Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and equipment for acquiring symmetric key

A symmetric key and key technology, applied in the field of communication security, can solve the problems of low security, sensitive data such as symmetric keys are easy to be stolen, and the process is cumbersome, so as to achieve the effect of enhancing security, convenient and quick update or upgrade

Active Publication Date: 2019-01-04
FEITIAN TECHNOLOGIES
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, the common method is to use special equipment to inject sensitive data such as symmetric keys into the device in plain text or simple encryption; if the user wants to update or upgrade the symmetric key of the device, the device must be returned to the factory (Let the manufacturer update or upgrade the symmetric key), the process is very cumbersome; in addition, users can use non-special equipment to update or upgrade the symmetric key of the device, but at this time the sensitive data such as the symmetric key is extremely easy to be stolen, and the security Low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for acquiring symmetric key
  • Method and equipment for acquiring symmetric key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1 provides a method for obtaining a symmetric key, including the following steps:

[0035] Step 101: The device receives the key transmission instruction sent by the host computer, parses the key transmission instruction to obtain the key block data;

[0036] Step 102: The device acquires a preset protection key; obtains the first key according to the protection key, first preset data, and second preset data;

[0037] Optionally, in step 102, the first key is obtained according to the protection key, the first preset data and the second preset data, specifically:

[0038] The device calculates the first preset data according to the protection key to obtain the first data, and obtains the first key according to the first data and the second preset data;

[0039] Further, the device calculates the first preset data according to the protection key to obtain the first data, and obtains the first key according to the first data and the second preset data, specifi...

Embodiment 2

[0069] The second embodiment provides a method for obtaining a symmetric key, which can be performed directly in a public network environment without using special equipment; the method is as follows: figure 2 shown, including the following steps:

[0070] Step 201: The device receives the key transmission instruction sent by the host computer, parses the key transmission instruction to obtain the key block data;

[0071] 例如,密钥块数据为42303043305030544530304530303030364338354246323437383333393938443230394643374341373931453146414135343339433735303039373946413132463943363937334539373639354346323041373137423232 3131373738384437;

[0072] Step 202: The device judges whether the total length of the received key block data is legal according to the preset length, and if so, executes Step 203, otherwise returns an error code to the host computer;

[0073] Specifically, the device judges whether the total length of the received key block data is equal to the preset length, if yes, the t...

Embodiment 3

[0188] Embodiment 3 provides a device for obtaining a symmetric key, including a receiving module 301, a first parsing module 302, a second parsing module 303, a first obtaining module 304, a first obtaining module 305, a second obtaining module 306, The third obtaining module 307, the fourth obtaining module 308, the fifth obtaining module 309, the sixth obtaining module 310, the second obtaining module 311, the storing module 312 and the sending module 313;

[0189] The receiving module 301 is used to receive the key transmission instruction sent by the host computer;

[0190] The first parsing module 302 is configured to parse the key transmission instruction received by the receiving module 301 to obtain key block data;

[0191] The second parsing module 303 is configured to parse the key block data parsed by the first parsing module 302 to obtain a key block header field, a key block data field, and a key block MAC value;

[0192] A first obtaining module 304, configured...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and equipment for acquiring a symmetric key, relating to the field of communication security. The method comprises the steps of: receiving and parsing a key transmission instruction sent by an upper computer by means of the equipment to obtain a key block header field, a key block data field and a key block MAC value; acquiring a first secret key and a second secret key according to a protective key, first preset data, second preset data, ninth preset data and tenth preset data; acquiring an encrypted key and a MAC key according to the protective key, the firstsecret key, third preset data, fourth preset data, fifth preset data, sixth preset data, seventh preset data and eighth preset data; acquiring first plaintext data according to the encrypted key, thekey block data field and the key block MAC value; acquiring a second MAC value according to the MAC key, the first plaintext data, the key block header field and the second secret key; and acquiringthe symmetric key from the first plaintext data when the second MAC value is identical with the key block MAC value, storing the symmetric key, and returning a key transmission success response to theupper computer.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method and equipment for obtaining a symmetric key. Background technique [0002] When transmitting transaction information between two devices that support the symmetric key system, it is necessary to use sensitive data such as symmetric keys to encrypt transaction information and verify data integrity, but first, sensitive data such as symmetric keys need to be Stored inside the device to encrypt and verify transaction information. In the existing technology, the common method is to use special equipment to inject sensitive data such as symmetric keys into the device in plain text or simple encryption; if the user wants to update or upgrade the symmetric key of the device, the device must be returned to the factory (Let the manufacturer update or upgrade the symmetric key), the process is very cumbersome; in addition, users can use non-special equipment to update or upg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0822H04L9/0891
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products