A secure transmission method and system based on SM2 key agreement mechanism
A key negotiation and secure transmission technology, applied in the field of secure transmission methods and systems based on SM2 key negotiation mechanism, can solve the problems of SSLVPN terminal access performance limitation, complex SSLVPN process, slow terminal access speed, etc. The effect of network bandwidth resource consumption, small data volume, and simplified format
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.
[0055] figure 1 A flowchart showing a secure transmission method based on the SM2 key agreement mechanism of the present invention.
[0056] Such as figure 1 As shown, a secure transmission method based on the SM2 key agreement mechanism of this embodiment includes:
[0057] Step 1: The IoT terminal and the IoT server negotiate a session key based on the national secret SM2 key negotiation mechanism;
[0058] Step 2: The Internet of Things terminal generates service reporting data, encrypts the service reporting data using the session key, and reports the encrypted service reporting data ciphertext to the Internet...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

