Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal communication method and system

A terminal communication and terminal technology, applied in the field of network security, can solve problems such as poor scalability, inability to provide non-repudiation functions, and difficulty in key management

Active Publication Date: 2019-06-11
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, the traditional symmetric encryption method has problems such as difficulty in key management, poor scalability, and inability to provide the function of preventing repudiation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal communication method and system
  • Terminal communication method and system
  • Terminal communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them.

[0128] Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0129] Below at first some functions and symbols used by the present invention are described:

[0130] Signature function SIGN-enc(message, key), which is expressed as a signature operation function for message message using private key key;

[0131] Name verification function SIGN-dec(message, key), which is expressed as a name verification operation function for message message using public key key;

[0132] Asymmetric encryption func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal communication method, used to realize secure communication between terminals, comprising: sending a network registration request to a server, and receiving a registration code generated and transmitted by the server; sending a session key generation request to the server, and receiving a request from the server Generate and transmit the temporary identification code generated according to the identification code of the terminal, and generate a session private key according to the registration code, the temporary identification code and the random number generated by the terminal; and send to the server the communication with the second terminal request, receiving the session public key sent by the server, and obtaining the session private key of the second terminal according to the session private key of the terminal and the session public key, so as to perform secure communication with the second terminal. The invention also provides a terminal communication system. The invention can ensure identity confidentiality, location confidentiality and untraceability in the communication process, thereby ensuring communication security of users.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a terminal communication method and system. Background technique [0002] With the continuous improvement of the level of science and technology, mobile phones have become a daily necessities that people carry with them, gradually changing people's work and lifestyle. While people use mobile phones to obtain the convenience of mobile communication, they also have higher requirements for information security in communication. [0003] At present, in the mobile communication system, in order to ensure the security and confidentiality of information between users, it is very important to realize the confidential communication, which requires encryption protection for the transmitted data. Encryption and protection of data is to use encryption algorithms on both sides of the communication. The sender encrypts the data to be transmitted according to the selected encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L63/06H04L63/0823H04L63/083H04L63/0876H04L65/1073H04L9/40
Inventor 汤镇辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD