Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method and a system for processing mixed secret keys with an asymmetric cryptographic algorithm

An asymmetric encryption and mixed key technology, applied in the field of mixed key processing, to achieve the effect of ensuring information security and satisfying security

Inactive Publication Date: 2014-03-05
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the general key management based on symmetric encryption algorithm has a great risk in a wide range of commercial applications due to the use of the same encryption and decryption key.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and a system for processing mixed secret keys with an asymmetric cryptographic algorithm
  • A method and a system for processing mixed secret keys with an asymmetric cryptographic algorithm
  • A method and a system for processing mixed secret keys with an asymmetric cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Such as figure 1 Shown is a network topology schematic diagram of a mixed key processing method of an asymmetric encryption algorithm in a weak terminal environment according to the present invention. The method specifically includes:

[0035] Distribute key pairs or key seed pools according to device forms, and set various trigger conditions;

[0036] Among them, such as image 3 Shown is a schematic diagram of the key in the device storage area and the key seed pool. The main steps of distributing the key pair or the key seed pool according to the device form are:

[0037] S11. The device form is a terminal device, and the key processing system distributes the private key identified by the terminal device and the access device public key seed pool that the terminal device needs to access;

[0038] S12. The device form is an access device of an access point, and the key processing system distributes the private key seed pool of the access device identification of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for processing mixed secret keys with an asymmetric cryptographic algorithm. Terminals and access-end devices at access points are treated discriminatively by using the method for processing mixed secret keys. Secret keys using the asymmetric cryptographic algorithm and different secret key storing methods are used in order to execute discriminative secret key processing from terminals to the access devices and from the access devices to the terminals, thereby reasonably satisfying requirements of security, efficiency, and space. Discriminative secret key processing is executed according to the different forms of the devices. Therefore, in a weak terminal environment with limited calculation and storage resources, bidirectional security certificate and encryption communication based on secret key processing is achieved and information security in an internet of things or a ubiquitous network is effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of computer applications, and relates to a mixed key processing method and system, in particular to a mixed key processing method and system design based on an asymmetric encryption algorithm in a weak terminal environment. Background technique [0002] With the development and application of Internet of Things and ubiquitous network technologies, more and more terminal devices based on limited computing and storage are widely used in various economic fields, such as industrial control, agricultural modernization, environmental monitoring, material monitoring and so on. The application of the Internet of Things in most fields requires security, such as terminal payment, confidential monitoring, core industrial control, etc. A secure environment can ensure that these application scenarios are free from external attacks, such as virus intrusion, authentication intrusion, and masquerading attacks. [0003] In t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/28H04L9/08
Inventor 蒋平川刘丹徐展李红静邓金城曾颖黎叶翔
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More