Encryption key acquisition method and system
A technology of encryption key and acquisition method, which is applied in the field of encryption key acquisition method and system, can solve problems such as leakage of signature private key, and achieve the effect of protecting signature private key
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] This embodiment provides an encryption key acquisition method.
[0028] figure 1 A flowchart of an encryption key acquisition method provided in this embodiment, such as figure 1 As shown, the encryption key acquisition method in this embodiment mainly includes the following steps S101 to S108.
[0029] S101. The terminal generates and saves a public signature key and a private signature key of the terminal based on a first security algorithm, and generates a temporary public key and a temporary private key based on a second security algorithm.
[0030] Among them, in this embodiment, the terminal is a terminal device capable of asymmetric encryption and decryption, for example, it can be a terminal device such as USBKEY, smart card, mobile phone, wearable device, etc. The first security algorithm and the second security algorithm are both in the terminal The stored preset asymmetric algorithm is used to generate a public-private key pair. The signature public key and...
Embodiment 2
[0063] This embodiment provides an encryption key acquisition system, which can be used to implement the encryption key acquisition method described in Embodiment 1.
[0064] figure 2 A schematic diagram of the architecture of an encryption key acquisition system provided in this embodiment, as shown in figure 2 As shown, the system mainly includes a terminal 201 and a server 202 .
[0065] In this embodiment, the terminal 201 is configured to generate and store the signature public key and the signature private key based on the first security algorithm, generate and store the temporary public key and the temporary private key based on the second security algorithm, and send the first data packet to To the server 202, wherein, the first data packet includes at least: a signature public key and a temporary public key; the server 202 is used to receive the first data packet, obtain the signature public key and the temporary public key, and store the signature public key; base...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

