Key acquisition method, device, server and medium
A server and key technology, applied in the field of network security, can solve problems such as key leakage, reduce the probability of leakage and improve security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] figure 1 It is a flow chart of a method for generating a key provided in Embodiment 1 of the present invention. This embodiment is applicable to the situation where a user uses a terminal to conduct financial transactions. This method is applied to a terminal, such as a POS machine or a mobile communication device, and can be executed by the key generation device configured in the terminal provided by the embodiment of the present invention. The key generating device can be realized by software and / or hardware. see figure 1 , the method specifically includes:
[0042] Step 101: Generate a certificate message request according to the serial number ciphertext and the hardware serial number, and send the certificate message request to the server, wherein the serial number ciphertext is obtained by encrypting the hardware serial number with an initial key .
[0043] Among them, when the terminal leaves the factory, the manufacturer will assign a unique hardware serial n...
Embodiment 2
[0061] figure 2 It is a flow chart of a method for generating a key provided in Embodiment 2 of the present invention. This embodiment is applicable to the situation where the user uses the terminal to conduct financial transactions. This method is applied to the server and can be executed by the key generation device configured in the server provided by the embodiment of the present invention. The key generation device can be implemented by software and / or or by means of hardware. see figure 2 , the method specifically includes:
[0062] Step 201: Receive a certificate message request from the terminal, and generate a certificate message according to the terminal certificate and the server public key, wherein the terminal certificate is generated according to the hardware serial number in the certificate message request.
[0063] Specifically, the server receives the certificate message request, obtains the hardware serial number from the certificate message request, and...
Embodiment 3
[0078] image 3 It is a flow chart of a key acquisition method provided by Embodiment 3 of the present invention. This embodiment provides a specific implementation manner for the second embodiment above. Specifically, it can include the following:
[0079] Step 301: Receive a certificate message request from a terminal, and determine whether the certificate message request is legal according to the hardware serial number and serial number ciphertext in the certificate message request.
[0080] Specifically, in order to prevent the terminal certificate from being obtained maliciously, after receiving the terminal certificate message request, the server will check the validity of the certificate message request according to the hardware serial number and serial number ciphertext in the certificate message request.
[0081] Optionally, step 301 includes:
[0082] A. From the candidate initial keys stored in the server in advance, the candidate initial key associated with the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



