Communication methods and systems, electronic equipment and storage medium

A communication method and technology of a cryptographic device, applied in the field of computer-readable storage media, can solve problems such as man-in-the-middle attacks and replay attacks, and achieve the effects of ensuring security, avoiding man-in-the-middle attacks, and low cost

Inactive Publication Date: 2019-04-16
成都卫士通信息产业股份有限公司
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security scheme of end-to-end communication in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication methods and systems, electronic equipment and storage medium
  • Communication methods and systems, electronic equipment and storage medium
  • Communication methods and systems, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0059] The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.

[0060] The embodiment of the application discloses a communication method, which improves the security of end-to-end communication.

[0061] See figure 1 , A flowchart of a communication method according to an exemplary embodiment, such as figure 1 Shown, including:

[0062] S101: Acquire the first identity certificate and the first identity private key in the first registration information corresponding to the first client, and select the first secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses communication methods and systems, electronic equipment and a computer-readable storage medium. The method includes: acquiring a first identity certificate and a first identity private key corresponding to a first client, and selecting a first security mechanism parameter; using the first identity certificate, the first security mechanism parameter, a first temporary public key and a first time parameter as a first part of a first key negotiation message, using the first identity private key to sign the first part to obtain a second part, and sending the first key agreement message to a second client; obtaining an encryption main key according to a second temporary public key and a first temporary private key after verification of second key negotiation information succeeds; and using the encryption main key to generate a voice communication session key, a voice encryption initialization vector and a voice communication authentication key, and determining a second security mechanism parameter as a current session security mechanism parameter to facilitate encryption communication of the first client and the second client. Security of end-to-end communication is improved.

Description

technical field [0001] The present application relates to the technical field of communication, and more specifically, to a communication method and system, an electronic device, and a computer-readable storage medium. Background technique [0002] Key negotiation refers to the negotiation between two or more entities to jointly establish a session key. Any participant can affect the result without any trusted third party. There are generally two mainstream methods of key agreement: key agreement through the server and end-to-end key agreement. [0003] With the development of the Internet, end-to-end communication occupies an increasingly important position in people's daily life, so more and more attention has been paid to the security of end-to-end communication. People's demand for end-to-end encrypted communication more and more urgent. The security solutions for end-to-end communication in related technologies have security risks such as replay attacks and man-in-the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0822H04L9/0838H04L9/0869H04L9/3247H04L9/3263H04L9/3297
Inventor 吕国栋青亮古恒陈志辉陈强
Owner 成都卫士通信息产业股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products