Unlock instant, AI-driven research and patent intelligence for your innovation.

Key Migration Method and Device

A key and group key technology, applied in the Internet field, can solve the problems of easy leakage and insecure key migration, and achieve the effect of efficient migration and solving insecure key migration.

Active Publication Date: 2021-09-17
JUZIX TECH SHENZHEN CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of this application provides a key migration method and device to solve the technical problems of insecure key migration and easy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key Migration Method and Device
  • Key Migration Method and Device
  • Key Migration Method and Device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to better understand the technical solutions in the present application, the technical solutions in the present application embodiment will be described in conjunction with the drawings in the present application embodiments, and will be described in conjunction with the drawings in the present application. The embodiment is merely the embodiment of the present application, not all of the embodiments. Based on the embodiments in the present application, one of ordinary skill in the art does not have all other embodiments obtained without creative labor, and should belong to the scope of the present application.

[0050] Considering the existing key migration method is often relatively simple design, resulting in a key migration easily occurs during transmission of a leak, the situation or stolen, even result in the loss of customers. That is, the conventional key migration method there is often a particularly unsafe migration key, technical problems likely to leak ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a method and device for key migration, wherein the method uses the second client device and the server to call the keys stored in the second client device and the server according to the preset rules generated based on the MPC protocol. The second key component and the first key component on the side, perform function operations to generate a new key component, that is, the fourth key component and the third key component to replace the original second key component and the first key component key component; and then encrypt the newly generated fourth key component and send it to the first client device to realize the migration of the key component between different client devices, thereby solving the key migration existing in the existing method The technical problem of being insecure and easy to leak achieves the technical effect of safely and efficiently migrating the key component stored in the second client device to the first client device.

Description

Technical field [0001] The present application relates to the field of Internet technologies, particularly to a method and apparatus for the migration key. Background technique [0002] With the development and popularization of Internet technology, more and more users got used to using a mobile client device (such as a user's mobile phone or tablet computer, etc.) to complete the transaction related to data processing. For example, the use of mobile phones for online shopping or pay bills and so on down the line. [0003] In order to ensure that users can have control over their own funds in the account data usage, often kept by or with the user account bound client device used by the user of a key component. In response to user instructions, transaction data processing, requires the user through the key components of the client device to provide the saved to the user's transaction should generate a signature, and then we can deal with this signature as proof, successfully call ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08G06Q20/38
CPCG06Q20/3825G06Q20/3829H04L9/0819H04L9/0891H04L63/064H04L63/0815
Inventor 安瑞谢翔傅志敬孙立林谢红军
Owner JUZIX TECH SHENZHEN CO LTD