US 12,326,944 B2
Key filling method, system, and apparatus, device, and storage medium
Junjian Liu, Shenzhen (CN); Weiming Yang, Shenzhen (CN); Dongqing Huang, Shenzhen (CN); and Runzeng Guo, Shenzhen (CN)
Assigned to TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, Shenzhen (CN)
Filed by Tencent Technology (Shenzhen) Company Limited, Shenzhen (CN)
Filed on Nov. 15, 2022, as Appl. No. 17/987,778.
Application 17/987,778 is a continuation of application No. PCT/CN2022/073859, filed on Jan. 25, 2022.
Claims priority of application No. 202110181982.9 (CN), filed on Feb. 9, 2021.
Prior Publication US 2023/0090351 A1, Mar. 23, 2023
Int. Cl. G06F 21/60 (2013.01)
CPC G06F 21/602 (2013.01) 20 Claims
OG exemplary drawing
 
1. A key filling method, performed by a server, the method comprising:
obtaining first filling information transmitted by an electronic device, wherein the first filling information indicates a filling permission to a security chip of the electronic device, the first filling information comprises a chip public key of the security chip;
in accordance with a determination that the electronic device has the filling permission: transmitting second filling information comprising a verification public key generated by the server to the electronic device, wherein the electronic device fills the verification public key into the security chip, the verification public key is used for encrypting information, and a verification private key corresponding to the verification public key is used for decrypting encrypted information;
encrypting generated verification information using the chip public key and the verification private key to obtain a first authentication code;
transmitting the first authentication code to the security chip, wherein the security chip decrypts the first authentication code using a chip private key and the verification public key to obtain first information;
obtaining a second authentication code from the security chip by encrypting the first information using the verification public key and the chip private key; and
in accordance with a determination that the first information in the second authentication code matches the verification information, transmitting verification success information of the security chip to the electronic device.