Check patentability & draft patents in minutes with Patsnap Eureka AI!

SM2-based secret key exchange method, system, electronic equipment and storage medium

A technology for exchanging electronic equipment and secret keys, which is applied in the computer field and can solve problems such as theft, terminal equipment or server camouflage

Active Publication Date: 2020-08-28
JD DIGITS HAIYI INFORMATION TECHNOLOGY CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present disclosure provides an SM2-based secret key exchange method, server, terminal device, system, electronic device and storage medium, which are used to solve the problem that in the prior art, the terminal device or server is easily disguised by other devices and stolen to participate in the secret key exchange Questions about information about the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based secret key exchange method, system, electronic equipment and storage medium
  • SM2-based secret key exchange method, system, electronic equipment and storage medium
  • SM2-based secret key exchange method, system, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0079] see figure 1 , figure 1 It is a schematic diagram of an application scenario of the SM2-based key exchange method according to the embodiment of the present application.

[0080] Such as figure 1 As shown, user A and user B can exchange secret keys, such as figure 1 In the illustrated embodiment, user A may be the initiator who initiates the key exchange, and user B may be t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an SM2-based secret key exchange method, a server, terminal equipment, a system, electronic equipment and a storage medium, relates to the technical field of computers, and specifically relates to artificial intelligence and a blockchain technology. The SM2-based secret key exchange method comprises the steps of: receiving random information transmitted by second electronicequipment; receiving secret key information transmitted by equipment participating in secret key exchange; generating a first secret key component according to the random information, the secret key information, a secret key fragment of the first electronic equipment and a preset public key; generating argumentation information according to the first secret key component; and transmitting the first secret key component and the argumentation information to the second electronic equipment. On one hand, the argumentation information used for verifying the identity of the first electronic device is generated according to the first secret key component, the technical effects of theft prevention and attack prevention are achieved, and therefore the technical effect of ensuring the safety of userinformation is achieved; and on the other hand, the first electronic equipment and the second electronic equipment are combined to jointly realize secret key exchange, so that the technical effect ofimproving the safety and reliability of secret key exchange can be achieved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, in particular to artificial intelligence and blockchain technology, and in particular to an SM2-based key exchange method, server, terminal equipment, system, electronic equipment, and storage medium. Background technique [0002] With the development of Internet technology, the security and reliability of information transmission or storage has become the focus of attention. [0003] In the prior art, a server or a terminal device usually stores and uses a private key in the form of software. For example, if the private key is completely stored in the server or terminal device, and based on the server or terminal device, the key exchange is performed with other devices, then the attacker can obtain the private key through privilege escalation, and exchange the secret key based on the private key . [0004] However, in the process of implementing this application, the inventor found ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0838H04L9/0869H04L9/3221H04L63/061H04L63/08Y04S40/20
Inventor 黄海泉
Owner JD DIGITS HAIYI INFORMATION TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More