Key management method and system
A key management and key management technology, applied in the field of key management, can solve the problems of key information theft, communication content monitoring and theft, user security risks, etc., to ensure safe transmission, improve generation security and transmission security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] see figure 1 , figure 1 It is a schematic flowchart of a key management method provided in Embodiment 1 of the present invention. The execution subject of this embodiment includes a local device, a peer device terminal, and a server, wherein both the local device and the peer device are terminals The device, specifically, may be a device such as a smart phone or other smart terminals. figure 1 The illustrated method of key management may include the following steps:
[0037] S101. If the local device detects that the user triggers the operation of communicating with the peer device, it sends a key application message to the key management server, wherein the key application message carries the local device identifier, and the key application message is used to apply for session key.
[0038] Specifically, the key management server is mainly used to complete key generation, encrypted storage, encryption and decryption process, and key management.
[0039] When the lo...
Embodiment 2
[0054] see figure 2 , figure 2 It is a schematic flowchart of a key management method provided in Embodiment 2 of the present invention. The execution subject of this embodiment includes a local device, a peer device terminal, and a server, wherein both the local device and the peer device are terminals The device, specifically, may be a device such as a smart phone or other smart terminals. figure 2 The illustrated method of key management may include the following steps:
[0055] S201. If the local device detects that the user triggers an operation to communicate with the peer device, create an application packet.
[0056] Specifically, when the local device detects that the user of the local device triggers a communication operation with the peer device, before establishing a communication connection with the peer device, the local device creates an application packet, which is used to send the key management server Apply for the session key used in the encrypted comm...
Embodiment 3
[0098] see image 3 , image 3 It is a schematic block diagram of a key management system provided by Embodiment 3 of the present invention. For ease of description, only parts related to the embodiments of the present invention are shown. image 3 The example key management system 300 may be the subject of execution of the key management method provided in the first embodiment. image 3 The exemplary key management system 300 mainly includes a local device 31, a peer device 32, and a key management server 33, and the details are as follows:
[0099] The local equipment 31 includes:
[0100] The key application unit 311 is configured to send a key application message to the key management server 33 if it is detected that the user triggers an operation to communicate with the peer device, wherein the key application message carries the identity of the local device, and the key application The message is used to apply for a session key;
[0101] The communication request un...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com