How OneKey Prevents Supply Chain Attacks

OneKey APP will generate a random number and send it to the hardware, the hardware will send the signature of the random number and the hardware built-in digital certificate back to APP, APP will send the result to the OneKey server, the server will verify the authenticity of the certificate.
Then use the certificate's public key to verify whether the signature is correct, and return the verification results to APP, if the verification passed it will also return the time of the last verification.

Was this article helpful?
0 out of 0 found this helpful