Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for random key transmission under multi-link conditions

A technology for key transmission and link transmission, which is applied in the field of key protection, and can solve problems affecting key confidentiality and security, increased key transmission interception and cracking, and economic losses

Active Publication Date: 2022-01-14
BEIJING CHERILEAD TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problems shown above, the present invention proposes a method and system for random key transmission under multi-link conditions to solve the problem mentioned in the background art that because the selected link is fixed and unique, the There will be great challenges in terms of security, which will greatly increase the possibility of hackers intercepting and cracking the transmission of keys, which will seriously affect the confidentiality and security of keys, and may even cause huge economic losses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for random key transmission under multi-link conditions
  • A method and system for random key transmission under multi-link conditions
  • A method and system for random key transmission under multi-link conditions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0078] Cryptography technology is the basic technology of information security, and the key is the basis of secure application of cryptography technology and the core element of information security. With the rapid and comprehensive development of my country's information industry, the key management system based on the symmetric key system has also entered a comprehensive construction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and system for random key transmission under multi-link conditions. The method includes: obtaining a first key to be transmitted, encrypting the first key to be transmitted, and obtaining the processed The second key to be transmitted, convert the second key to be transmitted into the format of link transmission, obtain N preset links, determine the start node and end node corresponding to each preset link, and activate N links at the same time A preset link, a preset random selection algorithm selects a target start node and a target end node among N start nodes and end nodes, and passes the format-converted second key to be transmitted through the target start node and target The first target preset link corresponding to the termination node is used for transmission. By randomly assigning the key to be transmitted to multiple links for transmission, the process of allocating the transmission link can not be mixed with artificial emotional factors, and avoids the key leakage caused by key leakage. The loss of more files leads to the problem of significant property damage.

Description

technical field [0001] The invention relates to the technical field of key protection, in particular to a method and system for randomly transmitting keys under multi-link conditions. Background technique [0002] Cryptography technology is the basic technology of information security, and the key is the basis of secure application of cryptography technology and the core element of information security. With the rapid and comprehensive development of my country's information industry, the key management system based on the symmetric key system has also entered a comprehensive construction stage, and the key transmission process involved in the system is facing more and more stringent security requirements. The key transmission method in the existing communication technology is to encrypt the key and then transmit it through the preset communication link, so that two devices can realize the transmission of the key in this way, but this method exists The following disadvantag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0819H04L9/0827H04L9/0869H04L9/0631H04L9/0643
Inventor 张凯郑应强牛德标
Owner BEIJING CHERILEAD TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More