Method for obtaining root key and server

A root key and server technology, applied in the electronic field, can solve problems such as terminal information security threats

Inactive Publication Date: 2017-10-20
SHENZHEN GIONEE COMM EQUIP
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Before the terminal needs to use the functions or services provided by the security chip, it needs to obtain the root key of the security chip from the server of the security chip manufacturer in advance. Since the root key of the security chip is the root If it is leaked during transmission to the terminal, it will pose a serious threat to the information security of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining root key and server
  • Method for obtaining root key and server
  • Method for obtaining root key and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0050] It should also be understood that the terminology used i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for obtaining a root key and a server. The method comprises the steps of obtaining a unique identifier of a security chip carried by root key obtaining request information, wherein the root key obtaining request information is sent by a terminal; encrypting the unique identifier through adoption of a first encryption key and sending the encrypted unique identifier to a service provider server corresponding to the security chip; receiving the encrypted root key returned by the service provider server; decrypting the encrypted root key through adoption of a first decryption key, thereby obtaining the root key corresponding to the unique identifier; encrypting the root key through adoption of a second encryption key and sending the encrypted root key to the terminal according to an identifier of the terminal carried by the root key obtaining request information; and decrypting the encrypted root key by the terminal through adoption of a second decryption key, thereby obtaining the root key. According to the embodiment of the invention, the risk of leaking the root key in a transmission process can be effectively reduced, the transmission security of the root key is improved, and the security of the information in the terminal is improved.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and server for obtaining a root key. Background technique [0002] At present, terminal information security has drawn more and more attention from users and the industry, and the key to the current security strategy is encryption technology. An encryption technology provided by the prior art relies on a hardware platform in the terminal, for example, a security chip. The terminal can encrypt the data to be encrypted according to the root key (Root Key) of the security chip and the preset encryption algorithm. Among them, the root key is derived from the key of the security chip, and is used for the key of the first layer of the hierarchical key. [0003] Before the terminal needs to use the functions or services provided by the security chip, it needs to obtain the root key of the security chip from the server of the security chip manufacturer in advance. Since th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W12/04
CPCH04L9/0836H04L9/0822H04W12/04
Inventor 刘岩
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products