Supercharge Your Innovation With Domain-Expert AI Agents!

A Method of Generating Trusted Keys

A key and trusted technology, applied in the field of information security, can solve problems such as cumbersome methods and complex implementations, and achieve the effect of reducing complexity and requiring low computing power

Active Publication Date: 2022-01-04
北京可信华泰科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are already some key generation methods in the prior art, but these methods are usually cumbersome and complicated to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Generating Trusted Keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, wherein the schematic embodiments and descriptions are only used to explain the present invention, but are not intended to limit the present invention.

[0025] The process of generating the key in the present invention involves three parties: a key requesting party, a key receiving party and a server. The key requesting party and the receiving party are two parties that need to perform encrypted communication on the network. The key requesting party is the party that initiates the encrypted communication, and the key requesting party initiates a key generation process. The key receiving method is a party that accepts encrypted communication, and cooperates with the key generation process initiated by the key requesting party.

[0026] The server is a neutral and trusted third party, which is used to register in advance all parties that need t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for generating a trusted key. In the method, the two parties involved in key generation generate corresponding connection information respectively, and send the connection information to the server after being hashed, and the server checks the information according to the received information. After the identities of both parties are verified, keys are randomly generated for both parties. The method is simple and reliable, has low requirements on computing power, and can be adapted to various computing devices.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for generating a credible key. Background technique [0002] In recent years, as the Internet begins to enter people's lives on a large scale, network security has increasingly become the focus of attention. In order to ensure the security and privacy of network communication, network communication usually needs to be carried out under an encrypted channel, which needs to be encrypted by a key. The key can be determined through prior negotiation, but for any two people on the network, there is no possibility of prior negotiation, and the encryption key between the two needs to be temporarily generated, and the negotiation needs to be carried out after confirming the other party. There are already some key generation methods in the prior art, but these methods are generally cumbersome and complicated to implement. Contents of the invention [0003] In o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/0869
Inventor 田健生杨秩
Owner 北京可信华泰科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More