Two-point key secure synchronization method and system, and equipment
A technology for synchronizing system and node keys, applied in key distribution, which can solve the problems of waste of communication resources and data insecurity.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.
[0021] The direct purpose of key synchronization is to call the key management system in different places to obtain the same key, so as to use the key to encrypt, transmit, and decrypt some important information. However, based on the problems raised in the background art, the present application proposes the following solutions.
[0022] figure 1 For a schematic flowchart of a two-point key security synchronization method provided by the embodiment of this application, see figure 1 , the two-point key security synchronization method provided by the embodiment of this application includes:
[0023] S101. After the first user sends the generated first primary key to the second user, encrypt a first key verification value of the first primary key with a node key to obtain an encrypted key verification value.
[0024] In this embodiment, the first user...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



