Authorization management method and system based on key encryption key (KEK)
The invention provides a KEK-based authorization management method and system, and the method comprises the steps: first equipment generates a KEK of second equipment through employing a preset encryption rule; the first device encrypts an encryption key of the second device by using the KEK to obta...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
05.09.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention provides a KEK-based authorization management method and system, and the method comprises the steps: first equipment generates a KEK of second equipment through employing a preset encryption rule; the first device encrypts an encryption key of the second device by using the KEK to obtain an encrypted encryption key; wherein the encryption key is used for encrypting data of the second equipment to obtain encrypted data; the encryption key comprises a data encryption key (DEK) or a content encryption key (CEK). According to the scheme provided by the invention, the security of data management can be improved.
本公开提供一种基于密钥加密密钥(KEK)的授权管理方法及系统,方法包括:第一设备利用预设的加密规则,生成第二设备的KEK;所述第一设备利用所述KEK,对所述第二设备的加密密钥进行加密,得到加密后的加密密钥;其中,所述加密密钥用于对所述第二设备的数据进行加密,得到加密数据;所述加密密钥包括数据加密密钥(DEK)或内容加密密钥(CEK)。本公开提供的方案,能够提高数据管理的安全性。 |
---|---|
Bibliography: | Application Number: CN202310976826 |