Three-way handshake protocol method
A three-step handshake and protocol technology, applied to key distribution, can solve problems such as low energy consumption, limited resources, and low power of equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0032] Concrete implementation method of the present invention is as follows:
[0033] 1) The initiator sends message 1 to the responder, which includes PTKID, MKID, UD, I-Nonce, etc., where the pairwise temporary key identifier PTKID is a value randomly selected by the initiator (not related to the locally stored or ongoing The temporary key identifier TKID used in the three-step handshake protocol or the group temporary key GTK distribution agreement is the same), the master key identifier MKID is the sign of the paired master key PMK, and the update identifier UD indicates whether it is a paired temporary key The update process of the key PTK, I-Nonce is the random number generated by the initiator (when the paired temporary key PTK is established for the first time, the I-Nonce is generated by the initiator using the random number generation function, and when the paired temporary key is updated When using the key PTK, I-Nonce is the value negotiated by the initiator and t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com