Unlock instant, AI-driven research and patent intelligence for your innovation.

Security key management system and method and secure element thereof

A technology for secure key management and secure elements, applied in the field of secure key management systems and methods and their secure elements, capable of solving problems such as reduced security

Active Publication Date: 2022-06-03
HENGBAO
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above technique, the codebook is fixed, so the security decreases with the increase of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key management system and method and secure element thereof
  • Security key management system and method and secure element thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Examples of the present disclosure will now be described more fully with reference to the accompanying drawings. The following description is merely exemplary in nature and is not intended to limit the disclosure, application, or uses.

[0033] Example embodiments are provided so that this disclosure will be thorough, and will fully convey the scope to those skilled in the art. Numerous specific details are set forth such as examples of specific components, devices, and methods in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to those skilled in the art that specific details need not be employed, that example embodiments may be embodied in many different forms, and that neither should be construed to limit the scope of the disclosure. In some example embodiments, well-known processes, well-known structures and well-known technologies are not described in detail.

[0034] The technical problems raised by the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a security key management system, including: a vehicle-mounted device and a remote server, wherein the vehicle-mounted device includes a secure element, and the secure element and the remote server respectively store at least one corresponding relationship code table and scrambling information, And update the corresponding code table and scrambling information according to certain time and rules. In addition, a secure element implementing a secure key management method is also provided. This application solves the problem of updating keys synchronously between the on-vehicle device and the server, and the code table and related information are constantly changing, so that the security of the generated key will not decrease with the increase of time.

Description

technical field [0001] The present invention relates to the field of password update management, in particular to a security key management system and method and a security element thereof. Background technique [0002] Cryptography is one of the core technologies of information security issues, and key management technology is the foundation of cryptography, which guarantees encryption during the entire life cycle of keys such as key generation, storage, distribution, update, revocation, control, and destruction. key security. In the security video surveillance system, the transmission of each video also needs to be encrypted with a symmetric key. However, the traditional symmetric key management method is based on the common storage of symmetric keys. At the same time, it is necessary to ensure that the exchange of each other's keys is safe and reliable, and at the same time, procedures to prevent key leakage and key change must be set. In modern cryptography research, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40H04L67/1095
CPCH04L9/0869H04L9/0866H04L9/0891H04L9/0894H04L63/06H04L67/025H04L67/1095
Inventor 钱京陆道如崔可
Owner HENGBAO