Key management method and system
The invention belongs to the technical field of data encryption, and particularly relates to a key management method and system. When the management method is applied to the mobile terminal, the method comprises the following steps: acquiring a unique identifier of equipment and generating a request...
Saved in:
Main Authors | , , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
07.06.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention belongs to the technical field of data encryption, and particularly relates to a key management method and system. When the management method is applied to the mobile terminal, the method comprises the following steps: acquiring a unique identifier of equipment and generating a request identifier according to the unique identifier; judging whether a public key for encrypting login information in the login request exists locally or not; when the public key for encrypting the login information exists locally, encrypting the login information by using the public key to generate encrypted login information, and sending the encrypted login information and the request identifier to the cloud; verifying the encrypted login information received by the cloud according to the request identifier, and encrypting a verification result; and verifying and decrypting the verification result, and determining whether a login condition is met or not according to the decrypted verification result. The encryption ke |
---|---|
Bibliography: | Application Number: CN202211567826 |