Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer-implemented system and method for secure session establishment and encrypted exchange of data

A technology for data exchange and secure encryption, applied in the field of security authentication and encrypted data exchange, and can solve the problems of light exchange

Active Publication Date: 2020-10-02
TATA CONSULTANCY SERVICES LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this exchange of authentication establishment requirements is not very lightweight

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer-implemented system and method for secure session establishment and encrypted exchange of data
  • Computer-implemented system and method for secure session establishment and encrypted exchange of data
  • Computer-implemented system and method for secure session establishment and encrypted exchange of data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The system of the present disclosure will now be described with reference to the embodiments shown in the drawings. This embodiment does not limit the scope and bounds of the present disclosure. This description relates only to example and preferred embodiments of the disclosed system and its suggested applications.

[0040] In the following description, the system of the present description and its various features and advantageous details will be explained with reference to non-limiting examples. Descriptions of well known parameters and processing techniques are omitted so as not to unnecessarily obscure the understanding of the embodiments herein. The examples used in this specification are intended only to facilitate an understanding of the manner in which the embodiments of this specification may be practiced and to further enable those skilled in the art to practice the embodiments of this specification. Therefore, the examples should not be construed as limiti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

System(s) and method(s) for secure session establishment and secure encrypted exchange of data are disclosed. The system meets certification requirements for general purpose networking / communication systems. It is easy to integrate with systems already using a scheme like DTLS-PSK. The system follows a cross-layer approach where dialog establishment is performed at a lightweight higher layer like the application layer. The system then passes the result parameters of this session establishment, including the session key, to the lower layers. The system performs channel encryption using a lower layer like the transport layer to exchange encrypted data through a secure dialogue according to a cross-layer approach. Since the exchange of data becomes the responsibility of lower layers like the transport layer, the data can be protected against replay attacks because the transport layer record encryption mechanism provides this protection.

Description

technical field [0001] The present disclosure relates to secure authentication and encrypted exchange of data between a server and a client. [0002] Definitions of terms used in this manual [0003] The expression "IoT" used hereinafter in this specification refers to the Internet of Things, in which uniquely identifiable objects are virtually represented in the structure of the Internet. [0004] The expression "M2M" used hereinafter in this specification refers to a machine-to-machine technology that allows both wireless and wired systems to communicate with heterogeneous devices. [0005] The expression "nonce" used in this specification below refers to a nonce that is used only once. [0006] The expression "datagram transport" used hereinafter in this specification refers to a connectionless transport protocol, an exemplary and common implementation of which is the User Datagram Protocol (UDP). [0007] The expression "preparation phase" used in this specification bel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04W4/70
CPCH04L63/0869H04L63/166H04L63/168H04L67/141H04L63/0435H04L9/0637H04L9/0869H04W4/70H04W12/033H04L63/0428H04L63/061H04W12/02
Inventor 阿比简·巴特查里亚图利卡·玻斯索玛·斑德尤帕迪亚阿吉特·优科尔阿潘·潘尔
Owner TATA CONSULTANCY SERVICES LTD