Key distribution method, device, apparatus, and storage medium

A key distribution and public key technology, applied in the field of communication, can solve the problem of low security of key distribution, and achieve the effect of improving security

Active Publication Date: 2018-12-25
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the key owner sends the key to the third party, the key is easily intercepted by the attacker, and the electronic certificate received by the receiving end may also be tampered with by the attacker, resulting in low key distribution security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution method, device, apparatus, and storage medium
  • Key distribution method, device, apparatus, and storage medium
  • Key distribution method, device, apparatus, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0040] The key distribution method provided by the present invention can be applied to figure 1 The communication system shown. Such as figure 1 As shown, the communication system includes: an access network device 11 , a terminal device 12 and a server 13 . It should be noted, figure 1 The communication system shown can be applied to different network standards, for example, it ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a key distribution method, a device, an apparatus and a storage medium. The method comprises: a block chain initiating node receives a user identification sentby a block chain participating node in a block chain network and a first public key of the user generated by the block chain participating node, the user identification and the first public key are signed by the block chain participating node using a first private key of the user generated by the block chain participating node; the block chain initiating node generates a second public key and a second private key of the user according to the user identification; the block chain initiating node uses the first public key to encrypt the second private key to obtain the encrypted second private key; the block chain initiating node broadcasts the user identification, the second public key and the encrypted second private key to the block chain network. The embodiment of the invention improvesthe security of key distribution.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a key distribution method, device, device, and storage medium. Background technique [0002] In the prior art, an electronic certificate is usually used to distribute the key, and the electronic certificate includes the key and identification information of the key owner. In order to ensure the authenticity of the electronic certificate, the electronic certificate needs to be signed by a trusted third party. [0003] The key owner needs to send the key to a trusted third party, and the third party generates an electronic certificate based on the key and the identification information of the key owner, signs the electronic certificate and sends it to the receiving end. As the key owner sends the key to a third party, the key is easily intercepted by an attacker. In addition, the electronic certificate received by the receiving end may also be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829
Inventor 肖征荣田新雪马书惠
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products