Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication method, device and client

A communication method and technology of a communication device, applied in the field of communication, can solve problems such as threats to the communication security of both communication parties, and achieve the effects of ensuring communication security, avoiding leakage, and ensuring security.

Pending Publication Date: 2020-11-17
QUECTEL WIRELESS SOLUTIONS
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The public key can be made public, but the private key cannot be made public. Once the private key is leaked, it will seriously threaten the communication security of both parties.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, device and client
  • Communication method, device and client
  • Communication method, device and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0037] It can be understood that when communicating through asymmetric encryption, two paired keys need to be used: a public key and a private key. The public key is used to encrypt data and the private key is used to decrypt data. The public key can be made public, but the private key cannot be made public. Once the private key is leaked, it will seriously threaten the communication security of both parties. Therefore, ensuring the security of the private key is of great significance for ensuring the communication security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method, a communication device and a client. The method comprises the following steps: acquiring a private key and a first password set by a user; encrypting the private key by using the first password to generate a first ciphertext; and sending the first ciphertext to a communication module of the client, so that the communication module decrypts the firstciphertext to obtain the private key, and communicates with a server by using the private key. The controller of the client encrypts the private key and then transmits the encrypted private key to thecommunication module, so that the private key is prevented from being leaked in the process of being transmitted from the controller to the communication module, the security of the private key is ensured, and a foundation is laid for secure communication between the client and the server.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a communication method, device and client. Background technique [0002] SSL (Secure Socket Layer, Secure Socket Layer) protocol is a security protocol that provides security and data integrity for network communication. Asymmetric encryption is often used in SSL protocol transmission, that is, different keys are used for encryption and decrypt. When communicating through asymmetric encryption, two paired keys need to be used: a public key and a private key. The public key is used to encrypt data, and the private key is used to decrypt data. The public key can be made public, but the private key cannot be made public. Once the private key is leaked, it will seriously threaten the communication security of both parties. [0003] Therefore, ensuring the security of the private key is of great significance for ensuring the communication security of both communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L63/0442
Inventor 魏文舒
Owner QUECTEL WIRELESS SOLUTIONS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More