Key processing system

A processing system and key management center technology, applied in the field of key processing systems, can solve problems such as poor key processing, and achieve the effect of ensuring security

Active Publication Date: 2021-07-16
CHINA MOBILE GROUP SICHUAN +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above technical problems, the main purpose of the embodiments of this specification is to provide a key processing system to solve the technical problem of poor key processing in the key processing system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key processing system
  • Key processing system
  • Key processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Such as figure 1 As shown, it is a schematic structural diagram of a key processing system model provided by one or more embodiments of this specification. The key processing system in this embodiment is a network of structural components based on hierarchical routing. The network model mainly It includes a key management center, a base station (BS), a cluster head node (CH) and an intra-cluster node (N) in the same cluster as the cluster head node. in:

[0057] The key processing system processes the key under the following assumptions:

[0058] After the cluster head node and the nodes in the cluster are captured, the identity information, key information and data of the captured nodes will be leaked. Each node has its own unique identification (ID). The base station is honest and reliable, and will not be captured. The base station has powerful computing power and huge storage space, and has a continuous power supply for it, so there is no need to worry about its ...

Embodiment 2

[0104] As an optimization or supplement to the key processing system provided in the foregoing embodiments, one or more embodiments of this specification further provide another key processing system. details as follows:

[0105] In this embodiment, a cluster head node is taken as an example for illustration, and the first communication key between all cluster head nodes and the base station is the same. The key processing system encrypts and decrypts the first communication key and the second communication key based on the public-private key pair of the base station or the cluster head node and the elliptic curve cryptosystem, and the cluster head node obtains the key after the decryption is completed. The first communication key and the second communication key, in this process, the cluster head node and the base station are completed in an interactive way, specifically for the following operations:

[0106] The cluster head node needs to send a configuration request for th...

Embodiment 3

[0139] The cluster head node is further configured to send the second communication key to the nodes in the cluster, and the nodes in the cluster obtain the second communication key. In this process, the cluster head node and the corresponding intra-cluster nodes are carried out in an interactive manner, as follows:

[0140] The node in the cluster is used to select the cluster head node corresponding to it, and send the second configuration message corresponding to the configuration request of the second communication key to the cluster head node corresponding to it, the second configuration message includes the identification of the node in the cluster and, The third digital signature based on elliptic curve encryption is performed on the configuration request with the time stamp with the private key of the node in the cluster. The nodes in the cluster pack their identification and the third digital signature into a second configuration message and send it to the correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key processing system. A key management center configures public and private key pairs and elliptic curve encryption parameters of a base station and each node based on an elliptic curve encryption mode; the base station configures a first communication key and a second communication key for the cluster head node based on the public key of the cluster head node and the elliptic curve encryption parameter after verifying that the key configuration request of the cluster head node is legal by using the public key of the cluster head node; the cluster head node requests configuration from a base station, receives the first communication key and the second communication key through a private key of the cluster head node, and sends the second communication key to the intra-cluster node based on a public key of the intra-cluster node and an elliptic curve encryption parameter; and the intra-cluster node requests configuration from the cluster head node to which the intra-cluster node belongs and receives the second communication key through a private key of the intra-cluster node.

Description

technical field [0001] The embodiments of this specification relate to the communication field, and in particular, to a key processing system. Background technique [0002] With the development of science and technology, the application of Internet of Things in daily life is more and more extensive. The application of the Internet of Things solves many problems that have not been solved before, and greatly meets the needs of various aspects. At the same time, various information is involved in the application process of the Internet of Things, and these information cannot be obtained or used casually. So it involves the security of this information. For example, a key, which is used to encrypt the transmitted information during the communication process of the Internet of Things, etc., to ensure the security of the transmitted information. [0003] However, before using the key to encrypt the transmitted information, each execution terminal in the Internet of Things needs ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04W12/03H04W12/0433H04W40/32
CPCH04L9/3252H04L9/3297H04L9/0819H04L9/0861H04L9/0891H04L9/3066H04W40/32Y02D30/70
Inventor 刘玉枝
Owner CHINA MOBILE GROUP SICHUAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products