Method and device for seamlessly replacing secret key, server side and data interaction method

A data interaction and key technology, applied in the field of communication, can solve problems such as complex server code logic, no strict restrictions on the timing of old key offline, transaction failure, etc., to reduce repeated operations, ensure timing controllability, reduce The effect of maintenance costs

Inactive Publication Date: 2021-09-03
BANK OF COMMUNICATIONS
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the compatibility of the two keys requires the support of the server, the code logic related to the server will be more complicated
Secondly, this technical solution does not strictly limit the timing of the offline of the old key, which will still cause some transactions to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for seamlessly replacing secret key, server side and data interaction method
  • Method and device for seamlessly replacing secret key, server side and data interaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Such as figure 1 As shown, this embodiment provides a method for seamless key replacement, including:

[0039] Receive the key replacement request from the client, the key replacement request includes the new public key, the effective time of the new key, the expiration time of the new key, and the expiration time of the old key;

[0040] Verify the key replacement request and determine the parallel period of the double key;

[0041] After the parallel period of the double key is over, the old key is taken offline and the new key is used to replace the old key.

[0042] In the above process, a scheduled task is also started to periodically clean up invalid old keys.

[0043] The specific method of verifying the key replacement request is: judging whether the expiration time of the old key lags behind the effective time of the new key and the lag time is less than the set threshold, if so, the verification passes, otherwise the verification fails and the key cannot be ...

Embodiment 2

[0046] Such as figure 2 As shown, this embodiment provides a device for seamless key replacement, including:

[0047] Request receiving unit 201: used to receive the key replacement request from the client, the key replacement request includes the new public key, the new key effective time, the new key expiration time, and the old key expiration time;

[0048] Verification determination unit 202: used to verify the key replacement request and determine the parallel period of the double key;

[0049] Replacement unit 203: used to log off the old key after the dual-key parallel period ends, and replace the old key with a new key.

[0050] The verification determination unit 202 verifies the key replacement request by: judging whether the expiration time of the old key lags behind the effective time of the new key and the lag time is less than the set threshold, if yes, the verification is passed, otherwise the key cannot be replaced if the verification fails .

[0051] The s...

Embodiment 3

[0055] Based on Embodiment 2, this embodiment provides a server, where the server includes the apparatus for seamless key replacement provided in Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for seamlessly replacing a secret key, a server side and a data interaction method. The method for seamlessly replacing the secret key comprises the following steps: receiving a secret key replacement request of a client, wherein the secret key replacement request comprises a new public key, new secret key effective time, new secret key failure time and old secret key failure time; verifying the key replacement request, and determining a double-key parallel period; and after the double-key parallel period is finished, the old key being offline, and the new key being used for replacing the old key. Compared with the prior art, when the background server carries out key switching, the timing controllability of the server on key switching is guaranteed, meanwhile, the defect that services need to be stopped during key switching in the prior art is overcome, and the maintenance cost of key replacement is reduced.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device, server and data interaction method for seamless key replacement. Background technique [0002] The enterprise's open platform uses key technology to realize secure communication between the client SDK and the server API gateway. The client provides its own public key to the server, and uses its own private key to sign the data when sending data to the server. The service After receiving the data, the terminal uses the client's public key to verify the signature to ensure the communication security between the client and the server. If the client changes the public-private key pair, it needs to give the new public key to the server. After the key database of the server is updated, the client can communicate with the server again. [0003] Existing key replacement methods mainly include: [0004] 1. Go offline with the old key and then go online w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60G06F21/64
CPCH04L63/06H04L63/068H04L63/0428G06F21/602G06F21/64
Inventor 赵哲阳覃俊杰
Owner BANK OF COMMUNICATIONS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products