Key update method and key update system

A key update and key technology, applied in the field of cryptographic communication, can solve problems such as security loopholes, and achieve the effect of isolating key exchange leakage

Active Publication Date: 2022-02-01
CHINA GREATWALL TECH GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a complex and changeable network environment, long-term use of the same key can easily lead to security vulnerabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key update method and key update system
  • Key update method and key update system
  • Key update method and key update system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0020] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addition of a collection thereof.

[0021] In a sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application is applicable to the technical field of encrypted communication, and provides a key update method and a key update system, including: when the first terminal device receives the key update command, it sends the key update command to the second terminal device ; After receiving the key update command, the second terminal device obtains the key flag bit of the first terminal device, and judges whether the key flag bit of the first terminal device is the same as the key flag bit of the second terminal device, if If they are the same, update the key of the second terminal device and the key flag bit of the second terminal device, and send update success information to the first terminal device; after receiving the update success information, the first terminal device updates the first terminal device key and the key flag bit of the first terminal device. Through this application, the keys of both communication parties can be updated, and the security of the keys can be guaranteed when the keys are updated.

Description

technical field [0001] The application belongs to the technical field of encrypted communication, and in particular relates to a key updating method and a key updating system. Background technique [0002] In traditional single-key cryptography communication, both communicating parties use the same key for encryption and decryption, that is, the encryption operation and the decryption operation are inverse operations, and both parties need to hold the same key and keep it secret. In a complex and changeable network environment, long-term use of the same key can easily lead to security vulnerabilities. How to renew keys for both communication parties on an insecure public network is a difficult problem in secure communication. Contents of the invention [0003] In view of this, the embodiment of the present application provides a key updating method and a key updating system, so as to update the keys of both communication parties and ensure the security of the keys when up...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 刘程远
Owner CHINA GREATWALL TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products