Unlock instant, AI-driven research and patent intelligence for your innovation.

Key storage method, key management method and device

A key storage and key technology, which is applied in security devices, secure communication devices, encoding/decoding devices, etc., can solve problems such as potential safety hazards, and achieve the effect of improving security and avoiding changes

Active Publication Date: 2017-09-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above method achieves the purpose of storing the terminal key by writing the terminal key in the TA code. This key storage method will cause terminals of the same model or batch to share only one key or one key pair , once the key is leaked, it will cause great security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key storage method, key management method and device
  • Key storage method, key management method and device
  • Key storage method, key management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0038] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0039] figure 1 is a flowchart of a key storage method provided by an embodiment of the present invention, such as figure 1 shown, including the follo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides a key storing method, a key managing method and apparatus which belong to terminal technologies. An example method includes generating a terminal root secret key. A first key digest of the terminal root secret key is generated. The terminal root secret key is stored in a first specified storage region of a terminal, the first specified storage region being a password protected region. The first key digest is stored in a second specified storage region in the terminal, the second specified storage region being a programmable hardware region with fusible features.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a key storage method, key management method and device. Background technique [0002] With the continuous development of terminal technology, the security and confidentiality of terminal systems are getting higher and higher. In order to improve the security of data transmission, when the terminal performs data interaction with a third-party application, the third-party application needs to obtain the terminal key, so that the terminal key can be used to encrypt or decrypt the transmitted data. Therefore, how to improve the security of key storage has become one of the important research directions to improve the security of data transmission. [0003] At present, the key storage method can be as follows: the terminal key provider writes the key of the terminal in the code of TA (Trusted Application, trusted application) before the terminal leaves the factory; wherein,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/088H04L9/0894G09C1/00H04L9/3226H04L9/3239H04L63/06H04L2209/80H04W12/041H04W12/0433H04L9/0825H04L9/0861H04L63/0428
Inventor 卢强
Owner TENCENT TECH (SHENZHEN) CO LTD