Efficient management of cryptographic key generations
A cryptography and key technology, applied to the public key and key distribution of secure communication, can solve impractical problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] The embodiments described below are given as examples only, and it should be understood that the present invention is not limited thereto. Further embodiments, changes, or improvements that maintain the basic underlying principles disclosed and claimed herein are within the scope of the invention.
[0068] Throughout the drawings, the same reference characters will be used for corresponding or similar elements.
[0069] refer to figure 1 , consider an information environment, here exemplified by the scope of a communication system, having at least one secret key issuer S, such as a key issuing server, at least one content or service provider P, and at least one potential recipient R. Using the terminology in the background section, S is the "producer" and P and R are "consumers". Assume that any S has an a priori secure (eg confidential) channel with P and R. One goal is for provider P to securely and efficiently transmit data to receiver R using information provide...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com