Identity authentication and secret key negotiation method and device in communication network

A technology of communication network and key negotiation, applied in the direction of public key of secure communication, user identity/authority verification, data exchange network, etc.

Inactive Publication Date: 2008-09-17
ALCATEL LUCENT SHANGHAI BELL CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, people began to pay attention to identity-based cryptography (Identity Based Cryptography, an asymmetric key encryption algorithm), but so far, identity-based cryptography has only one concept and some algorithms, which cannot be practically applied yet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication and secret key negotiation method and device in communication network
  • Identity authentication and secret key negotiation method and device in communication network
  • Identity authentication and secret key negotiation method and device in communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] figure 2 It is a schematic diagram of a communication network for implementing identity-based encryption technology according to a specific embodiment of the present invention. The communication network shown includes: a management device 3 (to avoid confusion, hereinafter referred to as KMC 3 ), a network server 4 and a plurality of communication devices (for simplicity, only the first communication device 1 and the second communication device 2 are shown). where the KMC shown 3 Including the first safety auxiliary device provided by the first aspect of the present invention; the first communication device 1 and the second communication device 2 shown both include the safety communication device provided by the second aspect of the present invention; the network server 4 shown includes the present invention The second safety auxiliary device provided by the third aspect.

[0031] Before describing specific embodiments in conjunction with the accompanying drawings, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In the prior art, PKI which is taken as a safety settling plan is widely applied in the internet (IT network) field. But PKI has the disadvantages of high requirement to the capability of the communication equipment and consuming considerable system resource for managing and maintaining the digital certificate and can not adapted for the requirement of the communication network which is fusing. The aim of the invention is to provide a technical scheme which specially actualizes the cryptographic technique based on identity to the communication network. In particular, a management device is leaded into for generating and managing a private key based on the characteristic information of the communication equipment. The communication equipment uses the public key which is generated based on the corresponding characteristic information, the private key that is obtained based on the corresponding characteristic information and preferably the conversation key that is obtained based on the keys for the safety communication between other communication equipments.

Description

technical field [0001] The present invention relates to communication networks, and more particularly to secure communication in communication networks. Background technique [0002] PKI (Public Key Infrastructure) is a standard-compliant security solution that uses public key encryption technology to provide a secure basic platform for e-commerce. It can provide encryption, digital signature and other cryptographic services for all network applications and the necessary Key and certificate management system. Users can use the platform provided by PKI to conduct secure electronic transactions, communications and various activities on the Internet. [0003] The core element of PKI is digital certificate, its core executor is CA (Certification Authority), and its basic technology includes encryption, digital signature, data integrity mechanism, digital envelope, double digital signature, etc. [0004] Specifically, in the PKI mechanism, the public-private key pair can be gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L12/24
Inventor 胡志远骆志刚万志坤
Owner ALCATEL LUCENT SHANGHAI BELL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products