SG11202104530YA - Key management method, security chip, service server and information system - Google Patents
Key management method, security chip, service server and information systemInfo
- Publication number
- SG11202104530YA SG11202104530YA SG11202104530YA SG11202104530YA SG11202104530YA SG 11202104530Y A SG11202104530Y A SG 11202104530YA SG 11202104530Y A SG11202104530Y A SG 11202104530YA SG 11202104530Y A SG11202104530Y A SG 11202104530YA SG 11202104530Y A SG11202104530Y A SG 11202104530YA
- Authority
- SG
- Singapore
- Prior art keywords
- management method
- service server
- information system
- key management
- security chip
- Prior art date
Links
- 238000007726 management method Methods 0.000 title 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910224105.8A CN109921902B (en) | 2019-03-22 | 2019-03-22 | Key management method, security chip, service server and information system |
PCT/CN2020/074893 WO2020192285A1 (en) | 2019-03-22 | 2020-02-12 | Key management method, security chip, service server and information system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202104530YA true SG11202104530YA (en) | 2021-05-28 |
Family
ID=66966444
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202104530YA SG11202104530YA (en) | 2019-03-22 | 2020-02-12 | Key management method, security chip, service server and information system |
Country Status (6)
Country | Link |
---|---|
US (1) | US11240008B2 (en) |
EP (1) | EP3860036B1 (en) |
CN (1) | CN109921902B (en) |
SG (1) | SG11202104530YA (en) |
TW (1) | TWI724555B (en) |
WO (1) | WO2020192285A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105515768B (en) * | 2016-01-08 | 2017-07-21 | 腾讯科技(深圳)有限公司 | A kind of methods, devices and systems of more new key |
CN109921902B (en) | 2019-03-22 | 2020-10-23 | 创新先进技术有限公司 | Key management method, security chip, service server and information system |
CN110430051B (en) * | 2019-08-01 | 2022-08-05 | 北京永新视博数字电视技术有限公司 | Key storage method, device and server |
CN113079013B (en) * | 2019-12-18 | 2023-04-18 | 华为技术有限公司 | Communication method, terminal device, road side unit, server, system and medium |
CN112822021B (en) * | 2020-12-30 | 2022-10-21 | 中国农业银行股份有限公司 | Key management method and related device |
CN116418486A (en) * | 2021-12-29 | 2023-07-11 | 华为云计算技术有限公司 | Data encryption system and related products |
CN114553510B (en) * | 2022-02-14 | 2022-11-04 | 重庆长安汽车股份有限公司 | Service key distribution system, method and readable storage medium |
CN115001716B (en) * | 2022-08-02 | 2022-12-06 | 长沙朗源电子科技有限公司 | Network data processing method and system of education all-in-one machine and education all-in-one machine |
CN119167380A (en) * | 2023-06-19 | 2024-12-20 | 广州腾讯科技有限公司 | A data processing method, device, equipment and storage medium |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020064282A1 (en) | 2000-11-29 | 2002-05-30 | Dmitrii Loukianov | Decryption key management in remote nodes |
US7676430B2 (en) | 2001-05-09 | 2010-03-09 | Lenovo (Singapore) Ptd. Ltd. | System and method for installing a remote credit card authorization on a system with a TCPA complaint chipset |
US7890771B2 (en) | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
US9356940B2 (en) | 2003-11-13 | 2016-05-31 | Digital Authentication Technologies, Inc. | Security and access system based on multi-dimensional location characteristics |
US8074262B2 (en) * | 2005-05-13 | 2011-12-06 | Intel Corporation | Method and apparatus for migrating virtual trusted platform modules |
CN101243469A (en) | 2005-08-22 | 2008-08-13 | 微软公司 | Digital license migration from first platform to second platform |
WO2008054406A2 (en) | 2005-11-18 | 2008-05-08 | Orsini Rick L | Secure data parser method and system |
CN101102180B (en) * | 2006-07-03 | 2010-08-25 | 联想(北京)有限公司 | Inter-system binding and platform integrity verification method based on hardware security unit |
GB2440170B8 (en) | 2006-07-14 | 2014-07-16 | Vodafone Plc | Digital rights management |
US8522018B2 (en) | 2006-08-18 | 2013-08-27 | Fujitsu Limited | Method and system for implementing a mobile trusted platform module |
US9158957B2 (en) | 2007-09-07 | 2015-10-13 | Apple Inc. | Finger sensing apparatus using hybrid matching and associated methods |
US8064605B2 (en) * | 2007-09-27 | 2011-11-22 | Intel Corporation | Methods and apparatus for providing upgradeable key bindings for trusted platform modules |
US8208637B2 (en) * | 2007-12-17 | 2012-06-26 | Microsoft Corporation | Migration of computer secrets |
US20090199279A1 (en) * | 2008-01-31 | 2009-08-06 | Microsoft Corporation | Method for content license migration without content or license reacquisition |
CN101515319B (en) | 2008-02-19 | 2011-01-26 | 联想(北京)有限公司 | Cipher key processing method, cipher key cryptography service system and cipher key consultation method |
US20100192170A1 (en) | 2009-01-28 | 2010-07-29 | Gregory G. Raleigh | Device assisted service profile management with user preference, adaptive policy, network neutrality, and user privacy |
CN101355422B (en) | 2008-07-16 | 2014-01-08 | 冯振周 | Novel authentication mechanism for encrypting vector |
US8103883B2 (en) | 2008-12-31 | 2012-01-24 | Intel Corporation | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption |
US8707043B2 (en) * | 2009-03-03 | 2014-04-22 | Riverbed Technology, Inc. | Split termination of secure communication sessions with mutual certificate-based authentication |
US8838977B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Watermark extraction and content screening in a networked environment |
US8799997B2 (en) | 2011-04-18 | 2014-08-05 | Bank Of America Corporation | Secure network cloud architecture |
US8503674B2 (en) * | 2011-04-28 | 2013-08-06 | Microsoft Corporation | Cryptographic key attack mitigation |
CN102355657B (en) * | 2011-06-28 | 2014-10-08 | 华为数字技术(成都)有限公司 | service access control method, device and system |
US9064109B2 (en) | 2012-12-20 | 2015-06-23 | Intel Corporation | Privacy enhanced key management for a web service provider using a converged security engine |
US9729517B2 (en) | 2013-01-22 | 2017-08-08 | Amazon Technologies, Inc. | Secure virtual machine migration |
CN118982352A (en) * | 2013-07-15 | 2024-11-19 | 维萨国际服务协会 | Secure remote payment transaction processing |
US9226145B1 (en) | 2014-03-28 | 2015-12-29 | Sprint Communications Company L.P. | Verification of mobile device integrity during activation |
US9652631B2 (en) | 2014-05-05 | 2017-05-16 | Microsoft Technology Licensing, Llc | Secure transport of encrypted virtual machines with continuous owner access |
US9413730B1 (en) * | 2014-06-04 | 2016-08-09 | Skyhigh Networks, Inc. | Encryption in the cloud using enterprise managed keys |
US10211985B1 (en) * | 2015-03-30 | 2019-02-19 | Amazon Technologies, Inc. | Validating using an offload device security component |
US10243739B1 (en) * | 2015-03-30 | 2019-03-26 | Amazon Technologies, Inc. | Validating using an offload device security component |
CN105743873A (en) * | 2015-04-17 | 2016-07-06 | 中国信息安全研究院有限公司 | Security system |
US9923881B2 (en) * | 2015-10-14 | 2018-03-20 | Mcafee, Llc | System, apparatus and method for migrating a device having a platform group |
US10277407B2 (en) | 2016-04-19 | 2019-04-30 | Microsoft Technology Licensing, Llc | Key-attestation-contingent certificate issuance |
US10810321B2 (en) | 2016-08-11 | 2020-10-20 | Intel Corporation | Secure public cloud |
US10303899B2 (en) | 2016-08-11 | 2019-05-28 | Intel Corporation | Secure public cloud with protected guest-verified host control |
US10187203B2 (en) * | 2016-08-30 | 2019-01-22 | Workday, Inc. | Secure storage encryption system |
CN107864109B (en) * | 2016-09-22 | 2020-04-17 | 上海复旦微电子集团股份有限公司 | Application data migration method for NFC (near field communication) smart card |
CN106789000A (en) * | 2016-12-13 | 2017-05-31 | 北京握奇智能科技有限公司 | A kind of secret phone system and method based on TEE technologies and wearable device |
CN108667608B (en) * | 2017-03-28 | 2021-07-27 | 阿里巴巴集团控股有限公司 | Method, device and system for protecting data key |
US10938560B2 (en) * | 2017-06-21 | 2021-03-02 | Microsoft Technology Licensing, Llc | Authorization key escrow |
CN107766724A (en) | 2017-10-17 | 2018-03-06 | 华北电力大学 | A kind of construction method of trusted computer platform software stack function structure |
CN108012268B (en) * | 2017-12-08 | 2021-07-09 | 北京虎符信息技术有限公司 | SIM card for ensuring safe use of application software on mobile phone terminal |
CN109450951B (en) * | 2018-12-28 | 2021-06-04 | 北京思源理想控股集团有限公司 | Server-side security file management method, device and system |
US11412052B2 (en) | 2018-12-28 | 2022-08-09 | Intel Corporation | Quality of service (QoS) management in edge computing environments |
CN109921902B (en) * | 2019-03-22 | 2020-10-23 | 创新先进技术有限公司 | Key management method, security chip, service server and information system |
-
2019
- 2019-03-22 CN CN201910224105.8A patent/CN109921902B/en active Active
- 2019-09-23 TW TW108134197A patent/TWI724555B/en active
-
2020
- 2020-02-12 SG SG11202104530YA patent/SG11202104530YA/en unknown
- 2020-02-12 EP EP20778745.8A patent/EP3860036B1/en active Active
- 2020-02-12 WO PCT/CN2020/074893 patent/WO2020192285A1/en unknown
-
2021
- 2021-04-30 US US17/246,212 patent/US11240008B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
TWI724555B (en) | 2021-04-11 |
EP3860036B1 (en) | 2023-04-05 |
CN109921902B (en) | 2020-10-23 |
CN109921902A (en) | 2019-06-21 |
EP3860036A1 (en) | 2021-08-04 |
EP3860036A4 (en) | 2021-12-22 |
TW202036343A (en) | 2020-10-01 |
WO2020192285A1 (en) | 2020-10-01 |
US11240008B2 (en) | 2022-02-01 |
US20210258148A1 (en) | 2021-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202104530YA (en) | Key management method, security chip, service server and information system | |
SG11202106514TA (en) | Key security management system and method, medium, and computer program | |
EP3197123A4 (en) | Method, terminal, and network server for information encryption and decryption and key management | |
EP3893196A4 (en) | Authentication system, management device, and authentication method | |
SG11202008621QA (en) | Method and system for data security, validation, verification and provenance within independent computer systems and digital networks | |
EP3610607A4 (en) | Cryptographic key management based on identity information | |
EP3602954A4 (en) | Method and system for hierarchical cryptographic key management | |
EP3786980A4 (en) | Pathogen distribution information provision system, pathogen distribution information provision server and pathogen distribution information provision method | |
SG11202008633TA (en) | Method and system for data security within independent computer systems and digital networks | |
IL293092B1 (en) | Cryptographic key management methods and systems | |
IL295777B1 (en) | Method and system for online user security information event management | |
SG11202009924RA (en) | Methods and devices for cryptographic key management based on blockchain system | |
SG11202100274PA (en) | Key transfer method and system based on shared security application, storage medium, and device thereof | |
EP3998564A4 (en) | Inventory checking apparatus, backend apparatus, inventory checking management system, and inventory checking method | |
GB202110160D0 (en) | Method, system, and computer readable medium for transferring cryptographic tokens | |
GB202013868D0 (en) | Management system, management method, power device, vehicle-mounted device, and management server | |
EP4135377A4 (en) | Key management method, device and system | |
SG11202002840WA (en) | Vulnerable plaque identification method, application server thereof, and computer readable medium | |
EP3789952A4 (en) | Talent and work experience-centered credit recognition academic management system and method, and system for providing talent contribution bank service using same | |
EP3422194A4 (en) | Event management server, information processing apparatus, information processing system, and event realizing method | |
EP3809298A4 (en) | System for performing bi-directional inquiry, comparison and tracking on security policies and audit logs, and method therefor | |
SG10202004901RA (en) | Image access management device, image access management method, and image access management system | |
SG11202009278QA (en) | Data processing method, system and server based on nfc tag | |
SG11202011843PA (en) | Environmental information management system, enrivonmental information management method, and environmental information management program | |
EP3975102A4 (en) | AUDIT DATA MANAGEMENT SYSTEM, MANAGEMENT DEVICE, MANAGEMENT METHOD AND TERMINAL |