A method for authentication and key agreement between devices

A technology of key agreement and equipment, applied in the field of digital communication, can solve the problem of low security, achieve the effect of improving security, ensuring security and reliability, and protecting security

Active Publication Date: 2016-08-24
SHENZHEN STATE MICRO TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing devices mostly use a single authentication and encryption method, which is simple but less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for authentication and key agreement between devices
  • A method for authentication and key agreement between devices
  • A method for authentication and key agreement between devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Before the two devices in the digital communication system need to exchange data, in order to ensure the security of the exchanged data, the two devices need to recognize each other’s identity. Encrypt transmission with session key.

[0041] Before performing authentication and negotiation between two devices, the present invention assumes that the two devices already have the same key information record, that is, the key number Key_ID of the record of key-related data owned by the two devices is the same. A key information record is composed of key number Key_ID, plus fuzzy data SM1, key data K1, and configuration word ACW selected by an algorithm. One or more key information records can exist in a device, and a security area with access restrictions is opened up in the memory of the device, and one or more key information records are stored in the security area to form a "key store".

[0042] Such as figure 1 As shown, the generation of a key information record in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certification and key agreement method between devices. The certification and key agreement method between the devices comprises that the same key information records are pre-established in a primary device and a slave device; when the primary device determines whether the slave device possesses the same key serial number, the slave device generates a random number RA; the primary device and the slave device calculate result data A1, B1 and C1 according to the key information records and the random number RA of the primary device and the slave device; when the primary device determines that the calculated result data A1 and B1 is equal to the calculated data A1 and B1 of the slave device, the slave device generates a random number RB; the primary device and the slave device calculate result data A2, B2 and C2 according to the key information records, the result data C1 and the random number RB of the primary device and the slave device; when the primary device determines that the calculated result data A2 and B2 is respectively equal to the result data A2 and B2 calculated by the slave device, the key between the primary device and the slave device is C2. The certification and key agreement method between the devices is safe and reliable and is beneficial to guaranteeing safety and reliability of data interaction between devices.

Description

technical field [0001] The invention relates to digital communication technology, in particular to a method for authentication and key negotiation between devices in a digital communication system. Background technique [0002] With the emergence and development of global informatization and communication network technology, human society has undergone tremendous changes. People can communicate more conveniently, and the exchange of information is becoming more and more frequent. [0003] Before the two devices in the digital communication system need to exchange data, in order to ensure the security of the exchanged data, the two devices need to recognize each other’s identity. Encrypt transmission with session key. [0004] At present, authentication key agreement methods include: based on public key encryption, based on digital signature, based on symmetric key, based on password and so on. However, a single authentication and encryption method is mostly used among exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 陈金强徐浩
Owner SHENZHEN STATE MICRO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products