Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key updating method and a key updating system

A key update and key technology, which is applied in the field of cryptographic communication, can solve problems such as security vulnerabilities, and achieve the effect of isolating key exchange leaks and the possibility of isolation

Active Publication Date: 2019-05-24
CHINA GREATWALL TECH GRP CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a complex and changeable network environment, long-term use of the same key can easily lead to security vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key updating method and a key updating system
  • Key updating method and a key updating system
  • Key updating method and a key updating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0020] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0021] In a sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of password communication, and provides a key updating method and a key updating system, and the method comprises the steps: a first terminal devicesends a key updating command to a second terminal device when receiving the key updating command; The second terminal device receives the key updating command; obtaining a secret key flag bit of the first terminal device, judging whether the secret key flag bit of the first terminal device is the same as the secret key flag bit of the second terminal device or not, if yes, updating the secret keyof the second terminal device and the secret key flag bit of the second terminal device, and sending update success information to the first terminal device; And after receiving the update success information, the first terminal device updates the secret key of the first terminal device and the secret key flag bit of the first terminal device. The secret keys of two communication parties can be updated, and the safety of the secret keys is ensured when the secret keys are updated.

Description

technical field [0001] The application belongs to the technical field of encrypted communication, and in particular relates to a key updating method and a key updating system. Background technique [0002] In traditional single-key cryptography communication, both communicating parties use the same key for encryption and decryption, that is, the encryption operation and the decryption operation are inverse operations, and both parties need to hold the same key and keep it secret. In a complex and changeable network environment, long-term use of the same key can easily lead to security vulnerabilities. How to renew keys for both communication parties on an insecure public network is a difficult problem in secure communication. Contents of the invention [0003] In view of this, the embodiment of the present application provides a key updating method and a key updating system, so as to update the keys of both communication parties and ensure the security of the keys when up...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 刘程远
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products