Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel terminal safety soft secret key management method

A technology of terminal security and management method, applied in key distribution, can solve problems such as increased hardware cost, U-key loss, user troubles, etc., to ensure legality, prevent illegal tampering and information camouflage, and improve system security.

Inactive Publication Date: 2016-03-16
CHINA SMARTCITY TECH
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] During the application and implementation of CPK, the user needs to deploy the CPK key management system, and deploy different versions of the key management system according to different business requirements. The key management system is deployed in the form of a hardware server. During the formal implementation process, the user The key is downloaded and stored in the U-key, which increases the hardware cost for the user, and the U-key may be lost during use, causing troubles for the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel terminal safety soft secret key management method
  • Novel terminal safety soft secret key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] [Embodiment 1] Customer Zhang San pays customer Li Si online.

[0043] Such as figure 1 As shown, the payer Zhang San wants to pay the payee Li Si online, and both use the mobile phone e-wallet client to operate. The soft key system is installed on the Zhang San mobile phone, Li Si mobile phone, and the background management system. run. Li Si enters the amount on the mobile phone, and the e-wallet client generates a QR code with the payee information and payment information.

[0044] Zhang San scans the QR code, and the soft key system in Zhang San’s mobile phone selects a random number R, uses Zhang San’s private key to sign the random number R, and signs the recipient information, payment information, payer information, and signature The information is sent to the background management system together.

[0045] After the background management system receives the above information, the soft key system verifies the signature information: that is, the public key is mapped ou...

Embodiment 2

[0046] [Embodiment 2] Customer Zhang San pays customer Li Si offline.

[0047] Such as figure 2 As shown, the payer Zhang San wants to pay the payee Li Si offline, and both use the mobile phone electronic wallet client to operate, and the soft key system is installed and running on both Zhang San mobile phone and Li Si mobile phone. Li Si enters the amount on the mobile phone, the soft key system selects a random number R, uses the private key to sign the random number R, and generates a QR code with transaction information, Li Si ID information, and signature information.

[0048] Zhang San scans the QR code, the soft key system uses the Li Si ID and the business subdomain ID to map out the public key, and uses the public key to verify the signature information of Li Si. If the verification fails, the process ends.

[0049] If the verification is successful, Zhang San’s mobile client asks whether he agrees to the payment operation. If Zhang San refuses, the process ends. If Zhang...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel terminal safety soft secret key management method. According to the method, information of two transaction parties are selected by a soft secret key system as identification ID, public and private key pairs are formed through mapping on the basis of business subdomain identification; for online payment, a two-dimensional code is generated at a receiving party; after the two-dimensional code is scanned by a payment party, signature is carried out by utilizing a private key pair randomized number, and information is sent to a background management system; signature verification is realized by the background management system through utilizing public key pair signature information; if signature verification succeeds, transaction is processed; for offline payment, signature is carried out by the receiving party through utilizing the private key pair randomized number, and a two-dimensional code is generated; the two-dimensional code is scanned by the payment party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is carried out by the payment party according to transaction information; signature is carried out by the payment party through utilizing the private key pair randomized number, a two-dimensional code is generated; the two-dimensional code is scanned by the receiving party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is successfully realized for the receiving party. Through the method, system safety is not only improved, system disposition cost is further reduced, transaction validness is fully guaranteed, and invalid information tampering and information steganography can be avoided.

Description

Technical field [0001] The invention relates to the field of key management, in particular to a terminal soft key management method based on key authentication. Background technique [0002] With the popularization of the Internet, people communicate more and more through the Internet, and the corresponding business activities through the Internet, namely e-commerce, have also been extensively developed. E-commerce provides a golden opportunity for Chinese enterprises to explore international and domestic markets and make good use of various resources at home and abroad. E-commerce truly embodies the advantages of equal competition, high efficiency, low cost, and high quality for enterprises, and enables enterprises to grasp business opportunities and stand out in the fierce market competition. Developed countries have regarded e-commerce as the focus of national economic growth in the 21st century, and relevant departments in my country are also vigorously promoting the develop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08G06Q20/38
CPCH04L63/06G06Q20/3829H04L9/08
Inventor 聂明
Owner CHINA SMARTCITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products