Supercharge Your Innovation With Domain-Expert AI Agents!

A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers

A mobile phone application and secure communication technology, applied in the field of information security, can solve problems such as low efficiency, occupying storage space, slow processing speed, etc., and achieve the effect of improving efficiency

Inactive Publication Date: 2015-11-04
闪捷信息科技有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The usual secure communication method is SSL / TLS, but it requires a third-party certification authority, must have the support of an online certificate library, and needs to maintain a database with a large amount of data, which takes up a lot of storage space and is not efficient at runtime. High, processing speed is very slow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers
  • A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0034] CPK is short for Combined Public Key. The CPK key management system is a discrete logarithm-hard problem-based identification (identity) key generation and management system. It constructs the public key and private key matrix based on the mathematical principle of the discrete logarithm problem, and uses the hash function and cryptographic transformation to map the identity of the entity into a sequence of row coordinates and column coordinates of the matrix, which is used to select and combine matrix elements , to generate a large number of public and private key pairs composed of public keys and private keys, so as to realize ultra-large-scale key producti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers. The method comprises steps of user warrant application and safety communication. Through adoption of CPK authentication technology, safe encryption communication between the intelligent handset applications and between the intelligent handset applications and the servers can be carried out; databases with large amount of data do not need to be maintained; and the operation efficiency is substantially raised.

Description

technical field [0001] The invention relates to information security technology, in particular to a CPK-based secure communication mode between smart phone applications and between mobile phone application servers. Background technique [0002] With the development of the Internet, the requirements for computer and network security are getting higher and higher, and corresponding encryption algorithms and technologies are also developing vigorously. The current encryption technology can be divided into two categories, namely symmetric key technology and asymmetric key technology. Among them, the asymmetric key technology is widely used because it can avoid the need of transmitting the decryption key, that is, the private key through the network. [0003] The most well-known technology for asymmetric keys is PKI (Public Key Infrastructure). The operation of PKI relies on two major components: a hierarchical CA (Certification Authority) organization and a huge certificate li...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/083
Inventor 宗旭王一磊石晓彬汤磊
Owner 闪捷信息科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More