CN109462474A - The generation method and relevant apparatus of Fernet key in a kind of Keystone - Google Patents
The generation method and relevant apparatus of Fernet key in a kind of Keystone Download PDFInfo
- Publication number
- CN109462474A CN109462474A CN201811353659.XA CN201811353659A CN109462474A CN 109462474 A CN109462474 A CN 109462474A CN 201811353659 A CN201811353659 A CN 201811353659A CN 109462474 A CN109462474 A CN 109462474A
- Authority
- CN
- China
- Prior art keywords
- key
- random value
- fernet
- keystone
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The generation method of Fernet key in a kind of Keystone provided herein, comprising: after the key request for receiving Keystone, send the corresponding key of key request to credible chip and generate instruction;After credible chip generates instruction generation random value according to key, random value is received;Keystone is back to using random value as Fernet key.By deficiency of the existing system stochastic source in terms of the randomness and efficiency for generating random value being solved, improving the randomness of random value using credible chip as the stochastic source of Fernet key, be conducive to the safety and working performance that improve Fernet key.Present invention also provides the generation system of Fernet key, a kind of computer readable storage medium and a kind of servers in a kind of Keystone, have above-mentioned beneficial effect.
Description
Technical field
This application involves cloud service field, in particular to the generation method of Fernet key, generation in a kind of Keystone
System, a kind of computer readable storage medium and a kind of server.
Background technique
OpenStack is one it is intended that public and private clound construction provides the open source projects of software with management, by several
A main component, which combines, completes specific works.OpenStack supports that almost all kinds of cloud environment, project objective are
Offer implementation is simple, can extend, enrich on a large scale, the cloud computing management platform that standard is unified.OpenStack passes through various complementations
The service facility that provides the foundation service the solution of (IaaS), each service provides API to be integrated.KeyStone
It is the Identity Management component in OpenStack, provides the service such as authorization, certification for other assemblies.KeyStone is available
Fernet token is verified the Fernet that rear other assemblies can be issued using KeyStone as the mark after authentication
Token accesses other assemblies or service.
Currently, the Fernet key in KeyStone is generated using the pseudorandom source of system offer, linux system
Used in be /dev/unrandom equipment as stochastic source generate Fernet key.And/dev/unrandom equipment is random
Property is poor, is subject to attack.
Summary of the invention
The purpose of the application is to provide generation method, the generation system, Yi Zhongji of Fernet key in a kind of Keystone
Calculation machine readable storage medium storing program for executing and a kind of server, solve in the prior art using pseudorandom source generate Fernet key bring with
The problem of machine difference.
In order to solve the above technical problems, the application provides a kind of generation method of Fernet key in Keystone, specifically
Technical solution is as follows:
After the key request for receiving Keystone, the corresponding key generation of the key request is sent to credible chip and is referred to
It enables;
After the credible chip generates instruction generation random value according to the key, the random value is received;
The Keystone is back to using the random value as the Fernet key.
Wherein, after receiving the random value, further includes:
The random value is stored to key warehouse.
Wherein, the random value is stored to before key warehouse, further includes:
Character format conversion is carried out to the Fernet key using Base64 coding.
Wherein, when the random value includes level-one random value and second level random value, using the random value as described in
Fernet key is back to the Keystone
The second level random value is encrypted using the level-one random value, and using the encrypted second level random value as
The Fernet key is back to the Keystone.
Wherein, the credible chip is TPM2.0 chip.
The application also provides a kind of generation system of Fernet key in Keystone, comprising:
Request sending module after the key request for receiving Keystone, sends the key to credible chip and asks
Corresponding key is asked to generate instruction;
Random value receiving module, for connecing after the credible chip generates instruction generation random value according to the key
Receive the random value;
Key return module, for being back to the Keystone for the random value as the Fernet key.
Wherein, further includes:
Key storage module, for storing the random value to key warehouse.
Wherein, when the random value includes level-one random value and second level random value, the key return module be for
It is used to encrypt the second level random value using the level-one random value, and using the encrypted second level random value as described in
Fernet key is back to the module of the Keystone.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey
The step of generation method as described above is realized when sequence is executed by processor.
The application also provides a kind of server, including memory and processor, has computer program in the memory,
The step of processor realizes generation method as described above when calling the computer program in the memory.
The generation method of Fernet key in a kind of Keystone provided herein, comprising: receive Keystone
Key request after, send the corresponding key of the key request to credible chip and generate instruction;The credible chip according to
After the key generates instruction generation random value, the random value is received;It is returned the random value as the Fernet key
It is back to the Keystone.
In terms of the application utilizes the quality and efficiency that generate random value using system random device for current KeyStone
Deficiency, using virtual credible root as the method for Fernet key stochastic source in KeyStone, specifically, utilizing credible chip
As the stochastic source of Fernet key, solve existing system stochastic source i.e./dev/unrandom equipment generating random value
Randomness and efficiency in terms of deficiency, improve the randomness of random value, be conducive to improve Fernet key safety and
Working performance.Present invention also provides the generation systems of Fernet key, a kind of computer-readable storage in a kind of Keystone
Medium and a kind of server have above-mentioned beneficial effect, and details are not described herein again.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of the generation method of Fernet key in a kind of Keystone provided by the embodiment of the present application;
Fig. 2 is the structural representation of the generation system of Fernet key in a kind of Keystone provided by the embodiment of the present application
Figure.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Referring to FIG. 1, generation method of the Fig. 1 for Fernet key in a kind of Keystone provided by the embodiment of the present application
Flow chart, which includes:
S101: after the key request for receiving Keystone, the corresponding key of the key request is sent to credible chip
Generate instruction;
When this step is intended to need to generate Fernet key, the key request of Keystone is received, and send out to credible chip
The corresponding key of the key request is sent to generate instruction.It should be noted that the subject of each step is credible in the present embodiment
Root module functions as the information exchange intermediary between Keystone and credible chip, therefore credible root module is actually
For another processor for being different from processor in system, only it is only used between control processing Keystone and credible chip
Information exchange and relevant function realize.Below by taking " credible root module " as an example as the subject of implementation of each step to respectively into
Row explanation.
Fernet key is identified as authentication and is used, and usually accesses remaining component or service Shi Huili in other assemblies
The Fernet key for using Keystone to authorize is as the essential mark of authentication.In other words, when other assemblies need
When the access of progress component or service, it will to Keystone request Fernet key.However in order to each in guarantee system
Service and component between exchange be it is safe, Fernet key cannot be fixed form password, therefore this step need to
Credible root module sends key request.It should be noted that being responsible for Fernet key dependent instruction usually in Keystone
Module is FernetUtil, then other need Fernet key component can between to FernetUtil send key request, with
Request Fernet key.
The form of instruction is generated for key herein and particular content is not construed as limiting, it is to be understood that key generation refers to
It enables for requesting Keystone to authorize Fernet key, the inside may include the information such as the component Name of requesting party.Likewise, right
In Fernet key concrete form and digit and use coding mode without limitation, such as can be 128
ASCII character etc..
Credible chip generates the random number when needing to generate random number.And information exchange is carried out as with credible chip
Credible root module usually can also include the associated drives etc. for being connected with components such as Keystone.Herein for credible
Chip is not construed as limiting, it is preferred that can be TPM2.0 chip etc..It is understood that the related drive for including in credible root module
It is dynamic to match with credible chip, such as when using TPM2.0 chip, then should be driven using TPM2.0.TPM(Trusted
Platform Module) safety chip refers to and meets TPM (Trusted Platform Module, credible platform module) standard
Safety chip, it can be effectively protected PC, prevent unauthorized users to access.
S102: after the credible chip generates instruction generation random value according to the key, the random value is received;
Specifically, when credible root module includes credible chip, before generating random value, it usually needs send and accord with to credible chip
The instructions such as the dependent instruction, such as TPM2_CC_GetRandom of generation key of credible chip instruction standard are closed, hereafter credible core
Piece generates random value.
This step is intended to receive the random value of credible chip generation, and random value is back to Keystone for S103 and does standard
It is standby.
S103: the Keystone is back to using the random value as the Fernet key.
The random value that this step is intended to generate credible root module is as Fernet key.Herein such as credible root module
What, which generates random value, is not especially limited, it is preferred that provides a kind of preferred generation method herein:
It is random using the level-one after regenerating second level random value in described credible Mr. root module at level-one random value
It is worth for being encrypted to the second level random value, and using the encrypted second level random value as the Fernet key.
It is intended to indicate that credible root module can be generated two random values in the generating process of above-mentioned random value, and one of them
Random value is for encrypting another random value, another encrypted random value is as Fernet key.And it is easy reason
Solution is specifically to be encrypted with level-one random value to second level random value in two random values or is with second level random value to level-one
Random value encryption is feasible.
Certainly, the generating process based on above-mentioned random value can also use a random value and other cipher mode phases
In conjunction with mode random value is encrypted, or using similar multistage random value method, to improve the safety of random value
Property.
It is easily understood that the credible chip in credible root module also needs to return to random value after generating random value
Keystone, then the random value is back to key request side as Fernet key.
If random value is used the generation method comprising ciphering process described above, close using random value as Fernet
When key, need complete Fernet key being sent to key request side, key request side also needs after receiving Fernet key
Fernet key is decrypted.
Based on the above embodiment, as a preferred embodiment, after receiving random value in above-described embodiment step S102, may be used also
To include:
The random value is stored to key warehouse.
The effect in key warehouse is storage Fernet key, is commonly referred to as the catalogue of storage Fernet key, and is distributed
Certain memory space.In the present embodiment, Fernet key is identical as the meaning of random value, can be substituted for each other.It needs to illustrate
It is, even if random value includes even multistage random value of level-one random value described in above-described embodiment, second level random value etc.,
To be stored in key warehouse.
In order to avoid other assemblies to Keystone request Fernet key when must also generate random value in real time, cause be
In system between each component information exchange efficiency decline, can use key warehouse store in advance preset quantity Fernet it is close
Key.Certainly preset quantity is not especially limited herein, it can be according to the package count for needing to request Fernet key in system
Amount makees corresponding setting.
Correspondingly, key warehouse should be generated before generating random value when needing key warehouse.Key warehouse can be with
It is interpreted as one configurable " file ", for there are Fernet keys.Storage for key warehouse in systems herein
Position is not construed as limiting.In general, can FernetUtil module creation key warehouse by mentioned earlier.
When there are key warehouse, needed for being read under catalogue KeyStone can directly arrive key warehouse when running where
Fernet key improves the letter in system between each component without generating Fernet key to trusted root module request in real time
Cease interactive efficiency.
It is noted that " storing the random value to key warehouse " can also be completed by Keystone, i.e. this step
Suddenly it can be executed after S103, Ketstone is after receiving Fernet key, if requesting without other assemblies to it
Fernet key can be stored first to key warehouse.
The present embodiment is using virtual credible root as the method for Fernet key stochastic source in KeyStone, specifically, sharp
Credible chip is used as the stochastic source of Fernet key, solve existing system stochastic source i.e./dev/unrandom equipment exists
The randomness and the deficiency in terms of efficiency for generating random value, improve the randomness of random value, are conducive to improve Fernet key
Safety and working performance.
Based on the above embodiment, as a preferred embodiment, the random value is stored to before key warehouse, further includes:
Character format conversion is carried out to the Fernet key using Base64 coding.
It should be noted that the Fernet key generated by credible root module may include unprintable value.It can not beat
The value of print refers to the value that key request side can not parse.It should be noted that parsing is different from decrypting process.In simple terms,
In order to avoid occurring unrecognized character in Fernet key, this step carries out word to Fernet key using unified coding
Format conversion is accorded with, specific converted contents are not limited thereto, the modes such as digit of including but not limited to unified Fernet key.
Based on previous embodiment, multistage random value if it exists, this step can after the generation of each random value to this with
Machine value carries out character format conversion.Since each random value is generated by credible chip, different random values is generallyd use
Identical coded format only can also carry out character format conversion to last encrypted random value.
Key warehouse if it exists should execute this step before Fernet key is stored in key warehouse, that is, answer before being put in storage
Fernet key is subjected to character format conversion using Base64 coding, allows Keystone will be in key warehouse
The direct " return " key" requesting party of Fernet key.
Certainly, on the basis of the present embodiment, other coding methods can also be applied, a different citing limits herein.
The generation system of Fernet key in a kind of Keystone provided by the embodiments of the present application is introduced below, under
The generation system of text description can correspond to each other reference with the generation method of Fernet key in a kind of above-described Keystone.
Referring to fig. 2, Fig. 2 is the generation system of Fernet key in a kind of Keystone provided by the embodiment of the present application
Structural schematic diagram, the application also provide a kind of generation system of Fernet key in Keystone, which includes:
Request sending module 100 after the key request for receiving Keystone, sends the key to credible chip
Corresponding key is requested to generate instruction;
Random value receiving module 200, after being used to generate instruction generation random value according to the key in the credible chip,
Receive the random value;
Key return module 300, for being back to the Keystone for the random value as the Fernet key.
Based on the above embodiment, as preferred embodiment, which can also include:
Key storage module, for storing the random value to key warehouse.
Based on the above embodiment, as preferred embodiment, which can also include, when the random value includes
When level-one random value and second level random value, the key return module 300 is used for particularly for using the level-one random value
The second level random value is encrypted, and is back to using the encrypted second level random value as the Fernet key described
The module of Keystone.
Based on the above embodiment, as preferred embodiment, which can also include:
Coding module, for carrying out character format conversion to the Fernet key using Base64 coding.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program
It is performed the step of generation method of Fernet key in a kind of Keystone provided by above-described embodiment may be implemented.It should
Storage medium may include: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), magnetic or disk.
Present invention also provides a kind of servers, may include memory and processor, have calculating in the memory
Machine program when the processor calls the computer program in the memory, may be implemented one provided by above-described embodiment
In kind Keystone the step of the generation method of Fernet key.Certain server can also include various network interfaces,
The components such as power supply.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities
The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For embodiment provide system and
Speech, since it is corresponding with the method that embodiment provides, so being described relatively simple, related place is referring to method part illustration
?.
Specific examples are used herein to illustrate the principle and implementation manner of the present application, and above embodiments are said
It is bright to be merely used to help understand the present processes and its core concept.It should be pointed out that for the ordinary skill of the art
For personnel, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, these improvement
It is also fallen into the protection scope of the claim of this application with modification.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (10)
1. the generation method of Fernet key in a kind of Keystone characterized by comprising
After the key request for receiving Keystone, the corresponding key of the key request is sent to credible chip and generates instruction;
After the credible chip generates instruction generation random value according to the key, the random value is received;
The Keystone is back to using the random value as the Fernet key.
2. generation method according to claim 1, which is characterized in that after receiving the random value, further includes:
The random value is stored to key warehouse.
3. generation method according to claim 2, which is characterized in that the random value is stored to before key warehouse,
Further include:
Character format conversion is carried out to the Fernet key using Base64 coding.
4. generation method according to claim 1-3, which is characterized in that when the random value includes that level-one is random
When value and second level random value, the random value, which is back to the Keystone as the Fernet key, includes:
The second level random value is encrypted using the level-one random value, and using the encrypted second level random value as described in
Fernet key is back to the Keystone.
5. generation method according to claim 4, which is characterized in that the credible chip is TPM2.0 chip.
6. the generation system of Fernet key in a kind of Keystone characterized by comprising
Request sending module after the key request for receiving Keystone, sends the key request pair to credible chip
The key answered generates instruction;
Random value receiving module, for receiving institute after the credible chip generates instruction generation random value according to the key
State random value;
Key return module, for being back to the Keystone for the random value as the Fernet key.
7. generation system according to claim 6, which is characterized in that further include:
Key storage module, for storing the random value to key warehouse.
8. generation system according to claim 6 or 7, which is characterized in that when the random value include level-one random value and
When second level random value, the key return module is for being used to add the second level random value using the level-one random value
It is close, and it is back to using the encrypted second level random value as the Fernet key module of the Keystone.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of processor realizes generation method as described in any one in claim 1-5 when executing.
10. a kind of server, which is characterized in that including memory and processor, have computer program, institute in the memory
It states when processor calls the computer program in the memory and realizes generation method as described in any one in claim 1-5
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811353659.XA CN109462474A (en) | 2018-11-14 | 2018-11-14 | The generation method and relevant apparatus of Fernet key in a kind of Keystone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811353659.XA CN109462474A (en) | 2018-11-14 | 2018-11-14 | The generation method and relevant apparatus of Fernet key in a kind of Keystone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109462474A true CN109462474A (en) | 2019-03-12 |
Family
ID=65610448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811353659.XA Pending CN109462474A (en) | 2018-11-14 | 2018-11-14 | The generation method and relevant apparatus of Fernet key in a kind of Keystone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462474A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021027827A1 (en) * | 2019-08-12 | 2021-02-18 | 南京芯驰半导体科技有限公司 | Methods for generating and using root key, chip, and electronic apparatus |
CN113869901A (en) * | 2021-12-02 | 2021-12-31 | 腾讯科技(深圳)有限公司 | Key generation method, key generation device, computer-readable storage medium and computer equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102595213A (en) * | 2012-02-22 | 2012-07-18 | 深圳创维-Rgb电子有限公司 | Security certificate method and system of credible TV terminal |
CN103763315A (en) * | 2014-01-14 | 2014-04-30 | 北京航空航天大学 | Credible data access control method applied to cloud storage of mobile devices |
CN103812648A (en) * | 2014-03-13 | 2014-05-21 | 深圳数字电视国家工程实验室股份有限公司 | PSA key generating method and device |
CN106027503A (en) * | 2016-05-09 | 2016-10-12 | 浪潮集团有限公司 | Cloud storage data encryption method based on TPM |
-
2018
- 2018-11-14 CN CN201811353659.XA patent/CN109462474A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102595213A (en) * | 2012-02-22 | 2012-07-18 | 深圳创维-Rgb电子有限公司 | Security certificate method and system of credible TV terminal |
CN103763315A (en) * | 2014-01-14 | 2014-04-30 | 北京航空航天大学 | Credible data access control method applied to cloud storage of mobile devices |
CN103812648A (en) * | 2014-03-13 | 2014-05-21 | 深圳数字电视国家工程实验室股份有限公司 | PSA key generating method and device |
CN106027503A (en) * | 2016-05-09 | 2016-10-12 | 浪潮集团有限公司 | Cloud storage data encryption method based on TPM |
Non-Patent Citations (4)
Title |
---|
DHP: "keystone令牌三种生成方式", 《HTTPS://WWW.CNBLOGS.COM/DHPLXF/P/7966890.HTML》 * |
DYMOM: "linux中特殊的设备(/dev/zeo,/dev/null,/dev/unrandom,/dev/random)", 《HTTPS://BLOG.CSDN.NET/MENOGEN/ARTICLE/DETAILS/38060003》 * |
王于丁: "云计算访问控制技术研究综述", 《软件学报》 * |
田晓丽: "OpenStack认证后端的安全性研究与改进", 《北京电子科技学院学报》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021027827A1 (en) * | 2019-08-12 | 2021-02-18 | 南京芯驰半导体科技有限公司 | Methods for generating and using root key, chip, and electronic apparatus |
CN113869901A (en) * | 2021-12-02 | 2021-12-31 | 腾讯科技(深圳)有限公司 | Key generation method, key generation device, computer-readable storage medium and computer equipment |
CN113869901B (en) * | 2021-12-02 | 2022-05-10 | 腾讯科技(深圳)有限公司 | Key generation method, key generation device, computer-readable storage medium and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103795692B (en) | Open authorization method, system and certification authority server | |
CN100487715C (en) | Date safety storing system, device and method | |
CN109067528B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN103138939B (en) | Based on the key access times management method of credible platform module under cloud memory module | |
US10250613B2 (en) | Data access method based on cloud computing platform, and user terminal | |
CN103107994B (en) | Vitualization environment data security partition method and system | |
CN108154038B (en) | Data processing method and device | |
WO2020042798A1 (en) | Cryptographic operation and working key creation method and cryptographic service platform and device | |
CN111104691A (en) | Sensitive information processing method and device, storage medium and equipment | |
CN104618096A (en) | Method and device for protecting secret key authorized data, and TPM (trusted platform module) secrete key management center | |
CN110312054B (en) | Image encryption and decryption method, related device and storage medium | |
CN110099048A (en) | A kind of cloud storage method and apparatus | |
CN111967065B (en) | Data protection method, processor and electronic equipment | |
Khan et al. | SSM: Secure-Split-Merge data distribution in cloud infrastructure | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN111695097A (en) | Login checking method and device and computer readable storage medium | |
CN110110551A (en) | A kind of date storage method and device | |
CN101212301B (en) | Authentication device and method | |
CN109462474A (en) | The generation method and relevant apparatus of Fernet key in a kind of Keystone | |
CN109274646A (en) | Key management client server side method, system and medium based on KMIP protocol | |
CN108650214B (en) | Dynamic page encryption anti-unauthorized method and device | |
CN103885725A (en) | Virtual machine access control system and method based on cloud computing environment | |
CN113946863A (en) | Data encryption storage method, system, equipment and storage medium | |
CN109101798A (en) | A kind of login method of BIOS, login system and relevant apparatus | |
CN113221154A (en) | Service password obtaining method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190312 |