Supercharge Your Innovation With Domain-Expert AI Agents!

Dynamic secret key protection method and system

A technology of dynamic secret key and protection system, which is applied in transmission system, digital transmission system and key distribution, which can solve problems such as doubts about the security of transmission secret key, and achieve the effect of strengthening protection

Active Publication Date: 2021-05-07
QIANXUN SPATIAL INTELLIGENCE INC
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some transmission channels cannot support channel encryption such as Transport Layer Security (TLS), or the client and the server agree on a fixed transmission key (the key used to encrypt the transmitted key) to protect the transmitted secret. key (the key itself that needs to be transmitted), and the security of this fixed transmission key itself has been questioned

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic secret key protection method and system
  • Dynamic secret key protection method and system
  • Dynamic secret key protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Various aspects and examples of the application will now be described. The following description provides specific details for a thorough understanding and enabling description of these examples. However, it will be understood by those skilled in the art that this application may be practiced without many of these details.

[0038] Also, some well-known structures or functions may not be shown or described in detail for the sake of brevity and to avoid unnecessarily obscuring the related description.

[0039] The terms used in the description given below, even if used in conjunction with the detailed description of some specific examples of this application, should be interpreted in their broadest reasonable manner. Even certain terms may be emphasized below, however, any terms that are intended to be interpreted in any limited manner will be explicitly and specifically defined in this Detailed Description section.

[0040] Without loss of generality, reference will b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic secret key protection method and system. The method comprises the following steps: generating a character string with a first length according to one or more custom variables; performing logical operation on the character string and a static character string to generate a dynamic character string with the first length, wherein the static character string is configured to be a second length and comprises a first section and a second section; performing left shift operation of one or more bits on the first section, performing right shift operation of one or more bits on the second section, and performing merging to generate a static character string after shift operation; and combining the dynamic character string with the static character string after the shift operation to generate a transmission key with a third length.

Description

technical field [0001] This specification generally relates to the technical field of data encryption, and specifically relates to a method and system for dynamic key protection. Background technique [0002] With the rapid development of the Internet, information security issues have attracted more and more attention, and information security technology based on data encryption technology has also developed rapidly. In the process of data transmission, especially when more sensitive key information needs to be transmitted, special processing of the key information is required to improve the security of the transmission. However, some transmission channels cannot support channel encryption such as Transport Layer Security (TLS), or the client and the server agree on a fixed transmission key (the key used to encrypt the transmitted key) to protect the transmitted secret. key (the key itself that needs to be transmitted), and the security of this fixed transmission key itself...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/065H04L9/0861
Inventor 刘涛刘云飞金纯嘉
Owner QIANXUN SPATIAL INTELLIGENCE INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More