Secret key negotiation method and device

A key negotiation and key technology, applied in the field of information security, can solve the problems of low security, complicated operation, and inability to authenticate terminal equipment, and achieve the effect of reducing costs

Active Publication Date: 2017-04-26
MIDEA SMART TECH CO LTD +1
View PDF5 Cites 120 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the above method of using the SSL protocol for security services, due to the large memory usage of SSL, most terminal devices cannot run SSL, and SSL needs to rely on a thi...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key negotiation method and device
  • Secret key negotiation method and device
  • Secret key negotiation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0035] The method and device for key agreement in the embodiments of the present application are described below with reference to the accompanying drawings.

[0036] Usually, when SSL provides security services for network communication, it uses a CA certificate on the device side, encrypts and decrypts through the public-private key pairing of the device, and completes the authentication of the server.

[0037] For example, the terminal device sends a connection request to the server, and the server sends its own CA certif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key negotiation method and a secret key negotiation device. The secret key negotiation method comprises the steps of: generating a first random number, encrypting the first random number and identification information of terminal equipment by using a first public key of a cloud server to generate a first ciphertext; sending a secret key negotiation request containing the first ciphertext and a second public key of the terminal equipment to the cloud server; receiving a secret key negotiation response containing a second ciphertext sent after the cloud server verifies that the terminal equipment is legal and a session key containing the first random number is encrypted by using the second public key; decrypting the second ciphertext by using a second private key, encrypting a first character string which negotiates with the cloud server in advance by using the session key when the first random number is obtained, and sending a secret key confirmation response containing a third ciphertext to the cloud server. The secret key negotiation method can complete the bidirectional identity authentication of the terminal equipment and the cloud server, establishes reliable and secure connection, reduces cost, improves security of data transmission, and is high in efficiency.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a key agreement method and device. Background technique [0002] Generally, SSL (Secure Sockets Layer, Secure Sockets Layer), as a security protocol that provides security and data integrity for network communication, is often used to confirm the identities of both parties when the terminal device communicates with the relevant server, and for Avoid data leakage, encryption of communication data, etc. [0003] However, in the above method of using the SSL protocol for security services, due to the large memory usage of SSL, most terminal devices cannot run SSL, and in the process of performing SSL services, a third-party CA company is required, and the operation is too complicated. And only the server can be authenticated, but the terminal device cannot be authenticated, so the security is low. Contents of the invention [0004] The purpose of this ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0838H04L9/0869H04L9/3236H04L9/3273H04L63/0442H04L63/06H04L63/0869H04L63/0876
Inventor 刘复鑫
Owner MIDEA SMART TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products