Method and device for upgrading cryptographic algorithm

A cryptographic algorithm and encryption algorithm technology, applied in the field of cryptographic algorithm upgrades, can solve problems such as man-in-the-middle attacks, algorithm insecurity, and spoofing attacks

Active Publication Date: 2020-06-26
HONOR DEVICE CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, these cryptographic algorithms used in the upgrade process may be unsafe algorithms, so these unsafe cryptographic algorithms can be disabled when upgrading the cryptographic algorithms. When all cryptographic algorithms on the mobile terminal are disabled, the server and mob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for upgrading cryptographic algorithm
  • Method and device for upgrading cryptographic algorithm
  • Method and device for upgrading cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] An embodiment of the present invention provides a method for upgrading a cryptographic algorithm, which is used to improve the security in the process of upgrading the cryptographic algorithm. The details are described below respectively.

[0071] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0072] The terms "first", "second", "third", "fourth", etc. (if any) in the descripti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed in the embodiments of the present invention are a method and relative device for upgrading cryptographic algorithm used for improving security in the process of upgrading cryptographic algorithm. The method in the embodiments of the present invention comprises: a server transmits a upgrading signal of the cryptographic algorithm to a device to be upgraded, chooses, from a target algorithm set, one or more target algorithms to perform cascade to generate a cascade algorithm when determining that all the algorithms in the target algorithm set are disabled algorithms after receiving a connection request sent from the device to be upgraded, and upgrades the cryptographic algorithm for the device to be upgraded by the upgrading packet of the cascade algorithm and cryptographic algorithm. As the cascade algorithm can improve the strength of algorithm security effectively, the security during the process of upgrading cryptographic algorithm can be improved effectively.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for upgrading a cryptographic algorithm and related equipment. Background technique [0002] With the wide application of mobile terminals, the security requirements for mobile terminals are also getting higher and higher, especially applications such as instant messaging and mobile payment have strong security requirements. All kinds of cryptographic algorithms are the core part to realize the security guarantee and support the normal operation of the security system, so they are widely used in various places of mobile terminals. [0003] In the prior art, a general method for upgrading a mobile terminal is: a server issues an upgrade package, and the mobile terminal downloads the upgrade package and then performs the upgrade. Multiple links in the upgrade process must use cryptographic algorithms for security protection. [0004] However, these cryptographic algorithms used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06
CPCH04L9/06
Inventor 黄征郝勇钢龙宇来学嘉陈璟
Owner HONOR DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products