Method for activating a third party application safely, a third party server, terminal and system

A server and terminal technology, applied to terminals that securely activate third-party applications, systems that securely activate third-party applications, activate third-party applications, securely activate third-party applications, third-party servers, and securely activate third-party applications. It can solve the problems of privatization, the inefficiency of preset multiple card writing, and the inability of the server to complete the security domain key, so as to achieve the effect of easy management.

Active Publication Date: 2009-02-25
CHINA MOBILE COMM GRP CO LTD +1
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The first purpose of the present invention is to provide a method for securely activating third-party applications to solve the problems of low efficiency and high cost of the existing preset multi-write card and the inability of the existing over-the-air download method to solve the problem of third-party security domain encryption. To solve the problem of key privatization, realize the key negotiation between the third party and the terminal, and safely download the third-party application to the terminal
[0021] The second purpose of the present invention is to provide a third-party server, which is used to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for activating a third party application safely, a third party server, terminal and system
  • Method for activating a third party application safely, a third party server, terminal and system
  • Method for activating a third party application safely, a third party server, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] see figure 2 , is a flow chart of Embodiment 1 of a method for securely activating a third-party application in the present invention. Such as figure 2 As shown, this embodiment includes:

[0059] Step 1: the terminal and the third-party server obtain the initial security domain key of the third-party application;

[0060] Step 2: The terminal triggers a security domain key modification request, and negotiates with the third-party server to generate a new security domain key through the same encryption algorithm containing at least two random numbers, and updates the initial security domain key;

[0061] Step 3: The terminal encrypts the associated user information for activating the third-party application with the updated security domain key and sends it to the third-party server;

[0062] Step 4: the third-party server decrypts the associated user information with the updated security domain key, and sets the association relationship between the terminal and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for safely activating the application of a third party, a third-party server, a terminal and a system. The method comprises the following steps: an initial security domain key applied by a third party is acquired by the terminal and the third-party server; a request for modifying the security domain key is triggered by the terminal, and a new security domain key is generated through negotiation with the same cryptographic algorithm with the third-party server, so as to update the initial security domain key; the related user information for activating the application of the third party is transmitted to the third-party server by the terminal; the application key of the terminal corresponding to the application of the third party is set by the third-party server according to the related user information; the updated security domain key is used for encrypting the application key of the third-party application by the third-party server and transmitting the application key to the terminal; the application key of the third-party application is acquired by the terminal through the decryption. The embodiments of the invention solve the problems that the current preset many-time writing card has lower efficiency and high cost, and the over-the-air downloading mode can not solve the problem of the privatization of the third-party security domain key.

Description

technical field [0001] The present invention relates to a method for safely activating a third-party application, especially a method for safely activating a third-party application through a network; the present invention also relates to a third-party server, especially a key negotiation method with a terminal , a server for securely activating a third-party application; the present invention relates to a terminal, especially a terminal for securely activating a third-party application by communicating with a third-party server; the present invention also relates to a system for securely activating a third-party application, especially A system for securely activating third-party applications through key negotiation between a third-party server and a terminal belongs to the field of communication technology. Background technique [0002] The mobile operator divides multiple security domain spaces on the issued telecommunication card device or the pluggable memory card on th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 李征游峰赵波锋郭小明范金桥
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products