WO2020135853A1 - 密钥安全管理系统和方法、介质和计算机程序 - Google Patents

密钥安全管理系统和方法、介质和计算机程序 Download PDF

Info

Publication number
WO2020135853A1
WO2020135853A1 PCT/CN2019/129769 CN2019129769W WO2020135853A1 WO 2020135853 A1 WO2020135853 A1 WO 2020135853A1 CN 2019129769 W CN2019129769 W CN 2019129769W WO 2020135853 A1 WO2020135853 A1 WO 2020135853A1
Authority
WO
WIPO (PCT)
Prior art keywords
operation request
key
user
key pair
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2019/129769
Other languages
English (en)
French (fr)
Inventor
顾建良
马帮亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Weilian Information Technology Co Ltd
Original Assignee
Shanghai Weilian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Weilian Information Technology Co Ltd filed Critical Shanghai Weilian Information Technology Co Ltd
Priority to SG11202106514TA priority Critical patent/SG11202106514TA/en
Priority to EP19906368.6A priority patent/EP3879747A4/en
Priority to JP2021537206A priority patent/JP7426031B2/ja
Priority to US17/309,831 priority patent/US12058252B2/en
Publication of WO2020135853A1 publication Critical patent/WO2020135853A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0847Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving identity based encryption [IBE] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the field of key management, in particular to a key security management system and method, a non-volatile storage medium, and a computer program.
  • the transaction process involves the use of keys to encrypt, decrypt, and sign data. Therefore, the level of key management security determines the security of the transaction process. Key management usually includes the generation, use and destruction of keys.
  • symmetric encryption algorithms can be divided into two categories: symmetric encryption algorithms and asymmetric encryption algorithms.
  • data encryption and decryption use the same key.
  • asymmetric encryption system two different keys are used for data encryption and decryption. These two keys depend on each other to form a key pair, called a public key and a private key, respectively.
  • the public key can be made public and can be sent through a secure or non-secure channel, while the private key is the non-public part, and no one knows it except the holder.
  • user A has a key pair, which includes the user's public key P k and private key S k . User A sends his public key P k to another user B.
  • user B wants to transmit data to user A, he can use user A's public key P k to encrypt the data and transmit it to user A.
  • User A after receiving the encrypted data using its private key S k for decrypting the encrypted data to recover the transmitted to user B wants his data (plaintext).
  • user A wants to transmit data to user B, he can use his own private key Sk to sign the data and transmit the signed data to user B.
  • user B After user B receives the signed data, if user A can decrypt it using public key P k of user A, it can verify that the data is sent by user A. Therefore, it can be seen that using the private key to sign the data enables the receiver to verify the identity of the sender. Due to this characteristic of the private key, the security requirements for private key management become very high.
  • the present disclosure provides a key security management solution for digital asset management of enterprise users.
  • the user's private key will not leave the hardware security device. Ensures a high degree of security of user private keys.
  • the key security management system includes: a security host configured to receive a first operation request, verify the first operation request, and generate a second operation request based on the first operation request when the verification is passed, Both the first operation request and the second operation request include an identity, and a hardware security device configured to receive the second operation request from the security host and verify the second operation request, And when the verification is passed, the type of the second operation request is parsed, and an operation related to a key pair associated with the identity is performed based on the type of the second operation request, the key pair includes specific A public key and a private key of the identity.
  • the method includes: a first operation request is received by a security host; the first operation request is verified by the security host and a second operation request is generated based on the first operation request when the verification is passed, the first Both the operation request and the second operation request include an identification; the hardware security device receives the second operation request from the security host, verifies the second operation request, and resolves the verification when the verification is passed The type of the second operation request; and operations performed by the hardware security device based on the type of the second operation request and related to a key pair associated with the identity, the key pair including A public key and a private key describing the identity.
  • Yet another aspect of the present disclosure provides a non-volatile computer-readable storage medium on which machine-executable instructions are stored, and when executed by a computer, the machine-executable instructions execute the key security described in the above aspects Management methods.
  • Yet another aspect of the present disclosure provides a computer program that includes machine-executable instructions that, when executed, perform the key security management method described in the above aspect.
  • FIG. 1 shows a schematic diagram of a key security management system according to the present disclosure
  • FIG. 2 shows a flowchart of a key security management method according to the present disclosure
  • FIG. 3 shows a flowchart of an operation example of the hardware security device in the key security management system shown in FIG. 1;
  • FIG. 4 shows a flowchart of another operation example of the hardware security device in the key security management system shown in FIG. 1;
  • FIG. 5 shows a flowchart of still another operation example of the hardware security device in the key security management system shown in FIG. 1.
  • FIG. 1 shows a schematic diagram of a key security management system 10 according to the present disclosure.
  • the key security management system 10 includes a security host 11 and a hardware security device 12.
  • the secure host 11 can be any type of computer.
  • the hardware security device 12 may be a hardware security module (Hardware Security Module, HSM) or other international standards that meet predetermined security certification standards, such as the Common Criteria for Information Technology Security Evaluation (Common Criteria), the United States Federal Information Processing Standard (FIPS) 140-2 and other international Certified hardware security device, which includes memory (not shown in the figure) and processor (not shown in the figure).
  • the hardware security device 12 can generate a key pair including a public key and a private key dedicated to digital asset management according to various asymmetric cryptographic algorithms. These asymmetric cryptographic algorithms are well known in the art and will not be repeated here.
  • the secure host 11 is configured to receive the first operation request, verify the first operation request, and generate a second operation request based on the first operation request when the verification is passed, where both the first operation request and the second operation request include an identity Logo.
  • the identity may be the identity of the user and/or the identity of the organization associated with the user.
  • "User” and “organization” in this disclosure refer to different subjects with affiliation, and "user” belongs to the "organization” associated with it.
  • an "organization” can be an enterprise, and a "user” can be an employee, sub-organization, department, or other user or customer of the enterprise. Each subject has a unique identity.
  • the hardware security device 12 is configured to receive the second operation request from the security host 11, verify the second operation request, and parse the type of the second operation request when the verification is passed, and execute and associate based on the type of the second operation request
  • the operation of the key pair of the identity includes a public key and a private key specific to the identity.
  • the hardware security device 12 can derive the organization's secret based on the Hierarchical Deterministic Wallet rules (referred to simply as Hierarchical Deterministic Wallet) rules jointly defined in Bitcoin Improvement Proposals BIP32, BIP39, and BIP44. Key pair and user's key pair.
  • BIP32 specifies a method for generating a key pair series of a hierarchical tree structure from a random seed
  • BIP39 specifies a method for deriving a random seed from a mnemonic sentence
  • BIP44 further gives each layer in the hierarchical tree structure Special meaning.
  • BIP32, BIP39 and BIP44 please refer to the corresponding Bitcoin Improvement Protocol.
  • a mnemonic sentence is first converted into a random seed by the function PBKDF2, and then the random seed is hashed to generate a master root key pair corresponding to the root node, and then derived based on the master root key pair
  • the key pair of the child node corresponding to the child node of the root node is further derived based on the key pair of each child node, and the key pair of the child node of the child node is further derived, so that it can continue forever.
  • the root node can derive several child nodes, and each child node can derive several child nodes, so that an infinite number of key pairs with different levels can be derived based on a random seed.
  • Each child node from the root node to the tree structure has a different path, and each path corresponds to a child node one by one. Therefore, according to the key pair of the root node and the path of the child node, the density of the child node corresponding to the path can be determined Key pair. If the root node corresponds to an organization (such as a company) and the child node corresponds to a user of the organization (such as a department or a member of the company), the master root key pair corresponding to the root node can be used as the master root of the organization Key pair, the key pair corresponding to the child node can be used as the user's key pair.
  • an organization such as a company
  • a user of the organization such as a department or a member of the company
  • the master root key pair corresponding to the root node can be used as the master root of the organization Key pair
  • the key pair corresponding to the child node can be used as the user's key pair.
  • the key security system 10 also includes an application server 13.
  • the application server 13 may be located in the same network as the secure host 11 or may be located in a different network and connected to the secure host 11 via a network bridge, for example.
  • the application server 13 is configured to receive an access request from an external node, such as the client 20 or the blockchain node 30, generate at least one first operation request according to the access request, and send the first operation request to the secure host 11.
  • an external node such as the client 20 or the blockchain node 30
  • the application server 13 may also receive the result of the operation from the security host 11 and return it to an external node.
  • the security host 11 and the hardware security device 12 are located in the same security network domain, so that the application server 13 or other external components can only access the hardware security device 12 through the security host 11 (that is, the security host 11 serves as a gateway to the hardware security device 12). For example, this can be achieved by setting a firewall at the secure host 11 and a secure link between the secure host 11 and the hardware security device 12.
  • FIG. 2 shows a schematic diagram of a key security management method 100 according to the present disclosure. Each step of the method 100 may be performed by the corresponding subject shown in FIG. 1 respectively. The method 100 will be described in detail below with reference to FIGS. 1 and 2 respectively.
  • the secure host 11 is configured to receive the first operation request (step 110).
  • the first operation request is signed by the sender of the request (for example, the application server 13 as shown in FIG. 1) and includes at least one identity depending on the requested service type.
  • the first operation request may be, for example, various operation requests for digital assets, such as a transfer request, or various operation requests that are not related to digital assets, such as deploying a smart contract, invoking a smart contract, and so on.
  • a digital asset is broadly understood to include digital possessions other than cryptocurrencies (such as digital documents or digital artwork, etc.)
  • the first operation request may also be the transfer or certification of the digital possessions request.
  • the secure host 11 is configured to verify the first operation request (step 120).
  • the verification of step 120 may include verifying the validity of the certificate of the sender of the first operation request (such as the application server 13) and the validity of the signature.
  • the secure host 11 parses the first operation request to obtain the application server certificate and the application server signature contained therein.
  • the application server certificate contains the identity of the application server 13, the list of allowed service types of the application server 13, and the validity period of the application server certificate.
  • the secure host 11 uses the public key of the application server 13 to decrypt the application server signature to obtain the service type requested by the first operation request.
  • the secure host 11 compares the service type requested by the first operation request with the list of allowed service types contained in the application server certificate to determine whether to allow the service type requested by the first operation request.
  • the secure host 11 may also be configured to verify whether the application server certificate is within its validity period. In addition, in some implementations, the secure host 11 may also be configured to obtain the status of the application server certificate from the blockchain to verify whether its status is valid. If all of the above determinations are yes, it is determined in step 121 that the first operation request has passed verification.
  • the secure host 11 If the first operation request is verified (YES in step 121), the secure host 11 generates a second operation request based on the first operation request (step 122) and sends it to the hardware security device 12 (step 123).
  • the second operation request includes at least a type field and a data field.
  • the type field can be encoded using a predefined binary sequence, and different binary sequences represent different types. By decoding the type field, the type of the second operation request can be determined.
  • the data field may include one identity, such as an organization's identity, or may include two identity, such as an organization's identity and a user's identity associated with the organization.
  • the second operation request is signed by the secure host 11 with its private key.
  • the hardware security device 12 is configured to verify the second operation request after receiving the second operation request (step 130).
  • the verification of step 130 may include verifying the validity of the certificate of the secure host 11 and the validity of the signature.
  • the hardware security device 12 is configured to parse the second operation request to obtain the secure host certificate and the secure host signature contained therein.
  • the secure host certificate includes the identity of the secure host 11, a list of allowed service types of the secure host 11, and the validity period of the secure host certificate.
  • the hardware security device 12 decrypts the secure host signature using the public key of the secure host 11 to determine whether the second operation request is signed by the secure host 11. Further, the hardware security device 12 may also be configured to verify whether the secure host certificate is within its validity period. If all the above judgments are yes, it is judged in step 131 that the verification of the second operation request passes.
  • the hardware security device 12 is further configured to parse the type of the second operation request (step 132) after verification of the second operation request is passed (YES in step 131), and execute based on the type of the second operation request Operations related to a key pair associated with the identity (step 133).
  • “operation related to a key pair associated with the identity” may refer to any operation performed by the hardware security device 12 related to the key pair associated with the identity included in the request.
  • the hardware security device 12 sends a second operation request result to the security host 11 to indicate the failure of the request or return a response to the request, respectively (step 134).
  • the request result is also sent by the secure host 11 to the application server 13 (if any) (step 124), and the result is then sent to the requesting external node (such as client 20 or blockchain node 30) ) (Not shown in the figure).
  • FIG. 3 shows a flowchart of an operation example of the hardware security device 12 in the key security management system 10 shown in FIG.
  • the analysis result of the second operation request in step 132 indicates that the type of the second operation request is the master root key pair that generates the organization, and the data field of the second operation request contains the organization Identity.
  • the hardware security device 12 when performing the operation related to the key pair associated with the identity based on the type of the second operation request (step 133), the hardware security device 12 is further configured to respond to the type of the second operation request is the request generation organization
  • the master root key pair of the first generate a random key seed (step 1331), and then use the key seed to generate the organization's master root key pair (step 1332), and store the master root key pair in its memory (step 1333).
  • the hardware security device 12 is further configured to destroy the key seed after generating the organization's master root key pair (step 1334).
  • the second operation request result in step 134 may include an indication that the organization's master root key was successfully generated.
  • FIG. 4 shows a flowchart of another operation example of the hardware security device 12 in the key security management system 10 shown in FIG.
  • the analysis result of the second operation request in step 132 indicates that the type of the second operation request is to request to obtain the user's public key, and the data field of the second operation request contains the identity of the organization ID and the user's ID.
  • the hardware security device 12 stores an organized master root key pair.
  • the hardware security device 12 when performing the operation related to the key pair associated with the identity based on the type of the second operation request (step 133), the hardware security device 12 is further configured to respond to the type of the second operation request being a request to acquire the user
  • the public key of the organization determine the organization’s master root key pair according to the organization’s identity (step 1335), determine the user’s key pair generation path based on the user’s identity (step 1336), and generate the path and organization’s key based on the user’s key pair
  • the master root key pair derives the user's key pair (step 1337).
  • the result of the second operation request in step 134 includes the public key in the user's key pair.
  • the system can predefine the mapping relationship between the identity and the path of the derived child node (each user corresponds to a child node) of the hierarchical deterministic rules, so that the user's key pair generation can be determined based on the user's identity path.
  • a hash operation can be performed on the combination of the user's identity and the organization's identity to obtain a hash value, and then the user's key pair generation path is determined based on the hash value and layered deterministic rules.
  • FIG. 5 shows a flowchart of still another operation example of the hardware security device 12 in the key security management system 10 shown in FIG.
  • the analysis result of the second operation request in step 132 indicates that the type of the second operation request is to sign the data to be signed, and the data field of the second operation request contains the identity of the organization , The user's identity and the data to be signed.
  • the hardware security device 12 stores the master root key pair of the organization.
  • the hardware security device 12 when performing an operation related to the key pair associated with the identity based on the type of the second operation request (step 133), the hardware security device 12 is further configured to respond to the type of request for the second operation request to be signed Sign the data, determine the organization's master root key pair according to the organization's identity (step 1339), determine the user's key pair generation path based on the user's identity (step 1340), generate the path based on the user's key pair and the organization's
  • the master root key pair derives the user's key pair (step 1341), and uses the private key in the user's key pair to sign the signature data to obtain signature data (step 1342).
  • the hardware security device 12 is further configured to destroy the user's private key after signing (not shown in the figure).
  • the result of the second operation request in step 134 includes the signature data.
  • Steps 1336 and/or 1340 may specifically include: performing a hash operation on the combination of the user's identity and the organization's identity to obtain a hash value, and determining the user's Key pair generation path.
  • FIG. 4 and FIG. 5 are described by taking an example of an organized master root key pair stored in advance in the hardware security device 12, however, those skilled in the art can understand that the present disclosure is not limited to this.
  • the hardware security device 12 may not store the organization's master root key pair in advance, but each time the user's public key or signature is requested, the method flow shown in FIG. 3 is executed to generate the organization's master root key pair as The basis for exporting the user's public or private key.
  • the hardware security device-specific device can be generated by referring to the method shown in FIG. 12 root key pair, and derive the master root key pair of each organization based on the relationship between the root key pair and each organization managed by the hardware security device 12 (similar to the examples shown in FIGS. 4 and 5 Derivation of the user's key pair).
  • the hardware security device-specific device can be generated by referring to the method shown in FIG. 12 root key pair, and derive the master root key pair of each organization based on the relationship between the root key pair and each organization managed by the hardware security device 12 (similar to the examples shown in FIGS. 4 and 5 Derivation of the user's key pair).
  • only the root key pair specific to the key security device 12 may be stored in the key security device 12 without storing the key pair of any organization or its users.
  • the present disclosure effectively prevents unauthorized access by double authentication of the operation request by the host 11 and the hardware security device 12.
  • the present disclosure takes advantage of the high security features of the hardware security device 12 to perform key generation and use operations within the hardware security device 12.
  • the user's private key is destroyed after use, so that the user's private key will not leave the hardware security device 12 under any circumstances, that is, no device can obtain the user's private key.
  • only authorized devices can obtain the user's private key signature, thereby ensuring a high degree of security of the user's private key.
  • the present disclosure adopts a method of determining the user's key based on hierarchical deterministic rules, therefore, for users or customers of different sub-organizations, departments, employees, or enterprises within the enterprise, a separate digital asset account is required , You can easily manage the private keys of these separate digital asset accounts without having to save the private keys themselves, which greatly improves the security of digital asset management.
  • non-volatile computer-readable storage medium including machine-executable instructions, which can be executed by a computer to perform the key security management method 100 of the present disclosure.
  • the functions described in this disclosure may be implemented in hardware, software, firmware, or any combination thereof.
  • the functions can be stored as one or more instructions or codes on a computer-readable storage medium, or as one or more instructions or codes on a computer-readable storage medium transmission.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种密钥安全管理系统、方法、计算机可读存储介质和计算机程序。密钥安全管理系统包括安全主机和硬件安全设备,安全主机被配置为接收第一操作请求,对第一操作请求进行验证,并在验证通过时基于第一操作请求生成第二操作请求,所述第一操作请求和所述第二操作请求都包括身份标识,硬件安全设备被配置为从安全主机接收第二操作请求,对第二操作请求进行验证,并且在验证通过时解析第二操作请求的类型,以及基于第二操作请求的类型执行和关联于身份标识的密钥对有关的操作,其中密钥对包括特定于该身份标识的一个公钥和一个私钥。

Description

密钥安全管理系统和方法、介质和计算机程序 技术领域
本申请涉及密钥管理领域,特别涉及一种密钥安全管理系统和方法、一种非易失性存储介质和一种计算机程序。
背景技术
随着电子商务的快速发展,交易安全问题日益受到重视。交易过程涉及到使用密钥对数据进行加密、解密和签名等过程,因此,密钥的管理安全程度的高低决定了交易过程的安全程度。密钥的管理通常包括密钥的生成、使用和销毁等方面。
现行的加密算法可以分为对称加密算法和非对称加密算法两大类。在对称加密体制中,数据加密和解密使用相同的密钥。而在非对称加密体制中,数据的加密和解密使用不同的两个密钥,这两个密钥相互依存,组成一个密钥对,分别称为公钥和私钥。公钥可以对外公开,并且可以通过安全或非安全通道发送,而私钥则为非公开部分,除了持有者之外无人知道。假设用户A拥有一个密钥对,其包括用户的公钥P k和私钥S k。用户A将其公钥P k发送给另一用户B。如果用户B想要向用户A传输数据,则他可以利用用户A的公钥P k对该数据进行加密,并传输给用户A。用户A在接收到加密数据之后,利用其私钥S k对加密数据进行解密,以恢复出用户B想要传输给他的数据(明文)。另一方面,如果用户A想要向用户B传输数据,则他可以利用他自己的私钥S k对该数据进行签名,并将签名数据传输给用户B。用户B在接收到签名数据后之后,如果能够利用用户A的公钥P k对其进行解密,则能够验证该数据是由用户A发出的。因此可以看出,利用私钥对数据进行签名使得接收方能够验证发送方的身份。由于私钥的这种特性,使得对私钥管理的安全性要求变得非常高。
在常规的金融行业中,用户的私钥通常存储在专门的硬件,例如USB盘、IC卡等存储设备中。在使用时,需要将该硬件与计算机相连,并且计算机从存储设备中调取该私钥以执行加密操作,在这个过程中存在一定的安全隐患。
另一方面,当前,数字资产作为企业资产的一部分,与传统资产类似,也需要与企业的资产管理系统对接。由于数字资产与普通资产本质上的不同,一个私钥对应于一个数字资产地址,因此数字资产的管理几乎完全依赖于专用于数字资产的私钥的管理,从而企业需要针对私钥的保管解决方案。在企业的正常商业活动中,考虑到企业的组织架构以及资金管理的需求,不同的子机构、部门、员工或其他用户(以下统称为企业的用户)需要有单独的数字资产账户,从而势必需要多个私钥对应不同的数字资产账户。传统的私钥体系没有相关性,意味着企业的每个用户需要单独管理自己的账户,与企业的资产管理制度匹配度不高。
发明内容
本公开提供了一种针对企业用户的数字资产管理的密钥安全管理方案,其通过在硬件安全设备内部进行用户密钥的生成和使用等操作,使得用户私钥不会离开硬件安全设备,从而确保了用户私钥的高度安全性。
本公开的一个方面提供了一种密钥安全管理系统。所述密钥安全管理系统包括:安全主机,其被配置为接收第一操作请求,对所述第一操作请求进行验证,并在验证通过时基于所述第一操作请求生成第二操作请求,所述第一操作请求和所述第二操作请求都包括身份标识,以及硬件安全设备,其被配置为从所述安全主机接收所述第二操作请求,对所述第二操作请求进行验证,并且在验证通过时解析所述第二操作请求的类型,以及基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作,所述密钥对包括特定于所述身份标识的一个公钥和一个私钥。
本公开的另一个方面提供了一种密钥安全管理方法。所述方法包括:由安全主机接收第一操作请求;由所述安全主机对所述第一操作请求进行验证并在验证通过时基于所述第一操作请求生成第二操作请求,所述第一操作请求和所述第二操作请求都包括身份标识;由所述硬件安全设备从所述安全主机接收所述第二操作请求,对所述第二操作请求进行验证,并在验证通过时解析所述第二操作请求的类型;以及由所述硬件安全设备基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作,所述密钥对包括特定于所述身份标识的一个公钥和一个私钥。
本公开的又一个方面提供了一种非易失性计算机可读存储介质,其上存储有机器可执行指令,所述机器可执行指令在被计算机运行时,执行上述方面所述的密钥安全管理方法。
本公开的再一个方面提供了一种计算机程序,其包括机器可执行指令,所述机器可执行指令在被运行时执行上述方面所述的密钥安全管理方法。
以上为本申请的概述,可能有简化、概括和省略细节的情况,因此本领域的技术人员应该认识到,该部分仅是示例说明性的,而不旨在以任何方式限定本申请范围。本概述部分既非旨在确定所要求保护主题的关键特征或必要特征,也非旨在用作为确定所要求保护主题的范围的辅助手段。
附图说明
通过下面说明书和所附的权利要求书并与附图结合,将会更加充分地清楚理解本申请内容的上述和其他特征。可以理解,这些附图仅描绘了本申请内容的若干实施方式,因此不应认为是对本申请内容范围的限定。通过采用附图,本申请内容将会得到更加明确和详细地说明。
图1示出了根据本公开的一种密钥安全管理系统的示意图;
图2示出了根据本公开的一种密钥安全管理方法的流程图;
图3示出了图1所示的密钥安全管理系统中的硬件安全设备的一种操作实例的流程图;
图4示出了图1所示的密钥安全管理系统中的硬件安全设备的另一种操作实例的流程图;
图5示出了图1所示的密钥安全管理系统中的硬件安全设备的再一种操作实例的流程图。
具体实施方式
在下面的详细描述中,参考了构成其一部分的附图。在附图中,类似的符号通常表示类似的组成部分,除非上下文另有说明。详细描述、附图和权利要求书中描述的说明性实施方式并非旨在限定。在不偏离本申请的主题的精神或范围的情况下,可以采用其他实施方式,并且可以做出其他变化。可以理解,可以对本申请中一般性描述的、在附图中图解说明的本申请内容的各个方面进行多种不同构成的配置、替换、组合,设计,而所有这些都明确地构成本申请内容的一部分。
图1示出了根据本公开的一种密钥安全管理系统10的示意图。如图1所示,密钥安全管理系统10包括安全主机11和硬件安全设备12。安全主机11可以为任何类型的计算机。硬件安全设备12可以是硬件安全模块(Hardware Security Module,HSM)或其他满足预定的安全认证标准,例如信息技术安全评估统一准则(Common Criteria)、美国联邦信息处理标准(FIPS)140-2等国际认证的硬件安全设备,其包括存储器(图中未示出)和处理器(图中未示出)。硬件安全设备12能够根据各种非对称密码学算法产生专用于数字资产管理的、包括公钥和私钥的密钥对。这些非对称密码学算法是本领域中公知的,在此不再赘述。
安全主机11被配置为接收第一操作请求,对第一操作请求进行验证,并在验证通过时基于第一操作请求生成第二操作请求,其中,第一操作请求和第二操作请求都包括身份标识。身份标识可以是用户的身份标识和/或与该用户关联的组织的身份标识。本公开中的“用户”和“组织”指具有隶属关系的不同主体,“用户”隶属于与其关联的“组织”。例如,“组织”可以是一个企业,而“用户”则可以是该企业的员工、子机构、部门或者企业的其他用户或客户。每个主体具有唯一的身份标识。
硬件安全设备12被配置为从安全主机11接收第二操作请求,对第二操作请求进行验证,并且在验证通过时解析第二操作请求的类型,以及基于第二操作请求的类型执行和关联于该身份标识的一个密钥对有关的操作。这里,该密钥对包括特定于该身份标识的一个公钥和一个私钥。在一些实现中,硬件安全设备12能够基于比特币改进提议BIP32、BIP39和BIP44中共同定义的分层确定性钱包(Hierarchical Deterministic Wallet)规则(简称为分层确定性规则)来派生出组织的密钥对和用户的密钥对。
BIP32规定了一种从一个随机种子产生分层树状结构的密钥对系列的方法,BIP39规定了从一个助记的句子导出随机种子的方法,BIP44进一步赋予了分层树状结构中各层的 特殊含义。关于BIP32、BIP39和BIP44的更具体的描述可以参见相应的比特币改进协议。根据分层确定性规则,首先通过函数PBKDF2将一个助记句子转换为随机种子,然后对随机种子进行哈希运算生成与根节点对应的主根密钥对,再然后基于该主根密钥对,派生出根节点的子节点对应的子节点密钥对,再进一步基于每个子节点的密钥对,进一步派生出子节点的子节点的密钥对,如此可以一直进行下去。其中,根节点可以派生出若干子节点,每个子节点又可派生出若干子节点,从而可以基于一个随机种子派生出无穷多个层次不同的密钥对。从根节点到树状结构的每个子节点具有不同的路径,每个路径与一个子节点一一对应,因此根据根节点的密钥对和子节点的路径即可确定该路径对应的子节点的密钥对。如果将根节点对应到一个组织(例如一个公司),将子节点对应到该组织的一个用户(例如公司的一个部门或者一个成员),则根节点对应的主根密钥对可作为该组织的主根密钥对,子节点对应的密钥对可以作为用户的密钥对。
在一些实施例中,密钥安全系统10还包括应用服务器13。应用服务器13可以与安全主机11位于同一网络内,也可以位于不同网络而经由例如网桥与安全主机11相连。应用服务器13被配置为接收外部节点,例如客户端20或区块链节点30的访问请求,并根据该访问请求生成至少一个第一操作请求,以及向安全主机11发送该第一操作请求。另一方面,在安全主机11和硬件安全设备12根据该第一操作请求执行了相应的操作之后,应用服务器13还可以从安全主机11接收该操作的结果并将其返回给外部节点。
安全主机11和硬件安全设备12位于同一安全网域内,以使得应用服务器13或其他外部组件只能够通过安全主机11来访问硬件安全设备12(即安全主机11作为访问硬件安全设备12的网关)。例如,这可以通过在安全主机11处设置防火墙以及在安全主机11和硬件安全设备12之间设置安全链路来实现。
将参考下面的图2至图5来进一步描述安全主机11和硬件安全设备12的具体功能和操作。
图2示出了根据本公开的密钥安全管理方法100的示意图。方法100的各个步骤可分别由图1所示的相应主体执行。下面结合图1和图2分别对方法100进行详细说明。
安全主机11被配置为接收第一操作请求(步骤110)。第一操作请求由该请求的发送者(例如如图1中所示的应用服务器13)签名并且取决于请求的业务类型而包括至少一个身份标识。第一操作请求例如可以是针对数字资产的各种操作请求,如转账请求,也可以是与数字资产无关的各种操作请求,如部署智能合约、调用智能合约等。此外,如果广义地将数字资产理解为还包括除了加密货币之外的数字所有物(例如数字文档或数字美术作品等)的话,第一操作请求也可以是针对该数字所有物的转移或存证请求。
进一步地,安全主机11被配置为对第一操作请求进行验证(步骤120)。步骤120的验证可以包括验证第一操作请求的发送者(如应用服务器13)的证书的有效性以及签名的有效性。具体地,安全主机11解析第一操作请求以获取其中包含的应用服务器证书和应用服务器签名。该应用服务器证书包含应用服务器13的身份标识、应用服务器13的允许业务类型列表和应用服务器证书的有效期。安全主机11利用应用服务器13的公钥对应用服务器签名进行解密,以获取第一操作请求所请求的业务类型。安全主机 11将第一操作请求所请求的业务类型与应用服务器证书中所包含的允许业务类型列表进行比较以确定是否允许第一操作请求所请求的业务类型。进一步的,安全主机11还可以被配置为验证应用服务器证书是否处于其有效期内。此外,在一些实现中,安全主机11还可以被配置为从区块链获取该应用服务器证书的状态以验证其状态是否有效。如果上述判断都为是,则步骤121中判断第一操作请求验证通过。
如果第一操作请求验证通过(步骤121中判断为“是”),则安全主机11基于第一操作请求生成第二操作请求(步骤122)并将其发送给硬件安全设备12(步骤123)。
第二操作请求至少包括类型字段和数据字段。类型字段可以采用预定义的二进制序列进行编码,不同的二进制序列表示不同的类型。通过对类型字段进行译码,即可确定第二操作请求的类型。数据字段可以包括一个身份标识,例如组织的身份标识,或者可以包括两个身份标识,例如组织的身份标识和与该组织关联的用户的身份标识。
第二操作请求由安全主机11用其私钥进行签名。硬件安全设备12被配置为在收到第二操作请求后,对第二操作请求进行验证(步骤130)。步骤130的验证可以包括验证安全主机11的证书的有效性以及签名的有效性。具体地,硬件安全设备12被配置为解析第二操作请求以获取其中包含的安全主机证书和安全主机签名。该安全主机证书包含安全主机11的身份标识、安全主机11的允许业务类型列表和安全主机证书的有效期。硬件安全设备12利用安全主机11的公钥对安全主机签名进行解密,以确定第二操作请求是否由安全主机11签名。进一步的,硬件安全设备12还可以被配置为验证安全主机证书是否处于其有效期内。如果上述判断都为是,则步骤131中判断第二操作请求的验证通过。
硬件安全设备12被进一步配置为在对第二操作请求的验证通过后(步骤131中判断为“是”),解析第二操作请求的类型(步骤132),并基于第二操作请求的类型执行和关联于身份标识的一个密钥对有关的操作(步骤133)。在这里,“和关联于身份标识的一个密钥对有关的操作”可以指硬件安全设备12执行的与关联于该请求中包含的身份标识的密钥对有关的任何操作。如果第二操作请求验证未通过,或者验证通过且执行完毕后,硬件安全设备12向安全主机11发送第二操作请求结果以分别指示请求失败或者返回对该请求的响应(步骤134)。相应地,该请求结果还被安全主机11发送给应用服务器13(如果有的话)(步骤124),该结果继而还被发送给发出请求的外部节点(如客户端20或区块链节点30)(图中未示出)。
图3示出了图1所示的密钥安全管理系统10中的硬件安全设备12的一种操作实例的流程图。在如图3中所示的实例中,在步骤132中对第二操作请求的解析结果指示第二操作请求的类型为生成组织的主根密钥对,且第二操作请求的数据字段包含该组织的身份标识。因此,在执行基于第二操作请求的类型执行和关联于身份标识的密钥对有关的操作(步骤133)时,硬件安全设备12被进一步配置为响应于第二操作请求的类型是请求生成组织的主根密钥对,首先产生随机的密钥种子(步骤1331),然后使用该密钥种子产生组织的主根密钥对(步骤1332),并将该主根密钥对存储在其存储器中(步骤1333)。进一步地,为了防止密钥种子被他人非法获取,硬件安全设备12被进一步配置为在产生组织的主根密钥对之后销毁该密钥种子(步骤1334)。
在这种情况下,步骤134中的第二操作请求结果可以包括成功产生该组织的主根密钥的指示。
图4示出了图1所示的密钥安全管理系统10中的硬件安全设备12的另一种操作实例的流程图。在如图4中所示的实例中,在步骤132中对第二操作请求的解析结果指示第二操作请求的类型为请求获取用户的公钥,且第二操作请求的数据字段包含组织的身份标识和该用户的身份标识。并且,硬件安全设备12中存储有组织的主根密钥对。因此,在执行基于第二操作请求的类型执行和关联于身份标识的密钥对有关的操作(步骤133)时,硬件安全设备12被进一步配置为响应于第二操作请求的类型是请求获取用户的公钥,根据组织的身份标识确定组织的主根密钥对(步骤1335),基于用户的身份标识确定用户的密钥对生成路径(步骤1336),基于用户的密钥对生成路径和组织的主根密钥对派生出用户的密钥对(步骤1337)。
在这种情况下,步骤134中的第二操作请求结果包括用户的密钥对中的公钥。系统可以预先定义身份标识与分层确定性规则的派生出的子节点(每个用户对应于一个子节点)的路径之间的映射关系,从而可以基于用户的身份标识确定用户的密钥对生成路径。较佳地,可以对用户的身份标识和组织的身份标识的组合执行哈希运算以得到哈希值,然后基于该哈希值和分层确定性规则)确定用户的密钥对生成路径。
图5示出了图1所示的密钥安全管理系统10中的硬件安全设备12的再一种操作实例的流程图。在如图5中所示的实例中,在步骤132中对第二操作请求的解析结果指示第二操作请求的类型为对待签名数据进行签名,且第二操作请求的数据字段包含组织的身份标识、该用户的身份标识和该待签名数据。并且,硬件安全设备12中存储有该组织的主根密钥对。因此,在执行基于第二操作请求的类型执行和关联于身份标识的密钥对有关的操作(步骤133)时,硬件安全设备12被进一步配置为响应于第二操作请求的类型是请求对待签名数据进行签名,根据组织的身份标识确定组织的主根密钥对(步骤1339),基于用户的身份标识确定用户的密钥对生成路径(步骤1340),基于用户的密钥对生成路径和组织的主根密钥对派生出用户的密钥对(步骤1341),利用用户的密钥对中的私钥对待签名数据进行签名以得到签名数据(步骤1342)。为了防止用户的私钥被他人非法获取,硬件安全设备12被进一步配置为在签名之后销毁该用户的私钥(图中未示出)。
在这种情况下,步骤134中的第二操作请求结果包括该签名数据。
其中,步骤1336和/或1340具体还可以包括:对用户的身份标识和组织的身份标识的组合执行哈希运算以得到哈希值,并且基于该哈希值和分层确定性规则确定用户的密钥对生成路径。
这里,以硬件安全设备12中事先存储有组织的主根密钥对为例来对图4和图5的操作实例进行表述,然而本领域技术人员可以理解,本公开并不局限于此。硬件安全设备12中可以不事先存储组织的主根密钥对,而是在每次请求用户的公钥或签名时,执行如图3中所示的方法流程来产生组织的主根密钥对以作为导出用户的公钥或私钥的基础。
此外,上述图3的实例中描述了直接为组织产生特定于该组织的主根密钥对的情况。然而,本公开并不局限于此。在一些情况下,例如密钥安全管理系统10通过单个硬件安全设备12管理多个组织及其各自的用户的密钥对的情况下,可以参照如图3所示的方法产生特定于硬件安全设备12的根密钥对,并且根据该根密钥对和硬件安全设备12所管理的各个组织之间的关系派生出各个组织的主根密钥对(类似于图4和图5所示的实例中的用户密钥对的派生方式)。在这种情况下,密钥安全设备12中可以仅存储特定于该密钥安全设备12的根密钥对,而不存储任何组织或其用户的密钥对。
此外,本文中使用的术语“证书”仅仅借用了常规技术中的用语,并不一定代表其具有与常规技术中完全相同的内涵和外延,也不代表其必然由常规技术中所称的证书授权中心发布。
通过本公开的方法100可以看出,本公开通过主机11和硬件安全设备12对操作请求的双重认证,有效防止了非授权的访问。同时,本公开利用硬件安全设备12具有高度安全性的特点,在硬件安全设备12内部进行密钥的生成和使用等操作。用户的私钥在使用完毕后即销毁,使得在任何情况下用户的私钥都不会离开硬件安全设备12,即任何设备都无法获取用户私钥。此外,只有授权设备才能够获得用户的私钥签名,从而确保了用户私钥的高度安全性。另外,由于本公开采用基于分层确定性规则确定用户的密钥的方法,因此,对于企业内部不同的子机构、部门、员工或企业的用户或客户都需要有单独的数字资产账户的情况下,可以方便地对这些单独的数字资产账户的私钥进行管理,而无需他们自己保存私钥,从而极大地提高了数字资产管理的安全性。
在一个或多个示例性的实施例中,还提供了一种包括机器可执行指令的非易失性计算机可读存储介质,上述指令可由计算机运行以执行本公开的密钥安全管理方法100。
在一个或多个示例性设计中,可以用硬件、软件、固件或它们的任意组合来实现本公开所述的功能。例如,如果用软件或固件来实现,则可以将所述功能作为一个或多个指令或代码存储在计算机可读存储介质上,或者作为计算机可读存储介质上的一个或多个指令或代码来传输。
本文公开的系统的各个组成部分可以使用分立硬件组件来实现,也可以集成地实现在一个硬件组件。例如,可以用通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或其它可编程逻辑器件、分立门或者晶体管逻辑、分立硬件组件或其组合来实现或执行结合本公开所描述的各种示例性的组成部分。
本技术领域的一般技术人员可以通过阅读说明书、公开的内容及附图和所附的权利要求书,理解和实施对披露的实施方式的其他改变。在权利要求中,措辞“包括”不排除其他的元素和步骤,并且措辞“一”、“一个”不排除复数。在本申请的实际应用中,一个零件可能执行权利要求中所引用的多个技术特征的功能。权利要求中的任何附图标记不应理解为对范围的限制。

Claims (22)

  1. 一种密钥安全管理系统,其特征在于,所述密钥安全管理系统包括:
    安全主机,其被配置为接收第一操作请求,对所述第一操作请求进行验证,并在验证通过时基于所述第一操作请求生成第二操作请求,所述第一操作请求和所述第二操作请求都包括身份标识,以及
    硬件安全设备,其被配置为从所述安全主机接收所述第二操作请求,对所述第二操作请求进行验证,并且在验证通过时解析所述第二操作请求的类型,以及基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作,所述密钥对包括特定于所述身份标识的一个公钥和一个私钥。
  2. 根据权利要求1所述的密钥安全管理系统,其特征在于,所述身份标识包括组织的身份标识,
    其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求生成所述组织的主根密钥对,产生随机的密钥种子,并且使用所述密钥种子产生所述组织的主根密钥对。
  3. 根据权利要求2所述的密钥安全管理系统,其特征在于,在使用所述密钥种子产生所述组织的主根密钥对之后,所述硬件安全设备被进一步配置为:
    存储所述组织的主根密钥对;以及
    销毁所述密钥种子。
  4. 根据权利要求1所述的密钥安全管理系统,其特征在于,所述身份标识包括用户的身份标识和与所述用户关联的组织的身份标识,所述密钥安全管理系统存储有所述组织的主根密钥对,
    其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求获取所述用户的公钥,根据所述组织的身份标识确定所述组织的主根密钥对;
    基于所述用户的身份标识和分层确定性规则确定所述用户的密钥对生成路径;
    基于所述用户的密钥对生成路径和所述组织的主根密钥对派生出所述用户的密钥对;以及
    将所述用户的密钥对中的公钥发送给所述安全主机。
  5. 根据权利要求1所述的密钥安全管理系统,其特征在于,所述身份标识包括用户的身份标识和与所述用户关联的组织的身份标识,所述硬件安全设备存储有所述组织的 主根密钥对,所述第二操作请求还包括所述用户的待签名数据,
    其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求对所述待签名数据进行签名,根据所述组织的身份标识确定所述组织的主根密钥对;
    基于所述用户的身份标识和分层确定性规则确定所述用户的密钥对生成路径;
    基于所述用户的密钥对生成路径和所述组织的主根密钥对派生出所述用户的密钥对;
    利用所述用户的密钥对中的私钥对所述待签名数据进行签名以得到签名数据;以及
    将所述签名数据发送给所述安全主机。
  6. 根据权利要求4或5所述的密钥安全管理系统,其特征在于,基于所述用户的身份标识确定所述用户的密钥对生成路径包括:
    对所述用户的身份标识和所述组织的身份标识的组合执行哈希运算以得到哈希值;以及
    基于所述哈希值和所述分层确定性规则确定所述用户的密钥对生成路径。
  7. 根据权利要求5所述的密钥安全管理系统,在利用所述用户的密钥对中的私钥对所述待签名数据进行签名之后,所述硬件安全设备还被配置为:
    销毁所述用户的密钥对中的私钥。
  8. 根据权利要求1所述的密钥安全管理系统,其特征在于,所述密钥安全管理系统还包括:
    应用服务器,其被配置为根据外部节点的请求生成所述第一操作请求,并且向所述安全主机发送所述第一操作请求,
    其中,所述硬件安全设备与所述安全主机位于同一安全网域内,由所述安全主机作为所述应用服务器访问所述硬件安全设备的网关。
  9. 根据权利要求1所述的密钥安全管理系统,其中对所述第一操作请求进行验证包括:
    解析所述第一操作请求以获取其中包含的应用服务器证书和应用服务器签名,所述应用服务器证书包含所述应用服务器的身份标识、所述应用服务器的允许业务类型列表和所述应用服务器证书的有效期;
    利用所述应用服务器的公钥对所述应用服务器签名进行解密,以获取所述第一操作请求所请求的业务类型;
    将所述第一操作请求所请求的业务类型与所述应用服务器证书中所包含的允许业务类型列表进行比较以确定是否允许所述第一操作请求所请求的业务类型;
    验证所述应用服务器证书是否处于所述应用服务器证书的有效期内;以及
    从区块链获取所述应用服务器证书的状态以验证所述应用服务器证书的状态。
  10. 根据权利要求1所述的密钥安全管理系统,其中对所述第二操作请求进行验证包括:
    解析所述第二操作请求以获取其中包含的安全主机证书和安全主机签名,所述安全主机证书包含所述安全主机的身份标识、所述安全主机的允许业务类型列表和所述安全主机证书的有效期;
    利用所述安全主机的公钥对所述安全主机签名进行解密,以确定所述第二操作请求是否由所述安全主机签名;
    验证所述安全主机证书是否处于所述安全主机证书的有效期内。
  11. 一种密钥安全管理方法,其特征在于,所述方法包括:
    由安全主机接收第一操作请求;
    由所述安全主机对所述第一操作请求进行验证并在验证通过时基于所述第一操作请求生成第二操作请求,所述第一操作请求和所述第二操作请求都包括身份标识;
    由所述硬件安全设备从所述安全主机接收所述第二操作请求,对所述第二操作请求进行验证,并在验证通过时解析所述第二操作请求的类型;以及
    由所述硬件安全设备基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作,所述密钥对包括特定于所述身份标识的一个公钥和一个私钥。
  12. 根据权利要求11所述的方法,其特征在于,所述身份标识包括组织的身份标识,其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求生成所述组织的主根密钥对,产生随机的密钥种子,并且使用所述密钥种子产生所述组织的主根密钥对。
  13. 根据权利要求12所述的方法,其特征在于,在使用所述密钥种子产生所述组织的主根密钥对之后,所述方法还包括:
    存储所述组织的主根密钥对;以及
    销毁所述密钥种子。
  14. 根据权利要求11所述的方法,其特征在于,所述身份标识包括用户的身份标识和与所述用户关联的组织的身份标识,所述硬件安全设备存储有所述组织的主根密钥对,其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求获取所述用户的公钥,根据所述组织的身份标识确定所述组织的主根密钥对;
    基于所述用户的身份标识和分层确定性规则确定所述用户的密钥对生成路径;
    基于所述用户的密钥对生成路径和所述组织的主根密钥对派生出所述用户的密钥对;以及
    将所述用户的密钥对中的公钥发送给所述安全主机。
  15. 根据权利要求11所述的方法,其特征在于,所述身份标识包括用户的身份标识和与所述用户关联的组织的身份标识,所述硬件安全设备存储有所述组织的主根密钥对,所述第二操作请求还包括所述用户的待签名数据,
    其中,基于所述第二操作请求的类型执行和关联于所述身份标识的一个密钥对有关的操作包括:
    响应于所述第二操作请求的类型是请求对所述待签名数据进行签名,根据所述组织的身份标识确定所述组织的主根密钥对;
    基于所述用户的身份标识和分层确定性规则确定所述用户的密钥对生成路径;
    基于所述用户的密钥对生成路径和所述组织的主根密钥对派生出所述用户的密钥对;
    利用所述用户的密钥对中的私钥对所述待签名数据进行签名以得到签名数据;以及
    将所述签名数据发送给所述安全主机。
  16. 根据权利要求14或15所述的方法,其特征在于,基于所述用户的身份标识确定所述用户的密钥对生成路径包括:
    对所述用户的身份标识和所述组织的身份标识的组合执行哈希运算以得到哈希值;以及
    基于所述哈希值和所述分层确定性规则确定所述用户的密钥对生成路径。
  17. 根据权利要求15所述的方法,其特征在于,在利用所述用户的密钥对中的私钥对所述待签名数据进行签名之后,所述方法包括:
    销毁所述用户的密钥对中的私钥。
  18. 根据权利要求11所述的方法,其中接收第一操作请求包括:
    由所述安全主机从应用服务器接收所述第一操作请求,其中,所述硬件安全设备与所述安全主机位于同一安全网域内,由所述安全主机作为所述应用服务器访问所述硬件安全设备的网关。
  19. 根据权利要求11所述的方法,其中对所述第一操作请求进行验证包括:
    解析所述第一操作请求以获取其中包含的应用服务器证书和应用服务器签名,所述应用服务器证书包含所述应用服务器的身份标识、所述应用服务器的允许业务类型列表和所述应用服务器证书的有效期;
    利用所述应用服务器的公钥对所述应用服务器签名进行解密,以获取所述第一操作请求所请求的业务类型;
    将所述第一操作请求所请求的业务类型与所述应用服务器证书中所包含的允许业务类型列表进行比较以确定是否允许所述第一操作请求所请求的业务类型;
    验证所述应用服务器证书是否处于所述应用服务器证书的有效期内;以及
    从区块链获取所述应用服务器证书的状态以验证所述应用服务器证书的状态。
  20. 根据权利要求11所述的方法,其中对所述第二操作请求进行验证包括:
    解析所述第二操作请求以获取其中包含的安全主机证书和安全主机签名,所述安全主机证书包含所述安全主机的身份标识、所述安全主机的允许业务类型列表和所述安全主机主机证书的有效期;
    利用所述安全主机的公钥对所述安全主机签名进行解密,以确定所述第二操作请求是否由所述安全主机签名;以及
    验证所述安全主机证书是否处于所述安全主机证书的有效期内。
  21. 一种非易失性计算机可读存储介质,其上存储有机器可执行指令,所述机器可执行指令在被计算机运行时,执行如权利要求11-20中任一项所述的方法。
  22. 一种计算机程序,其包括机器可执行指令,所述机器可执行指令在被运行时执行根据权利要求11-20中任一项所述的方法。
PCT/CN2019/129769 2018-12-29 2019-12-30 密钥安全管理系统和方法、介质和计算机程序 Ceased WO2020135853A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
SG11202106514TA SG11202106514TA (en) 2018-12-29 2019-12-30 Key security management system and method, medium, and computer program
EP19906368.6A EP3879747A4 (en) 2018-12-29 2019-12-30 KEY, MEDIA, AND COMPUTER PROGRAM SECURITY MANAGEMENT SYSTEM AND METHOD
JP2021537206A JP7426031B2 (ja) 2018-12-29 2019-12-30 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム
US17/309,831 US12058252B2 (en) 2018-12-29 2019-12-30 Key security management system and method, medium, and computer program

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811633995.X 2018-12-29
CN201811633995.XA CN109687959B (zh) 2018-12-29 2018-12-29 密钥安全管理系统和方法、介质和计算机程序

Publications (1)

Publication Number Publication Date
WO2020135853A1 true WO2020135853A1 (zh) 2020-07-02

Family

ID=66191138

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/129769 Ceased WO2020135853A1 (zh) 2018-12-29 2019-12-30 密钥安全管理系统和方法、介质和计算机程序

Country Status (6)

Country Link
US (1) US12058252B2 (zh)
EP (1) EP3879747A4 (zh)
JP (1) JP7426031B2 (zh)
CN (1) CN109687959B (zh)
SG (1) SG11202106514TA (zh)
WO (1) WO2020135853A1 (zh)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109687959B (zh) * 2018-12-29 2021-11-12 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序
CN109687975B (zh) * 2018-12-29 2020-11-03 飞天诚信科技股份有限公司 一种硬件钱包可脱机进行初始化的实现方法及装置
US11100497B2 (en) * 2019-08-20 2021-08-24 Anchor Labs, Inc. Risk mitigation for a cryptoasset custodial system using a hardware security key
CN110519256B (zh) * 2019-08-21 2021-09-24 上海唯链信息科技有限公司 一种DApp访问USB私钥管理设备的方法及装置
KR102942135B1 (ko) * 2019-08-23 2026-03-23 삼성전자주식회사 블록체인 계좌 정보를 제공하는 전자 장치와 이의 동작 방법
CN110401544A (zh) * 2019-08-29 2019-11-01 北京艾摩瑞策科技有限公司 知识付费平台用户的区块链私钥的代签方法及其装置
EP3886383A1 (en) * 2020-03-23 2021-09-29 Nokia Solutions and Networks Oy Apparatus, method and computer program for routing data in a dual or multi-connectivity configuration
CN111934858B (zh) * 2020-07-09 2022-03-18 中国电子科技集团公司第三十研究所 一种可监管的随机公钥派生方法
CN112187466B (zh) * 2020-09-01 2023-05-12 深信服科技股份有限公司 一种身份管理方法、装置、设备及存储介质
US11444771B2 (en) * 2020-09-08 2022-09-13 Micron Technology, Inc. Leveraging a trusted party third-party HSM and database to securely share a key
US11575508B2 (en) 2021-06-02 2023-02-07 International Business Machines Corporation Unified HSM and key management service
CN113364589B (zh) * 2021-08-10 2021-11-02 深圳致星科技有限公司 用于联邦学习安全审计的密钥管理系统、方法及存储介质
CN113641494B (zh) * 2021-08-11 2025-07-15 京东科技控股股份有限公司 服务器的控制方法、装置和服务器
CN114978774B (zh) * 2022-07-28 2022-10-04 四川九洲空管科技有限责任公司 基于嵌套式保护结构的多层级密钥管理方法
CN116384999B (zh) * 2023-04-19 2024-08-30 山东高速信联科技股份有限公司 轻量级支持隐形地址的分层确定性钱包模型及方法
FR3149104A1 (fr) * 2023-05-26 2024-11-29 Ledger Système de gestion mutualisée de comptes de cryptoactifs, ayant des modules matériels de gouvernance et de signature distincts
FR3149103A1 (fr) * 2023-05-26 2024-11-29 Ledger Système de gestion mutualisée de comptes de cryptoactifs à signature multipartite

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580872A (zh) * 2013-11-11 2014-02-12 北京华大智宝电子系统有限公司 一种用于密钥生成与管理的系统及方法
CN105915338A (zh) * 2016-05-27 2016-08-31 北京中油瑞飞信息技术有限责任公司 生成密钥的方法和系统
US20180097638A1 (en) * 2016-10-05 2018-04-05 The Toronto-Dominion Bank Certificate authority master key tracking on distributed ledger
CN108847937A (zh) * 2018-09-04 2018-11-20 捷德(中国)信息科技有限公司 密钥处理方法、装置、设备及介质
CN109687959A (zh) * 2018-12-29 2019-04-26 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001290727A1 (en) * 2000-09-08 2002-03-22 Larry R. Miller System and method for transparently providing certificate validation and other services within an electronic transaction
ATE465571T1 (de) * 2001-08-13 2010-05-15 Univ Leland Stanford Junior Systeme und verfahren zur verschlüsselung auf identitätsbasis und damit zusammenhängende kryptografische techniken
US20050114686A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation System and method for multiple users to securely access encrypted data on computer system
US7697691B2 (en) 2004-07-14 2010-04-13 Intel Corporation Method of delivering Direct Proof private keys to devices using an on-line service
CN100346249C (zh) * 2004-12-31 2007-10-31 联想(北京)有限公司 生成数字证书及应用该所生成的数字证书的方法
DE102005030590B4 (de) * 2005-06-30 2011-03-24 Advanced Micro Devices, Inc., Sunnyvale Sicheres Patchsystem
CN1925401B (zh) * 2006-10-12 2011-06-15 中国联合网络通信有限公司北京市分公司 互联网接入系统及接入方法
CN101426190A (zh) * 2007-11-01 2009-05-06 华为技术有限公司 一种服务访问认证方法和系统
CN101459505B (zh) * 2007-12-14 2011-09-14 华为技术有限公司 生成用户私钥的方法、系统及用户设备、密钥生成中心
CN101359991A (zh) * 2008-09-12 2009-02-04 湖北电力信息通信中心 基于标识的公钥密码体制私钥托管系统
US8452963B2 (en) * 2009-01-27 2013-05-28 Cisco Technology, Inc. Generating protected access credentials
CN101557289A (zh) * 2009-05-13 2009-10-14 大连理工大学 基于身份认证的存储安全密钥管理方法
CN102215488B (zh) * 2011-05-27 2013-11-06 中国联合网络通信集团有限公司 智能手机数字证书的应用方法和系统
US9350536B2 (en) * 2012-08-16 2016-05-24 Digicert, Inc. Cloud key management system
JP5948185B2 (ja) * 2012-08-29 2016-07-06 株式会社日立製作所 記録媒体、プログラム、及び、情報配信装置
US9094431B2 (en) * 2012-11-01 2015-07-28 Miiicasa Taiwan Inc. Verification of network device position
US9311500B2 (en) 2013-09-25 2016-04-12 Amazon Technologies, Inc. Data security using request-supplied keys
US10560441B2 (en) * 2014-12-17 2020-02-11 Amazon Technologies, Inc. Data security operations with expectations
US10541811B2 (en) * 2015-03-02 2020-01-21 Salesforce.Com, Inc. Systems and methods for securing data
CN106161017A (zh) * 2015-03-20 2016-11-23 北京虎符科技有限公司 标识认证安全管理系统
US9882726B2 (en) * 2015-05-22 2018-01-30 Motorola Solutions, Inc. Method and apparatus for initial certificate enrollment in a wireless communication system
US10461940B2 (en) 2017-03-10 2019-10-29 Fmr Llc Secure firmware transaction signing platform apparatuses, methods and systems
CN105373955B (zh) * 2015-12-08 2020-07-10 布比(北京)网络技术有限公司 基于多重签名的数字资产处理方法及装置
CN106921496A (zh) * 2015-12-25 2017-07-04 卓望数码技术(深圳)有限公司 一种数字签名方法和系统
KR20170091951A (ko) 2016-02-02 2017-08-10 에스프린팅솔루션 주식회사 전자 디바이스에게 보안을 제공하기 위한 방법 및 장치
CN106686004B (zh) 2017-02-28 2019-07-12 飞天诚信科技股份有限公司 一种登录认证方法及系统
CN112865982A (zh) 2017-07-26 2021-05-28 创新先进技术有限公司 数字证书管理方法、装置及电子设备
CN107395349A (zh) * 2017-08-16 2017-11-24 深圳国微技术有限公司 一种基于自认证公钥体制的区块链网络密钥分发方法
US11012237B1 (en) * 2018-01-09 2021-05-18 Jpmorgan Chase Bank, N.A. Systems and methods for inter-service authentication
CN108830711A (zh) * 2018-05-07 2018-11-16 国网浙江省电力有限公司嘉兴供电公司 一种基于区块链的能源互联网交易账本管理方法及系统
CN109067801B (zh) * 2018-09-29 2021-09-03 平安科技(深圳)有限公司 一种身份认证方法、身份认证装置及计算机可读介质
CN109064151A (zh) * 2018-10-23 2018-12-21 北京金山安全软件有限公司 一种转账方法、装置、电子设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103580872A (zh) * 2013-11-11 2014-02-12 北京华大智宝电子系统有限公司 一种用于密钥生成与管理的系统及方法
CN105915338A (zh) * 2016-05-27 2016-08-31 北京中油瑞飞信息技术有限责任公司 生成密钥的方法和系统
US20180097638A1 (en) * 2016-10-05 2018-04-05 The Toronto-Dominion Bank Certificate authority master key tracking on distributed ledger
CN108847937A (zh) * 2018-09-04 2018-11-20 捷德(中国)信息科技有限公司 密钥处理方法、装置、设备及介质
CN109687959A (zh) * 2018-12-29 2019-04-26 上海唯链信息科技有限公司 密钥安全管理系统和方法、介质和计算机程序

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3879747A4 *

Also Published As

Publication number Publication date
CN109687959B (zh) 2021-11-12
US12058252B2 (en) 2024-08-06
CN109687959A (zh) 2019-04-26
SG11202106514TA (en) 2021-07-29
EP3879747A1 (en) 2021-09-15
EP3879747A4 (en) 2022-08-10
JP2022515467A (ja) 2022-02-18
US20220078009A1 (en) 2022-03-10
JP7426031B2 (ja) 2024-02-01

Similar Documents

Publication Publication Date Title
JP7426031B2 (ja) 鍵セキュリティ管理システムおよび方法、媒体、ならびにコンピュータプログラム
US12058248B2 (en) Quantum-safe networking
US12015716B2 (en) System and method for securely processing an electronic identity
JP7181539B2 (ja) 利用者識別認証データを管理する方法および装置
US11329981B2 (en) Issuing, storing and verifying a rich credential
US11218305B2 (en) Blockchain authorization information generation
KR101389100B1 (ko) 저복잡도 장치들을 사용하여 인증 및 프라이버시를 제공하는 방법 및 장치
US9130926B2 (en) Authorization messaging with integral delegation data
JP2020009500A (ja) データセキュリティサービス
WO2020062668A1 (zh) 一种身份认证方法、身份认证装置及计算机可读介质
JP7686619B2 (ja) バイオメトリックプロトコル標準に関するシステム及び方法
KR20110079660A (ko) 태그 데이터 요소의 암호화와 동작 제어 프로세스-1
US20210391993A1 (en) Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
JP2018529299A (ja) 生体認証プロトコル標準のシステムおよび方法
US20020143987A1 (en) Message management systems and method
CN110020869B (zh) 用于生成区块链授权信息的方法、装置及系统
CN115720137A (zh) 一种信息管理的系统、方法以及装置
HK40050164A (zh) 密钥安全管理系统和方法、介质和计算机程序
López et al. LACChain ID Framework: A Set of Recommendations for Blockchain-Based Interoperable, Privacy-Preserving, Regulatory Compliant, Secure, and Standardized Digital Identifiers, Credentials, and Wallets
CN119848821A (zh) 一种用户身份验证方法
Kumar et al. Review on Hashing and Encryption Algorithms used in Cloud computing
KR20080014795A (ko) 태그 데이터 요소의 암호화와 동작 제어 프로세스
KR20190066470A (ko) 일회성 패스워드를 생성하고 검증하는 방법과 그 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19906368

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2019906368

Country of ref document: EP

Effective date: 20210611

ENP Entry into the national phase

Ref document number: 2021537206

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE