A key agreement method and system
A key negotiation and session key technology, applied in the field of information security, can solve the problems of security risks, low security, and inability to pre-determine the result of the shared key of the key negotiation method, so as to prevent anti-replay attacks and improve security. sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] like figure 1 As shown, this embodiment proposes a key agreement method, including:
[0054] S1. The terminal device acquires a first key negotiation parameter, and constructs the first key negotiation parameter into key negotiation request information reqMsg and sends it to the service platform;
[0055] S2. The service platform obtains the second key negotiation parameter, and constructs the second key negotiation parameter and the first key negotiation parameter into data aData, wherein the first key negotiation parameter is The key agreement request information reqMsg is obtained after parsing;
[0056] S3. The service platform performs digest calculation on the data aData to generate a digest value aHash, and after obtaining a session key sKey according to the digest value aHash, signs the digest value aHash to obtain a signature value signMsg;
[0057] S4. The service platform encrypts the parameter information including the signature value signMsg to generate e...
Embodiment 2
[0083] like figure 2 As shown, this embodiment provides a key agreement system, including a terminal device and a service platform for performing key agreement. When implementing key agreement, the first security module set in the terminal device is a TF cipher card, The second security module set in the service platform is a PCI cipher card; the complete process of key negotiation between the terminal device and the service platform is specifically:
[0084] When generating the key agreement request message reqMsg, the specific work of the terminal device is as follows:
[0085] A1: Call the TF password card interface to read the end user digital certificate uCert;
[0086] A2: Call the random number generator in the TF password card to generate a random number r A ∈ [1, n-1];
[0087] A3: Call the TF password card to read the hardware ID of the security chip;
[0088] A4: Splicing uCert||r A ||ID||uTime (terminal timestamp), which is recorded as the key agreement requ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

