Key agreement method
A key agreement and key pair technology, applied in the field of information security, can solve the problems of consuming storage and processor resources, and achieve the effect of high speed, less resources and high security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] A key agreement method provided by this embodiment includes the following steps:
[0057] 1. Waiting to receive the instruction of key negotiation;
[0058] 2. Check the instruction type of said instruction received;
[0059] 3. Perform a key negotiation operation according to the instruction and return a corresponding response;
[0060] 4. Return to step 1.
[0061] Step 2 is specifically:
[0062] Step 201: Check whether the received instruction is complete. If it is complete, continue; otherwise, return the pre-agreed error code to the upper computer;
[0063] Step 202: Determine the instruction type according to the second byte of the instruction;
[0064] Specifically, in this embodiment, the judgment method is (in no particular order):
[0065] Step 202-1: If the second byte of the instruction is a pre-agreed 0x82, the instruction is a negotiated key parameter command.
[0066] Step 202-2: If the second byte of the instruction is a pre-agreed 0x85, the inst...
Embodiment 2
[0087] A key agreement method described in this embodiment, such as figure 1 shown, including the following steps:
[0088] Step 1: The smart key device receives the command sent by the host computer;
[0089] Step 2: parse the command to determine the predetermined length data of the header, the length value of the data field and the data field;
[0090] In this embodiment, specifically, the parsing of the command in step 2 further includes a process of verifying whether the command is complete, and the process of verifying whether the command is complete will be described in detail in Embodiments 3 and 4.
[0091] Step 3: Judging whether the predetermined length data of the header is consistent with the first preset character string, if so, execute step 4, otherwise judge whether the predetermined length data of the header is consistent with the second preset character string, then execute step 7, Otherwise, it is judged whether the predetermined length data of the header ...
Embodiment 3
[0115] On the basis of Embodiment 2, when the predetermined length data of the header matches the first preset character string, the process of generating the key negotiation parameters by the initiator smart key device is as follows: figure 2 As shown, the initiator is represented by the host computer, and the process includes the following steps:
[0116] Step 101: the initiator intelligent key device receives the command to generate key negotiation parameters sent by the upper computer;
[0117] This step also includes the initiator smart key device judging whether the command is an ECC generation key negotiation parameter command according to a pre-agreed format, and the judging method is specifically:
[0118] If the data of the predetermined length in the header of the generate key agreement parameter command matches the first characteristic string, the generate key agreement parameter command is the ECC generate key agreement parameter command; if it does not match the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 