KEY AGREEMENT METHOD AND DEVICE FOR VERIFICATION INFORMATION
First Claim
1. A key agreement method for verification information, comprising:
- generating a key pair for encrypting and decrypting the verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or a user'"'"'s identity or permission during execution of a specific service by a target application;
encrypting, by the network device, the verification information by using the public key before the verification information is sent to the terminal, and sending the encrypted verification information to the terminal;
decrypting, by the terminal, the encrypted verification information by using the private key, and obtaining the verification information.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is a key agreement method for verification information. The method comprises: generating a key pair for encrypting and decrypting verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or user'"'"'s identity or permission during execution of a specific service by a target application; the network device uses the public key to encrypt the verification information before the verification information is sent to the terminal, and sends the encrypted verification information to the terminal; the terminal uses the private key to decrypt the encrypted verification information, and obtains the verification information.
9 Citations
40 Claims
-
1. A key agreement method for verification information, comprising:
-
generating a key pair for encrypting and decrypting the verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or a user'"'"'s identity or permission during execution of a specific service by a target application; encrypting, by the network device, the verification information by using the public key before the verification information is sent to the terminal, and sending the encrypted verification information to the terminal; decrypting, by the terminal, the encrypted verification information by using the private key, and obtaining the verification information. - View Dependent Claims (2, 3, 4, 8, 10, 11, 12, 13)
-
-
5. (canceled)
-
6. (canceled)
-
7. (canceled)
-
9. (canceled)
-
14. (canceled)
-
15. (canceled)
-
16. (canceled)
-
17. (canceled)
-
18. (canceled)
-
19. (canceled)
-
20. A key agreement device for verification information, comprising a memory having instructions stored thereon and at least one processor to execute the instructions to perform operations for key agreement for verification information, the operations comprising:
-
generating a key pair for encrypting and decrypting the verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or a user'"'"'s identity or permission during execution of a specific service by a target application; receiving from the network device the encrypted verification information which is encrypted by using the public key; decrypting the encrypted verification information by using the private key, and obtaining the verification information. - View Dependent Claims (21, 22, 23, 27, 29, 30, 31, 32)
-
-
24. (canceled)
-
25. (canceled)
-
26. (canceled)
-
28. (canceled)
-
33. (canceled)
-
34. (canceled)
-
35. (canceled)
-
36. (canceled)
-
37. (canceled)
-
38. (canceled)
-
39. (canceled)
-
40. A computer-readable medium, having instructions stored thereon, when executed by at least one processor, cause the at least one processor to perform operations for key agreement for verification information, the operations comprising:
-
generating a key pair for encrypting and decrypting the verification information in a terminal, transmitting a public key to a network device via a network, and storing a private key locally, wherein the verification information is a message used for verifying a terminal or a user'"'"'s identity or permission during execution of a specific service by a target application; encrypting, by the network device, the verification information by using the public key before the verification information is sent to the terminal, and sending the encrypted verification information to the terminal; and decrypting, by the terminal, the encrypted verification information by using the private key, and obtaining the verification information.
-
Specification