▪ | Decentralized KMS |
▪ | Cloud based KMS |
KMS is based on a hardware-based cryptographic module that generates a key called HSM (Hardware Security Module). It manages the entire process of generating, distributing, updating, and revoking keys.
▪ Decentralized KMS
▪ Cloud based KMS
Decentralized KMS distributes the HSM nodes that store the key to distribute the burden of attacks concentrated on the HSM. It is a distributed HSM-based key management system that has a structure in which the entire system operates normally even if some of the distributed nodes do not operate. A PCB-based PUF module provided by ICTK is used for a general server connected to the Internet. When installed, it can be used as a distributed node, and service is possible through KMS in the cloud.
Cloud based KMS is a method of storing the user's key in the cloud because there is a possibility of loss or misuse if the user's key is stored in the device, and each device acquires and uses the key when necessary through authentication. Cloud-based KMS can be linked with existing HSM equipment or with decentralized HSM. PUF-based authentication is carried out to strengthen the authentication of each device.
About us | PUF Technology | Product | Resource | Contact Us | Investment | Careers |
What is Hardware Root of Trust (HRoT)? |