SA (security association) negotiation method, device and system
A technology for security association and communication equipment, applied in the field of digital information transmission, can solve the problems of complex SA negotiation implementation process, heavy communication load, etc., and achieve the effects of security supervision and legal monitoring, low communication load, and simple process.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0066] The embodiment of the present invention records an SA negotiation method, figure 2 It is a schematic diagram of the implementation flow of the SA negotiation method in the embodiment of the present invention, such as figure 2 shown, including:
[0067] Step 201: The key server generates a private key corresponding to the communication initiator and a private key corresponding to the communication responder for the communication initiator and the communication responder respectively;
[0068] The key server is configured for key management.
[0069] Preferably, the key server generates a master key, and determines the private key corresponding to the communication initiator according to the master key and the identity (ID, Identity) of the communication initiator, and, according to the The master key and the ID of the commu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com