WO2019037395A1 - 密钥管理方法、装置及可读存储介质 - Google Patents

密钥管理方法、装置及可读存储介质 Download PDF

Info

Publication number
WO2019037395A1
WO2019037395A1 PCT/CN2018/075664 CN2018075664W WO2019037395A1 WO 2019037395 A1 WO2019037395 A1 WO 2019037395A1 CN 2018075664 W CN2018075664 W CN 2018075664W WO 2019037395 A1 WO2019037395 A1 WO 2019037395A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
key management
service system
processor
management method
Prior art date
Application number
PCT/CN2018/075664
Other languages
English (en)
French (fr)
Inventor
臧磊
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2019037395A1 publication Critical patent/WO2019037395A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms

Definitions

  • the present application belongs to the field of keys, and in particular, to a key management method, apparatus, and readable storage medium.
  • a key is used to encrypt the information to be transmitted of each service system.
  • the key is manually imported into the local configuration file of the service system by using a traditional medium such as a USB disk, and the key is safely imported into the local configuration file. Sex is not guaranteed and the operation is cumbersome and inefficient. For example, the loss of local configuration files may lead to the leakage of keys.
  • the main purpose of the present application is to provide a key management method, apparatus, and readable storage medium, which are aimed at solving the technical problem that the key is easy to leak and the security performance is low in the process of transmitting information in the network of each existing service system.
  • the present application provides a key management method, where the key management method includes:
  • the step of acquiring the attribute of the service system, and acquiring the key rule corresponding to the service system based on the attribute includes:
  • the key rule includes a key algorithm
  • the key management method is applied to a key storage
  • the step of dynamically acquiring a key based on the key rule includes:
  • the key algorithm is invoked to generate a key with a preset validity period and a key length.
  • the step of detecting whether the subkey repository matching the key rule exists in the key repository includes:
  • the key rule corresponding key is dynamically obtained from the subkey repository.
  • the step of dynamically acquiring the key rule corresponding key from the subkey repository includes:
  • the key management method further includes:
  • the key that does not have the preset validity period is deleted or disabled.
  • the step of obtaining the attribute of the service system includes:
  • the step of sending the key to the corresponding service system for the service system to perform encryption on the information to be transmitted of the service system according to the key includes:
  • the key sent to the corresponding business system and the associated record of the business system are saved for subsequent query.
  • the present application further provides a key management apparatus, the key management apparatus including: a memory, a processor, a communication bus, and a key management program stored on the memory,
  • the communication bus is used to implement a communication connection between the processor and the memory
  • the processor is configured to execute the backlight adjustment program to implement the following steps:
  • the step of acquiring the attribute of the service system, and acquiring the key rule corresponding to the service system based on the attribute includes:
  • the key rule includes a key algorithm
  • the key management method is applied to a key storage
  • the step of dynamically acquiring a key based on the key rule includes:
  • the key algorithm is invoked to generate a key with a preset validity period and a key length.
  • the step of detecting whether the subkey repository matching the key rule exists in the key repository includes:
  • the key rule corresponding key is dynamically obtained from the subkey repository.
  • the step of dynamically acquiring the key rule corresponding key from the subkey repository includes:
  • the key management method further includes:
  • the key that does not have the preset validity period is deleted or disabled.
  • the step of obtaining the attribute of the service system includes:
  • the step of sending the key to the corresponding service system for the service system to perform encryption on the information to be transmitted of the service system according to the key includes:
  • the key sent to the corresponding business system and the associated record of the business system are saved for subsequent query.
  • the present application also provides a readable storage medium storing one or more programs, the one or more programs being executable by one or more processors Used for:
  • the application When the service system key request is detected, the application obtains the attribute of the service system, acquires a key rule corresponding to the service system based on the attribute, dynamically acquires a key based on the key rule, and sends the key And corresponding to the service system, where the service system encrypts the information to be transmitted of the service system according to the key.
  • the key management system acquires a key based on the request, and transmits the key to a different service system for the service system to use according to the key to the service system.
  • the information to be transmitted is encrypted, which effectively avoids the leakage of the key in the service system.
  • the caller that is, the service system does not perceive the key and does not land the key, thus solving the network transmission information process of each existing service system.
  • the technical problem is that the key is easy to leak and the security performance is low.
  • FIG. 1 is a schematic flowchart of a first embodiment of a key management method according to the present application
  • FIG. 2 is a schematic flowchart of a second embodiment of a key management method according to the present application.
  • FIG. 3 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application
  • FIG. 4 is a schematic diagram of a scenario involved in a method according to an embodiment of the present application.
  • the present application provides a key management method.
  • the key management method includes:
  • Step S10 Acquire an attribute of the service system when the service system key request is detected, and obtain a key rule corresponding to the service system based on the attribute;
  • the keys of each system are uniformly managed by the key management system, such as centralized generation of different keys, secure storage of keys, distribution of keys to corresponding service systems, etc., as shown in FIG.
  • the key management system communicates with each business system through a key service interface.
  • the key management system implements a full lifecycle management of the generated key update, storage, logout, and use, and the key management system also has a monitoring function. When the key is abnormal, an exception notification or warning is generated.
  • the key has a key attribute, the key attribute includes a preset validity period information of the key, a length information of the key, and the like, and the key is presented in a pairwise key, that is, the key may include a symmetric key and an asymmetric key.
  • the key wherein the asymmetric key is a public key and a private key, the public key and the private key are encrypted and decrypted, and the asymmetric key is taken as an example for description. After the public key is used to encrypt the information to be transmitted at the transmitting end of the service system, Sending it to the receiving end, the receiving end decrypts the received transmission information based on the private key.
  • the receiving end of the service to be processed is obtained. And sending, by the sending end, the public key in the asymmetric key to the sending end, so that the sending end encrypts the information to be transmitted based on the public key, and the service system sends the private key to the receiving end, so that the receiving end is based on the private key. Decrypt the received transmission information.
  • the symmetric key may be a private key.
  • the service system obtains the private key sent by the key management system, the same private key is sent to the corresponding sending end and receiving end respectively, and the sending end adopts The private key encrypts the information to be transmitted, and the receiving end uses the private key to decrypt the received transmission information.
  • the service system may have multiple waiting The service is processed, and thus different keys are respectively sent according to the key request corresponding to the service to be processed.
  • the attribute of the service system is obtained, where the service system sends a key request when the service system needs timing or when there is a service processing requirement, and the key management system receives the key request through the key service interface.
  • the key generation strategy or algorithm sends the key to the service system periodically after generating the key, or generates the key in real time and then sends the key to the service system.
  • the key is generated before sending the key to the service system.
  • the management system acquires an attribute of the service system based on the key request, and obtains a key rule corresponding to the service system based on the attribute.
  • the step of acquiring the attribute of the service system, and acquiring the key rule corresponding to the service system based on the attribute includes:
  • Step S11 Obtain a type of the service system, and obtain configuration information corresponding to the information to be transmitted based on the service system of the type;
  • the attributes of the service system include the type of the service system. Different types of service systems have different requirements for key attributes.
  • the key attributes include the type of the key, such as the public key, and the private key belongs to different types of keys. For example, if the public key encryption has a larger key space (a range of possible values of the key), the public key may cause an excessive extension of the encryption process time when encrypting a large amount of data, and the possible range of the private key may be Small, although the encryption process is relatively fast, the private key may be cracked due to exhaustiveness. Therefore, the public key or the private key is used to encrypt the information to be transmitted according to the type of the service to be processed of the service system, and the service to be processed is used as the service system.
  • the private key may be selected to encrypt the information to be transmitted.
  • the public information may be selected. The key encrypts it.
  • the configuration information of the to-be-processed service is read, that is, after the type of the service system is obtained, the configuration information of the information to be transmitted corresponding to the to-be-processed service of the service system is obtained, and the corresponding key rule is obtained.
  • Step S12 Acquire a service system corresponding key rule based on the configuration information of the information to be transmitted.
  • the configuration information includes the length requirement information of the key, the validity requirement information of the key, the key encryption rule information, and the like
  • the corresponding key rule of the service system is obtained based on the configuration information of the information to be transmitted.
  • the key rule corresponding to the service system is read from the configuration information of the information to be transmitted, and the key rule includes a length rule of the key, an algorithm rule of the key, and the like.
  • Step S20 dynamically acquiring a key based on the key rule
  • the obtaining process may be: randomly selecting one key from multiple keys that meet the key rule, that is, due to the secret
  • the key may be generated by the key management system and stored in different subkey repositories according to different attributes of the key. When there are multiple keys that meet the key rules, the corresponding key is randomly selected from the key.
  • the process of dynamically generating a key based on the key rule may be: orderly combining binary codes 0 and 1 according to a key rule to obtain a key conforming to a key rule, that is, the key may also be based on This key rule is generated in real time.
  • Step S30 Send the key to the corresponding service system, so that the service system encrypts the information to be transmitted of the service system according to the key.
  • the service system encrypts the information to be transmitted of the service system according to the key, and is described by using a specific embodiment, when the service system is an A-mail service system.
  • the key management system acquires the attribute of the A mail service system and generates a class A key corresponding to the service system
  • the address information of the A mail service system is obtained, and the class A key is sent to the address information based on the address information.
  • the A mail service system continues to randomly assign the class A key to the mail service to be sent, and encrypts the mail to be sent. In this process, the A mail service system may not perceive the key. Do not land the key.
  • the key repository in the key management system may have a key that conforms to the attributes or requirements of the A mail service system. If the key storage inventory is in the class A key, the class A key is selected, and the class A key is selected. Sent to the business system.
  • the present application obtains the attribute of the service system by detecting the service system key request, obtains the key rule corresponding to the service system based on the attribute, and dynamically acquires the key based on the key rule;
  • the key is sent to the corresponding service system, so that the service system encrypts the information to be transmitted of the service system according to the key.
  • the key management system acquires a key based on the request, and transmits the key to a different service system for the service system to use according to the key to the service system.
  • the information to be transmitted is encrypted, which effectively avoids the leakage of the key in the service system.
  • the caller that is, the service system does not perceive the key and does not land the key, thus solving the network transmission information process of each existing service system.
  • the technical problem is that the key is easy to leak and the security performance is low.
  • a second embodiment of a key management method is provided.
  • the key rule includes a key algorithm
  • the key The management method is applied to a key repository, and the step of dynamically acquiring a key based on the key rule includes:
  • the key algorithm is invoked to generate a key with a preset validity period and a key length.
  • the key rules of the key such as the length information of the key, the composition information of the key, the algorithm information of the key, etc., or store the key rules corresponding to each subkey repository in the key management system configuration file set.
  • the key rules corresponding to the service system are compared with the key rules corresponding to the subkey store in the key management system.
  • the key algorithm includes an algorithm of a public key key or an algorithm of a private key key, and the algorithm is pre-imported to a secret.
  • a subkey repository matching the key may be established, and the corresponding key is stored in the subkey repository.
  • the key management system when detecting that the key rule corresponding to the service system is updated, the key management system generates a key based on the updated key rule and transmits the key.
  • the key rule invokes a key algorithm to generate a key with a preset validity period and a key length.
  • the key management system can generate a key corresponding to the corresponding service system in real time, and the service system still does not perceive the key and does not land the key in the process, thereby further improving the user experience.
  • a third embodiment of the key management method is provided.
  • whether the key is stored in the detection key repository After the rule matching subkey repository step it includes:
  • the key rule corresponding key is dynamically obtained from the subkey repository.
  • the step of dynamically acquiring the key rule corresponding key from the subkey repository includes:
  • the corresponding key is dynamically obtained from the sub-key repository.
  • the time limit of each key in the sub-key repository is acquired.
  • Information, wherein each key in the sub-key repository may be stored in batches according to the aging of the key in advance, and a key having a preset validity period is obtained based on the aging information, from the secret with a preset validity period.
  • the key is dynamically selected in the key, wherein the dynamic selection may randomly extract a preset number of keys for sending the selected preset number of keys to the service system.
  • the corresponding key is dynamically obtained from the subkey repository when there is a matching subkey repository.
  • the step of dynamically obtaining the corresponding key from the sub-key repository includes: obtaining time-information information of each key in the sub-key repository; and acquiring a key having a preset validity period based on the time-effective information, The key is dynamically selected in the key having the preset validity period. Since the present application obtains a key with a preset validity period, the phenomenon that the service system to be transmitted is delayed due to the failure of the key is effectively avoided, and the user experience can be further improved.
  • the key management method further includes:
  • the key that does not have the preset validity period is deleted or disabled.
  • the key management system acquires the time-information information of each key in the sub-key repository every predetermined time period, wherein each key in the sub-key storage library may be stored in batches according to the time limit of the key, if If any key that does not have a preset validity period is detected, the key that does not have the preset validity period is deleted or deactivated. If the default validity period of a certain type B key in the subkey repository is 1 month, The Class B key is generated in April 2017. After May 2017, the Class B key is a deadkey. After detecting that the Class B key is a deadlock key, the Class B key is deleted or Disable processing.
  • the time-information information of each key in the sub-key repository is obtained by the preset time period of each interval; if any key that does not have the preset validity period is detected, the preset validity period is not used.
  • the key is deleted or deactivated. Since the detection of the preset time period and the deletion or deactivation of the key without the preset validity period can effectively avoid the delay of the transmission of the information to be transmitted by the service system due to the key failure, the user can be further improved. Experience.
  • a fifth embodiment of the key management method is provided.
  • the detection is performed.
  • the types of steps of the adjustment operation include:
  • the step of obtaining the attribute of the service system includes:
  • the service system When the service system key request is detected, the service system is authenticated, and the identity verification includes the rights verification, the role verification, and the like.
  • the identity authentication is passed, the attributes of the service system are obtained, and when the identity authentication fails, Generate a prompt message to prompt the business system identity authentication failed.
  • the service system when the service system key request is detected, the service system is authenticated; when the identity authentication is passed, the attribute of the service system is obtained, and the key management system authenticates the service system. Therefore, the security of the key management system can be effectively improved, thereby further improving the user experience.
  • a sixth embodiment of a key management method is provided.
  • the key is sent to a corresponding service system.
  • the method includes:
  • the key sent to the corresponding business system and the associated record of the business system are saved for subsequent query.
  • the key sent to the corresponding service system and the associated record of the service system are saved for subsequent query, which is described in the specific embodiment, and the key management system sends the class A key to After the M service system, the key management system stores the mapping relationship between the class A key and the M service system.
  • the key sent to the corresponding service system and the associated record are saved by the service system for subsequent query. This further enhances the user experience.
  • FIG. 3 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application.
  • the key management device in the embodiment of the present application may be a PC, or may be a smart phone, a tablet computer, an e-book reader, and an MP3 (Moving). Picture Experts Group Audio Layer III, motion picture expert compression standard audio layer 3) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 4) terminal devices such as players and portable computers.
  • MP3 Motion Picture Experts Group Audio Layer III, motion picture expert compression standard audio layer 3
  • MP4 Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 4
  • terminal devices such as players and portable computers.
  • the key management apparatus may include a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between the processor 1001 and the memory 1005.
  • the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the key management device may further include a user interface, a network interface, a camera, and an RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • the user interface may include a display, an input unit such as a keyboard, and the optional user interface may also include a standard wired interface, a wireless interface.
  • the network interface can optionally include a standard wired interface or a wireless interface (such as a WI-FI interface).
  • the structure of the key management apparatus shown in FIG. 3 does not constitute a limitation of the key management apparatus, and may include more or less components than those illustrated, or may combine some components or different. Parts layout.
  • an operating system may be included in the memory 1005 as a computer storage medium.
  • the operating system is a program that manages and controls the hardware and software resources of the key management device, supporting the operation of the key management program and other software and/or programs.
  • the network communication module is used to implement communication between components within the memory 1005 and with other hardware and software in the key management device.
  • the processor 1001 is configured to execute a key management program stored in the memory 1005, and implements the following steps:
  • the step of acquiring the attribute of the service system, and acquiring the key rule corresponding to the service system based on the attribute includes:
  • the key rule includes a key algorithm
  • the key management method is applied to a key storage library
  • the step of dynamically acquiring a key based on the key rule includes:
  • the key algorithm is invoked to generate a key with a preset validity period and a key length.
  • the step of detecting whether the subkey repository matching the key rule exists in the key repository includes:
  • the key rule corresponding key is dynamically obtained from the subkey repository.
  • the step of dynamically acquiring the key rule corresponding key from the subkey repository includes:
  • the key management method further includes:
  • the key that does not have the preset validity period is deleted or disabled.
  • the step of obtaining the attribute of the service system includes:
  • the method includes:
  • the key sent to the corresponding business system and the associated record of the business system are saved for subsequent query.
  • the application provides a readable storage medium storing one or more programs, which may also be executed by one or more processors for implementing the following steps:
  • the step of acquiring the attribute of the service system, and acquiring the key rule corresponding to the service system based on the attribute includes:
  • the key rule includes a key algorithm
  • the key management method is applied to a key storage library
  • the step of dynamically acquiring a key based on the key rule includes:
  • the key algorithm is invoked to generate a key with a preset validity period and a key length.
  • the step of detecting whether the subkey repository matching the key rule exists in the key repository includes:
  • the key rule corresponding key is dynamically obtained from the subkey repository.
  • the step of dynamically acquiring the key rule corresponding key from the subkey repository includes:
  • the key management method further includes:
  • the key that does not have the preset validity period is deleted or disabled.
  • the step of obtaining the attribute of the service system includes:
  • the method includes:
  • the key sent to the corresponding business system and the associated record of the business system are saved for subsequent query.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种密钥管理方法、装置及可读存储介质,所述密钥管理方法包括:当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;基于所述密钥规则动态获取密钥;将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。本申请解决现有各个业务系统网络传输信息过程中密钥易泄漏,安全性能低的技术问题。

Description

密钥管理方法、装置及可读存储介质
本申请要求于2017年8月24日提交中国专利局、申请号为201710741118.3、发明名称为“密钥管理方法、装置及可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请属于密钥领域,尤其涉及一种密钥管理方法、装置及可读存储介质。
背景技术
 目前,为确保各个业务系统网络传输信息过程的安全,需使用密钥对各个业务系统的待传输信息进行加密。然而,现有技术在对待传输信息进行加密时,密钥都是人为通过传统媒介如U盘等方式导入至业务系统的本地配置文件中,人为导入密钥至本地配置文件中对密钥的安全性没有保障且操作繁琐,效率较低,如本地的配置文件的丢失会导致密钥的泄漏等问题。
发明内容
本申请的主要目的在于提供一种密钥管理方法、装置及可读存储介质,旨在解决现有各个业务系统网络传输信息过程中密钥易泄漏,安全性能低的技术问题。
为实现上述目的,本申请提供一种密钥管理方法,所述密钥管理方法包括:
当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
基于所述密钥规则动态获取密钥;
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
可选地,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
可选地,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
可选地,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
可选地,所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
获取所述子密钥存储库中各密钥的时效信息;
基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
可选地,所述密钥管理方法还包括:
每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
可选地,所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
当检测到业务系统密钥请求时,对业务系统进行身份认证;
当所述身份认证通过时,获取该业务系统的属性。
可选地,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
此外,为实现上述目的,本申请还提供一种密钥管理装置,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
所述通信总线用于实现处理器与存储器间的通信连接;
所述处理器用于执行所述背光调节程序,以实现以下步骤:
当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
基于所述密钥规则动态获取密钥;
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
可选地,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
可选地,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
可选地,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
可选地,所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
获取所述子密钥存储库中各密钥的时效信息;
基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
可选地,所述密钥管理方法还包括:
每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
可选地,所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
当检测到业务系统密钥请求时,对业务系统进行身份认证;
当所述身份认证通过时,获取该业务系统的属性。
可选地,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
此外,为实现上述目的,本申请还提供一种可读存储介质,所述可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序可被一个或者一个以上的处理器执行以用于:
当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
基于所述密钥规则动态获取密钥;
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
本申请通过当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;基于所述密钥规则动态获取密钥;将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。由于在本申请中,当检测到业务系统密钥请求时,密钥管理系统基于该请求获取密钥,将密钥发送至不同的业务系统,以供业务系统根据所述密钥对业务系统的待传输信息进行加密,有效避免了在业务系统处泄漏密钥,即在此过程中,调用方即业务系统不感知密钥,不落地密钥,因而解决了现有各个业务系统网络传输信息过程中密钥易泄漏,安全性能低的技术问题。
附图说明
图1为本申请密钥管理方法第一实施例的流程示意图;
图2为本申请密钥管理方法第二实施例的流程示意图;
图3为本申请实施例方法涉及的硬件运行环境的设备结构示意图;
图4为本申请实施例方法涉及的场景示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供一种密钥管理方法,在本申请密钥管理方法的第一实施例中,参照图1,所述密钥管理方法包括:
步骤S10,当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
在本申请中,通过密钥管理系统对各系统的密钥进行统一管理,如集中产生不同密钥、安全存储密钥、将密钥分发至对应的业务系统等,如图4所示,密钥管理系统与各个业务系统通过密钥服务接口进行通信,另外,密钥管理系统实现生成的密钥的更新、存储、注销和使用等全生命周期的管理,密钥管理系统还存在监控功能,当密钥产生异常时,生成异常通知或者预警。
密钥具有密钥属性,密钥属性包括密钥的预设有效期信息,密钥的长度信息等,另外,密钥以成对的密钥呈现,即密钥可包括对称密钥与非对称密钥,其中,非对称密钥可是公钥与私钥,该公钥与私钥为加解密,以非对称密钥为例进行说明,通过公钥对业务系统发送端的待传输信息进行加密后,将其发送给接收端,接收端基于私钥对接收到的传输信息进行解密处理,即在本申请中,业务系统获取密钥管理系统发送的非对称密钥后,获取待处理业务的接收端与发送端,将非对称密钥中的公钥发送给发送端,以供发送端基于该公钥加密待传输信息,业务系统还将私钥发送给接收端,以供接收端基于该私钥解密接收到的传输信息。
当密钥为对称密钥时,该对称密钥可是私钥,即业务系统获取密钥管理系统发送的私钥后,将该相同私钥分别发送至对应的发送端与接收端,发送端采用该私钥加密待传输信息,接收端采用该私钥解密接收到的传输信息,另外,业务系统将该私钥分别发送至对应的发送端与接收端过程之前,由于业务系统可能存在多个待处理业务,因而根据待处理业务对应的密钥请求分别发送不同的密钥。
当检测到业务系统密钥请求时,获取该业务系统的属性,其中,业务系统可是定时或者存在业务处理需求时,发送密钥请求,密钥管理系统通过密钥服务接口接收该密钥请求,基于密钥生成策略或者算法在生成密钥后定时发送密钥至业务系统,或者实时生成密钥后发送密钥至业务系统,如图4所示,在发送密钥至业务系统之前,密钥管理系统基于密钥请求获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则。
其中,如图2所示,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
步骤S11,获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
业务系统的属性包括业务系统的类型,不同类型业务系统对密钥属性等具有不同的需求,密钥属性包括密钥的类型,如公钥,私钥分属不同类型密钥,用以具体实施例进行说明,如通过公钥加密具有更大的密钥空间(密钥的可能值范围),但是公钥在加密大量数据时会造成加密过程时间的过度延长,而私钥的可能值范围较小,虽然加密过程较为迅速,但是私钥可能因为穷举而被破获,因而,根据业务系统待处理业务的类型的不同而采取公钥或者私钥加密待传输信息,当业务系统的待处理业务一般为包含大量数据的待传输信息时,为避免传输过程中的延时,可选取私钥对待传输信息进行加密,当业务系统的待处理业务的待传输信息数据含量较少时,可选取公钥对其进行加密。
另外,由于业务系统类型不同,待处理业务不同,待处理业务不同,对应待传输信息不同,进一步地,对密钥的规则需求信息不同,其中,待处理业务对密钥的规则需求信息可从待处理业务的配置信息中读取,即在获取业务系统的类型后,获取该类型业务系统的对应待处理业务的待传输信息的配置信息即可获取对应密钥规则。
步骤S12,基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
在本申请中,配置信息中包括对密钥的长度需求信息,密钥的实效性需求信息,密钥加密规则信息等,基于所述待传输信息的配置信息,获取业务系统对应密钥规则即是从所述类型待传输信息的配置信息,读取业务系统对应的密钥规则,该密钥规则包括密钥的长度规则、密钥的算法规则等。
步骤S20,基于所述密钥规则动态获取密钥;
在获取业务系统的密钥规则后,基于所述密钥规则动态获取或者生成密钥,该获取过程可是:从符合密钥规则的多个密钥中随机挑选一个密钥即可,即由于密钥可是密钥管理系统已经产生并根据密钥不同属性分别将密钥存储在不同的子密钥存储库中的,当符合密钥规则的密钥存在多个,从中随机挑选对应的密钥即可,另外,基于所述密钥规则动态生成密钥过程可是:根据密钥规则,将二进制码0与1进行有序组合,以得到符合密钥规则的密钥,即该密钥也可是根据该密钥规则实时生成的。
步骤S30,将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密,用以具体实施例进行说明,当该业务系统是A邮件业务系统时,密钥管理系统获取该A邮件业务系统的属性并对应生成该业务系统对应的A类密钥后,获取该A邮件业务系统的地址信息,基于该地址信息,将A类密钥发送给对应的A邮件业务系统,A邮件业务系统继续将A类密钥随机分配该待发送的邮件业务,并对该待发送的邮件进行加密,在此过程中,A邮件业务系统可不感知密钥,不落地密钥。另外,密钥管理系统中的密钥存储库可能存在符合A邮件业务系统属性或者要求的密钥,若密钥存储库存在A类密钥时,选取A类密钥,并将A类密钥发送给业务系统。
本申请通过本申请通过当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;基于所述密钥规则动态获取密钥;将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。由于在本申请中,当检测到业务系统密钥请求时,密钥管理系统基于该请求获取密钥,将密钥发送至不同的业务系统,以供业务系统根据所述密钥对业务系统的待传输信息进行加密,有效避免了在业务系统处泄漏密钥,即在此过程中,调用方即业务系统不感知密钥,不落地密钥,因而解决了现有各个业务系统网络传输信息过程中密钥易泄漏,安全性能低的技术问题。
进一步地,在本申请密钥管理方法的第一实施例的基础上,提供密钥管理方法第二实施例,在第二实施例中,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库,其中,在子密钥存储库对应的接口配置中,预存子密钥存储库中存储的密钥的密钥规则,如密钥的长度信息,密钥的构成信息,密钥的算法信息等,或者在密钥管理系统配置文件集合中存储各个子密钥存储库对应的密钥规则等,将业务系统对应的密钥规则与密钥管理系统中子密钥存储库对应的密钥规则进行比对,当密钥规则不一致时,匹配失败,因而需要实时生成密钥,即基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥,该密钥算法包括公钥密钥的算法,或者私钥密钥的算法,该算法已预先导入至密钥管理系统中,当实时生成密钥后,可建立与该密钥匹配的子密钥存储库,在该子密钥存储库中存储对应的密钥。另外,密钥管理系统在检测到业务系统对应的密钥规则发生更新时,基于更新的密钥规则产生密钥,并发送。
在本实施例中,通过基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。由于密钥管理系统可实时生成与对应的业务系统对应的密钥,且在该过程中业务系统还是不感知密钥,不落地密钥,进而进一步提升了用户体验。
进一步地,在本申请密钥管理方法的第二实施例的基础上,提供密钥管理方法第三实施例,在第三实施例中,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
获取所述子密钥存储库中各密钥的时效信息;
基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取相应密钥,具体地,由于密钥具有时效性,因而获取子密钥存储库中的各密钥的时效信息,其中,该子密钥存储库中的各密钥可是预先根据密钥的时效进行分批存储,基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取密钥,其中,该动态选取可是随机抽取预设数目的密钥,以供将选取的预设数目的密钥发送给业务系统。
在本实施例中,通过当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取相应密钥。其中,从所述子密钥存储库中动态获取相应密钥步骤包括:获取所述子密钥存储库中各密钥的时效信息;基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取密钥。由于本申请获取具有预设有效期的密钥,有效避免了因密钥失效而造成业务系统待传输信息发送延误的现象,能够进一步提升用户体验。
进一步地,在本申请密钥管理方法的第一实施例的基础上,提供密钥管理方法第四实施例,在第四实施例中,所述密钥管理方法还包括:
每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
密钥管理系统每间隔预设时间段获取子密钥存储库中各密钥的时效信息,其中,该子密钥存储库中的各密钥可是预先根据密钥的时效进行分批存储,若检测到任意不具有预设有效期的密钥时,对不具有预设有效期的密钥进行删除或者停用处理,如若子密钥存储库中某B类密钥预设有效期期为1个月,该B类密钥在2017年4月生成,则2017年5月后,该B类密钥为失效密钥,在检测到B类密钥为失效密钥后,对B类密钥进行删除或者停用处理。
在本实施例中,通过每间隔预设时间段获取子密钥存储库中各密钥的时效信息;若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。由于每间隔预设时间段检测并对不具有预设有效期的密钥进行删除或者停用处理,因而能够有效避免了因密钥失效而造成业务系统待传输信息发送延误的现象,能够进一步提升用户体验。
进一步地,在本申请密钥管理方法的第四实施例的基础上,提供密钥管理方法第五实施例,在第五实施例中,所述当所述距离时间大于预设时间时,检测该调节操作的类型步骤包括:
所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
当检测到业务系统密钥请求时,对业务系统进行身份认证;
当所述身份认证通过时,获取该业务系统的属性。
当检测到业务系统密钥请求时,对业务系统进行身份认证,该身份验证包括权限验证,角色验证等,当所述身份认证通过时,获取该业务系统的属性,当身份认证未通过时,生成提示信息,以提示业务系统身份认证未通过。
在本实施例中,通过当检测到业务系统密钥请求时,对业务系统进行身份认证;当所述身份认证通过时,获取该业务系统的属性,由于密钥管理系统对业务系统进行身份验证,因而能够有效提升密钥管理系统的安全性,因而进一步提升用户体验。
进一步地,在本申请密钥管理方法的第一实施例的基础上,提供密钥管理方法第六实施例,在第六实施例中,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
在本实施例中,对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询,用以具体实施例进行说明,密钥管理系统将A类密钥发送至M业务系统后,密钥管理系统中保存A类密钥与M业务系统的映射关联关系。
在本实施例中,通过对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。因而进一步提升用户体验。
参照图3,图3是本申请实施例方法涉及的硬件运行环境的设备结构示意图。
本申请实施例密钥管理装置可以是PC,也可以是智能手机、平板电脑、电子书阅读器、MP3(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)播放器、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、便携计算机等终端设备。
如图3所示,该密钥管理装置可以包括:处理器1001,例如CPU,存储器1005,通信总线1002。其中,通信总线1002用于实现处理器1001和存储器1005之间的连接通信。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
可选地,该密钥管理装置还可以包括用户接口、网络接口、摄像头、RF(Radio Frequency,射频)电路,传感器、音频电路、WiFi模块等等。用户接口可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口还可以包括标准的有线接口、无线接口。网络接口可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。
本领域技术人员可以理解,图3中示出的密钥管理装置结构并不构成对密钥管理装置的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图3所示,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块以及密钥管理程序。操作系统是管理和控制密钥管理装置硬件和软件资源的程序,支持密钥管理程序以及其它软件和/或程序的运行。网络通信模块用于实现存储器1005内部各组件之间的通信,以及与密钥管理装置中其它硬件和软件之间通信。
在图3所示的密钥管理装置中,处理器1001用于执行存储器1005中存储的密钥管理程序,实现以下步骤:
当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
基于所述密钥规则动态获取密钥;
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
进一步地,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
进一步地,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
进一步地,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
进一步地,所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
获取所述子密钥存储库中各密钥的时效信息;
基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
进一步地,所述密钥管理方法还包括:
每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
进一步地,所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
当检测到业务系统密钥请求时,对业务系统进行身份认证;
当所述身份认证通过时,获取该业务系统的属性。
进一步地,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
本申请密钥管理装置具体实施方式与上述密钥管理方法各实施例基本相同,在此不再赘述。
本申请提供了一种可读存储介质,所述可读存储介质存储有一个或者一个以上程序,所述一个或者一个以上程序还可被一个或者一个以上的处理器执行以用于实现以下步骤:
当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
基于所述密钥规则动态获取密钥;
将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
进一步地,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
进一步地,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
进一步地,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
进一步地,所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
获取所述子密钥存储库中各密钥的时效信息;
基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
进一步地,所述密钥管理方法还包括:
每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
进一步地,所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
当检测到业务系统密钥请求时,对业务系统进行身份认证;
当所述身份认证通过时,获取该业务系统的属性。
进一步地,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
本申请可读存储介质具体实施方式与上述密钥管理方法各实施例基本相同,在此不再赘述。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利处理范围内。

Claims (20)

  1. 一种密钥管理方法,其特征在于,所述密钥管理方法包括:
    当检测到业务系统密钥请求时,获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则;
    基于所述密钥规则动态获取密钥;
    将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密。
  2. 如权利要求1所述的密钥管理方法,其特征在于,所述获取该业务系统的属性,基于所述属性获取业务系统对应的密钥规则步骤包括:
    获取业务系统的类型,并基于所述类型业务系统获取对应待传输信息的配置信息;
    基于所述待传输信息的配置信息,获取业务系统对应密钥规则。
  3. 如权利要求1所述的密钥管理方法,其特征在于,所述密钥规则包括密钥算法,所述密钥管理方法应用于密钥存储库,所述基于所述密钥规则动态获取密钥步骤包括:
    基于所述密钥规则,检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库;
    当不存在匹配的子密钥存储库时,基于所述密钥规则,调用密钥算法,生成具有预设有效期、密钥长度的密钥。
  4. 如权利要求3所述的密钥管理方法,其特征在于,所述检测密钥存储库中是否存在与该密钥规则匹配的子密钥存储库步骤之后包括:
    当存在匹配的子密钥存储库时,从所述子密钥存储库中动态获取所述密钥规则相应密钥。
  5. 如权利要求4所述的密钥管理方法,其特征在于,所述从所述子密钥存储库中动态获取所述密钥规则相应密钥步骤包括:
    获取所述子密钥存储库中各密钥的时效信息;
    基于所述时效信息获取具有预设有效期的密钥,从所述具有预设有效期的密钥中动态选取所述密钥规则相应密钥。
  6. 如权利要求5所述的密钥管理方法,其特征在于,所述密钥管理方法还包括:
    每间隔预设时间段获取子密钥存储库中各密钥的时效信息;
    若检测到任意不具有预设有效期的密钥时,对所述不具有预设有效期的密钥进行删除或者停用处理。
  7. 如权利要求1所述的密钥管理方法,其特征在于,所述当检测到业务系统密钥请求时,获取该业务系统的属性步骤包括:
    当检测到业务系统密钥请求时,对业务系统进行身份认证;
    当所述身份认证通过时,获取该业务系统的属性。
  8. 如权利要求1所述的密钥管理方法,其特征在于,所述将所述密钥发送至对应的业务系统,以供所述业务系统根据所述密钥对业务系统的待传输信息进行加密步骤之后包括:
    对发送至对应的业务系统的密钥,以及该业务系统进行关联记录保存,以供后续查询。
  9. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求1所述的密钥管理方法的步骤。
  10. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求2所述的密钥管理方法的步骤。
  11. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求3所述的密钥管理方法的步骤。
  12. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求4所述的密钥管理方法的步骤。
  13. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求5所述的密钥管理方法的步骤。
  14. 一种密钥管理装置,其特征在于,所述密钥管理装置包括:存储器、处理器,通信总线以及存储在所述存储器上的密钥管理程序,
    所述通信总线用于实现处理器与存储器间的通信连接;
    所述处理器用于执行所述密钥管理程序,以实现如权利要求6所述的密钥管理方法的步骤。
  15. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求1所述的密钥管理方法的步骤。
  16. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求2所述的密钥管理方法的步骤。
  17. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求3所述的密钥管理方法的步骤。
  18. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求4所述的密钥管理方法的步骤。
  19. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求5项所述的密钥管理方法的步骤。
  20. 一种可读存储介质,其特征在于,所述计算机课读存储介质上存储有密钥管理程序,所述密钥管理程序被处理器执行时实现如权利要求6项所述的密钥管理方法的步骤。
PCT/CN2018/075664 2017-08-24 2018-02-07 密钥管理方法、装置及可读存储介质 WO2019037395A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710741118.3 2017-08-24
CN201710741118.3A CN107733639B (zh) 2017-08-24 2017-08-24 密钥管理方法、装置及可读存储介质

Publications (1)

Publication Number Publication Date
WO2019037395A1 true WO2019037395A1 (zh) 2019-02-28

Family

ID=61204829

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/075664 WO2019037395A1 (zh) 2017-08-24 2018-02-07 密钥管理方法、装置及可读存储介质

Country Status (2)

Country Link
CN (1) CN107733639B (zh)
WO (1) WO2019037395A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108496336A (zh) * 2018-03-21 2018-09-04 福建联迪商用设备有限公司 一种传输密钥的方法及pos终端
CN110351232A (zh) * 2018-04-08 2019-10-18 珠海汇金科技股份有限公司 摄像头安全加密方法及系统
CN112543167B (zh) * 2019-09-20 2023-07-14 天翼电子商务有限公司 通信加密方法、系统、介质及装置
CN113824552B (zh) * 2020-06-19 2024-05-31 上海汽车集团股份有限公司 车辆应用程序的密钥生成方法、装置、电子设备
CN112995144A (zh) * 2021-02-05 2021-06-18 杭州华橙软件技术有限公司 文件处理方法、系统、可读存储介质及电子设备
CN114679324B (zh) * 2021-12-15 2024-03-12 国机工业互联网研究院(河南)有限公司 一种数据交换方法、工具、系统、设备及介质
CN115412303A (zh) * 2022-08-05 2022-11-29 浪潮软件股份有限公司 监管数据交换的加密解密系统及方法
CN115396885A (zh) * 2022-08-26 2022-11-25 中国联合网络通信集团有限公司 一种密钥安全管理方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090513A (zh) * 2006-06-13 2007-12-19 华为技术有限公司 一种获取业务密钥的方法
CN102447690A (zh) * 2010-10-12 2012-05-09 中兴通讯股份有限公司 一种密钥管理方法与网络设备
EP2775659A1 (en) * 2006-06-23 2014-09-10 Huawei Technologies Co., Ltd. Method and system for key distribution in a wireless communication network
CN106487505A (zh) * 2016-09-12 2017-03-08 北京安御道合科技有限公司 密钥管理、获取方法及相关装置和系统

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100356789C (zh) * 2004-09-01 2007-12-19 华为技术有限公司 一种保护宽带视音频广播内容的方法及装置
CN101431409B (zh) * 2007-11-09 2011-04-27 北京华旗资讯数码科技有限公司 可在不同无线局域网中实现保密通信的方法
US8321925B1 (en) * 2009-02-17 2012-11-27 Amazon Technologies, Inc. Distributed encryption key management
CN101583131B (zh) * 2009-06-10 2012-05-09 中兴通讯股份有限公司 一种业务密钥的传输方法和系统
CN101719830B (zh) * 2009-11-27 2012-09-05 中兴通讯股份有限公司 Nfc认证方法和系统
CN102281139B (zh) * 2010-06-10 2016-02-10 中兴通讯股份有限公司 基于密钥管理协议的认证系统和方法
CN103297224B (zh) * 2012-02-23 2016-05-25 中国移动通信集团公司 密钥信息分发方法及相关设备
CN106888183A (zh) * 2015-12-15 2017-06-23 阿里巴巴集团控股有限公司 数据加密、解密、密钥请求处理的方法和装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101090513A (zh) * 2006-06-13 2007-12-19 华为技术有限公司 一种获取业务密钥的方法
EP2775659A1 (en) * 2006-06-23 2014-09-10 Huawei Technologies Co., Ltd. Method and system for key distribution in a wireless communication network
CN102447690A (zh) * 2010-10-12 2012-05-09 中兴通讯股份有限公司 一种密钥管理方法与网络设备
CN106487505A (zh) * 2016-09-12 2017-03-08 北京安御道合科技有限公司 密钥管理、获取方法及相关装置和系统

Also Published As

Publication number Publication date
CN107733639A (zh) 2018-02-23
CN107733639B (zh) 2020-08-04

Similar Documents

Publication Publication Date Title
WO2019037395A1 (zh) 密钥管理方法、装置及可读存储介质
WO2018058919A1 (zh) 标识信息生成方法、装置、设备和计算机可读存储介质
WO2018082482A1 (zh) 一种网络共享方法、接入网络方法及系统
WO2019001110A1 (zh) 权限认证方法、系统、设备及计算机可读存储介质
WO2016178548A1 (ko) 프로파일 제공 방법 및 장치
WO2019024336A1 (zh) 数据查询方法、装置及计算机可读存储介质
WO2015172684A1 (en) Ap connection method, terminal, and server
WO2014036977A1 (en) Data security management system
WO2018233367A1 (zh) 立案方法、装置、终端和计算机可读存储介质
WO2015061941A1 (zh) 一种密钥配置方法和装置
WO2019019374A1 (zh) 智能语音设备控制家电的方法、装置及系统
WO2017035695A1 (zh) 信息传输方法及移动设备
WO2015061992A1 (zh) 一种密钥配置方法、系统和装置
WO2019019493A1 (zh) 数据共享方法、装置及计算机可读存储介质
WO2018120457A1 (zh) 数据处理方法、装置、设备及计算机可读存储介质
WO2017054481A1 (zh) 一种信息验证和处理方法、装置、以及信息处理系统
EP3281436A1 (en) Method and apparatus for downloading a profile in a wireless communication system
WO2019114269A1 (zh) 一种节目续播方法、电视设备及计算机可读存储介质
WO2019051866A1 (zh) 权益信息管理方法、装置、设备及计算机可读存储介质
WO2018227887A1 (zh) 视频广告投放、生成方法、装置、服务器及可读存储介质
WO2017071352A1 (zh) 密码的推送方法、推送系统及终端设备
WO2018076875A1 (zh) 备份数据的同步方法、装置、存储介质、电子设备及服务器
WO2019100531A1 (zh) 数字签名生成、验证方法及其设备和存储介质
WO2018000856A1 (zh) 一种实现SDN Overlay网络报文转发的方法、终端、设备及计算机可读存储介质
WO2017185480A1 (zh) 多屏互动连接方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18847796

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24/06/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18847796

Country of ref document: EP

Kind code of ref document: A1