Authentication system and method based on key management protocol
A key management protocol and key management technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc. The effect of improving safety performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] image 3 It is a preferred flowchart of an authentication method based on a key management protocol according to an embodiment of the present invention, which includes the following steps:
[0058] Step S302: The key management module receives identity information (ID information).
[0059] Step S304: the key management module sends an authentication request to the authentication module.
[0060] Step S306: the authentication module interacts with the long-term key storage module to acquire authentication information.
[0061] Step S308: the authentication module sends an authentication response to the key management module.
[0062] Step S310: the key management module generates a session key.
[0063] Step S312: the key management module sends the session key to the short-term key storage module.
[0064] Step S314: the short-term key storage module sends the session key to the routing protocol module.
[0065] Step S316: the routing protocol module uses the sess...
Embodiment 2
[0067] Figure 4 is another preferred flowchart of an authentication method based on a key management protocol according to an embodiment of the present invention, which includes the following steps:
[0068] Step S402: the routing protocol module sends a request session key message to the short-term key storage module.
[0069] Step S404: the short-term key storage module sends a session key request message to the key management module.
[0070] Step S406: the key management module interacts with the identity module to obtain identity information.
[0071] Step S408: The key management module interacts with the long-term key storage module to acquire authentication information.
[0072] Step S410: the key management module performs an authentication process.
[0073] Step S412: the key management module generates a session key.
[0074] Step S414: the key management module sends the session key to the short-term key storage module.
[0075] Step S416: the short-term key ...
Embodiment 3
[0078] Figure 5 It is another preferred flowchart of the authentication method based on the key management protocol according to the embodiment of the present invention, which includes the following steps:
[0079] Step S502: the routing protocol module sends a session key request message to the key management module.
[0080] Step S504: the key management module interacts with the identity module to obtain identity information.
[0081] Step S506: The key management module interacts with the long-term key storage module to acquire authentication information.
[0082] Step S508: the key management module performs the authentication process.
[0083] Step S510: the key management module generates a session key.
[0084] Step S512: the key management module sends the session key to the short-term key management module.
[0085] Step S514: the short-term key management module sends the encrypted session key to the routing protocol module.
[0086] Step S516: the routing pro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 