SG11202010745XA - Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device - Google Patents
Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service deviceInfo
- Publication number
- SG11202010745XA SG11202010745XA SG11202010745XA SG11202010745XA SG11202010745XA SG 11202010745X A SG11202010745X A SG 11202010745XA SG 11202010745X A SG11202010745X A SG 11202010745XA SG 11202010745X A SG11202010745X A SG 11202010745XA SG 11202010745X A SG11202010745X A SG 11202010745XA
- Authority
- SG
- Singapore
- Prior art keywords
- cryptographic
- cryptographic service
- working key
- operation method
- service device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/062—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Sub-Exchange Stations And Push- Button Telephones (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811010286.6A CN109347625B (en) | 2018-08-31 | 2018-08-31 | Password operation method, work key creation method, password service platform and equipment |
PCT/CN2019/096309 WO2020042798A1 (en) | 2018-08-31 | 2019-07-17 | Cryptographic operation and working key creation method and cryptographic service platform and device |
Publications (1)
Publication Number | Publication Date |
---|---|
SG11202010745XA true SG11202010745XA (en) | 2020-11-27 |
Family
ID=65292127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11202010745XA SG11202010745XA (en) | 2018-08-31 | 2019-07-17 | Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device |
Country Status (6)
Country | Link |
---|---|
US (1) | US11025415B2 (en) |
EP (1) | EP3780484B1 (en) |
CN (1) | CN109347625B (en) |
SG (1) | SG11202010745XA (en) |
TW (1) | TWI706658B (en) |
WO (1) | WO2020042798A1 (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109347625B (en) * | 2018-08-31 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Password operation method, work key creation method, password service platform and equipment |
CN110166234A (en) * | 2019-05-21 | 2019-08-23 | 阿里巴巴集团控股有限公司 | A kind of creation of business cipher key and business datum encryption method, apparatus and system |
CN111541723B (en) * | 2020-07-07 | 2020-10-13 | 飞天诚信科技股份有限公司 | Method and terminal for processing key data |
CN111935181B (en) * | 2020-09-25 | 2021-01-26 | 北京天御云安科技有限公司 | Method for realizing uninterrupted service of key switching under full-secret condition |
CN112788005B (en) * | 2020-12-29 | 2023-05-23 | 福建正孚软件有限公司 | Cross-border transmission method and system for improving safety by combining software and hardware |
CN114629642A (en) * | 2022-03-17 | 2022-06-14 | 浙江大华技术股份有限公司 | Target data sending method and device, storage medium and electronic device |
CN115801453B (en) * | 2023-01-30 | 2023-05-02 | 北京大数元科技发展有限公司 | System for sensitive data internet security inquiry |
CN116232593B (en) * | 2023-05-05 | 2023-08-25 | 杭州海康威视数字技术股份有限公司 | Multi-password module sensitive data classification and protection method, equipment and system |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7711122B2 (en) * | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
EP1761904A1 (en) * | 2004-05-28 | 2007-03-14 | International Business Machines Corporation | Smart card data transaction system and methods for providing storage and transmission security |
JP5018558B2 (en) * | 2008-02-29 | 2012-09-05 | 富士通株式会社 | Storage area allocation method and information processing apparatus |
US20090296926A1 (en) * | 2008-06-02 | 2009-12-03 | Sun Microsystems, Inc. | Key management using derived keys |
GB2471282B (en) * | 2009-06-22 | 2015-02-18 | Barclays Bank Plc | Method and system for provision of cryptographic services |
CN101656007B (en) * | 2009-08-14 | 2011-02-16 | 通联支付网络服务股份有限公司 | Safe system realizing one machine with multiple ciphers on POS machine and method thereof |
CN102355351B (en) * | 2011-07-21 | 2014-11-05 | 华为技术有限公司 | Key generation, backup and migration method and system based on trusted computing |
US9350536B2 (en) * | 2012-08-16 | 2016-05-24 | Digicert, Inc. | Cloud key management system |
CN102957541B (en) * | 2012-11-21 | 2016-11-16 | 浪潮集团有限公司 | A kind of cipher encrypting method based on SAAS |
CN103237005A (en) * | 2013-03-15 | 2013-08-07 | 福建联迪商用设备有限公司 | Method and system for key management |
CN103714634B (en) * | 2013-03-15 | 2016-06-15 | 福建联迪商用设备有限公司 | A kind of method of main key of secure download terminal and system |
CN103825698A (en) * | 2014-01-20 | 2014-05-28 | 中国建设银行股份有限公司 | Password security management system and method |
GB201519612D0 (en) * | 2015-11-06 | 2015-12-23 | Nagravision Sa | Key sequence generation for cryptographic operations |
US9379890B1 (en) * | 2015-12-07 | 2016-06-28 | Workiva Inc. | System and method for managing cryptographic keys |
CN106059760B (en) * | 2016-07-12 | 2019-03-19 | 武汉理工大学 | A kind of cryptographic system from user terminal crypto module calling system private key |
CN106452771B (en) * | 2016-10-10 | 2018-09-18 | 山东渔翁信息技术股份有限公司 | JCE calls the method and device of the built-in RSA key operation of cipher card realization |
US10230525B2 (en) * | 2016-12-23 | 2019-03-12 | Amazon Technologies, Inc. | Public key rollup for merkle tree signature scheme |
CN107070642B (en) * | 2016-12-26 | 2020-07-21 | 贵州银行股份有限公司 | Heterogeneous resource pool multiplexing technology for multi-brand cipher machine |
CN108123800B (en) * | 2017-12-19 | 2021-06-15 | 腾讯科技(深圳)有限公司 | Key management method, key management device, computer equipment and storage medium |
CN108365950A (en) * | 2018-01-03 | 2018-08-03 | 深圳怡化电脑股份有限公司 | The generation method and device of financial self-service equipment key |
CN109347625B (en) * | 2018-08-31 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Password operation method, work key creation method, password service platform and equipment |
CN111654367B (en) * | 2018-08-31 | 2023-05-12 | 创新先进技术有限公司 | Method for cryptographic operation and creation of working key, cryptographic service platform and device |
-
2018
- 2018-08-31 CN CN201811010286.6A patent/CN109347625B/en active Active
-
2019
- 2019-06-26 TW TW108122287A patent/TWI706658B/en active
- 2019-07-17 SG SG11202010745XA patent/SG11202010745XA/en unknown
- 2019-07-17 EP EP19854452.0A patent/EP3780484B1/en active Active
- 2019-07-17 WO PCT/CN2019/096309 patent/WO2020042798A1/en unknown
-
2020
- 2020-10-30 US US17/085,161 patent/US11025415B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
WO2020042798A1 (en) | 2020-03-05 |
CN109347625A (en) | 2019-02-15 |
TW202011712A (en) | 2020-03-16 |
TWI706658B (en) | 2020-10-01 |
US20210067326A1 (en) | 2021-03-04 |
EP3780484B1 (en) | 2023-06-07 |
EP3780484A4 (en) | 2021-09-29 |
US11025415B2 (en) | 2021-06-01 |
EP3780484A1 (en) | 2021-02-17 |
CN109347625B (en) | 2020-04-24 |
EP3780484C0 (en) | 2023-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG11202010748RA (en) | Cryptographic Operation Method, Working Key Creation Method, Cryptographic Service Platform, and Cryptographic Service Device | |
SG11202010745XA (en) | Cryptographic operation method, method for creating working key, cryptographic service platform, and cryptographic service device | |
EP3752935C0 (en) | A system, apparatus and method for privacy preserving contextual authentication | |
SG11202000571RA (en) | Key management method, apparatus, and device | |
EP3652875C0 (en) | Communication device, system and method for communication using feedback | |
SG11202000396QA (en) | Service authorization method, apparatus, and device | |
EP3726797A4 (en) | Key distribution method, device and system | |
EP3598714A4 (en) | Method, device, and system for encrypting secret key | |
EP3769070C0 (en) | Spectrometer device, method for operating the device and use thereof | |
GB201715250D0 (en) | Systems, methods, and apparatus for dynamically planning machine dumping operations | |
ZA202005744B (en) | Method and system for encrypted communication between devices by using block chain system | |
IL281112A (en) | Information communication device, authentication program for information communication device, and authentication method | |
IL274853A (en) | Tool, work management device, work management method, and work management system | |
EP3252584A4 (en) | Method, apparatus and device for activating task management interface | |
HUE062307T2 (en) | Bell plate, atomizer-type cleaning device, and associated operating method | |
IL286330A (en) | Casing for apparatus, apparatus and method | |
EP3920463A4 (en) | Encryption device, encryption method | |
SG10201910023SA (en) | Apparatus and method for generating cryptographic algorithm, apparatus and method for encryption | |
SG10201910018YA (en) | Apparatus and method for generating cryptographic algorithm, apparatus and method for encryption | |
EP3457302A4 (en) | Operation management device, operation management method, and operation management system | |
IT201900025567A1 (en) | PROCEDURE FOR PERFORMING ENCRYPTING OPERATIONS ON A PROCESSING DEVICE, CORRESPONDING PROCESSING DEVICE AND IT PRODUCT | |
EP3839922A4 (en) | Secret combination system, method therefor, secret calculation device, and program | |
GB201712839D0 (en) | Physically unclonable function device, method and apparatus | |
SG10201607610SA (en) | Method, system, and apparatus for operating a kinetic typography service | |
SG11202110441RA (en) | Communication method and apparatus, and device |