Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of terminal security and management method, applied in key distribution, can solve problems such as increased hardware cost, U-key loss, user troubles, etc., to ensure legality, prevent illegal tampering and information camouflage, and improve system security.
Inactive Publication Date: 2016-03-16
CHINA SMARTCITY TECH
View PDF4 Cites 31 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0011] During the application and implementation of CPK, the user needs to deploy the CPK key management system, and deploy different versions of the key management system according to different business requirements. The key management system is deplo
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0042] [Embodiment 1] Customer Zhang San pays customer Li Si online.
[0043] Such as figure 1 As shown, the payer Zhang San wants to pay the payee Li Si online, and both use the mobile phone e-wallet client to operate. The soft key system is installed on the Zhang San mobile phone, Li Si mobile phone, and the background management system. run. Li Si enters the amount on the mobile phone, and the e-wallet client generates a QR code with the payee information and payment information.
[0044] Zhang San scans the QR code, and the soft key system in Zhang San’s mobile phone selects a random number R, uses Zhang San’s private key to sign the random number R, and signs the recipient information, payment information, payer information, and signature The information is sent to the background management system together.
[0045] After the background management system receives the above information, the soft key system verifies the signature information: that is, the public key is mapped ou...
Embodiment 2
[0046] [Embodiment 2] Customer Zhang San pays customer Li Si offline.
[0047] Such as figure 2 As shown, the payer Zhang San wants to pay the payee Li Si offline, and both use the mobile phone electronic wallet client to operate, and the soft key system is installed and running on both Zhang San mobile phone and Li Si mobile phone. Li Si enters the amount on the mobile phone, the soft key system selects a random number R, uses the private key to sign the random number R, and generates a QR code with transaction information, Li Si ID information, and signature information.
[0048] Zhang San scans the QR code, the soft key system uses the Li Si ID and the business subdomain ID to map out the public key, and uses the public key to verify the signature information of Li Si. If the verification fails, the process ends.
[0049] If the verification is successful, Zhang San’s mobile client asks whether he agrees to the payment operation. If Zhang San refuses, the process ends. If Zhang...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses a novel terminal safety soft secret key management method. According to the method, information of two transaction parties are selected by a soft secret key system as identification ID, public and private key pairs are formed through mapping on the basis of business subdomain identification; for online payment, a two-dimensional code is generated at a receiving party; after the two-dimensional code is scanned by a payment party, signature is carried out by utilizing a private key pair randomized number, and information is sent to a background management system; signature verification is realized by the background management system through utilizing public key pair signature information; if signature verification succeeds, transaction is processed; for offline payment, signature is carried out by the receiving party through utilizing the private key pair randomized number, and a two-dimensional code is generated; the two-dimensional code is scanned by the payment party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is carried out by the payment party according to transaction information; signature is carried out by the payment party through utilizing the private key pair randomized number, a two-dimensional code is generated; the two-dimensional code is scanned by the receiving party, and signature verification is realized through public key pair signature information; if signature verification succeeds, payment is successfully realized for the receiving party. Through the method, system safety is not only improved, system disposition cost is further reduced, transaction validness is fully guaranteed, and invalid information tampering and information steganography can be avoided.
Description
Technical field [0001] The invention relates to the field of key management, in particular to a terminal soft key management method based on key authentication. Background technique [0002] With the popularization of the Internet, people communicate more and more through the Internet, and the corresponding business activities through the Internet, namely e-commerce, have also been extensively developed. E-commerce provides a golden opportunity for Chinese enterprises to explore international and domestic markets and make good use of various resources at home and abroad. E-commerce truly embodies the advantages of equal competition, high efficiency, low cost, and high quality for enterprises, and enables enterprises to grasp business opportunities and stand out in the fierce market competition. Developed countries have regarded e-commerce as the focus of national economic growth in the 21st century, and relevant departments in my country are also vigorously promoting the develop...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.