Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-point key secure synchronization method and system, and equipment

A technology for synchronizing system and node keys, applied in key distribution, which can solve the problems of waste of communication resources and data insecurity.

Active Publication Date: 2021-09-03
中安云科科技发展(山东)有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Database rollback not only leads to a waste of communication resources, but also causes certain insecurity in the transmitted data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-point key secure synchronization method and system, and equipment
  • Two-point key secure synchronization method and system, and equipment
  • Two-point key secure synchronization method and system, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The scheme will be described below in conjunction with the accompanying drawings and specific implementation methods.

[0021] The direct purpose of key synchronization is to call the key management system in different places to obtain the same key, so as to use the key to encrypt, transmit, and decrypt some important information. However, based on the problems raised in the background art, the present application proposes the following solutions.

[0022] figure 1 For a schematic flowchart of a two-point key security synchronization method provided by the embodiment of this application, see figure 1 , the two-point key security synchronization method provided by the embodiment of this application includes:

[0023] S101. After the first user sends the generated first primary key to the second user, encrypt a first key verification value of the first primary key with a node key to obtain an encrypted key verification value.

[0024] In this embodiment, the first user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-point key secure synchronization method and system, and equipment. The method comprises the steps: after a first user transmits a generated first primary key to a second user, encrypting a first key verification value of the first primary key through a node key, and obtaining an encryption key verification value, enabling the first user to send the encryption key verification value to a second user; and processing the first primary key according to the information fed back by the second user; and after the first user sends the generated key to the second user, verifying the key received by the second user through the unique identifier key verification value of the key, and if the key verification values are inconsistent, discarding the key. The keys between the two parties are kept synchronous, so that the problem that the two parties of data communication perform data interaction under the condition that the keys are not synchronous is avoided.

Description

technical field [0001] The present application relates to the technical field of key synchronization, in particular to a two-point key security synchronization method, system and equipment. Background technique [0002] Key synchronization is an important link to ensure the security of data transmission in the field of data communication. The key to secure key synchronization is the key for the caller to use the key to encrypt and decrypt normally. At present, in the field of key synchronization technology, the mechanism of key security synchronization is relatively complete. Generally, in order to ensure key synchronization, the caller will send the key to the receiver through a secure channel after encrypting the data with the key. [0003] However, if there is a network problem or the communication request is modified, the sent key will be inconsistent, which will cause the received key to be out of sync, and the data receiver will not be able to decrypt the encrypted dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/06H04L9/0861
Inventor 于传江刘磊何彬滕敬国郑海森郭家喜
Owner 中安云科科技发展(山东)有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More