Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secret key generation method and data processing method, device and system based on secret key generation method

A technology of key generation and equipment, which is applied in the field of data processing, can solve problems such as difficult to guarantee information security and illegal wiretapping in the negotiation process, and achieve the effect of saving software and hardware resources and improving security

Pending Publication Date: 2022-05-17
CHINA UNIONPAY
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the fixed key of the above-mentioned terminal encryption method, the information security is difficult to be guaranteed
[0003] Although techniques such as asymmetric encryption can be used to negotiate session keys, this requires a reliable third-party public key certification authority
In addition, when a symmetric key is used, the negotiation process is vulnerable to illegal eavesdropping

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method and data processing method, device and system based on secret key generation method
  • Secret key generation method and data processing method, device and system based on secret key generation method
  • Secret key generation method and data processing method, device and system based on secret key generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present application is described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the application are shown. However, the present application may be embodied in different forms, and should not be construed as being limited to only the embodiments given herein. The above-mentioned embodiments are given to make the disclosure herein comprehensive and complete, so as to more fully convey the protection scope of the present application to those skilled in the art.

[0061] In this specification, terms such as "comprising" and "comprising" mean that in addition to the units and steps that are directly and explicitly stated in the specification and claims, the technical solution of the application does not exclude Or the situation of other units and steps clearly stated.

[0062] Words such as "first" and "second" do not denote the order of elements in terms of time, space, size, etc. but are merely used to distingu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security technology, in particular to a key generation method based on physical layer channel characteristics, a data processing method using the key generation method, and client equipment, an Internet of Things system and a computer readable storage medium which implement the key generation method. The key generation method according to one aspect of the invention comprises the following steps: A, determining a pilot frequency training sequence sent between first equipment and second equipment based on coherence time of wireless communication between the first equipment and the second equipment; b, extracting channel characteristics by a pilot frequency training sequence sent by a second device to generate a first initial key, and sending the determined pilot frequency training sequence to the second device, so that the second device can generate a second initial key in the same mode as the mode of generating the first key; and C, using a key negotiation mechanism between the first device and the second device to determine a common key of the first device and the second device according to the first initial key and the second initial key.

Description

technical field [0001] The present application relates to data processing technology, and in particular to a key generation method based on physical layer channel characteristics, a data processing method using the method, and a client device implementing the method, an Internet of Things system, and a computer-readable storage medium. Background technique [0002] In application scenarios such as parking and charging, the current convenient payment scheme needs to send the corresponding key and payment account related information to the device side, and the device side initiates an "end-to-end" verifiable payment. Terminal encryption methods usually include one-type-one-key, one-machine-one-key, and one-time-one-key, etc. Due to the immobility of the key in the above-mentioned terminal encryption method, it is difficult to guarantee the information security. [0003] Although techniques such as asymmetric encryption can be used to negotiate session keys, this requires a re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W12/041H04W12/0431H04W4/40
CPCH04W12/009H04W12/041H04W12/0431H04W4/40
Inventor 徐智劼朱涛曾望年张琦戚文彬侯腾杨阳
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products