Certificate-based end-to-end key exchange method

A key exchange and certificate technology, applied in the information field, can solve problems such as high cost, lack of security protection means, and inconvenient use, and achieve the effects of improving efficiency, shortening waiting time, and preventing man-in-the-middle attacks and replay attacks

Active Publication Date: 2018-07-06
河南芯盾网安科技发展有限公司
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] To achieve encrypted communication between end-to-end devices, encryption keys need to be exchanged in advance. At present, most solutions use specific encryption devices to import keys for devices on site. This solu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below in conjunction with the embodiments, so that those skilled in the art can implement it with reference to the description.

[0033] It should be understood that terms such as "having", "comprising" and "including" as used herein do not entail the presence or addition of one or more other elements or combinations thereof.

[0034] A certificate-based end-to-end key exchange method, where the key refers to the public key, that is, terminal I obtains the public key of terminal II, and terminal II obtains the public key of terminal I synchronously, and terminal I is used as Example details, including:

[0035] Step 1. Terminal I obtains the public key of Terminal II. The specific process is as follows:

[0036] A1. When user X registers on terminal I, a public-private key pair is generated, including public key and private key. The public-private key pair here does not leave the factory synchronously with termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-based end-to-end key exchange method. The method comprises the following steps: first step, a terminal I obtains a public key of a terminal II, wherein the specific process is as follows: A1, the terminal I encrypts the public key and submits the same to a server; A2, the server decrypts the public key encrypted by the terminal I, a digital certificate authentication center creates a user certificate of the terminal I, and the server stores the user certificate of the terminal I; A3, the terminal I generates a request message for key exchange with the terminal II; A4, the server sends the user certificate of the terminal I to the terminal II, and after the terminal II agrees to the key exchange request, the server sends the user certificate of the terminal II to the terminal I; A5, the terminal I parses the public key of the terminal II from the user certificate of the terminal I and stores and the same. Similarly, the terminal II acquires the public key of terminal 1. By adoption of the certificate-based end-to-end key exchange method, the key exchange process is simplified, the man-in-the-middle attacks and replay attacks in the registrationprocess are prevented, and the security of the public key is improved.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a certificate-based end-to-end key exchange method. Background technique [0002] To achieve encrypted communication between end-to-end devices, encryption keys need to be exchanged in advance. At present, most solutions use specific encryption devices to import keys for devices on site. This solution is costly and inconvenient to use. A small number of end-to-end device keys are exchanged through the network, but lack of security protection means, and are extremely vulnerable to man-in-the-middle attacks and replay attacks. Contents of the invention [0003] It is an object of the present invention to solve at least the above-mentioned problems and to provide at least the advantages which will be described later. [0004] Another object of the present invention is to provide a certificate-based end-to-end key exchange method, which simplifies the key exchange process, im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04W4/14H04L9/32
CPCH04L9/0822H04L9/0863H04L9/3247H04L63/0428H04L63/061H04L63/0823H04W4/14
Inventor 王靖姚明月罗东平庞潼川杨成功
Owner 河南芯盾网安科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products