Unlock instant, AI-driven research and patent intelligence for your innovation.

A management method and system, a terminal, a secret key management system and a terminal manufacturer system

A technology of a key management system and a management method, which is applied in the field of application installation management, can solve problems such as terminal inability to apply legality verification, and achieve the effect of enhancing user experience

Inactive Publication Date: 2017-05-03
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a management method and system, a terminal, a key management system and a terminal manufacturer system to solve the problem that the existing terminal cannot verify the validity of the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A management method and system, a terminal, a secret key management system and a terminal manufacturer system
  • A management method and system, a terminal, a secret key management system and a terminal manufacturer system
  • A management method and system, a terminal, a secret key management system and a terminal manufacturer system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0059] figure 1 It is a schematic structural diagram of the management system provided by the first embodiment of the present invention, consisting of figure 1 It can be seen that in this embodiment, the management system provided by the present invention includes: a key management system 1, a terminal manufacturer system 2 and a terminal 3, wherein,

[0060] The key management system 1 is used to receive and store the public key of the application key uploaded by the application developer, and feed back the application identification corresponding to the application to the application developer;

[0061] The terminal manufacturer system 2 is used to send a key download request to the key management system 1, receive the public key of the application key returned by the key management system 1, and write it into the key partition of the terminal 3;

[0062] Terminal 3 is used to obtain the application identification of the application to be installed, and search for the publi...

no. 2 example

[0083] figure 2 It is a flow chart of the management method provided by the second embodiment of the present invention, consisting of figure 2 It can be seen that in this embodiment, the management method provided by the present invention includes the following steps:

[0084] S201: The key management system receives and stores the public key of the application key uploaded by the application developer, and feeds back the application identification corresponding to the application to the application developer;

[0085] S202: The terminal manufacturer system sends a key download request to the key management system, receives the public key of the application key returned by the key management system, and writes it into the key partition of the terminal;

[0086] S203: The terminal obtains the application identification of the application to be installed, and searches for the public key of the application key corresponding to the application identification in the key partitio...

no. 3 example

[0108]The purpose of this embodiment is to establish a new mobile phone application use standard mode, and establish a third-party key management organization database, that is, the key management system provided by the present invention. After the application developer uploads the key to the database, the application can be published above the network. Only the mobile phone manufacturer, that is, the terminal manufacturer system provided by the present invention, can have the download access and download authority of the database through the formal application channel, and save the key database locally in the mobile phone. With the development of technology, the storage space of the mobile phone has been reduced It is no longer a limitation issue. When users install applications downloaded from the Internet, they query the database key of the mobile phone's security partition to verify the signature. It can be installed successfully and can be queried according to the release...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a management method and system, a terminal, a secret key management system and a terminal manufacturer system. The method comprises the following steps: the secret key management system receives and stores a public secret key of an application key uploaded by an application developer and feeds back an application identifier corresponding to the application to the application developpper; the terminal manufacturer system sends a secret key download request to the secret key management system, receives the public secret key of the application secret key returned by the secret key management system and writes the public secret key into a secret key subarea; and the terminal obtains the application identifier of the application to be installed, searches the public secret key of the application secret key corresponding to the application identifier in the secret key subarea, performs signature verification on a private key of the application to be installed and manages the installation of the application to be installed according to the verification result. Through enforcement of the present invention, when the application is installed, the terminal performs signature verification on the private key of the application based on the public secret key of the stored application secret key of the legitimate application, and manages the installation of the application according to the verification result, which solves the problem that the existing terminals can not verify legitimacy of the verification.

Description

technical field [0001] The invention relates to the management field of application installation, in particular to a management method and system, a terminal, a key management system and a terminal manufacturer system. Background technique [0002] At present, the Android system platform is the most popular mobile phone platform for users. As all open source codes, Android platform applications, application developers can develop at will, and can download network applications to decompile and modify the internal source code before publishing. After some application developers modify and add Trojan horse programs to some popular applications, the installation of such applications by users will result in deductions of fees and data traffic after downloading and installing. [0003] At present, application software is downloaded from various websites, and users cannot distinguish which ones are released by formal organizations and which ones are pirated applications that have b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/06
CPCH04L9/32H04L9/30H04L9/08H04L63/06
Inventor 李楠章强
Owner ZTE CORP