Check patentability & draft patents in minutes with Patsnap Eureka AI!

A link session key negotiation method and device

A session key and link technology, applied in the field of information security, can solve the problem that session keys are easy to be illegally intercepted, and achieve the effect of not easy to be cracked by malicious programs and strong anti-attack ability.

Active Publication Date: 2019-05-10
FEITIAN TECHNOLOGIES
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key agreement method commonly used in the prior art is that one of the communication parties generates a random number, and then sends the random number to the other party, so as to ensure that the communication parties share a random number as the session key, and the transmitted information is Encryption and decryption, this negotiation method is the simplest, but the session key is also the easiest to be illegally intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A link session key negotiation method and device
  • A link session key negotiation method and device
  • A link session key negotiation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a smart key device (referred to as the device in this embodiment) as an example. Two pairs of key pairs (KeyPair1 and KeyPair2), respectively the first public key and the first private key, the second public key and the second private key, preferred KeyPair1 and KeyPair2 are two pairs of RSA key pairs, in the present embodiment The PKCS#1 filling mode is specifically the RSA PKCS1 filling mode; the first private key corresponding to the device is stored in the host computer in advance, and the second preset data and the first preset data are also stored in the host computer and the device respectively. set data. Such as figure 1 As shown, the negotiation process provided by this embodiment includes the following contents:

[0054] Step 101: The device establishes a connection with the host computer;

[0055] Preferably, the de...

Embodiment 2

[0115] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a smart key device (referred to as a device in this embodiment) as an example, as shown in image 3 As shown, the negotiation process provided by this embodiment includes the following contents:

[0116] Step 301: the device establishes a connection with the host computer;

[0117] Step 302: the device generates a random number, and saves the random number as a link session key;

[0118] Specifically, the device generates a 16-byte random number and saves it as a link session key.

[0119] Preferably, each time the device is powered on, that is, when a connection is established with the host computer, a random number is generated, and the previously saved random number is overwritten with the newly generated random number.

[0120] Step 303: The upper computer sends an instruction to obtain a link session key to the device;

...

Embodiment 3

[0140] This embodiment provides a method for negotiating a link session key, taking the negotiation of a link session key between a host computer and a device as an example, where a pair of RSA key pairs are pre-stored in the device, and in this embodiment The PKCS#1 filling mode is specifically the RSA PKCS#1 filling mode; that is, the device public key and the device private key described in this embodiment, and the device public key exists in the form of the first public key data and the second public key data; as Figure 5 As shown, the negotiation process provided by this embodiment includes the following contents:

[0141] Step 501: The upper computer establishes a connection with the device;

[0142] Step 502: The host computer sends an instruction to obtain the first public key data to the device;

[0143] Step 503: the device receives the instruction to obtain the first public key data;

[0144] Step 504: The device returns the preset first public key data to the ho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a link session key negotiation method and device and belongs to the technical field of information safety.The method comprises the steps that an intelligent key device returns a second public key to an upper computer, and decrypts second preset data from a link session key acquiring request sent from the upper computer through a second private key; when the second preset data consists with first preset data stored in the intelligent key device, the intelligent key device generates a random number, a link session key is composed according to the random number and the preset data, and the random number is returned to the upper computer.By means of the link session key negotiation method and device, the link session key can be effectively prevented from being illegally intercepted, communication data is encrypted and decrypted through the link cession key when the upper computer and the intelligent key device are in communication, and thus the safety of transmission of the communication data is improved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a link session key negotiation method and device. Background technique [0002] With the rapid development of electronic information technology, network communication through the Internet (such as network transactions, system login, etc.) Information. In order to prevent information from being illegally intercepted, the two communicating parties first generate a session key through negotiation, and encrypt the transmitted information with the session key. The key agreement method commonly used in the prior art is that one of the communication parties generates a random number, and then sends the random number to the other party, so as to ensure that the communication parties share a random number as the session key, and the transmitted information is Encryption and decryption, this negotiation method is the simplest, but the session key is also the easiest to be il...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
CPCH04L9/0838H04L9/0869H04L9/088H04L9/30H04L63/061
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More