Method for distributing key
A technology of key distribution and key distribution center, which is applied in the field of key distribution based on key distribution center, can solve the problems of forward secrecy without key perfection, large security risks, threats to system security, etc., and achieve perfection The effect of forward secrecy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] Here, four embodiments of a key distribution method of the present invention are given.
[0048] see Figure 5 , the specific steps of Embodiment 1 of the present invention are as follows:
[0049] When the first entity A and the second entity B need to communicate securely, they apply to the key distribution center for a communication session key. The first entity A generates a pair of temporary public-private key pair a and Pa, and sends a key request message to the key distribution center, which contains the temporary public key Pa, and the key distribution center receives the key request from the first entity A After the message, the communication session key k between the first entity A and the second entity B is generated, and the key distribution center uses A’s temporary public key Pa to encrypt k, and then forms a key response message and returns it to the first entity A. After an entity A receives the key response message, it uses the temporary private key a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com