FIELD: computer equipment.
SUBSTANCE: system includes hardware for loading keys into a smart terminal, which contains a working module, which generates a request to receive a certificate. Request is received by the server of the service provider over a secure communication channel, where a certificate is generated. Certificate is stored in the service provider database and sent to the working module. Working module forms a request to the service provider server, where a random secret key for the working module is generated and is encrypted with a random public key. In the key distribution module, the random public key is encrypted with the working module certificate. Secret key is signed. Working module receives a response from the service provider server, performs a request to the service provider server to provide a set of symmetric keys for use in the operation of the working module. Service provider server, through the key distribution module, generates a set of random keys and sends them to the working module with an encrypted private key. Working module receives a set of random keys, decrypts them, during verification, transfers the received set of keys to the operating mode and uses these keys to perform transactions.
EFFECT: technical result is to improve the security level of smart terminals.
1 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF REMOTE LOADING A SET OF KEYS INTO A SMART TERMINAL | 2019 |
|
RU2724793C1 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
MUTUAL AUTHENTICATION OF PROGRAM LEVELS | 2016 |
|
RU2715032C2 |
METHOD OF SHARING THE PROTECTED DATA | 2017 |
|
RU2659730C1 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
CONFIDENCE AGENTS FOR OPEN ELECTRONIC BUSINESS | 1995 |
|
RU2136042C1 |
METHODS AND DEVICE FOR LARGE-SCALE PROPAGATION OF ELECTRONIC ACCESS CLIENTS | 2013 |
|
RU2595904C2 |
CRYPTOGRAPHIC AUTHENTICATION AND IDENTIFICATION METHOD WITH REAL-TIME ENCRYPTION | 2013 |
|
RU2584500C2 |
AUTHENTICATION IN DISTRIBUTED ENVIRONMENT | 2015 |
|
RU2702076C2 |
METHOD OF PROVIDING CRYPTOGRAPHIC PROTECTION OF INFORMATION IN A NETWORK INFORMATION SYSTEM | 2019 |
|
RU2706176C1 |
Authors
Dates
2020-02-07—Published
2019-10-01—Filed