Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, terminal and system for realizing secure communication

A secure communication and terminal technology, applied in the field of secure communication, can solve the problems of prolonging the establishment time of secure channels, reducing communication efficiency, and taking a long time for private key calculations, so as to reduce storage space requirements, optimize calculation processes, and reduce Quantity effect

Active Publication Date: 2022-07-19
FUJIAN LANDI COMML EQUIP CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, according to the conventional process of establishing a secure channel, at least three pairs of public-private key pairs are required. If there are many communication roles, more sets of keys should be added accordingly. It is necessary to apply to the CA to issue multiple certificates, which increases the overhead of the issuance work; in addition, the entire process requires at least three private key calculations. Since the private key calculation itself takes a long time, it prolongs the time for establishing a secure channel. Reduced communication efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, terminal and system for realizing secure communication
  • A method, terminal and system for realizing secure communication
  • A method, terminal and system for realizing secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0183] Please refer to figure 1 , a method for realizing secure communication, the present embodiment is described from the perspective of one of the terminals of the two communicating parties that are interacting, including the steps:

[0184] S0. First, pre-prepare a work certificate, a root certificate corresponding to the work certificate, and a private key corresponding to the work certificate, respectively, on the two interacting terminals. The details are as follows:

[0185] Another terminal: a prefabricated root certificate crtroot, a first work certificate crt_a_e signed by the root certificate, and a first private key pri_a_e corresponding to the first work certificate;

[0186] The terminal: a prefabricated root certificate crtroot, a second work certificate crt_b_e signed by the root certificate, and a second private key pri_b_e corresponding to the second work certificate;

[0187] Among them, the root certificate is used to issue subordinate certificates, that ...

Embodiment 2

[0196] The difference between this embodiment and Embodiment 1 is that the step S1 further includes: receiving a first random number r1 sent by the other terminal, and the length of the random number r1 can be set according to actual needs. This embodiment In the example, the length is 32 bytes;

[0197] Use the first work certificate crt_a_e to encrypt the first temporary session key rpk1 and the first random number r1 to obtain the first encrypted data enc(crt_a_e, rpk1+r1), so that the other terminal uses the same A first private key pri_a_e corresponding to a work certificate crt_a_e decrypts the first encrypted data enc(crt_a_e, rpk1+r1) to obtain a third random number r1', and according to the first random number r1 and the third random number r1 'Verify the legitimacy of the first encrypted data sender;

[0198] In the step S2, the second encrypted data includes after the other terminal uses the second work certificate crt_b_e to encrypt the second temporary session ke...

Embodiment 3

[0213] Please refer to figure 2 , a method for realizing secure communication, the present embodiment is described from the perspective of two communicating parties interacting, including the steps:

[0214] S0. First, pre-prepare a work certificate, a root certificate corresponding to the work certificate, and a private key corresponding to the work certificate, respectively, on the two interacting terminals. The details are as follows:

[0215] The second terminal: a prefabricated root certificate crtroot, a first work certificate crt_a_e signed by the root certificate, and a first private key pri_a_e corresponding to the first work certificate;

[0216] The first terminal: a prefabricated root certificate crtroot, a second work certificate crt_b_e signed by the root certificate, and a second private key pri_b_e corresponding to the second work certificate;

[0217] Among them, the root certificate is used to issue subordinate certificates, that is, crt_a_e and crt_b_e are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method, terminal and system for realizing secure communication. Both parties in communication generate a temporary session key for forming a session key for realizing secure communication, and encrypt the generated temporary session key by using the work certificate of the other party. , only need to generate a pair of public and private key pairs, and only need two private key calculations to establish a secure channel between the two parties, which not only reduces the storage space requirements for the public and private keys, but also reduces the number of CA certificate requests. The operation process is optimized, and the efficiency of establishing a safe channel is improved.

Description

technical field [0001] The present invention relates to the field of secure communication, in particular to a method, terminal and system for realizing secure communication. Background technique [0002] To achieve secure communication between the two parties, usually refer to the process of establishing a secure channel with SSL (Secure Sockets Layer), and in order to ensure that the purpose of the asymmetric key is unique (that is, a pair of public and private keys can only be used for encryption and decryption or signature verification), one of the two parties in the communication needs to have two pairs of asymmetric keys, because at least one party needs to use a pair of asymmetric keys for encryption and decryption, and use another pair of asymmetric keys for signature verification. sign. [0003] Therefore, according to the conventional process of establishing a secure channel, at least three pairs of public and private key pairs are required. If there are many commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
Inventor 洪逸轩
Owner FUJIAN LANDI COMML EQUIP CO LTD