Certificate-based end-to-end key exchange method
A key exchange and certificate technology, applied in the information field, can solve problems such as high cost, lack of security protection means, and inconvenient use, and achieve the effects of improving efficiency, shortening waiting time, and preventing man-in-the-middle attacks and replay attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0032] The present invention will be further described in detail below in conjunction with the embodiments, so that those skilled in the art can implement it with reference to the description.
[0033] It should be understood that terms such as "having", "comprising" and "including" as used herein do not entail the presence or addition of one or more other elements or combinations thereof.
[0034] A certificate-based end-to-end key exchange method, where the key refers to the public key, that is, terminal I obtains the public key of terminal II, and terminal II obtains the public key of terminal I synchronously, and terminal I is used as Example details, including:
[0035] Step 1. Terminal I obtains the public key of Terminal II. The specific process is as follows:
[0036] A1. When user X registers on terminal I, a public-private key pair is generated, including public key and private key. The public-private key pair here does not leave the factory synchronously with termi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com