Alibaba Group Holding Limited
CRYPTOGRAPHIC KEY MANAGEMENT BASED ON IDENTITY INFORMATION
Last updated:
Abstract:
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing cryptographic keys based on user identity information. One of the methods includes receiving a request to store identity information and a user key pair to a memory on a chip, the request being digitally signed with a digital signature, the identity information uniquely identifying the user, and the user key pair being assigned to the user; determining that the digital signature is authentic based on a public key pre-stored in the memory; encrypting the identity information and the user key pair; and storing the identity information and the user key pair to the memory.
Status:
Application
Type:
Utility
Filling date:
30 Sep 2019
Issue date:
1 Oct 2020