Unlock instant, AI-driven research and patent intelligence for your innovation.

Information encryption method, information authentication method, terminal and computer readable storage medium

A technology for information encryption and authentication methods, applied in the fields of information authentication methods, terminals and computer-readable storage media, and information encryption methods, which can solve problems such as inability to obtain SN/IMEI, increase terminal cost, and easy tampering of SN/IMEI

Inactive Publication Date: 2018-02-23
MEIZU TECH CO LTD
View PDF11 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the terminal can store the SN / IMEI in plain text, but this storage method makes the SN / IMEI easy to be tampered with, making it impossible to authenticate the terminal. Therefore, in order to improve the security of the SN / IMEI, the following two methods can be used to store the SN / IMEI IMEI:
[0004] One way is to encrypt and store the SN / IMEI, but this way makes it impossible for the server that authenticates the terminal to obtain the SN / IMEI;
[0005] Another way is: implant an encryption chip in the terminal, and store SN / IMEI through the encryption chip, but this method will increase the cost of the terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption method, information authentication method, terminal and computer readable storage medium
  • Information encryption method, information authentication method, terminal and computer readable storage medium
  • Information encryption method, information authentication method, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0070] see figure 1 , which shows a flowchart of an information encryption method provided by an embodiment of the present invention, which may include the following steps:

[0071] 101: Obtain the identity information of the terminal, the key and the public key corresponding to the terminal. Wherein, the identity information of the termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information encryption method, an information authentication method, a terminal and a computer readable storage medium. After identity identification information of the terminal and a secret key and a public key corresponding to the terminal are acquired, the secret key can be used for encrypting the identity identification information of the terminal to acquire the encrypted identity identification information, so that encryption of the identity identification information is achieved without encrypting the chip, information security is improved without increasing cost, the identity identification information of the terminal can be corresponding to the public key, the identity identification information of the corresponding terminal and the public key are sent toa server, and thus after the server acquires the identity identification information of the terminal, the public key corresponding to the terminal can be used for acquiring the identity identificationinformation of the terminal, and then the server can still normally acquire the information for authenticating under the premise of improving the information security.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to an information encryption method, an information authentication method, a terminal and a computer-readable storage medium. Background technique [0002] SN (Serial Number, serial number) and IMEI (International Mobile Equipment Identity, electronic serial number) are used as the identity information of the terminal, and the terminal can be authenticated through the SN / IMEI. [0003] At present, the terminal can store the SN / IMEI in plain text, but this storage method makes the SN / IMEI easy to be tampered with, making it impossible to authenticate the terminal. Therefore, in order to improve the security of the SN / IMEI, the following two methods can be used to store the SN / IMEI IMEI: [0004] One way is to encrypt and store the SN / IMEI, but this way makes it impossible for the server that authenticates the terminal to obtain the SN / IMEI; [0005] Ano...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0428H04L63/08
Inventor 陈玉文
Owner MEIZU TECH CO LTD