Key management method
A key management and message technology, applied in the field of key management, can solve problems such as storage exhaustion, prevent forgery and replay, solve DoS attack problems, and enhance security and robustness.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] Concrete method of the present invention is as follows:
[0020] 1) The authenticator adds the key negotiation identifier KNID (Key Negotiation IDentifier) and the message integrity code MIC on the basis of the original definition content of the message 1, forms a new message 1, and sends it to the requester;
[0021] 2) After receiving the new message 1, the requester verifies whether the MIC field in it is correct, and if not, discards it directly; otherwise, performs the original verification, and if the verification is successful, sends message 2 to the authenticator; message 2 The content of is the same as the original definition;
[0022] It should be noted that: the MIC in the new message 1 is the hash value calculated by the authenticator using the pairwise master key PMK (Pairwise Master Key) negotiated in the authentication phase for all the fields before the MIC field; the KNID in the new message 1, If this process is the first 4-step handshake protocol af...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com