Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
An offline key injection system and method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
An offline key injection system technology, applied in the field of offline key injection system, can solve the problems of mutual authentication between equipment and modules
Active Publication Date: 2019-01-22
江苏先安科技有限公司
View PDF9 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0022] In view of the above technical problems, the present invention proposes an offline key injection system and method, which is used to establish an initial trust relationship based on the public key system between two offline devices or modules, and is used to solve problems between devices and modules that cannot be connected to the Internet. The problem of mutual authentication
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0119] Example 1, the offline import process is the same as figure 2 As shown, it specifically includes the following steps:
[0120] Step 1, the key injection gun obtains the identification code ID(b) of module B;
[0121] Step 2, the key injection gun obtains the access address of the central key store;
[0122] Step 3, the key injection gun sends ID(b) to the central key store;
[0123] Step 4: The central key store searches for the public key PUBK(b) of module B according to the ID(b), and uses its own private key PRIVK(c) to sign PUBK(b), and obtains the result S(c)=sign (PUBK(b), PRIVK(c));
[0124] Step 5, the central key store returns R=PUBK(b)+S(c) to the key injection gun;
[0125] Step 6, the key injection gun imports R to device A;
[0126] Step 7. Device A verifies the signature S(c) of the central key store, and if the signature matches, imports PUBK(b); otherwise, refuses to import.
Embodiment 2
[0127] Example 2, such as image 3 As shown, the process of obtaining random numbers from device A can also be added in Embodiment 1 to enhance the anti-retransmission capability of the entire system. The second process is as follows image 3 .
Embodiment 3
[0128] Example 3, such as Figure 4 As shown, it is also possible to add the device A public key + private key signature information in Embodiment 2, so as to realize the management of the device key pairing situation (device X and module Y have been paired) by the central key storehouse.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses an offline key injection system. The offline key injection system comprises a key injection gun and a central key store; the key injection gun comprises an identification code reader, a display module, a keyboard module, a connection transmission module and a network communication module; and public and private keys of central distributors and public keys of managed equipment or modules are stored in the central key store. The invention further discloses an offline key injection method. Due to the method, reliable import of the public keys of the equipment in a non-reliable environment can be ensured. In the whole process, the key gun is only used as a carrier for interacting data with the central key store; the key gun itself does not participate in generation and modification of data contents; therefore, equipment maintenance / replacement place and personal requirements are greatly simplified.
Description
technical field [0001] The invention belongs to the technical field of security authentication, and in particular relates to an off-line key injection system and method. Background technique [0002] In the industrial field, a certain device A must be started and operated under effective supervision. The detachable module B on the device A acts as this supervision function. Module B uses GPS / Beidou positioning, or short-wave reception, etc. When the device is detected When A's current operating environment meets the operating expectations, device A is allowed to start, otherwise, module B will prevent device A from starting by cutting off the circuit / stop responding, etc. Obviously, one-way or two-way identification and authentication conditions should be met between device A and module B to avoid forgery or tampering of module B commands / responses to bypass the supervision mechanism. [0003] When leaving the factory, the trust relationship between the two can be initializ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.