Key management method and system

The invention belongs to the technical field of data encryption, and particularly relates to a key management method and system. When the management method is applied to the mobile terminal, the method comprises the following steps: acquiring a unique identifier of equipment and generating a request...

Full description

Saved in:
Bibliographic Details
Main Authors ZHANG YUANTAO, PAN KAI, WANG HONGXU, LIU DINGZHI, ZHANG HAN, ZHANG XI, HAN KEJIANG
Format Patent
LanguageChinese
English
Published 07.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention belongs to the technical field of data encryption, and particularly relates to a key management method and system. When the management method is applied to the mobile terminal, the method comprises the following steps: acquiring a unique identifier of equipment and generating a request identifier according to the unique identifier; judging whether a public key for encrypting login information in the login request exists locally or not; when the public key for encrypting the login information exists locally, encrypting the login information by using the public key to generate encrypted login information, and sending the encrypted login information and the request identifier to the cloud; verifying the encrypted login information received by the cloud according to the request identifier, and encrypting a verification result; and verifying and decrypting the verification result, and determining whether a login condition is met or not according to the decrypted verification result. The encryption ke
Bibliography:Application Number: CN202211567826