Key negotiation method and device of verification information
The invention discloses a key negotiation method of verification information. The method comprises the steps that: a key pair used for encryption and decryption of the verification information is generated on a terminal, a public key is transmitted to a network device through a network, and a privat...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
30.12.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention discloses a key negotiation method of verification information. The method comprises the steps that: a key pair used for encryption and decryption of the verification information is generated on a terminal, a public key is transmitted to a network device through a network, and a private key is locally stored, wherein the verification information is a message used for verifying the identity or authority of a terminal or a user in a specific service execution process of a target application program; before the verification information is sent to the terminal, the network device utilizes the public key to encrypt the verification information and sends the encrypted verification information to the terminal; and the terminal utilizes the private key to decrypt the encrypted verification information, and the verification information is obtained. According to the invention, the verification information is encrypted through key negotiation between the terminal application program and the network device, the verification information is encrypted, and the safety of business operation such as payment on the application program is effectively ensured. |
---|---|
Bibliography: | Application Number: CN201410240893 |