The secret key to isolate different business systems. Other Secret encryption key management services can be unified. First, we need a safe place to store an encrypted secret key. But if the business logic can not avoid these information stored. As long as the user information is stored, it may become a target of attack.