Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key generation method, system, mobile terminal, server, and storage medium

A mobile terminal and key generation technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as inability to ensure the same mobile phone number of the same mobile terminal, inability to ensure the same terminal, and inability to access external password devices

Active Publication Date: 2019-01-22
AEROSPACE INFORMATION
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, considering the portability of the mobile terminal, it cannot be easily connected to an external cryptographic device like a computer to ensure user identity and data security, and most mobile terminals do not have built-in and integrated security cryptographic hardware, usually Generate a key for the user in the mobile terminal and store it
However, the existing key generation method cannot ensure that the mobile terminal that initiates the registration request and the mobile terminal that finally generates the user key are the same terminal, and also cannot ensure that the same mobile terminal is the same when initiating the registration request and generating the user key. same phone number used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method, system, mobile terminal, server, and storage medium
  • Key generation method, system, mobile terminal, server, and storage medium
  • Key generation method, system, mobile terminal, server, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0104] figure 1 is a flowchart of a method for generating a key according to an exemplary embodiment of the present disclosure, as shown in figure 1 As shown, the method includes the following steps:

[0105] In step S11, the mobile terminal sends a registration request to the server, and the registration request includes the mobile phone number of the target user.

[0106] The mobile phone number corresponds to a unique user, which can be used to identify the user's identity. In the embodiment of the present disclosure, the mobile phone number of the target user may be input by the target user when registering through the mobile terminal, or it may be the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key generation method, a system, a mobile terminal, a server and a storage medium. The method comprises the following steps: a mobile terminal sends a registration request including a mobile phone number of a target user to a server. The server receives the registration request and sends the registration verification code to the mobile phone number of the target user. The mobile terminal receives a registration verification code for responding to the registration request, generates a user key pair using the registration verification code and the used mobile phone number, and sends a public key in the user key pair to the server. The server generates a user public key by using the mobile phone number of the target user and the registration verification code sent out, compares the user public key with the public key in the user key pair, and returns the comparison result to the mobile terminal. If the comparison result indicates that the public key in the userkey pair is consistent with the user public key, the mobile terminal determines that the user key pair for verifying the identity of the target user is successfully generated. With the technical solution of the present disclosure, it can be ensured that a user key pair is generated at a mobile terminal held by a target user.

Description

technical field [0001] The present disclosure relates to the technical field of communications, and in particular, to a key generation method, system, mobile terminal, server, and storage medium. Background technique [0002] With the development of mobile Internet technology and the advancement of smart mobile terminal applications, mobile terminals such as mobile phones have become indispensable smart devices for mobile office applications. network activity. In these Internet applications, user identity authentication is particularly important, and reliable user identity identification is usually implemented using a key-based digital certificate, which requires the user to hold a key for signature calculation. [0003] In the prior art, considering the portability of the mobile terminal, it cannot be easily connected to an external cryptographic device like a computer to ensure user identity and data security, and most mobile terminals do not have built-in and integrated ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/0866H04L9/3226
Inventor 宁红宙
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products