Alibaba Group Holding Limited
CRYPTOGRAPHIC KEY MANAGEMENT BASED ON IDENTITY INFORMATION

Last updated:

Abstract:

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing cryptographic keys based on user identity information. One of the methods includes receiving a request to store identity information and a user key pair to a memory on a chip, the request being digitally signed with a digital signature, the identity information uniquely identifying the user, and the user key pair being assigned to the user; determining that the digital signature is authentic based on a public key pre-stored in the memory; encrypting the identity information and the user key pair; and storing the identity information and the user key pair to the memory.

Status:
Application
Type:

Utility

Filling date:

30 Sep 2019

Issue date:

1 Oct 2020