Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, equipment and system for checking temporary key negotiation information

A technology of temporary keys and negotiation messages, which is applied in the field of communication, can solve problems such as failure to respond to negotiation messages, consumption, resource occupation of receiving devices, etc., and achieve the effect of avoiding denial of service attacks

Active Publication Date: 2010-03-31
HUAWEI TECH CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in fact, the attacking device does not require communication, so the negotiation message sent by the attacking device is an illegal negotiation message, which causes the resources of the receiving device to be occupied and consumed
When there are too many illegal negotiation messages, a large amount of Responder resources are used to process illegal negotiation messages, resulting in no response to legitimate negotiation messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for checking temporary key negotiation information
  • Method, equipment and system for checking temporary key negotiation information
  • Method, equipment and system for checking temporary key negotiation information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] This embodiment provides a verification method for a temporary key agreement message, such as figure 1 As shown, in this method, when two devices want to communicate, first, both the initiator and the responder will be safely assigned at least one pair of master keys PMK, and each pair of master keys corresponds to a master key identifier ;

[0042] 11. The initiating device calculates the first verification information according to the temporary key identifier (PTKID) and the first master key (PMK).

[0043] It needs to be confirmed that in the embodiment of the present invention, the verification information does not necessarily have to be obtained through calculation, and can also be obtained by presetting optional items and according to the key identifier and the master key.

[0044] 12. Send a temporary key negotiation message to the responding device, the negotiation message includes the calculated first verification information and the master key identifier (MKI...

Embodiment 2

[0061] This embodiment also provides a verification method for a temporary key agreement message, such as Figure 5 As shown, the verification method of the temporary key agreement message in this embodiment includes the following steps:

[0062] 501. Both the initiating device and the responding device are securely distributed to the first and second master keys PMK.

[0063] 502. The initiating device selects a first master key PMK, pre-allocates a temporary key identifier PTKID, and generates a 128-bit random number I-Nonce.

[0064] 503. The initiating device calculates the first derived key PMK' according to the first master key PMK. In this embodiment, calculating the first derived key includes but is not limited to the following methods:

[0065] Define function S=S(PMK, OtherElement), wherein S represents the first derivation key PMK ', the method of derivation can be but not limited to select part of the data bit information from PMK as the first derivation key PMK '...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, equipment and a system for checking temporary key negotiation information, which relates to the field of communication and avoids the problem that alarge amount of resources of response equipment are occupied and consumed by attacking equipment. In the embodiment of the invention, an initiator calculates first checking information firstly according to a first derivation key of a first main key and a temporary key label and transmits temporary key negotiation information comprising the first checking information and the like to a responser; the responser calculates the second checking information, judges whether the second checking information and the received first checking information conform to a preset logical relationship or not, andverifies whether the temporary key negotiation information of the initiator is legal or not; and when a condition that the negotiation information is legal is judged, a temporary key and a temporarykey integrality code are calculated, and the temporary key is installed. The embodiment of the invention is mainly used in systems of various negotiating temporary keys.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for negotiating a temporary key needed in the communication process, and a device and a system using the method. Background technique [0002] The UWB (Ultra Wideband, ultra-wideband wireless communication technology) system is a distributed system, that is, each device in the UWB system is independent and equal to each other. The communication process in the UWB system is not managed by the central coordinator. If two devices need to communicate securely, they need to negotiate a temporary key so that the transmitted data can be encrypted using the temporary key in subsequent communications to ensure communication safety. [0003] In the existing UWB system, the four-way handshake method is used to negotiate the temporary key, and the Initiator (initiator) and the Responder (response device) that need to carry out secure communication share a paired master key (PMK, Pairwise ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/18
Inventor 张向东
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products