Unlock instant, AI-driven research and patent intelligence for your innovation.

Management method of RSSP-II secure communication protocol key management mechanism

A technology of key management and secure communication, which is applied in the management field of the key management mechanism of the RSSP-II secure communication protocol, which can solve the problems of complex communication relationships, difficult implementation, and large amount of calculation, and achieve the effect of reducing risks

Active Publication Date: 2019-02-12
BEIJING JIAOTONG UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology improves upon how secure communication systems are managed through specific mechanisms like RSSI (Reliable Secure Internet Protocol) Signaling System II). It uses different types of keys for authentication purposes rather than transmitting them over wireless networks. By introducing a system that combines symmetric cryptography techniques with other methods such as asymmetrical ones, shared verifying keys reduce human error during managing these keys within designated areas.

Problems solved by technology

Technological Problem addressed in this patents relates to improving the reliance of wireless communications systems during operation without compromising their functionality. Current methods involve sending secret messages over wired connections, but these techniques have limitations in terms of scalability, availability, and maintaining security at high speeds.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management method of RSSP-II secure communication protocol key management mechanism
  • Management method of RSSP-II secure communication protocol key management mechanism
  • Management method of RSSP-II secure communication protocol key management mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0120] Embodiment 1: Implement under the CTCS-3 train control system:

[0121] Figure 6-1 A schematic diagram of information interaction between ground safety-related equipment of a CTCS-3 train control system provided by an embodiment of the present invention, Figure 6-2 It is a schematic diagram of the railway safety communication protocol corresponding to different interfaces between ground equipment. Such as Figure 6-1 with 6-2 As shown, in the CTCS-3 train control system, the ground equipment includes RBC (Radio Block Center), TSRS (Temporary Speed ​​Limit Server), CTC (Centralized Dispatching), CBI (Computer Interlocking) and TCC (Train Control Center). Among them, RBC and TSRS, RBC and CBI, RBC and CTC, TSRS and CTC, RBC and adjacent RBC, TSRS and adjacent TSRS all use the RSSP-II security communication protocol for information exchange.

[0122] The specific implementation process is as follows:

[0123] a. Determine a cluster

[0124] All relevant node device...

Embodiment 2

[0145] Embodiment 2: The next generation train control system based on vehicle-to-vehicle communication:

[0146] Figure 8 An overall structural diagram of a next-generation train control system based on vehicle-to-vehicle communication provided by the embodiment of the present invention, as shown in Figure 8 As shown, the next-generation train control system takes the on-board equipment as the core, and integrates the train control function and interlocking function on the vehicle. The distance between vehicles is controlled, and its functional modules are mainly composed of ground equipment modules and vehicle equipment modules. Among them, the ground equipment module is composed of a train dispatching module (CTC), a train management unit module (TMU), an object controller module (OC) and a transponder module. The on-board equipment module is composed of train control module, interlock module, electronic map module and peripheral equipment module (DMI, etc.). Among the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a management method of a RSSP-II secure communication protocol key management mechanism. The method comprises the following steps: when a verification key stored by each node device in one cluster reaches its updating time, each node device elects a master node device through a set voting mechanism; the master node device generates a new verification key, encrypts the verification key and related information through a public key encryption method, and then shares the new verification key with the other node devices; each node device builds a new secure connection throughthe new verification key, and performs data communication through the new secure connection. In the method provided by the invention, a key management mechanism in a RSSP-II protocol is improved, a transmission key is replaced by an asymmetric key, a distributed consensus mechanism is introduced, and in combination with an asymmetric encryption algorithm, uniform sharing or updating of the verification key among all the related node devices in a designated area is realized.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner BEIJING JIAOTONG UNIV