Unlock instant, AI-driven research and patent intelligence for your innovation.

Session key generation device and method

A technology of session key and generation device, which is applied to secure communication device and key distribution, can solve the problems of key negotiation method security risks, complicated negotiation process, low efficiency, etc., achieve high security, improve efficiency, and improve security Effect

Active Publication Date: 2022-05-13
无锡融卡科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increasingly complex communication environment, the continuous development of information technology and the continuous improvement of computing power, the attack methods in the communication environment are also constantly developing, which makes many key agreement methods have different degrees of security risks, and the negotiation process is complicated, Inefficiency and relatively low performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session key generation device and method
  • Session key generation device and method
  • Session key generation device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Various embodiments of the invention will be described in more detail below with reference to the accompanying drawings. In the various drawings, the same elements are denoted by the same or similar reference numerals. For the sake of clarity, various parts in the drawings have not been drawn to scale. Also, some well-known parts may not be shown in the drawings.

[0067] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. In the following, many specific details of the present invention, such as structures, materials, dimensions, processes and techniques of components, are described for a clearer understanding of the present invention. However, the invention may be practiced without these specific details, as will be understood by those skilled in the art.

[0068] It should be understood that when describing the structure of a component, when a layer or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a session key generation device and method. According to the session key generation device and method provided by the embodiment of the invention, the first communication module and the second communication module perform identity mutual recognition through the first identity verification information and the second identity verification information, and generate the session key according to the first identity verification information and the second identity verification information. According to the session key generation device and method provided by the embodiment of the invention, the identity of the session object is judged in the negotiation process of the session key, and identity verification can be realized without depending on a public key and a CA certificate system, so that the efficiency of generating the session key is improved, and the security of the session key is improved.

Description

technical field [0001] The invention relates to the technical field of key agreement, in particular to a session key generation device and method. Background technique [0002] With the development of communication technology and information processing technology, more and more attention has been paid to the security of information during transmission. The use of encryption keys in the communication process is an encrypted communication method commonly used in encrypted communication at present. The key agreement is mainly to allow the communication parties to establish a temporary session key, that is, two or more participants in the system provide information together, and each derive a shared key that cannot be predetermined by any party. [0003] Once the encryption key is cracked, the subsequent encrypted information will no longer be safe. Therefore, in order to prevent the encryption key from being cracked, various key agreement mechanisms have emerged. However, wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0861H04L9/0844H04L9/0825H04L63/06Y04S40/20
Inventor 王明洋王涛余彦飞陈华林
Owner 无锡融卡科技有限公司