×

KEY DOWNLOADING METHOD, MANAGEMENT METHOD, DOWNLOADING MANAGEMENT METHOD, DEVICE AND SYSTEM

  • US 20160028547A1
  • Filed: 01/23/2014
  • Published: 01/28/2016
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A key downloading method, comprising:

  • sending a device sequence number DSN and a device identity authentication request to an RKS server via a device terminal;

    receiving the working certificate public key RKS_WCRT_PK sent by the RKS server, via the device terminal;

    verifying if the digital signature of RKS_WCRT_PK is valid by using a root public key certificate RKS_RCRT, and if so, encrypting a divergence factor by using RKS_WCRT_PK to obtain a divergence factor cipher text, and sending the divergence factor cipher text to the RKS server, via the device terminal;

    receiving the cipher text AT_TK1 sent by the RKS server via the device terminal, wherein the cipher text AT_TK1 is obtained through encrypting the authentication token AT and the first transmission key component TK1 by the secondary device identity authentication key DIK2;

    the DIK2 is generated by calling the secondary device identity authentication key generating function according to the device sequence number DSN and a primary device identity authentication key DIK1;

    decrypting the cipher text AT_TK1 by using DIK2 to obtain clear texts AT and TK1, via the device terminal;

    generating the third random number as the second transmission key component TK2, performing XOR on TK1 and TK2 to obtain a transmission key TK, calculating SHA256 verification value of TK to obtain TK_SHA2, via the device terminal;

    encrypting AT, TK2, and TK_SHA2 by using RKS_WCRT_PK to obtain the cipher text AT_TK2_TK_SHA2, and sending the cipher text AT_TK2_TK_SHA2 to the RKS server, via the device terminal;

    receiving a key cipher text sent by the RKS server via the device terminal, wherein the key cipher text is obtained through encrypting the key to be downloaded by TK;

    decrypting the key cipher text by using TK to obtain a key clear text, storing the key in a security module, via the device terminal; and

    judging if the key downloading is complete, and if complete, clearing AT, TK and RKS_WCRT_PK, via the device terminal.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×