Key agreement method and device
A key negotiation and key exchange protocol technology, applied in the field of key negotiation methods and devices, can solve problems such as reducing system session security, and achieve the effects of strong security and improved efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The embodiments of the present invention provide a key agreement method and device, which are applied to a key agreement system based on a key exchange protocol, in which a first user terminal obtains a key agreement session with the first user terminal from a certificate center. The long-term public key of the second user side, the temporary key of the first user side is randomly selected, and the first hash calculation is performed on the temporary key of the first user side and the long-term private key of the first user side to obtain the first intermediate value. The first intermediate value and the temporary key generate a first key agreement message, and after the first key agreement message is sent to the second user end, the second key agreement message returned by the second user end is received, and the first user end is based on The second key agreement message, the long-term public key of the second user end, the temporary key of the first user end, the long-te...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com