Communication link protection method and device

A communication link and link encryption technology, applied in the field of communication link protection methods and devices, to achieve the effect of improving security

Active Publication Date: 2018-07-20
FEITIAN TECHNOLOGIES
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is too simple, there is no factor involved in the calling end, and there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication link protection method and device
  • Communication link protection method and device
  • Communication link protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] An embodiment of the present invention provides a communication link protection method, such as figure 1 shown, including:

[0044] Step 101, the device generates a device-side temporary negotiation private key and a device-side temporary negotiation public key;

[0045] The base point of the elliptic curve used in this embodiment is (00 CDB9CA7F 1E6B0441 F658343F 4B10297C0EF9B649 1082400A 62E7A748 5735FADD, 01 3DE74DA6 5951C4D76DC89220 D5F7777A611B2C381C83E260B)

[0046] The order of the elliptic curve is 7FFFFFFF FFFFFFFF FFFFFFFF FFFFFFFF BC972CF7 E6B6F900945B3C6A 0CF6161D;

[0047] Specifically, the device side generates the device side temporary negotiation private key and the device side temporary negotiation public key as follows: the device side generates the first random number as the device side temporary negotiation private key; the device side uses the first random number multiple of the elliptic curve base point as The device temporarily negotiates the publ...

Embodiment 2

[0111] An embodiment of the present invention provides a communication link protection method, such as figure 2 shown, including:

[0112] Step 201, the device side generates a device-side temporary negotiation private key and a device-side temporary negotiation public key, and generates a third random number as the distinguishable identifier of the caller;

[0113] Specifically, the device side generates the device side temporary negotiation private key and the device side temporary negotiation public key as follows: the device side generates the first random number as the device side temporary negotiation private key; the device side uses the first random number multiple of the elliptic curve base point as The device temporarily negotiates the public key; and generates a third random number as the distinguishable identifier of the caller;

[0114] Step 202, the caller generates the caller's temporary negotiation private key and the caller's temporary negotiation public key...

Embodiment 3

[0175] This embodiment provides a communication link protection device, see image 3 , including: the device side and the calling side;

[0176] The device side includes:

[0177] The first generation module is used to generate a device-side temporary negotiation private key and a device-side temporary negotiation public key;

[0178] Specifically, the first generating module is specifically configured to generate a first random number as a temporary private key for device-side negotiation; and the device-side uses a multiple of the first random number of the base point of the elliptic curve as a temporary public key for device-side negotiation.

[0179] The first sending module is used to send the device-side temporary negotiation public key and the device-side public key to the caller;

[0180] The first receiving module is used to receive the caller's temporary negotiation public key, the first check value and the caller's public key sent by the caller;

[0181] The seco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication field, in particular to a communication link protection method and device. The device comprises an equipment end and a calling end; the equipment end comprises a first generation module, a first sending module, a first receiving module, a second elliptic curve point generation module, a second link encryption key generation module, a second verification value generation module, a first judgment module, a first terminating module and a third verification value generation module; and the calling end comprises a second receiving module, a second generation module, a first elliptic curve point generation module, a first link encryption key generation module, a first verification value generation module, a fourth verification value generation module, asecond judgment module, a second terminating module and a second sending module. According to the device, factors of the calling end takes participate in the link encryption key negotiation process,and therefore the communication security is improved.

Description

technical field [0001] The invention relates to the communication field, in particular to a communication link protection method and device. Background technique [0002] At present, the method of communication link protection mainly adopts the method of digital envelope, that is, the RSA private key is preset at the device end, the RSA public key is preset at the caller end, the device generates a random number as a symmetric key and encrypted with the RSA private key, and the caller end uses the public key. Subsequent symmetric key communication is performed after the key is decrypted. This method is too simple, there is no factor involved in the calling end, and there are certain security risks. Contents of the invention [0003] The purpose of the present invention is to propose a communication link protection method and device in order to overcome the defects of the prior art. [0004] A communication link protection method, comprising: [0005] Step S1, the device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/0838H04L9/3066
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products