Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network private key generating and applying method and system for mobile terminal

A mobile terminal, private key technology, applied in the field of computer and information security, can solve the problems of no PIN protection, loss of applicability and security, affecting Internet use and rapid development, etc., to overcome security defects and improve security and efficiency. Effect

Active Publication Date: 2016-08-17
周波
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the SMS verification code has the advantage of being simple to set, it can only be verified but cannot be decrypted or signed. The SMS verification code sent is easy to be stolen, and there is no PIN protection: the mobile terminal can be used for unauthorized verification after it is lost or stolen
Defects in its applicability and security not only cause losses and increase costs, but also affect the wider use and rapid development of the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network private key generating and applying method and system for mobile terminal
  • Network private key generating and applying method and system for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions of the present invention will be further specifically described below through examples.

[0043] Unlike the software private key in the prior art, which puts the data and calculations for decrypting the private key on the same terminal, for the network private key of the present invention, part of the data and calculations for decrypting the private key are moved to the verification server , and the verification server sets the maximum number of consecutive incorrect PIN inputs to prevent unlimited input of various PINs. The specific solution of the present invention is described below through an embodiment, that is, how the APP on the mobile terminal initializes, encrypts and decrypts the private key.

[0044] (1) Initialize and encrypt the private key

[0045] figure 1 It is a schematic flow chart of initializing and encrypting a private key in a preferred embodiment of the present invention.

[0046] First, the user inputs user information ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network private key generating and applying method and system for a mobile terminal. Compared with the conventional software private key, the method and the system are characterized in that data and operation for decrypting a private key are placed on the same terminal, and the difference is that a part of data and operation for decrypting the private key are moved to a verification server, and the verification server is provided with maximum continuous inputting error times of a PIN (Personal Identity Number) to prevent unlimited input of various different PINs. By adopting the method and the system, the safety defects that the software private key and the environment of the conventional mobile terminal can be duplicated, and hackers can input various different PINs in an unlimited way are overcome.

Description

technical field [0001] The invention belongs to the technical field of computer and information security, and in particular relates to a method for generating and using a network private key used as a digital certificate for a mobile terminal in the mobile Internet and a system thereof. Background technique [0002] With the increasing popularity of the Internet, especially the mobile Internet, e-commerce has become more and more deeply involved in economic life. When doing transactions online, since the two parties to the transaction do not conduct on-site transactions, it is impossible to confirm the identities of both parties through the traditional face-to-face method; Transaction information exists electronically, and traditional stamping and signature cannot be performed. Therefore, in the event of disputes or disputes, it is necessary to ensure the non-repudiation of transaction information and, when necessary, serve as evidence with legal effect. Therefore, in e-com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/041H04W12/122
CPCH04W12/04
Inventor 周波
Owner 周波
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products