Creation method of end-to-end shared key and system
A technology for sharing keys and establishing methods, which is applied in the field of communication network security applications, and can solve problems such as attacks on switching devices, complex network data communications, and reduced network transmission efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0086] The node N (Node) in the present invention refers to a user terminal STA (STation) and a switching device SW (SWitch) in a wired LAN. Physical layer devices such as hubs in the LAN are not treated as nodes.
[0087] In the network, all switching devices and user terminals have established secure connections with the core switching devices in the network through pre-distribution or other security mechanisms, that is, they already have shared keys. The establishment mechanism of the assumed key is not limited or defined in the present invention. The core switching device in the present invention is generally the switching device closest to the gateway in the local area network, which can be specified or configured by the network administrator, and is not limited or defined in the present invention.
[0088] to send source node N Source with destination node N Destination The establishment of the shared key between Center It is the core switching device in the network....
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com