Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key management method and system

A key management and key management technology, applied in the field of key management, can solve the problems of key information theft, communication content monitoring and theft, user security risks, etc., to ensure safe transmission, improve generation security and transmission security. Effect

Inactive Publication Date: 2017-03-22
SHENZHEN GIONEE COMM EQUIP
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, smart terminal devices such as smartphones are widely popularized. When users use these smart terminal devices to communicate, the communication content is easily monitored and stolen by malicious software.
However, the existing encrypted communication methods usually use software encryption algorithm or hardware encryption algorithm, and the key information is generated by one party and sent directly to the other party. The call process is maliciously attacked, bringing security risks to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key management method and system
  • Key management method and system
  • Key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] see figure 1 , figure 1 It is a schematic flowchart of a key management method provided in Embodiment 1 of the present invention. The execution subject of this embodiment includes a local device, a peer device terminal, and a server, wherein both the local device and the peer device are terminals The device, specifically, may be a device such as a smart phone or other smart terminals. figure 1 The illustrated method of key management may include the following steps:

[0037] S101. If the local device detects that the user triggers the operation of communicating with the peer device, it sends a key application message to the key management server, wherein the key application message carries the local device identifier, and the key application message is used to apply for session key.

[0038] Specifically, the key management server is mainly used to complete key generation, encrypted storage, encryption and decryption process, and key management.

[0039] When the lo...

Embodiment 2

[0054] see figure 2 , figure 2 It is a schematic flowchart of a key management method provided in Embodiment 2 of the present invention. The execution subject of this embodiment includes a local device, a peer device terminal, and a server, wherein both the local device and the peer device are terminals The device, specifically, may be a device such as a smart phone or other smart terminals. figure 2 The illustrated method of key management may include the following steps:

[0055] S201. If the local device detects that the user triggers an operation to communicate with the peer device, create an application packet.

[0056] Specifically, when the local device detects that the user of the local device triggers a communication operation with the peer device, before establishing a communication connection with the peer device, the local device creates an application packet, which is used to send the key management server Apply for the session key used in the encrypted comm...

Embodiment 3

[0098] see image 3 , image 3 It is a schematic block diagram of a key management system provided by Embodiment 3 of the present invention. For ease of description, only parts related to the embodiments of the present invention are shown. image 3 The example key management system 300 may be the subject of execution of the key management method provided in the first embodiment. image 3 The exemplary key management system 300 mainly includes a local device 31, a peer device 32, and a key management server 33, and the details are as follows:

[0099] The local equipment 31 includes:

[0100] The key application unit 311 is configured to send a key application message to the key management server 33 if it is detected that the user triggers an operation to communicate with the peer device, wherein the key application message carries the identity of the local device, and the key application The message is used to apply for a session key;

[0101] The communication request un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a key management method and system. The key management method includes the steps: if home terminal equipment detects that a user triggers the operation on opposite terminal equipment, the home terminal equipment sends a key application message to a key management server; according to the received key application message, the key management server generates a session key corresponding to an identifier of the home terminal equipment randomly, and sends the session key to the home terminal equipment; if the home terminal equipment receives the session key, the home terminal equipment sends a communication request to the opposite terminal equipment; according to the identifier of the home terminal equipment included in the communication request, the opposite terminal equipment requests the key management server to acquire the session key corresponding to the home terminal equipment; and if the opposite terminal equipment receives the session key, the opposite terminal equipment gives a response to the communication request and establishes communication connection with the home terminal equipment. The technical scheme of the key management method and system enables both the home terminal equipment and the opposite terminal equipment to safely acquire the session key of the communication of this time, thus improving generation safety and transmission safety for the session key, and guaranteeing safe transmission of the communication content.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a key management method and system. Background technique [0002] At present, smart terminal devices such as smart phones are widely popularized. When users use these smart terminal devices to communicate, the communication content is easily monitored and stolen by malicious software. However, the existing encrypted communication methods usually use software encryption algorithm or hardware encryption algorithm, and the key information is generated by one party and sent directly to the other party. The call process is maliciously attacked, which brings security risks to users. Contents of the invention [0003] Embodiments of the present invention provide a key management method and system, which can improve key generation security and transmission security of encrypted communication, thereby ensuring secure transmission of communication content. [0004] In a f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04L29/06H04W12/0433
CPCH04L63/062H04W12/04
Inventor 刘岩
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products