Key negotiation method and device of verification information

The invention discloses a key negotiation method of verification information. The method comprises the steps that: a key pair used for encryption and decryption of the verification information is generated on a terminal, a public key is transmitted to a network device through a network, and a privat...

Full description

Saved in:
Bibliographic Details
Main Author HU YUGUANG
Format Patent
LanguageEnglish
Published 30.12.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention discloses a key negotiation method of verification information. The method comprises the steps that: a key pair used for encryption and decryption of the verification information is generated on a terminal, a public key is transmitted to a network device through a network, and a private key is locally stored, wherein the verification information is a message used for verifying the identity or authority of a terminal or a user in a specific service execution process of a target application program; before the verification information is sent to the terminal, the network device utilizes the public key to encrypt the verification information and sends the encrypted verification information to the terminal; and the terminal utilizes the private key to decrypt the encrypted verification information, and the verification information is obtained. According to the invention, the verification information is encrypted through key negotiation between the terminal application program and the network device, the verification information is encrypted, and the safety of business operation such as payment on the application program is effectively ensured.
Bibliography:Application Number: CN201410240893