| CPC G06F 21/79 (2013.01) [G06F 21/72 (2013.01)] | 17 Claims |

|
1. A key management method, applied to a key manager, the method comprising:
determining a plurality of memory regions that need to be encrypted and protected in a memory and a memory protocol of each memory region of the plurality of memory regions, wherein the plurality of memory regions comprise at least one Compute Express Link (CXL) memory region based on a CXL memory protocol;
determining, for a CXL memory region of the at least one CXL memory region, a device identification of the CXL memory region and an address information of the CXL memory region;
generating protection key generation information of the CXL memory region based on to the device identification and the address information of the CXL memory region;
generating a protection key of the CXL memory region based on a predetermined system root key and the protection key generation information of the CXL memory region, wherein generating the protection key of the CXL memory region comprises processing a result of splicing the system root key and the protection key generation information of the CXL memory region by a hash algorithm,
wherein the protection key of the CXL memory region is used for encrypting and protecting a data key of the CXL memory region, and the data key of the CXL memory region is used for encrypting and decrypting data of the CXL memory region.
|