Unlock instant, AI-driven research and patent intelligence for your innovation.

Test method and device for intelligent secrete key equipment

A smart key device and the tested technology are applied in secure communication devices and key distribution, which can solve problems such as difficulty in validity testing

Active Publication Date: 2017-02-15
FEITIAN TECHNOLOGIES
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes it difficult to test the effectiveness of the function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Test method and device for intelligent secrete key equipment
  • Test method and device for intelligent secrete key equipment
  • Test method and device for intelligent secrete key equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Embodiment 1 of the present invention provides a method for testing a smart key device, specifically taking the process of importing a key as an example for illustration, as shown in figure 1 shown, including:

[0066] Step 100: The device derives the first public key from the smart key device under test according to the preset parameters, if not derived, the test is terminated and ends;

[0067] Specifically, in this embodiment, the device derives the first public key by sending a first instruction (that is, the ExportPublicKey instruction) to the smart key device under test, and the data field of the first instruction (ExportPublicKey) instruction includes: application ID, container ID , the key bit length of the first public key; step 100 is specifically: generate a first instruction according to the preset application ID, the preset container ID, and the first public key length, and send it to the tested smart key device , the smart key device under test parses the...

Embodiment 2

[0089] Embodiment 2 of the present invention provides a method for testing a smart key device, specifically taking the process of deriving a key as an example for illustration, as shown in figure 2 shown, including:

[0090] Step 201: Send the third public key to the tested smart key device, control the tested smart key device to generate and export the third session key ciphertext and obtain the third session key ID, such as the tested smart key If the device does not output the third session key ciphertext or the third session key ID, the test is terminated and ends;

[0091] In this embodiment, before step 201, it also includes: the device derives the third public key from the auxiliary smart key device that has passed the test;

[0092] Preferably, in this embodiment, the third public key used in step 201 corresponds to the third private key, preferably, the third public key is an RSA public key or an SM2 public key;

[0093] Specifically, in this embodiment, the device...

Embodiment 3

[0107] Embodiment 3 of the present invention provides a method for testing smart key devices, wherein the first smart key device and the second smart key device conduct mutual testing, and the specific process is as follows image 3 shown, including:

[0108]Step 300: the device derives the second public key from the second smart key device according to the second preset parameter, if not derived, the test is terminated and ends;

[0109] Specifically, in this embodiment, the device derives the second public key by sending a first instruction (that is, the ExportPublicKey instruction) to the second smart key device, and the data field of the first instruction (ExportPublicKey) instruction includes: application ID, container ID , the key bit length of the second public key; Step 300 is specifically: generate a first instruction according to the preset application ID, the preset container ID, and the length of the second public key, and send it to the second smart key device , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a test method and device for intelligent secrete key equipment. The method comprises that a first public key is led out of the tested intelligent secrete key equipment according to a preset parameter; the first public key is used to encrypt a preset first session key to obtain a first session key ciphertext; the first session key ciphertext is guided into the tested intelligent secrete key equipment according to the preset parameter, and a first session key ID returned by the tested intelligent secret key equipment is received; a second public key and the first session key ID are used to guide a second session key ciphertext from the tested intelligent secret key equipment; and a second secrete key is used to decrypt the second session key ciphertext, a decryption result is compared with the first session key, if the decryption result is consistent with the first session key, test is passed, and otherwise, test is not passed, and test is ended. According to technical schemes of the invention, whether a sample of the intelligent secrete key equipment has a session key negotiation function can be determined accurately and efficiently, and mutual operation is realized.

Description

technical field [0001] The invention relates to the field of electronic products, in particular to a method and device for testing smart key equipment. Background technique [0002] In the past 10 years, with the rapid development of my country's computer technology and information construction, the application scope and quantity of smart key devices in various industries have increased dramatically. In the application fields of finance, transportation, municipal administration, telecommunications and government departments, smart key devices have played an important role, and have played an inestimable role in the safe development of applications in these industries. [0003] At present, there are a variety of smart key device products, different implementation methods, and different considerations in product functions and other aspects. Negotiating session keys is one of the main functions required by smart key devices in application fields. The session key negotiation i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L9/08
CPCH04L9/0838H04L43/08
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES