted root module request in real time Cease interactive efficiency.
It is noted that " storing the random value to key warehouse " can also be completed by Keystone, i.e. this step Suddenly it can be executed after S103, Ketstone is after receiving Fernet key, if requesting without other assemblies to it Fernet key can be stored first to key warehouse.
The present embodiment is using virtual credible root as the method for Fernet key stochastic source in KeyStone, specifically, sharp Credible chip is used as the stochastic source of Fernet key, solve existing system stochastic source i.e./dev/unrandom equipment exists The randomness and the deficiency in terms of efficiency for generating random value, improve the randomness of random value, are conducive to improve Fernet key Safety and working performance.
Based on the above embodiment, as a preferred embodiment, the random value is stored to before key warehouse, further includes:
Character format conversion is carried out to the Fernet key using Base64 coding.
It should be noted that the Fernet key generated by credible root module may include unprintable value.It can not beat The value of print refers to the value that key request side can not parse.It should be noted that parsing is different from decrypting process.In simple terms, In order to avoid occurring unrecognized character in Fernet key, this step carries out word to Fernet key using unified coding Format conversion is accorded with, specific converted contents are not limited thereto, the modes such as digit of including but not limited to unified Fernet key.
Based on previous embodiment, multistage random value if it exists, this step can after the generation of each random value to this with Machine value carries out character format conversion.Since each random value is generated by credible chip, different random values is generallyd use Identical coded format only can also carry out character format conversion to last encrypted random value.
Key warehouse if it exists should execute this step before Fernet key is stored in key warehouse, that is, answer before being put in storage Fernet key is subjected to character format conversion using Base64 coding, allows Keystone will be in key warehouse The direct " return " key" requesting party of Fernet key.
Certainly, on the basis of the present embodiment, other coding methods can also be applied, a different citing limits herein.
The generation system of Fernet key in a kind of Keystone provided by the embodiments of the present application is introduced below, under The generation system of text description can correspond to each other reference with the generation method of Fernet key in a kind of above-described Keystone.
Referring to fig. 2, Fig. 2 is the generation system of Fernet key in a kind of Keystone provided by the embodiment of the present application Structural schematic diagram, the application also provide a kind of generation system of Fernet key in Keystone, which includes:
Request sending module 100 after the key request for receiving Keystone, sends the key to credible chip Corresponding key is requested to generate instruction;
Random value receiving module 200, after being used to generate instruction generation random value according to the key in the credible chip, Receive the random value;
Key return module 300, for being back to the Keystone for the random value as the Fernet key.
Based on the above embodiment, as preferred embodiment, which can also include:
Key storage module, for storing the random value to key warehouse.
Based on the above embodiment, as preferred embodiment, which can also include, when the random value includes When level-one random value and second level random value, the key return module 300 is used for particularly for using the level-one random value The second level random value is encrypted, and is back to using the encrypted second level random value as the Fernet key described The module of Keystone.
Based on the above embodiment, as preferred embodiment, which can also include:
Coding module, for carrying out character format conversion to the Fernet key using Base64 coding.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program It is performed the step of generation method of Fernet key in a kind of Keystone provided by above-described embodiment may be implemented.It should Storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), magnetic or disk.
Present invention also provides a kind of servers, may include memory and processor, have calculating in the memory Machine program when the processor calls the computer program in the memory, may be implemented one provided by above-described embodiment In kind Keystone the step of the generation method of Fernet key.Certain server can also include various network interfaces, The components such as power supply.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For embodiment provide system and Speech, since it is corresponding with the method that embodiment provides, so being described relatively simple, related place is referring to method part illustration ?.
Specific examples are used herein to illustrate the principle and implementation manner of the present application, and above embodiments are said It is bright to be merely used to help understand the present processes and its core concept.It should be pointed out that for the ordinary skill of the art For personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these improvement It is also fallen into the protection scope of the claim of this application with modification.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (10)

1. the generation method of Fernet key in a kind of Keystone characterized by comprising
After the key request for receiving Keystone, the corresponding key of the key request is sent to credible chip and generates instruction;
After the credible chip generates instruction generation random value according to the key, the random value is received;
The Keystone is back to using the random value as the Fernet key.
2. generation method according to claim 1, which is characterized in that after receiving the random value, further includes:
The random value is stored to key warehouse.
3. generation method according to claim 2, which is characterized in that the random value is stored to before key warehouse, Further include:
Character format conversion is carried out to the Fernet key using Base64 coding.
4. generation method according to claim 1-3, which is characterized in that when the random value includes that level-one is random When value and second level random value, the random value, which is back to the Keystone as the Fernet key, includes:
The second level random value is encrypted using the level-one random value, and using the encrypted second level random value as described in Fernet key is back to the Keystone.
5. generation method according to claim 4, which is characterized in that the credible chip is TPM2.0 chip.
6. the generation system of Fernet key in a kind of Keystone characterized by comprising
Request sending module after the key request for receiving Keystone, sends the key request pair to credible chip The key answered generates instruction;
Random value receiving module, for receiving institute after the credible chip generates instruction generation random value according to the key State random value;
Key return module, for being back to the Keystone for the random value as the Fernet key.
7. generation system according to claim 6, which is characterized in that further include:
Key storage module, for storing the random value to key warehouse.
8. generation system according to claim 6 or 7, which is characterized in that when the random value include level-one random value and When second level random value, the key return module is for being used to add the second level random value using the level-one random value It is close, and it is back to using the encrypted second level random value as the Fernet key module of the Keystone.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of processor realizes generation method as described in any one in claim 1-5 when executing.
10. a kind of server, which is characterized in that including memory and processor, have computer program, institute in the memory It states when processor calls the computer program in the memory and realizes generation method as described in any one in claim 1-5 Step.
CN201811353659.XA 2018-11-14 2018-11-14 The generation method and relevant apparatus of Fernet key in a kind of Keystone Pending CN109462474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811353659.XA CN109462474A (en) 2018-11-14 2018-11-14 The generation method and relevant apparatus of Fernet key in a kind of Keystone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811353659.XA CN109462474A (en) 2018-11-14 2018-11-14 The generation method and relevant apparatus of Fernet key in a kind of Keystone

Publications (1)

Publication Number Publication Date
CN109462474A true CN109462474A (en) 2019-03-12

Family

ID=65610448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811353659.XA Pending CN109462474A (en) 2018-11-14 2018-11-14 The generation method and relevant apparatus of Fernet key in a kind of Keystone

Country Status (1)

Country Link
CN (1) CN109462474A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021027827A1 (en) * 2019-08-12 2021-02-18 南京芯驰半导体科技有限公司 Methods for generating and using root key, chip, and electronic apparatus
CN113869901A (en) * 2021-12-02 2021-12-31 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595213A (en) * 2012-02-22 2012-07-18 深圳创维-Rgb电子有限公司 Security certificate method and system of credible TV terminal
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN103812648A (en) * 2014-03-13 2014-05-21 深圳数字电视国家工程实验室股份有限公司 PSA key generating method and device
CN106027503A (en) * 2016-05-09 2016-10-12 浪潮集团有限公司 Cloud storage data encryption method based on TPM

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102595213A (en) * 2012-02-22 2012-07-18 深圳创维-Rgb电子有限公司 Security certificate method and system of credible TV terminal
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN103812648A (en) * 2014-03-13 2014-05-21 深圳数字电视国家工程实验室股份有限公司 PSA key generating method and device
CN106027503A (en) * 2016-05-09 2016-10-12 浪潮集团有限公司 Cloud storage data encryption method based on TPM

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
DHP: "keystone令牌三种生成方式", 《HTTPS://WWW.CNBLOGS.COM/DHPLXF/P/7966890.HTML》 *
DYMOM: "linux中特殊的设备(/dev/zeo,/dev/null,/dev/unrandom,/dev/random)", 《HTTPS://BLOG.CSDN.NET/MENOGEN/ARTICLE/DETAILS/38060003》 *
王于丁: "云计算访问控制技术研究综述", 《软件学报》 *
田晓丽: "OpenStack认证后端的安全性研究与改进", 《北京电子科技学院学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021027827A1 (en) * 2019-08-12 2021-02-18 南京芯驰半导体科技有限公司 Methods for generating and using root key, chip, and electronic apparatus
CN113869901A (en) * 2021-12-02 2021-12-31 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment
CN113869901B (en) * 2021-12-02 2022-05-10 腾讯科技(深圳)有限公司 Key generation method, key generation device, computer-readable storage medium and computer equipment

Similar Documents

Publication Publication Date Title
CN103795692B (en) Open authorization method, system and certification authority server
CN100487715C (en) Date safety storing system, device and method
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
CN103138939B (en) Based on the key access times management method of credible platform module under cloud memory module
US10250613B2 (en) Data access method based on cloud computing platform, and user terminal
CN103107994B (en) Vitualization environment data security partition method and system
CN108154038B (en) Data processing method and device
WO2020042798A1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
CN111104691A (en) Sensitive information processing method and device, storage medium and equipment
CN104618096A (en) Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center
CN110312054B (en) Image encryption and decryption method, related device and storage medium
CN110099048A (en) A kind of cloud storage method and apparatus
CN111967065B (en) Data protection method, processor and electronic equipment
Khan et al. SSM: Secure-Split-Merge data distribution in cloud infrastructure
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN111695097A (en) Login checking method and device and computer readable storage medium
CN110110551A (en) A kind of date storage method and device
CN101212301B (en) Authentication device and method
CN109462474A (en) The generation method and relevant apparatus of Fernet key in a kind of Keystone
CN109274646A (en) Key management client server side method, system and medium based on KMIP protocol
CN108650214B (en) Dynamic page encryption anti-unauthorized method and device
CN103885725A (en) Virtual machine access control system and method based on cloud computing environment
CN113946863A (en) Data encryption storage method, system, equipment and storage medium
CN109101798A (en) A kind of login method of BIOS, login system and relevant apparatus
CN113221154A (en) Service password obtaining method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312