Method and device for initial key distribution of terminal equipment with minimum key management cost

A technology of terminal equipment and initial key, applied in the field of information security, can solve the problems of administrator burden and high labor cost of application system

Active Publication Date: 2021-03-12
BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the key data will not enter the production environment and will not be known by the manufacturer of the terminal device. Its security is easy to guarantee, but it requires the administrator to build an additional pipeline dedicated to writing the initial key (sometimes known as a "Key Issuing Device")
Due to the various types and large quantities of terminal devices, the cost of such pipeline devices for writing initial keys and the labor costs required for operation and maintenance are relatively high, which will bring a huge burden to the administrators of the application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for initial key distribution of terminal equipment with minimum key management cost
  • Method and device for initial key distribution of terminal equipment with minimum key management cost
  • Method and device for initial key distribution of terminal equipment with minimum key management cost

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiments.

[0028] Unless expressly stated otherwise, throughout the specification and claims, the term "comprise" or variations thereof such as "includes" or "includes" and the like will be understood to include the stated elements or constituents, and not Other elements or other components are not excluded.

[0029] According to the terminal device initial key distribution method that minimizes the key management cost in the preferred embodiment of the present invention, on the premise of not using the public key infrastructure (PKI) system and the dedicated symmetric key issuing device, write the non- Confidential data and online execution of a set of interactive processes can generate a pair of shared initial keys between the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a terminal equipment initial key distribution method and device that minimizes the key management cost, wherein the terminal equipment initial key distribution method includes the following steps: in the offline environment, respectively write non- Confidential data; perform an online interaction process to achieve terminal device identity authentication; and perform an online interaction process to achieve management node identity authentication and initial key distribution. The terminal equipment initial key distribution method of the present invention can realize the distribution of terminal equipment initial key without PKI system or symmetric key management system and key issuing equipment. The characteristics of the DH key agreement protocol are used to realize the initial key distribution without any pre-set keys, and a two-way identity authentication mechanism is designed to make up for the problems that the DH protocol does not have identity authentication features and there is a risk of man-in-the-middle attacks.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for distributing an initial key of a terminal device that minimizes key management costs. Background technique [0002] Modern cryptography technology provides an efficient and reliable solution to the problem of information security protection in application systems. Considering multiple factors such as security and cost, designers of application system security solutions usually choose standardized cryptographic algorithms whose security has been fully demonstrated. In the case that the cryptographic algorithm itself does not have confidentiality characteristics, the security of the entire system depends entirely on the security of the key data. Therefore, the design of the key management scheme has become the focus of the system security scheme design. [0003] How to securely distribute the initial key is one of the most critical issues in key managem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0825H04L63/083H04L63/0869
Inventor 夏冰冰唐晓柯刘亮甘杰涂因子
Owner BEIJING SMARTCHIP MICROELECTRONICS TECH COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products