Supercharge Your Innovation With Domain-Expert AI Agents!

One-way process forward-secure technology implement method

A technology of forward security and implementation method, which is applied in the field of one-way process forward security technology realization, can solve the unsolved problems of mobile communication forward security technology channel resources, calculation efficiency, etc., and achieve easy implementation, high fault tolerance, logic simple effect

Active Publication Date: 2017-05-31
XINGTANG TELECOMM TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In a word, according to the currently disclosed patents and known technologies, none of them solves the problems of channel resources and computing efficiency of forward security technologies in narrowband mobile Internet networks such as mobile communications (such as short messages), satellite communications, and microwave scattering.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-way process forward-secure technology implement method
  • One-way process forward-secure technology implement method
  • One-way process forward-secure technology implement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] In order to make the purpose and technical solution of the present invention clearer, based on the method proposed above, a specific example workflow of one-way process forward security interaction will be given according to the actual process scenario in the end-to-end non-center mode.

[0064] Such as Figure 5 as shown, Figure 5 It is a schematic flow chart of Embodiment 1 of the present invention. In this scenario, there are two types of devices, the sending end and the receiving end, which mainly include the following steps:

[0065] Step 501: Preset the same keystore at the sending end and the receiving end respectively;

[0066] Set the number of keystore groups N=128, the group number GID is 0~127, the initialization keystore of the sending end is Data_O (the format is: group version number V_O+group key data KEY_O), the initialization keystore of the receiving end is Data_T( The format is: group version number V_T+group key data KEY_T). The current versions...

Embodiment 2

[0076] In order to make the purpose and technical solution of the present invention more clear, based on the method proposed above, a specific example workflow of one-way process forward security interaction will be given according to the actual process scenario in the centered mode.

[0077]In this scenario, there are three types of devices: the sender, the center, and the receiver. Set the number of keystore groups N = 128, the group number GID is 0 to 127, and the initialization keystore of the sender (ID = 1) is Data_O (format It is: group version number V_O+group key data KEY_O), and record the current version Cur_V_O=0 of the sending end; the initialization keystore of the receiving end (ID=2) is Data_T (the format is: group version number V_T+group key data KEY_T ), and record the current version of the receiving end Cur_V_T=0; the central side saves the keystore and the current initial version information of the sending end and the receiving end as (ID=1, V_O_C=0, KEY_O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a one-way process forward-secure technology implement method, which comprises the following steps: a key store is preset on the sending end and receiving end, version number Cur-V and grope number GID are related; the sending end reads the key data from the key storage according to the GID and carry the version number Cur-V to send the business receiver, and updates key data and version number of the GID location; the receiver end calculates the version number Cur-V according to analyzing and obtains the GID, reads key data corresponded by the receiving end according to the Cur-V, compares the version number Cur-V and group version number in key data which is read, when the two are same and interlinked, the GID key data and version number to the location are updated after the business completes. The technical scheme is applied to the scenarios of the forward direction security requirements and has great reference value for the communication safety design in related fields.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for realizing forward security technology of one-way flow. Background technique [0002] Forward security technology is one of the key technologies in the field of cryptography. The so-called forward security concept means that even if the cryptographic algorithm, system parameters and current keys are leaked seriously, it will not endanger the security of users before that time period. Therefore, the harm caused by key leakage is greatly reduced. [0003] At present, there are few domestic patents involving forward security mechanisms. The main method is based on the asymmetric key system, and the forward security is achieved through multiple interactive key negotiations. The key evolution mechanism is complex and feasible. and poor usability. [0004] In the patent application titled an identity-based forward security digital signature method, device and syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16H04L9/12H04L9/08
Inventor 汪江萍丁雪瑶何力
Owner XINGTANG TELECOMM TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More