Unlock instant, AI-driven research and patent intelligence for your innovation.

Key negotiation method, device and terminal

A key negotiation and terminal technology, which is applied in the communication field, can solve problems such as large amount of calculation and mutual trust between CAs, and achieve the effect of reducing the amount of calculation, solving mutual trust between CAs, and avoiding waste of resources

Pending Publication Date: 2022-04-15
CHINA MOBILE COMM LTD RES INST +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The purpose of the present invention is to provide a key agreement method, device and terminal to solve the problems of mutual trust between CAs and large amount of computation in the prior art for the shared key agreement scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method, device and terminal
  • Key negotiation method, device and terminal
  • Key negotiation method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0117] In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will describe in detail with reference to the drawings and specific embodiments.

[0118] The present invention aims at the problems of mutual trust between CAs and large amount of calculation in the existing technology for the shared key negotiation scheme, and provides a key negotiation method, which is applied to the calling terminal, such as figure 2 shown, including:

[0119] Step 21: Determine the first public key and the first private key of the calling terminal;

[0120] Step 22: Obtain the second public key of the called terminal according to the blockchain certificate of the called terminal;

[0121] Step 23: Obtain a shared key according to the first private key and the second public key;

[0122] Step 24: Obtain the calling message according to the first public key and the shared key, and send it to the called terminal. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key negotiation method, device and terminal, and the key negotiation method comprises the steps: determining a first public key and a first private key of a calling terminal; obtaining a second public key of the called terminal according to the block chain certificate of the called terminal; obtaining a shared key according to the first private key and the second public key; and obtaining a calling message according to the first public key and the shared key, and sending the calling message to the called terminal. According to the scheme, the information can be obtained according to the block chain certificate, so that the mutual trust problem among multiple CAs is avoided; in addition, according to the scheme, the calling message can be directly obtained according to the first public key and the shared key, and operation does not need to be carried out by using an asymmetric key algorithm twice, so that the operation amount of shared key negotiation is reduced; the problems of mutual trust between CAs, large operand and the like existing in a shared key negotiation scheme in the prior art are well solved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a key agreement method, device and terminal. Background technique [0002] IP-based multimedia communication (including IP-based voice transmission VoIP) has become the mainstream of real-time communication. Due to the connectionless and publicly accessible nature of IP networks, VoIP communications are vulnerable to various attacks, including the possibility of voice eavesdropping (breaking confidentiality) and voice data tampering (breaking integrity). For this, a series of standards have been formulated to ensure the security of VoIP communication: [1] defines SRTP (secure real-time transport protocol) to encrypt RTP (real-time transport protocol) or RTCP (real-time transport control protocol) packets carrying multimedia and integrity protection; [2] designed a protocol framework for VoIP communication parties to establish a shared key TGK (TEK (Traffic-Encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40H04L67/10
Inventor 刘福文杨波王珂阎军智粟栗
Owner CHINA MOBILE COMM LTD RES INST