SE-based key management method and device
A key management and key technology, applied in the field of information security, can solve the problems that data transmission is easy to be tracked, forged and tampered with, and the private key is easy to leak, so as to reduce the risk of data theft.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] Embodiment 1 of the present invention provides an SE-based key management method, including: the SE issuer initializes the SE, the above-mentioned SE application party or the above-mentioned SE generates a symmetric key, and uses the MAC key pair through the above-mentioned SE issuer to The above-mentioned symmetric key is verified, and after the verification is passed, the above-mentioned SE and the above-mentioned SE application party store the above-mentioned symmetric key. By using the public key in the SE or the public key of the SE application party to encrypt the symmetric key, data security is enhanced. The above-mentioned MAC key includes a MAC key.
[0062] The above-mentioned SE, the secure element, can exist on a variety of hardware, including SIM cards, SD cards or mobile terminals. The SE has computing power, and it can complete the encryption and decryption process of asymmetric keys and symmetric keys, and can encrypt and decrypt passwords. Keys, encryp...
Embodiment 2
[0090] This embodiment provides an SE-based key management device such as Figure 5As shown, it may specifically include the following modules: SE, SE issuer and SE application party. The above-mentioned SE issuer is used to initialize the above-mentioned SE and generate the above-mentioned SE identity and MAC key; the SE application party or the above-mentioned SE is used to generate a symmetric key, and use the above-mentioned MAC key pair through the above-mentioned SE issuer The above-mentioned symmetric key is verified; further, the above-mentioned SE and the above-mentioned SE application party are also used to store the above-mentioned symmetric key after the above-mentioned symmetric key is verified.
[0091] The above-mentioned SE issuer is used to send the identity and the public key of the above-mentioned SE issuer to the above-mentioned SE; the above-mentioned SE is used to write the above-mentioned identity into the above-mentioned SE as the identity of the above-...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


