Key distributing method and system using public key cryptographic technique
A technology of key distribution and public key cryptography, which is applied to the public key and key distribution of secure communication, and can solve problems such as major security risks, lack of key perfect forward secrecy, and threats to system security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0044] In consideration of security or in order to meet the needs of communication services, etc., the public-private key pair of the key distribution center KDC needs to be updated regularly or dynamically. The new public-private key pair is respectively marked as x' and Px', and the new public key Px' is online The implementation method of notification to each communicating entity is as follows:
[0045] see Figure 7 , the online update process steps of the public key of the key distribution center KDC are as follows:
[0046] 1) The key distribution center KDC queries the database DB to obtain a list of communication entities that have registered for confidential services;
[0047] 2) The key distribution center KDC generates a public key update notification message, which includes the new public key Px' of the key distribution center KDC and the signature made using the old private key x of the key distribution center KDC;
[0048] 3) According to the list of communicat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com