Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for distributing key

A key distribution and key technology, applied in the field of communication, can solve the problem of insecure key distribution from the security domain, and achieve the effect of improving security

Inactive Publication Date: 2010-06-09
ZTE CORP
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In consideration of the problem in the related art that the distribution of the key from the security domain is insecure due to the fact that the card issuer management platform is responsible for the transmission of the key data, the key data in the security domain can be obtained, and the present invention is proposed. The main purpose of the invention is to provide a key distribution method and system to solve the above-mentioned problems in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for distributing key
  • Method and system for distributing key
  • Method and system for distributing key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Functional Overview

[0030]In the related technology, since the card issuer management platform can obtain the sent security domain key data when it is responsible for the transmission of the key data, it will lead to the problem that the distribution of the application provider's secondary security domain key is not safe. Therefore, the present invention Provided is a key distribution method and system, which specifically includes: the card issuer management platform notifies the application provider of the corresponding secondary security domain to generate a public-private key pair including a public key and a private key in the smart card, and receives the secondary security domain The returned public key, and import the trusted root public key used for external authentication to the secondary security domain, and send the information and public key from the secondary security domain to the application provider management platform; the application provider managemen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for distributing a key. The method comprises the following steps that: a card issuer management platform informs a sub-security domain corresponding to an application provider of generating a public-private key pair including a public key and a private key in an intelligent card, receiving the public key returned from the sub-security domain, introducing a trusty root public key for external authentication into the sub-security domain and sending information of the sub-security domain and the public key to the application provider management platform; the application provider management platform receives the information of the sub-security domain and the public key from the card issuer management platform and selects the sub-security domain of the intelligent card via a service terminal according to the information of the sub-security domain and the public key; and the application provider management platform informs the sub-security domain of regenerating the public key and the private key, generates a sub-security domain certificate according to the regenerated public key returned from the sub-security domain, and completes distribution of the sub-security domain key by sending the sub-security domain certificate to the sub-security domain.

Description

technical field [0001] The present invention relates to the communication field, and in particular, to a key distribution method and system. Background technique [0002] In related technologies, near field communication technology (Near Field Communication, referred to as NFC) is a short-range wireless communication technology working at 13.56MHz, which consists of radio frequency identification (Radio Frequency Identification, referred to as RFID) technology and interconnection Technological convergence evolved. After integrating NFC technology, mobile communication terminals such as mobile phones can simulate non-contact IC cards for electronic payment related applications; in addition, to implement this solution on mobile communication terminals, NFC analog front-end chips and NFC antennas need to be added to the terminals. And use a smart card that supports electronic payments. [0003] After more than ten years of development, IC cards, especially non-contact IC card...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
CPCH04L9/083H04L9/08H04L2209/56H04L9/0877H04B5/02H04L2209/805H04L9/3263
Inventor 马景旺余万涛贾倩
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products