Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for ensuring system communication security, secure communication device, public key server

A technology for secure communication and system communication, which is applied in the fields of secure communication equipment and public key servers, and can solve problems such as cumbersome use, cumbersome setting or updating of keys, etc.

Active Publication Date: 2019-11-26
快普特奥姆特里加拿大公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods are more cumbersome to use
For example, these methods often involve out-of-band key exchange, making setting or updating keys cumbersome and therefore performed infrequently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for ensuring system communication security, secure communication device, public key server
  • Method for ensuring system communication security, secure communication device, public key server
  • Method for ensuring system communication security, secure communication device, public key server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] figure 1 A block diagram of a system 100 for secure communications is shown. At least one secure communication terminal (secure communication terminals 104 - 1 and 104 - 2 ) can be connected to the public key server 112 via the network 108 . Safety communication terminals 104 - 1 and 104 - 2 are referred to as safety communication terminals 104 , and are collectively referred to as safety communication terminals 104 . This nomenclature is also used elsewhere in the specification. The secure communication terminals 104 may be based on any suitable computing environment, and are not particularly limited in type, as long as each secure communication terminal 104 is capable of receiving, processing, and sending secure communications. In this embodiment, the secure communication terminal 104 is configured to at least execute instructions capable of interacting with network services provided by the public key server 112 (host) to establish secure communication. Although in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for ensuring system communication security, a security communication device, and a public key server. A method for providing a new enhanced public key by a secure communication terminal having a processor operatively connected to a memory and a communication interface for securing system communications, the method comprising: generating, by the processor, a a first part for authenticating a customer account; the processor generates a second part for authenticating a public key server; the processor generates an asymmetric public key and a corresponding asymmetric private key; the processor generates the The first part, the second part and the asymmetric public key are combined to form a new enhanced public key; the enhanced public key is normalized by the processor based on the size of the asymmetric public key.

Description

[0001] Cross References to Related Applications [0002] This application claims U.S. Provisional Application no. 61 / 934,341 filed January 31, 2014, U.S. Provisional Application no. 62 / 038,589 filed August 18, 2014, and U.S. Provisional Application no. Priority of 62 / 090,632, the entire contents of which are hereby incorporated by reference. technical field [0003] The invention relates to the field of data communication, in particular to a method for ensuring system communication security, a method for receiving an enhanced public key, a method for receiving and sending secure communication, a secure communication device, and a public key server. Background technique [0004] Data security is extremely important as more and more data is collected and maintained in web-based systems. An important aspect of security is secure communication between devices. Specifically, huge amounts of data are exchanged between network-connected devices every minute. This exchange takes ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/0822H04L9/0866H04L9/14H04L9/0891H04L9/3228H04L9/0869H04L9/16H04L9/30H04L2209/24H04L9/0825
Inventor M·C·特谢拉
Owner 快普特奥姆特里加拿大公司