Pre-shared key obtaining method, pre-shared key distribution method and pre-shared key distribution device

A pre-shared key and acquisition device technology, applied in the field of information security, can solve the problems of reduced IKE negotiation security, easy cracking of the pre-shared key, etc., and achieve the effect of improving security

Active Publication Date: 2016-07-13
NEW H3C TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the present application provides a method and device for obtaining and distributing a pre-shared key to solve the problem of reduced security of IKE negotiation due to the fact that the pre-shared key is easily cracked in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pre-shared key obtaining method, pre-shared key distribution method and pre-shared key distribution device
  • Pre-shared key obtaining method, pre-shared key distribution method and pre-shared key distribution device
  • Pre-shared key obtaining method, pre-shared key distribution method and pre-shared key distribution device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0049]The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a pre-shared key obtaining method, a pre-shared key distribution method and a pre-shared key distribution device. The pre-shared key obtaining method comprises: receiving negotiation message for building an Internet safety tunnel sent by a terminal device; determining whether the negotiation message includes the user information of the terminal device or not; if the negotiation message includes the user information of the terminal device, sending the user information to a server to facilitate randomly generating a pre-shared key when the server is determined to store the user information by itself, and sending to pre-shared key to a network device and the terminal device; receiving the pre-shared key, corresponding to the user information, sent by the server; and employing the pre-shared key and the terminal device to perform follow-up message negotiation. According to the embodiment of the invention, the pre-shared key obtaining method, the pre-shared key distribution method and the pre-shared key distribution device employ a pre-shared key to perform negotiation so as to prevent the pre-shared key from being solved by attackers and avoid pretending to be a real user to access the internal network for data stealing, therefore the safety of the IKE negotiation is improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a method and device for obtaining and distributing a pre-shared key. Background technique [0002] With the development of secure communication technology, at present, almost all IP security (IPsec, IPSecurity) tunnels are negotiated by Internet Key Exchange (IKE, InternetKeyExchange). Its most widely used scenario is that the user uses IKE to negotiate with the gateway of the company's intranet to establish an IPsec tunnel to encrypt and access the company's intranet data. [0003] Among them, the negotiation process of IKE is divided into two independent negotiation phases. The first phase is the main mode negotiation phase with identity protection and can negotiate a large number of attributes; the second phase is the quick mode negotiation phase. [0004] In the first stage, a channel that has passed identity verification and security protection is est...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0844H04L63/061
Inventor 张太博
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products