A Method of Generating Trusted Keys
A key and trusted technology, applied in the field of information security, can solve problems such as cumbersome methods and complex implementations, and achieve the effect of reducing complexity and requiring low computing power
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, wherein the schematic embodiments and descriptions are only used to explain the present invention, but are not intended to limit the present invention.
[0025] The process of generating the key in the present invention involves three parties: a key requesting party, a key receiving party and a server. The key requesting party and the receiving party are two parties that need to perform encrypted communication on the network. The key requesting party is the party that initiates the encrypted communication, and the key requesting party initiates a key generation process. The key receiving method is a party that accepts encrypted communication, and cooperates with the key generation process initiated by the key requesting party.
[0026] The server is a neutral and trusted third party, which is used to register in advance all parties that need t...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com