Check patentability & draft patents in minutes with Patsnap Eureka AI!

Device and method for generating transmission key

A technology for transmitting keys and generating algorithms, applied in the field of network security, can solve problems such as increasing implementation costs, not completely avoiding risks, and achieving the effect of avoiding leakage risks

Active Publication Date: 2010-08-18
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this approach must not completely avoid risks, and changing the key once needs to regenerate, negotiate and transmit the process, too frequent will greatly increase the implementation cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for generating transmission key
  • Device and method for generating transmission key
  • Device and method for generating transmission key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to specific embodiments and drawings.

[0047] The technical core of the present invention is that the transmission key is jointly generated by the transmission key generation algorithm distributed by the third party based on the private key generated by the party and the interactive key transmitted by the other party. If the key is intercepted in the network, the transmission key cannot be generated separately. The transmission key generation algorithm distributed by the third party makes the algorithms used by both parties consistent, and the transmission keys generated locally by both parties are equal, thereby achieving the effect of the symmetric encryption algorithm . The local private keys of both parties are randomly generated and become invalid once used, ensuring that even if the tran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a device and a method for generating a transmission key. The transmission key is generated by two communication parties according to a private key generated by the party and an interactive key transmitted by the opposite party through a transmission key generating algorithm distributed by a third party. Even though the interactive key transmitted by the opposite party is intercepted in the network, the transmission key also cannot be generated separately. The transmission key generating algorithm distributed by the third party makes the algorithms used by the two parties consilient. And the transmission keys generated at the localities of the two parties are equal so as to achieve the effect of the symmetric encipherment algorithm. The local private keys of the two parties are generated randomly and lose efficacy when being used once so as to guarantee that even through the transmission key is stolen or cracked, the next transmission also cannot be influenced. The transmission key generating algorithm is distributed by the third party and is transparent and consilient to the two communication parties, can be distributed again each time or be distributed at regular intervals or at irregular intervals, also can be distributed randomly, and further improves the safety of the interactive key and the transmission key.

Description

Technical field [0001] The present invention relates to the technical field of network security, in particular to a device and method for generating a transmission key. The generated transmission key cooperates with a symmetric encryption algorithm to realize safe encrypted data transmission. Background technique [0002] High-security-related industries often involve a large number of private information transmission scenarios, requiring the use of secure transmission protocols and a secure network environment. While using secure transmission protocols and secure network environments, symmetric cryptographic encryption methods are currently widely used to transmit private information, such as 3DES. [0003] When using the symmetric encryption method, the algorithm that generates the transmission key is the core of the implementation; how to generate and save the transmission key is the fundamental guarantee of the security strength and performance of the encryption method. A good...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 赵晖
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More