US 11,943,345 B2
Key management method and related device
Fuqiang Ma, Jiangsu (CN); and Jin Wang, Jiangsu (CN)
Assigned to INSPUR SUZHOU INTELLIGENT TECHNOLOGY CO., LTD., Jiangsu (CN)
Appl. No. 18/036,388
Filed by INSPUR SUZHOU INTELLIGENT TECHNOLOGY CO., LTD., Jiangsu (CN)
PCT Filed Nov. 30, 2021, PCT No. PCT/CN2021/134331
§ 371(c)(1), (2) Date May 10, 2023,
PCT Pub. No. WO2022/148182, PCT Pub. Date Jul. 14, 2022.
Claims priority of application No. 202110034124.1 (CN), filed on Jan. 11, 2021.
Prior Publication US 2023/0308269 A1, Sep. 28, 2023
Int. Cl. H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/0861 (2013.01) [H04L 9/0819 (2013.01); H04L 9/085 (2013.01); H04L 63/105 (2013.01); H04L 63/20 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A key management method, comprising:
receiving key generation request information;
generating attribute access policy information on the basis of the key generation request information, wherein the attribute access policy information is an attribute set for encrypting a data key;
encrypting the data key on the basis of the attribute set for encrypting the data key;
receiving key acquisition request information;
on the basis of the attribute set for encrypting the data key, verifying whether attribute information of the key acquisition request information is included in the attribute set for encrypting the data key; and
in response to the attribute information of the key acquisition request information being included in the attribute set for encrypting the data key, acquiring a destination data key on the basis of the attribute information of the key acquisition request information;
wherein before the step of encrypting the data key on the basis of the attribute set for encrypting the data key, the method further comprises:
generating an initial data key according to the key generation request information;
generating a project key according to the key generation request information, wherein in response to the project key existing, the project key is used directly and encrypted with a system root key; and
encrypting the initial data key according to the project key to obtain a first encrypted data key.