Method, device and system for key agreement

A key agreement and equipment technology, applied in transmission systems, security devices, electrical components, etc., can solve problems such as complex encrypted communication processes

Inactive Publication Date: 2010-11-24
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of complex encrypted communication process in the prior art, the present invention provides a key agreement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for key agreement
  • Method, device and system for key agreement
  • Method, device and system for key agreement

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] The embodiment of the present invention provides a method for key agreement and a key agreement device for implementing the method. In order to better understand the technical solutions of the present invention, the embodiments provided by the present invention will be described in detail below with reference to the accompanying drawings.

[0023] See figure 1 , figure 1 It is a flowchart of the first embodiment of the key agreement method provided by the present invention.

[0024] Step 101: The first key agreement device receives a first key agreement request sent by the first terminal, where the first key agreement request carries identification information of the second terminal.

[0025] Step 102: The first key agreement device generates a random number R1 according to the received first key agreement request, and sends a second key agreement request to a second key agreement device corresponding to the second terminal according to the identification information of the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a device and a system for key agreement. The method comprises the following steps: a first key agreement device receives a first key agreement request sent by a first terminal, wherein the identification information of a second terminal is contained in the first key agreement request; the first key agreement device generates a random number R1 according to the received first key agreement request and sends a second key agreement request and the random number R1 to a second key agreement device corresponding to the second terminal according to the identification information of the second terminal; the second key agreement device generates a random number R2 and sends the random numbers R1 and R2 and a third key agreement request to the second terminal; the second terminal generates a session key according to the random numbers R1 and R2; the first key agreement device receives the random number R2 sent by the second key agreement device and sends the random numbers R1 and R2 to the first terminal; and the first terminal generates a session key according to the random numbers R1 and R2 and communicates with the second terminal on the basis of the session key. Accordingly, the invention can achieve the encrypted communication between the first terminal and the second terminal.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a key negotiation method, device and system. Background technique [0002] With the widespread application of mobile communication systems, mobile communication is closely related to people's lives, and its security has always been concerned by people. In the existing mobile communication system, various protection mechanisms including user identity authentication and data confidentiality are provided. During the access authentication process of the terminal, the terminal and the network side negotiate to generate the private key of the terminal, and then the terminal uses the private key to pair The data sent to the network side is encrypted, and the network side uses the terminal's private key to decrypt the encrypted data after receiving it. [0003] The prior art provides a key agreement method, which mainly includes: the terminal sends an access authentication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04W12/03H04W12/041H04W12/0431
CPCH04W12/04H04W76/023H04L63/062H04W76/14H04W12/0431
Inventor 张向东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products