Software secret key updating method and device

A software and key technology, which is applied to secure communication devices and key distribution, can solve problems such as updating software keys, and achieve the effect of preventing the problem of being unable to update

Active Publication Date: 2014-02-19
HUAWEI TECH CO LTD
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In view of this, the embodiment of the present invention provides a software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software secret key updating method and device
  • Software secret key updating method and device
  • Software secret key updating method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0029] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined arbitrarily with each other.

[0030] At present, the existing TrE technology has relatively mature and reliable solutions for managing and storing sensitive information. Due to the existence of the trust chain in the trusted environment, unauthorized access and modification of the software in the trusted client device is not allowed, and the legality ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided in an embodiment of the present invention are a software key updating method and device. A trusted client device receives key information and verification information corresponding to the software and transmitted by a server, the key information containing a to-be-updated first software public key signature and a new second software public key signature, and the verification information containing software verification information; if a valid first software public key signature corresponding to the software and stored in the trusted client device is consistent with the received first software public key signature, then checking whether the software verification information is valid; and if the software verification information is valid, then updating the valid first software public key signature corresponding to the software and stored in the trusted client device as a second software public key signature. With the above solution, the present invention can remotely update a software key signature on a trusted client device, thus preventing the problem of being unable to update an invalid key.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a software key updating method and device. Background technique [0002] With the development of mobile Internet, terminals and network devices have become an indispensable part of social life, and user information security and privacy protection are getting more and more attention. Moreover, the flat wireless network architecture, the full Internet Protocol (IP) of mobile networks, the intelligentization of terminals, and the miniaturization of the physical form of network equipment such as base stations have made terminals or network equipment vulnerable to more and more security threats. . [0003] In response to this threat to the security of the software and hardware of the terminal or network equipment itself, many terminals or network equipment require a certain trusted environment in design to verify the identity of the terminal or network equipment itself and wheth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0891H04L9/3247
Inventor 崔洋赵兴军汪慧君
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products