A link session key negotiation method and device
A session key and link technology, applied in the field of information security, can solve the problem that session keys are easy to be illegally intercepted, and achieve the effect of not easy to be cracked by malicious programs and strong anti-attack ability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a smart key device (referred to as the device in this embodiment) as an example. Two pairs of key pairs (KeyPair1 and KeyPair2), respectively the first public key and the first private key, the second public key and the second private key, preferred KeyPair1 and KeyPair2 are two pairs of RSA key pairs, in the present embodiment The PKCS#1 filling mode is specifically the RSA PKCS1 filling mode; the first private key corresponding to the device is stored in the host computer in advance, and the second preset data and the first preset data are also stored in the host computer and the device respectively. set data. Such as figure 1 As shown, the negotiation process provided by this embodiment includes the following contents:
[0054] Step 101: The device establishes a connection with the host computer;
[0055] Preferably, the de...
Embodiment 2
[0115] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a smart key device (referred to as a device in this embodiment) as an example, as shown in image 3 As shown, the negotiation process provided by this embodiment includes the following contents:
[0116] Step 301: the device establishes a connection with the host computer;
[0117] Step 302: the device generates a random number, and saves the random number as a link session key;
[0118] Specifically, the device generates a 16-byte random number and saves it as a link session key.
[0119] Preferably, each time the device is powered on, that is, when a connection is established with the host computer, a random number is generated, and the previously saved random number is overwritten with the newly generated random number.
[0120] Step 303: The upper computer sends an instruction to obtain a link session key to the device;
...
Embodiment 3
[0140] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a device as an example, where a pair of RSA key pairs are pre-stored in the device, and in this embodiment The PKCS#1 filling mode is specifically the RSA PKCS#1 filling mode; that is, the device public key and the device private key described in this embodiment, and the device public key exists in the form of the first public key data and the second public key data; as Figure 5 As shown, the negotiation process provided by this embodiment includes the following contents:
[0141] Step 501: The upper computer establishes a connection with the device;
[0142] Step 502: The host computer sends an instruction to obtain the first public key data to the device;
[0143] Step 503: the device receives the instruction to obtain the first public key data;
[0144] Step 504: The device returns the preset first public key data to the ho...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



