Unlock instant, AI-driven research and patent intelligence for your innovation.

Security key management system and method and security element thereof

A security key management and security element technology, applied in the security key management system and method and the security element field thereof, can solve problems such as security reduction

Active Publication Date: 2019-08-27
HENGBAO
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above technique, the codebook is fixed, so the security decreases with the increase of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key management system and method and security element thereof
  • Security key management system and method and security element thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application or uses.

[0033] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those who are skilled in the art. Numerous specific details are set forth such as examples of specific components, devices and methods, to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms, and that neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures, and well-known technologies are not described in detail.

[0034] The technical problems raised by the pres...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security key management system. The system comprises a vehicle-mounted device and a remote server, the vehicle-mounted device comprises a security element, at least one corresponding relation code table and scrambling information are stored in the security element and the remote server respectively, and the corresponding relation code table and the scrambling information are updated according to a certain time and a certain rule. In addition, the invention also provides a security element for realizing the security key management method. According to the method and thedevice, the problem of synchronously updating the key between the vehicle-mounted equipment and the server is solved, and the security of the generated key cannot be reduced along with the increase of time due to the continuously changed code table and related information.

Description

technical field [0001] The invention relates to the field of password update management, in particular to a security key management system and method and a security element thereof. Background technique [0002] Cryptography technology is one of the core technologies of information security issues. Key management technology is the basis of cryptographic technology. key security. In the security video surveillance system, the transmission of each video also needs to be encrypted with a symmetric key. However, the traditional symmetric key management method is based on the common storage of symmetric keys. At the same time, it is necessary to ensure that the exchange of mutual keys is safe and reliable, and at the same time, it is necessary to set up procedures to prevent key leaks and change keys. In modern cryptography research, encryption and decryption algorithms are generally public. When the cryptographic algorithm is determined, the degree of secrecy of the cryptosyst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06H04L29/08
CPCH04L9/0869H04L9/0866H04L9/0891H04L9/0894H04L63/06H04L67/025H04L67/1095
Inventor 钱京陆道如崔可
Owner HENGBAO