Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Session cipher key distributing method and system

A session key and key technology, which is applied in the field of communication technology and network information security to achieve the effect of ensuring call security

Inactive Publication Date: 2009-03-11
CHINA TELECOM CORP LTD
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is theoretically feasible, but in many communication systems, the network system, especially the mobile communication network, does not have good conditions to support the two parties to directly negotiate the key. Therefore, it is necessary to find a method suitable for various communication systems. Method and system for distributing session key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session cipher key distributing method and system
  • Session cipher key distributing method and system
  • Session cipher key distributing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0035] Since in many communication systems, the network system does not allow the communication parties to directly negotiate the key, the present invention distributes the session key to the communication parties through the network side, which is applicable to various types of communication systems and frees the communication terminal from for complex key management.

[0036] Such as figure 1 As shown, it is a schematic flowchart of an embodiment of the session key distribution method of the present invention. This embodiment can be realized by the key management center on the network side, specifically including the following steps:

[0037] Step 101, the key management center receives the first key request message sent by the calling party communication terminal, the first key request message includes the first t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a session key distribution method which comprises the steps as follows: a first key request message sent by a calling party communication terminal is received, and the first key request message includes a first temporary public key; a communication session key is generated according to the first key request message, and a cryptographic notification message is sent to a called party communication terminal; a second key request message sent by the called party communication terminal is received, and the second key request message includes a second temporary public key; the communication session key is encrypted by respectively using the first temporary public key and the second temporary public key, and a first key response message is sent back to the calling party communication terminal, and a second key response message is sent back to the called party communication terminal. The invention relates to a session key distribution system. The invention realizes the distribution of the keys of the two communication parties having encryption requirements at the network side, utilizes the asymmetric key way to protect the session key, and ensures the safety of the session key transmission; and the session key is distributed by the network side to cause the communication terminals to be free of complex key management.

Description

technical field [0001] The invention relates to the field of communication technology and the field of network information security, in particular to a method and system for distributing session keys. Background technique [0002] In various communication systems, in order to ensure the security and confidentiality of the user's communication content, it is very important to realize the confidential communication between the communication users. Taking the mobile communication system as an example, there is a process of transmission in the air for interactive information, which is easy to be intercepted. , so the demand for confidential communication is even more prominent. [0003] There are two main types of encryption mechanisms at present: symmetric key system and asymmetric key system. Compared with the asymmetric key system, the symmetric key system has the characteristics of low computational complexity and high security strength, so it is more suitable as an encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 林奕琳李宝荣杨维忠孙宇张琳峰龙彪林衡华肖海
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products