Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management method, device and system

A key management and key technology, applied in the computer field, can solve the problems of key unscrupulous personnel cracking, security risks of vehicle terminal and server data transmission, etc., to avoid key leakage, improve security, and reduce harm.

Active Publication Date: 2017-05-10
NEUSOFT CORP
View PDF5 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of communication between the vehicle-mounted terminal and the server, the key is fixed, and the key is easily cracked by illegal personnel. There are certain security risks in the data transmission between the vehicle-mounted terminal and the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method, device and system
  • Key management method, device and system
  • Key management method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0079] The key management method, device and key management system of the embodiments of the present invention are described below with reference to the accompanying drawings.

[0080] figure 1 is a flowchart of a key management method according to an embodiment of the present invention. It should be noted that the key management method in the embodiment of the present invention is applied to a server. Such as figure 1 As shown, the key management method may include the following steps:

[0081] S11. Receive an activation mes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a key management method, device and system. The method includes the following steps that: an activation message sent by a vehicle-mounted terminal is received; a first key corresponding to a first key identifier in the activation message is obtained, a first encrypted message authentication code in the activation message is decrypted through the first key; after the decrypted message authentication code is successfully verified, a second key is generated, and the second key is associated with the first key identifier; a vehicle-mounted terminal identifier in the activation message is obtained, and the association relations of the vehicle-mounted terminal identifier, the second key and the first key are saved; and an activation completion message carrying the second key is sent to the vehicle-mounted terminal. According to the method, key update is realized during a key activation process, a possibility of key leakage in a period from a time point when an initial key is generated to a time point when the initial key is injected into a vehicle-mounted terminal due to poor management can be eliminated, hazards caused by the leakage of the initial key can be decreased, and the security of the transmission of the Internet of Vehicles can be improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a key management method, device and system. Background technique [0002] With the development of electronic technology, the functions of vehicle-mounted terminals are becoming more and more perfect. During the process of using the vehicle, the vehicle-mounted terminal can be used to access the Internet and obtain the required information from the Internet. Get the navigation route in , and drive according to the navigation route. [0003] In order to ensure the transmission security requirements of the Internet of Vehicles, in related technologies, the server provides a unique key for each vehicle-mounted terminal, and when the vehicle-mounted terminal activates the key, if the key in the vehicle-mounted terminal is monitored and stored in the server When the keys of the vehicle-mounted terminal match, the activation of the vehicle-mounted terminal is completed, and, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/041H04W12/0433
CPCH04W12/04
Inventor 刘玉涛陈静相
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products