Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for key protection

A key protection and private key technology, applied in the field of information security, can solve problems such as the inability to guarantee the security of the user's private key, the bank server does not know the terminal, and potential safety hazards, and achieve the effects of ensuring security, increasing difficulty, and ensuring security

Active Publication Date: 2013-04-24
TENDYRON CORP
View PDF2 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem is that when the bank server issues the user public key certificate to the terminal, the bank server may not know the specific terminal it is sending, so it may be intercepted, and the user public key certificate may be stolen during the process of issuing the user public key certificate. There are hidden security risks in the transaction process, and the security of the user's private key cannot be guaranteed during the transaction process, and there are security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for key protection
  • Method and system for key protection
  • Method and system for key protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0019] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for key protection and a system for the key protection. The method for the key protection includes that a mobile terminal receives a registration instruction and generates a user public key and a user private key according to the registration instruction; when the mobile terminal is subjected to identification authentication by a mobile banking server and a bank comprehensive front server, the mobile banking server sends the user public key to a third-party e-commerce authentication server for certified signing so as to generate a user public key certificate and store the user public key certificate; the mobile banking server carries out an authentication process to encrypted user transaction information sent by the mobile terminal according to the user public key certificate, and when the authentication is passed, the bank comprehensive front server executes a transaction; and after the transaction is finished, the mobile terminal generates an updated private key protecting parameter and sends the updated private key protecting parameter to the mobile banking server, and then the mobile terminal receives an update success result from the mobile banking server and encrypts and stores the user private key according to the updated private key protecting parameter. The method for the key protection and the system for the key protection can increase attack difficulty and improve safety.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a key protection method and a key protection system. Background technique [0002] In recent years, with the rapid development of the Internet and financial informatization, online banking has been widely praised by users and the banking industry due to its convenience and high efficiency. Digital certificates are the identification of users and bank servers when conducting transactions through online banking. Can guarantee the security of online transactions. [0003] At present, the generation of the user's public key certificate is completed by the bank server, and then issued to the terminal used by the user after being authenticated by the third-party e-commerce authentication server. The problem is that when the bank server issues the user public key certificate to the terminal, the bank server may not know the specific terminal it is sending, so it may be int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q30/00
CPCH04W12/04H04L9/08G06Q20/00H04L29/06H04L9/0825H04L9/321H04L9/3263H04L2209/56H04L2209/80H04L63/0823G06Q40/02H04W12/0433H04W12/041G06Q20/3829
Inventor 李东声
Owner TENDYRON CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products