Key Migration Method and Device
A key and group key technology, applied in the Internet field, can solve the problems of easy leakage and insecure key migration, and achieve the effect of efficient migration and solving insecure key migration.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to better understand the technical solutions in the present application, the technical solutions in the present application embodiment will be described in conjunction with the drawings in the present application embodiments, and will be described in conjunction with the drawings in the present application. The embodiment is merely the embodiment of the present application, not all of the embodiments. Based on the embodiments in the present application, one of ordinary skill in the art does not have all other embodiments obtained without creative labor, and should belong to the scope of the present application.
[0050] Considering the existing key migration method is often relatively simple design, resulting in a key migration easily occurs during transmission of a leak, the situation or stolen, even result in the loss of customers. That is, the conventional key migration method there is often a particularly unsafe migration key, technical problems likely to leak ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


