Secret key remote acquisition method and device

A technology of remote acquisition and key, applied in the field of communication, can solve the problem of cumbersome key injection

Active Publication Date: 2017-05-31
PAX COMP TECH SHENZHEN
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a remote key acquisition method and device for the cumbersome process of injecting keys into sales terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key remote acquisition method and device
  • Secret key remote acquisition method and device
  • Secret key remote acquisition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0065] figure 1 It is an application environment diagram of the key remote acquisition method in an embodiment. refer to figure 1 , the key remote acquisition method is applied to the key remote acquisition system. The key remote acquisition system includes a terminal 110 and a server 120, wherein the sales terminal 110 is connected to the remote injection server 120 through a network. The sales terminal 110 may be a mobile terminal for obtaining a key, and specifically the mobile terminal may be a POS terminal for obtaining a key.

[0066] figure 2 for an example figure 1 A schematic diagra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secret key remote acquisition method and device. The method includes the steps: detecting injected secret key acquisition instructions; generating temporary secret key pairs when the injected secret key acquisition instructions are detected; acquiring private keys saved in the locality in the random secret key pairs, and enabling public key signatures in the temporary secret key pairs to generate temporary secret key signatures according to private key pairs in the random secret key pairs; acquiring first identity authentication credentials; transmitting the temporary secret key signatures and the first identity authentication credentials to a random injection server; receiving injected secret key cipher text signatures and second identity authentication credentials returned by the random injection server according to the temporary secret key signatures and the first identity authentication credentials; acquiring and saving injection secret keys according to the injected secret key cipher text signatures and the second identity authentication credentials. According to the secret key remote acquisition method and device, the steps acquiring the secret keys to a fixed place are avoided, acquiring processes of the secret keys are simplified, consumed time for acquiring the secret keys is shortened, and the acquisition efficiency of the secret keys is improved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a method and device for remotely acquiring keys. Background technique [0002] With the rapid development of communication technology, more and more important information is disseminated through the network. However, due to the consideration of information security in the network, the transmission of information in many business fields does not depend on the network, and relatively primitive methods are still used. [0003] However, in the field of payment technology, a sales terminal (POS terminal, Point of sale) is one of the most commonly used hardware devices in a financial payment system, and the sales terminal needs to encrypt transaction sensitive information to ensure transaction security. When injecting the key into the sales terminal, it is necessary to transport the sales terminal to a fixed safe place to inject the key. In this way, the process of inje...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14H04L9/32
CPCH04L9/0819H04L9/083H04L9/14H04L9/3247H04L9/3268H04L9/0861H04L9/3263H04L9/0825G06F21/606G06F21/33H04L9/0866
Inventor 刘传杨勇泉
Owner PAX COMP TECH SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products