A management method and system, a terminal, a secret key management system and a terminal manufacturer system
A technology of a key management system and a management method, which is applied in the field of application installation management, can solve problems such as terminal inability to apply legality verification, and achieve the effect of enhancing user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0059] figure 1 It is a schematic structural diagram of the management system provided by the first embodiment of the present invention, consisting of figure 1 It can be seen that in this embodiment, the management system provided by the present invention includes: a key management system 1, a terminal manufacturer system 2 and a terminal 3, wherein,
[0060] The key management system 1 is used to receive and store the public key of the application key uploaded by the application developer, and feed back the application identification corresponding to the application to the application developer;
[0061] The terminal manufacturer system 2 is used to send a key download request to the key management system 1, receive the public key of the application key returned by the key management system 1, and write it into the key partition of the terminal 3;
[0062] Terminal 3 is used to obtain the application identification of the application to be installed, and search for the publi...
no. 2 example
[0083] figure 2 It is a flow chart of the management method provided by the second embodiment of the present invention, consisting of figure 2 It can be seen that in this embodiment, the management method provided by the present invention includes the following steps:
[0084] S201: The key management system receives and stores the public key of the application key uploaded by the application developer, and feeds back the application identification corresponding to the application to the application developer;
[0085] S202: The terminal manufacturer system sends a key download request to the key management system, receives the public key of the application key returned by the key management system, and writes it into the key partition of the terminal;
[0086] S203: The terminal obtains the application identification of the application to be installed, and searches for the public key of the application key corresponding to the application identification in the key partitio...
no. 3 example
[0108]The purpose of this embodiment is to establish a new mobile phone application use standard mode, and establish a third-party key management organization database, that is, the key management system provided by the present invention. After the application developer uploads the key to the database, the application can be published above the network. Only the mobile phone manufacturer, that is, the terminal manufacturer system provided by the present invention, can have the download access and download authority of the database through the formal application channel, and save the key database locally in the mobile phone. With the development of technology, the storage space of the mobile phone has been reduced It is no longer a limitation issue. When users install applications downloaded from the Internet, they query the database key of the mobile phone's security partition to verify the signature. It can be installed successfully and can be queried according to the release...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


