Unlock instant, AI-driven research and patent intelligence for your innovation.

SE-based key management method and device

A key management and key technology, applied in the field of information security, can solve the problems that data transmission is easy to be tracked, forged and tampered with, and the private key is easy to leak, so as to reduce the risk of data theft.

Inactive Publication Date: 2018-03-23
北京印天网真科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantages of the above-mentioned method for encrypting data in the prior art are: using software to encrypt data has certain security risks, it is easy to be tracked during data transmission and thus forged and tampered with, and the private key is easy to leak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SE-based key management method and device
  • SE-based key management method and device
  • SE-based key management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Embodiment 1 of the present invention provides an SE-based key management method, including: the SE issuer initializes the SE, the above-mentioned SE application party or the above-mentioned SE generates a symmetric key, and uses the MAC key pair through the above-mentioned SE issuer to The above-mentioned symmetric key is verified, and after the verification is passed, the above-mentioned SE and the above-mentioned SE application party store the above-mentioned symmetric key. By using the public key in the SE or the public key of the SE application party to encrypt the symmetric key, data security is enhanced. The above-mentioned MAC key includes a MAC key.

[0062] The above-mentioned SE, the secure element, can exist on a variety of hardware, including SIM cards, SD cards or mobile terminals. The SE has computing power, and it can complete the encryption and decryption process of asymmetric keys and symmetric keys, and can encrypt and decrypt passwords. Keys, encryp...

Embodiment 2

[0090] This embodiment provides an SE-based key management device such as Figure 5As shown, it may specifically include the following modules: SE, SE issuer and SE application party. The above-mentioned SE issuer is used to initialize the above-mentioned SE and generate the above-mentioned SE identity and MAC key; the SE application party or the above-mentioned SE is used to generate a symmetric key, and use the above-mentioned MAC key pair through the above-mentioned SE issuer The above-mentioned symmetric key is verified; further, the above-mentioned SE and the above-mentioned SE application party are also used to store the above-mentioned symmetric key after the above-mentioned symmetric key is verified.

[0091] The above-mentioned SE issuer is used to send the identity and the public key of the above-mentioned SE issuer to the above-mentioned SE; the above-mentioned SE is used to write the above-mentioned identity into the above-mentioned SE as the identity of the above-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present invention provide a SE-based key management method and device, including: the SE issuer initializes the SE, and generates the SE identity and MAC key; the SE application party or the SE generates a symmetric key, through which the SE issuer uses the MAC key to verify the symmetric key; after the symmetric key is verified, the SE and the SE application party verify the symmetric key storage. In order to realize the shortcomings of being easily tracked and forged and tampered in data transmission, and the private key is easy to leak, thereby reducing the risk of encrypted data leakage.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an SE-based key management method and device. Background technique [0002] With the development of computers, the security problems in the network are becoming more and more serious. In the transmission control protocol, the transmitted data is transmitted in plain text, so there are inherent security defects. An important means to solve this problem is data encryption. In modern network communication, people's security awareness is becoming stronger and stronger. The application of science is becoming more and more extensive. [0003] At present, encryption technology is the main security measure adopted by e-commerce, and it is the most commonly used security measure. It uses technical means to convert important data into garbled codes (encryption) and sends them, and then restores them with the same or different means after arriving at the destination (d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 孙贵成
Owner 北京印天网真科技有限公司