Method, device and system for key agreement
A key agreement and equipment technology, applied in transmission systems, security devices, electrical components, etc., can solve problems such as complex encrypted communication processes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0022] The embodiment of the present invention provides a method for key agreement and a key agreement device for implementing the method. In order to better understand the technical solutions of the present invention, the embodiments provided by the present invention will be described in detail below with reference to the accompanying drawings.
[0023] See figure 1 , figure 1 It is a flowchart of the first embodiment of the key agreement method provided by the present invention.
[0024] Step 101: The first key agreement device receives a first key agreement request sent by the first terminal, where the first key agreement request carries identification information of the second terminal.
[0025] Step 102: The first key agreement device generates a random number R1 according to the received first key agreement request, and sends a second key agreement request to a second key agreement device corresponding to the second terminal according to the identification information of the se...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap