Unlock instant, AI-driven research and patent intelligence for your innovation.

Key pair management method and terminal

A key pair management and terminal technology, applied in key distribution, can solve the problems of amplifying privacy exposure, user producer exposure, low efficiency, etc., and achieves the effect of simplifying the management process

Active Publication Date: 2021-08-10
SHENZHEN DAPU MICROELECTRONICS CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Since the identification of each individual product is unique, the manufacturer needs to add a special process to inject its unique identification for each product, such as labeling, injecting a unique ID, etc., which is very inefficient
[0007] 2. During the product life cycle, the manufacturer needs to maintain each individual product and its corresponding unique identification to track the information and after-sales status of each product, which is very complicated and costly to maintain
[0008] 3. Since each product and its unique identifier are one-to-one correspondence in plain text, the user's privacy is exposed to the producer, causing a great security risk
Due to capacity and delivery issues, the same type of product may be produced by multiple manufacturers; this leads to more complex management of individual products and their unique identifiers, further magnifying the possibility of privacy exposure
[0009] 4. Since the product developer, producer and seller are usually not the same company, in terms of production volume / sales volume control, authorization volume statistics, product update maintenance, etc., multiple parties need to participate together, and the complexity and cost of management and maintenance are too high , the response cycle is too long

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key pair management method and terminal
  • Key pair management method and terminal
  • Key pair management method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0076] In order to have an accurate understanding of the method and device of the embodiment of the present invention, some terms involved in the method and device of the embodiment of the present invention are firstly introduced below.

[0077] 1. Digital signature

[0078] A digital signature refers to a digital string that can only be generated by the private key of the information sender and cannot be forged by others. This digital string is also an effective proof of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a key pair management method and a terminal, which are used to simplify the key pair management process. The method in the embodiment of the present invention includes: the terminal generates a first private key according to the product identification; the terminal uses a digital signature algorithm to generate a public key according to the first private key; the terminal sends the product identification to the server, so that The server generates a second private key according to the product identification, the first private key is the same as the second private key; the terminal obtains the second private key sent by the server; the terminal uses the The second private key is used to sign the preset command to obtain encrypted information; when the encrypted information is verified by using the public key, the terminal executes the preset command. A public key is generated on the terminal, and a private key is generated on the server. The private key and the public key form a key pair. The server can manage the terminal through the key pair. In this way, the management process is simplified.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a key pair management method and a terminal. Background technique [0002] To authorize and manage products, key pairs are often used. [0003] In the existing way of using key pairs for management, refer to figure 1 , the common way is as follows: [0004] The developer generates a large number of key pairs and uses a list to manage these key pairs. The developer then sends the list to the producer. Therefore, the producer loads the public key in the key pair in the list onto the device, for example, by attaching a label, writing configuration information, and so on. Then, the producer sends each device and the private key corresponding to the public key loaded on the device to the seller. The sales method manages each device and its corresponding private key separately, and sells them. Seller does not manage such information long after the sale is complete. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/0861H04L9/3236H04L9/3247
Inventor 黎剑坤尚宁
Owner SHENZHEN DAPU MICROELECTRONICS CO LTD