Method and device for key storage and device identity authentication
A key storage and session key technology, applied in the field of information security, can solve problems such as increasing system costs, and achieve the effect of reducing the amount of calculation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] figure 2 A flow chart of a key storage method according to an embodiment of the present invention is shown, and the method is used in a server. according to figure 2 As shown, the method includes the following steps:
[0033] S101: Import the first encryption key into the security chip. This method requires an encryption key, and according to the security chip national secret standard, the encryption key must be generated externally and safely imported. Unless it specifically refers to the public key or private key of the encryption key, the encryption key in this application refers to the encryption key pair, including the public key and the private key.
[0034] S102: Deriving the public key of the first encryption key. According to the security chip national secret standard, only the public key of the encryption key can be exported, and the private key cannot be exported.
[0035] S103: Using the public key of the first encryption key to generate a first sessi...
Embodiment 2
[0042] image 3 A flow chart of another key storage method according to an embodiment of the present invention is shown, and the method is used for a server. Figure 4 A schematic diagram of the key storage method is shown.
[0043] according to image 3 As shown, the method includes the following steps:
[0044] S201: Control the security chip to internally generate and derive the first signature key.
[0045] Such as Figure 4 As shown, the control generates the first signature key P1 (pu1, pr1) inside the security chip, and pu1 and pr1 are the public key and private key of the first signature key P1 (pu1, pr1) respectively.
[0046] S202: Generate a second session key inside the security chip by using the first signature key, and derive a second session key ciphertext and a second session key handle.
[0047] After the above-mentioned first signature key P1 (pu1, pr1) is generated inside the security chip, the security chip can be directly controlled to use the first s...
Embodiment 3
[0069] Figure 5 It shows a flow chart of a device identity authentication method according to an embodiment of the present invention, the method is used in a server, and the server uses the key storage method described in Embodiment 1 or Embodiment 2 to store the signature private key. according to Figure 5 As shown, the method includes the following steps:
[0070] S301: Receive a client certificate and first encrypted data sent by a client. The first encrypted data is encrypted using the signature public key of the server.
[0071] S302: Obtain the signature private key from the readable and writable storage area of the security chip when the client certificate is verified to be valid.
[0072] S303: Decrypt the first encrypted data by using the signature private key.
[0073] Since the first encrypted data is encrypted using the server's signature public key, if the decryption is successful using the server's signature private key, it can be shown that the client ho...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


