KMS 
(Key Management System)

KMS is to manage the entire lifecycle of creating, injecting, updating, and revoking a key in a key injection system. KMS plays a very important role.

KMS is based on a hardware-based cryptographic module that generates a key called HSM (Hardware Security Module). It manages the entire process of generating, distributing, updating, and revoking keys. 
ICTK KMS

ICTK provides two types of KMS systems.


Decentralized KMS
Cloud based KMS

Decentralized KMS distributes the HSM nodes that store the key to distribute the burden of attacks concentrated on the HSM. 
It is a distributed HSM-based key management system that has a structure in which the entire system operates normally even if some of the distributed nodes do not operate. A PCB-based PUF module provided by ICTK is used for a general server connected to the Internet. When installed, it can be used as a distributed node, and service is possible through KMS in the cloud. 
Cloud based KMS is a method of storing the user's key in the cloud because there is a possibility of loss or misuse if the user's key is stored in the device, and each device acquires and uses the key when necessary through authentication. Cloud-based KMS can be linked with existing HSM equipment or with decentralized HSM. PUF-based authentication is carried out to strengthen the authentication of each device. 
KMS (Key Management System)



KMS is to manage the entire lifecycle of creating, injecting, updating, and revoking a key in a key injection system. KMS plays a very important role.

KMS is based on a hardware-based cryptographic module that generates a key called HSM (Hardware Security Module). It manages the entire process of generating, distributing, updating, and revoking keys.

ICTK KMS



ICTK provides two types of KMS systems. 


▪ Decentralized KMS

▪ Cloud based KMS


Decentralized KMS distributes the HSM nodes that store the key to distribute the burden of attacks concentrated on the HSM. It is a distributed HSM-based key management system that has a structure in which the entire system operates normally even if some of the distributed nodes do not operate. A PCB-based PUF module provided by ICTK is used for a general server connected to the Internet. When installed, it can be used as a distributed node, and service is possible through KMS in the cloud. 


Cloud based KMS is a method of storing the user's key in the cloud because there is a possibility of loss or misuse if the user's key is stored in the device, and each device acquires and uses the key when necessary through authentication. Cloud-based KMS can be linked with existing HSM equipment or with decentralized HSM. PUF-based authentication is carried out to strengthen the authentication of each device.