Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting key file

A key file and key technology, applied in the field of key file protection methods and systems, can solve the problems of inability to satisfy security, low security, etc., and achieve the effects of increasing costs, preventing economic losses, and improving security

Active Publication Date: 2010-11-24
ZTE CORP
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it needs to use a third-party platform independent of the SIM card manufacturer and terminal manufacturer, which uses additional resources, and the security of this method of sending applications through the air interface is low, which cannot meet the requirements for security. Requirements for more demanding key files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting key file
  • Method and system for protecting key file
  • Method and system for protecting key file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The basic idea of ​​the present invention is: use the encryption algorithm to encrypt the generated key, and generate a key file; digitally sign the encrypted key, and generate a digital certificate file; the terminal, according to the key file and the digital certificate file, Use the pre-saved dynamic link library to perform digital signature authentication and manufacturer code verification; when the digital signature authentication is successful and the manufacturer code verification is passed, the decryption password of the key is obtained.

[0032] The RSA encryption algorithm was developed by Ron Rivest, Adi Shamirh, and LenAdleman in 1977. The RSA encryption algorithm is named after the development of the three of them. The RSA encryption algorithm is currently the most influential public key encryption algorithm. It can resist until now. All password attacks known so far.

[0033] The present invention will be further described in detail below with reference to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting a key file, which comprises the following steps of: encrypting a generated key by using an encryption algorithm, and generating the key file; performing digital signature on the encrypted key, and generating a digital certificate file; performing digital signature authentication and manufacturer code check by a terminal according to the key file and the digital certificate file by using a pre-stored dynamic link library; and when the digital signature authentication and the manufacturer code check are successful, acquiring a decryption code of the key. The invention also provides a system for protecting the key file. According to the technical scheme of the invention, the divulgence of the key file is effectively prevented.

Description

technical field [0001] The present invention relates to wireless access terminal technology in the field of mobile communication, in particular to a method and system for protecting a key file. Background technique [0002] With the issuance of domestic third-generation mobile communication technology (3G, 3rd-generation) licenses and changes in the business areas of mobile operators, the wireless fixed-line terminal business has become a new field for various mobile operators to expand their own business, and mobile operators have begun Increase efforts to seize the wireless fixed-line terminal market. Due to the particularity of wireless fixed-line terminal services, mobile operators usually adopt preferential communication tariff policies and machine card authentication methods to prevent tariffs from being stolen and applied to other business fields. "Technical Specifications for SIM Cards for Mobile Public Telephones" describes in detail the principle, method flow, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/041H04W12/10
Inventor 杨淑娟范雪峰李新宇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products