CN110691069A - Method and system for maintaining and managing terminal high-authority password - Google Patents

Method and system for maintaining and managing terminal high-authority password Download PDF

Info

Publication number
CN110691069A
CN110691069A CN201910830643.1A CN201910830643A CN110691069A CN 110691069 A CN110691069 A CN 110691069A CN 201910830643 A CN201910830643 A CN 201910830643A CN 110691069 A CN110691069 A CN 110691069A
Authority
CN
China
Prior art keywords
password
terminal
verification server
signature verification
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910830643.1A
Other languages
Chinese (zh)
Other versions
CN110691069B (en
Inventor
高大会
胡彬
邓力飞
宋昊
佟强
许超
郭建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA SPORTS LETTWAY TECHNOLOGY DEVELOPMENT Co Ltd
Original Assignee
CHINA SPORTS LETTWAY TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA SPORTS LETTWAY TECHNOLOGY DEVELOPMENT Co Ltd filed Critical CHINA SPORTS LETTWAY TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201910830643.1A priority Critical patent/CN110691069B/en
Publication of CN110691069A publication Critical patent/CN110691069A/en
Application granted granted Critical
Publication of CN110691069B publication Critical patent/CN110691069B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Abstract

The invention provides a method and a system for maintaining and managing a high-authority password of a terminal, wherein the method comprises the following steps: generating a root password by the terminal and acquiring a signature verification server certificate; encrypting the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain an encrypted password; uploading and storing the encrypted password to a operation and maintenance database; and when a password inquiry command is received, calling a decryption interface of the signature verification server, decrypting the encrypted password by using a private key of the signature verification server, and acquiring the decrypted password. The method and the system for maintaining and managing the terminal high-weight password, provided by the invention, adopt an asymmetric encryption algorithm to carry out password encryption, and encryption and decryption utilize a public key and a private key of a signature verification server, so that high-strength confidentiality protection of the large-scale terminal high-weight password and the secret key is realized, and the safety of the password and the secret key is ensured.

Description

Method and system for maintaining and managing terminal high-authority password
Technical Field
The invention relates to the technical field of terminal operation and maintenance, in particular to a method and a system for maintaining and managing a high-authority password of a terminal.
Background
At present, an information system administrator often needs to manage accounts and passwords of a plurality of systems of a plurality of terminals at the same time; such as root user (root), mySQL (relational database management system), etc. Often the password is different for each system account. When the number of terminals is gradually increased, a system administrator needs to uniformly record the IP address, the account number, and the corresponding password of each terminal in one file, so as to be used for querying and logging in a specified system account of a certain terminal later. However, such a maintenance management method is prone to errors in actual operation and has poor safety.
Therefore, the prior art also provides a process for generating and using the root password of the terminal, the root password is randomly generated by the terminal, encrypted by using an AES algorithm symmetric encryption mode and uploaded to the background operation and maintenance server. However, the key used by the AES algorithm is stored on the terminal and is consistent among all terminals, and the key is not changed periodically, which may cause the risk that the key stored in the terminal for the local AES algorithm is cracked or leaked. In this regard, the security of the symmetric encryption algorithm depends on the storage of the encryption keys, and if a key used by a user is obtained by an intruder, the intruder can read all documents encrypted by the user key, and if an encryption key is shared by the entire enterprise, the confidentiality of the entire enterprise document is not mentioned.
Therefore, a maintenance and management scheme for a high-rights terminal password is needed to ensure the security of the terminal key and the password.
Disclosure of Invention
In order to solve the problems, the invention provides a method and a system for maintaining and managing a terminal high-weight password, which can adopt an asymmetric encryption algorithm to encrypt the password, and utilize a public key and a private key of a signature verification server to encrypt and decrypt the password, thereby realizing high-strength secret protection of the large-scale terminal high-weight password and the secret key and ensuring the safety of the password and the secret key.
In an embodiment of the present invention, a method for maintaining and managing a high-authority password of a terminal is provided, where the method includes:
generating a root password by the terminal and acquiring a signature verification server certificate;
encrypting the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain an encrypted password;
uploading and storing the encrypted password to a operation and maintenance database;
and when a password inquiry command is received, calling a decryption interface of the signature verification server, decrypting the encrypted password by using a private key of the signature verification server, and acquiring the decrypted password.
Optionally, uploading and storing the encrypted password to a operation and maintenance database, including:
and uploading and storing the encrypted password to a motion maintenance database by utilizing an SSL (secure sockets layer) channel.
Optionally, the method further includes:
and after the decrypted password is obtained, logging in the terminal for maintenance by using the decrypted password.
Optionally, the generating, by the terminal, a root password and acquiring a signature verification server certificate includes:
and after the terminal is started, automatically acquiring a signature and signature verification server certificate from the signature and signature verification server.
Optionally, the generating, by the terminal, a root password and acquiring a signature verification server certificate includes:
after the terminal is started, the terminal generates a root account password by using a random algorithm, wherein the password intensity is an 8-bit string and the string contains upper and lower case characters.
Optionally, the terminal is a ticket selling terminal, and all ticket selling terminals use the same public key of the signature verification server.
Optionally, the public key certificate of the signature and signature verification server certificate is generated by a self-built PKI/CA system.
In an embodiment of the present invention, a system for maintaining and managing a high-authority password of a terminal is further provided, where the system includes:
the password generation module is arranged at the terminal and used for generating a root password and acquiring a signature verification server certificate;
the password encryption module is used for encrypting the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain an encrypted password;
the password uploading module is used for uploading and storing the encrypted password to the operation and maintenance database;
and the operation and maintenance database is used for calling a decryption interface of the signature verification server when receiving the password query instruction, decrypting the encrypted password by using a private key of the signature verification server and acquiring the decrypted password.
In an embodiment of the present invention, a computer device is further provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements a method for maintaining and managing a high-rights password of a terminal when executing the computer program.
In an embodiment of the present invention, a computer-readable storage medium is further provided, where a computer program for executing the method for maintaining and managing a high-authority password of a terminal is stored in the computer-readable storage medium.
The method and the system for maintaining and managing the terminal high-weight password, provided by the invention, adopt an asymmetric encryption algorithm to carry out password encryption, and encryption and decryption utilize a public key and a private key of a signature verification server, so that high-strength confidentiality protection of the large-scale terminal high-weight password and the secret key is realized, and the safety of the password and the secret key is ensured.
Drawings
Fig. 1 schematically shows an application scenario in which an embodiment of the invention may be implemented.
Fig. 2 is a flowchart of a method for maintaining and managing a high-authority password of a terminal according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a system for maintaining and managing a high-authority password of a terminal according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to the embodiment of the invention, a method and a system for maintaining and managing a high-authority password of a terminal are provided.
The principles and spirit of the present invention are explained in detail below with reference to several representative embodiments of the invention.
Reference is first made to fig. 1, which illustrates an application scenario in which embodiments of the present invention may be implemented.
The scenario shown in fig. 1 includes a terminal 100, a signature verification server 200, and an operation and maintenance system 300, where the terminal 100 may be a ticketing terminal and is provided with a confidential program, the signature verification server 200 is provided with a decryption interface, and the operation and maintenance system 300 is used by operation and maintenance personnel and may be used to query a password; the terminal 100, the signature verification server 200, and the operation and maintenance system 300 may be connected to each other through a mobile internet or the like.
For a ticketing terminal, operation and maintenance personnel need to maintain a terminal system regularly, and then a root password needs to be called. Since the root user is the only hypervisor in the system, it has the same authority as the operating system; the authority of the root user is enough to delete most files of the whole system, so that the system is completely destroyed and cannot be used again. Therefore, improper operation with root is quite dangerous, can be halted slightly, and can not even be started seriously. The root has all the authority of the system, if the root password is leaked, the whole computer is controlled by a person who steals the root password completely, and the possession of the root password means the possession of all the data of all the users on the computer. Therefore, the invention provides a method and a system for maintaining and managing the high-weight terminal password, which can realize the high-strength security protection of the large-scale high-weight terminal password and the key and ensure the security of the password and the key.
In the following, referring to fig. 2, a method for maintaining and managing a high-rights terminal password according to an exemplary embodiment of the present invention is described with reference to an application scenario of fig. 1.
As shown in fig. 2, the method includes:
and step S1, the terminal generates a root password and acquires a signature and signature server certificate from the signature and signature server.
In one embodiment, the specific process is as follows: after a terminal is started, generating a root account password by using a random algorithm, wherein the password intensity is an 8-bit string and comprises upper and lower case characters; and, automatically obtaining the signature-signature server certificate from the signature-signature server.
The terminal is a ticket selling terminal, the ticket selling terminal uses the same public key of the signature verification server, and the public key certificate of the signature verification server certificate is generated by a self-built PKI/CA system.
And step S2, the terminal encrypts the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain the encrypted password. After the root password is encrypted by using the SM2 asymmetric encryption algorithm, the password security can be improved.
And step S3, uploading and storing the encrypted password to a operation and maintenance database.
In an embodiment, the encrypted password may be uploaded and stored to the operation and maintenance database by using an SSL channel, so as to ensure the security of the data transmission process.
And step S4, when the password inquiry instruction is received, calling a decryption interface of the signature verification server, decrypting the encrypted password by using the private key of the signature verification server, and acquiring the decrypted password.
And step S5, after the decrypted password is obtained, the password can be used by operation and maintenance personnel, and the decrypted password is used for logging in the terminal for maintenance.
It should be noted that although the operations of the method of the present invention have been described in the above embodiments and the accompanying drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the operations shown must be performed, to achieve the desired results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
Based on the same inventive concept, the present invention further provides a system for maintaining and managing a terminal high-authority password, as shown in fig. 3, the system includes:
the password generation module 310 is arranged at the terminal and used for generating a root password and acquiring a signature verification server certificate;
the password encryption module 320 is configured to encrypt the root password by using an asymmetric encryption algorithm by using the public key of the signature verification server certificate to obtain an encrypted password;
the password uploading module 330 is configured to upload and store the encrypted password in the operation and maintenance database;
and the operation and maintenance database 340 is configured to call a decryption interface of the signature verification server when the password query instruction is received, decrypt the encrypted password by using the private key of the signature verification server, and obtain the decrypted password.
It should be noted that although several modules of the maintenance management system of the terminal high-rights password are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the modules described above may be embodied in one module according to embodiments of the invention. Conversely, the features and functions of one module described above may be further divided into embodiments by a plurality of modules.
In an embodiment of the present invention, the present invention further provides a computer device 400, as shown in fig. 4, including a memory 410, a processor 420, and a computer program 430 stored on the memory 410 and executable on the processor 420, where the processor 420 executes the computer program 430 to implement a method for maintaining and managing a high-rights password of a terminal.
In an embodiment of the present invention, a computer-readable storage medium is further provided, where a computer program for executing the method for maintaining and managing a high-authority password of a terminal is stored in the computer-readable storage medium.
For a clearer explanation of the method and system for maintaining and managing the high-rights password of the terminal, a specific embodiment is described below, but it should be noted that the embodiment is only for better explaining the present invention and is not to be construed as an undue limitation on the present invention.
The first embodiment is as follows:
taking a large-scale ticketing terminal of a certain enterprise as an example, the ticketing terminal automatically acquires a signature and signature verification server certificate after being started, and a root password is encrypted by using a signature and signature verification server certificate public key of the ticketing terminal (all ticketing terminals use the same signature server public key).
The encryption mode can perform root password encryption through an SM2 asymmetric encryption algorithm, and encryption and decryption utilize a public key and a private key of a signature verification server, wherein a public key certificate is generated and issued by a self-built PKI/CA system.
It should be noted that, in the prior art, the signature verification server is only used for signature verification of ticketing, but the root password is encrypted by using the signature verification server.
Among these, the SM2 asymmetric cryptographic algorithm requires two keys: the public key and the private key are a pair, and if the public key is used for encrypting data, only the corresponding private key can be used for decrypting the data; if the data is encrypted with a private key, it can only be decrypted with the corresponding public key. Since encryption and decryption use two different keys, an asymmetric encryption algorithm is used.
In the PKI/CA system, the PKI technology is the core of the information security technology, and the basic technologies include encryption, digital signature, data integrity mechanism, digital envelope, double digital signature, and the like. A typical, complete, and efficient PKI application system should have at least the following: and managing public key password certificates. Publishing and managing a blacklist; backup and recovery of keys; automatically updating the key; automatically managing a history key; cross-certification is supported. Certification Authority (CA): i.e., the issuing and applying authorities of digital certificates, the CA must be authoritative.
Further, the encrypted password is uploaded through an SSL channel and stored in the operation and maintenance database. The SSL channel is used for guaranteeing the safety of data transmission on the Internet, and the data Encryption (Encryption) technology is utilized to ensure that the data cannot be intercepted and intercepted in the transmission process on the network.
In asymmetric encryption, different keys are used for encryption and decryption, one key is used as a public key, and the other key is used as a private key. The public key encrypted information can be decrypted only by the private key. The private key can decrypt the encrypted information only by the public key. The private key is kept securely by the signature verification server and cannot be revealed, while the public key can be issued to anyone requesting it. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key. The encryption mode has the advantages that the security is higher, the public key is public, the secret key is stored by the secret key, and the private key does not need to be sent to other people. Compared with a symmetric encryption algorithm, the asymmetric encryption algorithm has a lower speed than the symmetric encryption algorithm, so that the algorithm is only suitable for encrypting a small amount of data. However, the root password is only an 8-bit string, and the additional time of adopting the asymmetric encryption algorithm cannot influence the system starting efficiency.
And storing the encrypted ciphertext password in the operation and maintenance background database, calling a decryption interface of the signature verification server through the operation and maintenance system when the ticket terminal needs to be logged in, further decrypting the password by using a private key of the signature verification server, and inquiring to obtain a password plaintext for operation and maintenance personnel to use.
In summary, the terminal high-weight account password is encrypted by an asymmetric encryption algorithm, the asymmetric encryption algorithm is implemented by using a public key and a private key of a digital certificate, and the public key certificate is issued by a certificate authority. The password security is higher. The private key is generated through fixed equipment, cannot be extracted and exported after being generated, and high-strength secret key protection is carried out. The high-right account password is encrypted through TLS in the transmission process, and the safety of the data transmission process is guaranteed.
The method and the system for maintaining and managing the terminal high-weight password, provided by the invention, adopt an asymmetric encryption algorithm to carry out password encryption, and encryption and decryption utilize a public key and a private key of a signature verification server, so that high-strength confidentiality protection of the large-scale terminal high-weight password and the secret key is realized, and the safety of the password and the secret key is ensured.
While the spirit and principles of the invention have been described with reference to several particular embodiments, it is to be understood that the invention is not limited to the disclosed embodiments, nor is the division of aspects, which is for convenience only as the features in such aspects may not be combined to benefit. The invention is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A method for maintaining and managing a high-authority password of a terminal is characterized by comprising the following steps:
generating a root password by the terminal and acquiring a signature verification server certificate;
encrypting the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain an encrypted password;
uploading and storing the encrypted password to a operation and maintenance database;
and when a password inquiry command is received, calling a decryption interface of the signature verification server, decrypting the encrypted password by using a private key of the signature verification server, and acquiring the decrypted password.
2. The method for maintaining and managing the high-authority password of the terminal according to claim 1, wherein uploading and storing the encrypted password to a operation and maintenance database comprises:
and uploading and storing the encrypted password to a motion maintenance database by utilizing an SSL (secure sockets layer) channel.
3. The method for maintaining and managing the high-rights password of the terminal as claimed in claim 1, further comprising:
and after the decrypted password is obtained, logging in the terminal for maintenance by using the decrypted password.
4. The method for maintaining and managing the high-authority password of the terminal according to claim 1, wherein the terminal generates a root password and obtains the signature and verification server certificate, comprising:
and after the terminal is started, automatically acquiring a signature and signature verification server certificate from the signature and signature verification server.
5. The method for maintaining and managing the high-authority password of the terminal according to claim 1, wherein the terminal generates a root password and obtains the signature and verification server certificate, comprising:
after the terminal is started, the terminal generates a root account password by using a random algorithm, wherein the password intensity is an 8-bit string and the string contains upper and lower case characters.
6. The method for maintaining and managing the high-authority password of the terminal according to claim 1, wherein the terminal is a ticket selling terminal, and all ticket selling terminals use the same public key of the signature verification server.
7. The method for maintaining and managing the high-authority password of the terminal as claimed in claim 1, wherein the public key certificate of the signature and verification server certificate is generated by a self-built PKI/CA system.
8. A maintenance management system for a high-authority password of a terminal is characterized by comprising:
the password generation module is arranged at the terminal and used for generating a root password and acquiring a signature verification server certificate;
the password encryption module is used for encrypting the root password by using the public key of the signature verification server certificate and an asymmetric encryption algorithm to obtain an encrypted password;
the password uploading module is used for uploading and storing the encrypted password to the operation and maintenance database;
and the operation and maintenance database is used for calling a decryption interface of the signature verification server when receiving the password query instruction, decrypting the encrypted password by using a private key of the signature verification server and acquiring the decrypted password.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program for executing the method of any one of claims 1 to 7.
CN201910830643.1A 2019-09-04 2019-09-04 Method and system for maintaining and managing terminal high-authority password Active CN110691069B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910830643.1A CN110691069B (en) 2019-09-04 2019-09-04 Method and system for maintaining and managing terminal high-authority password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910830643.1A CN110691069B (en) 2019-09-04 2019-09-04 Method and system for maintaining and managing terminal high-authority password

Publications (2)

Publication Number Publication Date
CN110691069A true CN110691069A (en) 2020-01-14
CN110691069B CN110691069B (en) 2022-05-17

Family

ID=69108850

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910830643.1A Active CN110691069B (en) 2019-09-04 2019-09-04 Method and system for maintaining and managing terminal high-authority password

Country Status (1)

Country Link
CN (1) CN110691069B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113422757A (en) * 2021-06-04 2021-09-21 广西电网有限责任公司 Document management system based on encryption application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302316A (en) * 2015-05-15 2017-01-04 中兴通讯股份有限公司 Cipher management method and device, system
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method
CN109472130A (en) * 2018-11-13 2019-03-15 试金石信用服务有限公司 Linux cipher management method, middle control machine, readable storage medium storing program for executing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302316A (en) * 2015-05-15 2017-01-04 中兴通讯股份有限公司 Cipher management method and device, system
CN107888560A (en) * 2017-10-12 2018-04-06 深圳市中易通安全芯科技有限公司 A kind of mobile intelligent terminal mail security Transmission system and method
CN109472130A (en) * 2018-11-13 2019-03-15 试金石信用服务有限公司 Linux cipher management method, middle control machine, readable storage medium storing program for executing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113422757A (en) * 2021-06-04 2021-09-21 广西电网有限责任公司 Document management system based on encryption application

Also Published As

Publication number Publication date
CN110691069B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
US11108753B2 (en) Securing files using per-file key encryption
US10171451B2 (en) Distributed single sign-on
US20190318356A1 (en) Offline storage system and method of use
US10911431B2 (en) Local encryption for single sign-on
US20140270179A1 (en) Method and system for key generation, backup, and migration based on trusted computing
CN104618096B (en) Protect method, equipment and the TPM key administrative center of key authorization data
CN113037484B (en) Data transmission method, device, terminal, server and storage medium
US20210258148A1 (en) Key management method, security chip, service server and information system
CN107920052B (en) Encryption method and intelligent device
CN108809633B (en) Identity authentication method, device and system
GB2543726B (en) Password-based generation and management of secret cryptographic keys
US11757625B2 (en) Multi-factor-protected private key distribution
US20120290833A1 (en) Certificate Blobs for Single Sign On
CN110868291B (en) Data encryption transmission method, device, system and storage medium
US20210112039A1 (en) Sharing of encrypted files without decryption
KR100668446B1 (en) Safe --method for transferring digital certificate
US20210144002A1 (en) Secondary Channel Authentication of Public Keys
CN110691069B (en) Method and system for maintaining and managing terminal high-authority password
CN113886793A (en) Device login method, device, electronic device, system and storage medium
CN106257859A (en) A kind of password using method
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
CN111368271A (en) Method and system for realizing password management based on multiple encryption
CN115801232A (en) Private key protection method, device, equipment and storage medium
EP3886355A2 (en) Decentralized management of data access and verification using data management hub
US10257176B2 (en) Replacing keys in a computer system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant