Session key negotiating method, system and server in communication network

A session key and key negotiation technology, applied in the field of network information security, can solve the problem that the two parties in communication cannot directly conduct key negotiation, and achieve high security and simple effect.

Active Publication Date: 2009-01-07
CHINA TELECOM CORP LTD
View PDF3 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the communication system, due to the control of the network on the user, the two parties in the communication cannot directly negotiate the key under normal circumstances. Therefore, it is necessary to provide an implementation of the session key agreement suitable for the communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session key negotiating method, system and server in communication network
  • Session key negotiating method, system and server in communication network
  • Session key negotiating method, system and server in communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0029] figure 1 It is a schematic structural diagram of the session key agreement system according to the present invention. Such as figure 1As shown, the system includes a communication terminal 11 , a key agreement server 12 and a communication terminal 13 . Wherein, the communication terminal 11 stores the encryption key of the key agreement server 12, generates a session key, encrypts the session key with the stored encryption key of the key agreement server 12, generates a session key ciphertext, and then sends the session key The key ciphertext is sent to the key agreement server 12 . The key agreement server 12 stores the decryption key of the key agreement server and the encryption key of the communication terminal 13, receives the session key ciphertext from the communication terminal 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key agreement method, a system and a server of a communication network, the method comprises the following steps: a first terminal sends a conversation key ciphertext which is generated after the encryption of a conversion key by an encryption key of a key agreement server to the key agreement server; the key agreement server obtains the conversation key from the decryption of the conversation key ciphertext, the encryption key of a second terminal re-encrypts to the conversation key for generating the conversation key ciphertext to be sent to the second terminal; and the second terminal obtains the conversation key from the decryption of the obtained conversation key ciphertext and returns a response message to the first terminal. The conversation key agreement method and the system provided by the invention realize the simple process and ensure the safety of the key transmission through the realization of the encryption transmission of the conversation key by the key agreement server. The key agreement is realized by the use of the non-symmetric cryptosystem, and the encryption communication is realized by using the symmetric cryptosystem, thereby fully utilizing the advantages of the symmetric and the non-symmetric cryptosystems.

Description

technical field [0001] The invention relates to network information security technology, in particular to a session key negotiation method, system and server in a communication network. Background technique [0002] In various communication systems, how to realize the protection of interactive information between users and ensure the security and confidentiality of communication content is a key consideration. Especially in the mobile communication system, there is a process of air transmission for the interactive information, and the requirement for the security of the information is particularly prominent. Encrypting the transmitted data is an important way to realize secure communication. The current encryption system includes symmetric key system and asymmetric key system. Compared with the asymmetric key system, the symmetric key system has higher computational complexity, and the security strength of the symmetric key system is also high, so the symmetric key system ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/32
Inventor 林奕琳李宝荣杨维忠孙宇张琳峰龙彪林衡华肖海
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products