Unlock instant, AI-driven research and patent intelligence for your innovation.

A method to refresh secret key

A key and initial key technology, applied in the field of communication, can solve the problems of frequently generating initial keys, affecting communication quality, and increasing communication time, so as to reduce the authentication process, prevent attacks, and reduce delays

Active Publication Date: 2007-05-16
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a key refresh method to solve the problem of increasing the communication duration due to the need to regenerate the initial key when the key validity period ends in the existing technology of generating keys through multiple levels; further solve the problem of frequent key generation Issues affecting communication quality due to initial key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to refresh secret key
  • A method to refresh secret key
  • A method to refresh secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In a network system that divides the key generation process into multiple levels, in order to avoid increasing the time delay due to the frequent generation of the initial key when refreshing the key, the present invention introduces change data in at least one level, and the previous level encryption key and change data to generate the key of this level; moreover, when the effective period (namely life cycle) of the key of the level ends, the level notifies the previous level, and uses the re-delivered key and change data to generate the level's key new key.

[0026] In order to provide security, a better way is to introduce change data at each level to generate the key of this level. The changing data can be a random number generated by the layer that generates the key, or a parameter value that changes in the layer.

[0027] The layer that notifies the previous layer of the end of the key life cycle can use the following two methods to deliver the key:

[0028] 1. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed key refresh method comprises: using multi-layer calculation to generate final key with the original key; wherein, using last layer key to generate current layer key with effective period; on at least one layer, using variable data as parameter for current key; when the period is to finish, notifying last layer to re-distribute key and generate new key. This invention can reduce time delay and prevents attack to key.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for renewing a key. Background technique [0002] In the wireless local area network (WLAN) authentication process, the key generation process is divided into several levels. When the wireless station (STA) and the wireless access point (AP) perform a four-way handshake, the key generated by the final level is used. [0003] As shown in Figure 1, after the STA performs 802.1X authentication with the authentication server, a master session key (MSK) will be generated. At this time, both the network side device and the STA have MSK. The R0 key holder on the network side obtains this MSK and generates PMK-R0 through a certain algorithm together with some other parameters; similarly, the R1 key holder on the network side obtains PMK-R0 from the R0 key holder on the network side, Together with some other parameters, a PMK-R1 is generated through a certain algorithm, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 庄宏成杜汉美
Owner XFUSION DIGITAL TECH CO LTD