Method of secure communication based on commercial cipher algorithm
A technology for secure communication and encrypted communication, applied in key distribution, can solve problems such as imperfect C/S application support, and achieve the effect of preventing eavesdropping and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The technical solution of the present invention will be further explained below in conjunction with the accompanying drawings.
[0025] Such as figure 1 As shown, a secure communication method based on a business secret algorithm includes the following steps:
[0026] Step 10: The client and the server establish an initial connection;
[0027] Step 20: The client sends a session key negotiation request, and the server accepts the session key negotiation request, then executes step 30, if the server does not accept the session key negotiation request, the process ends, and re-executes step 10;
[0028] Step 30: The client and the server perform session key negotiation, if the session key negotiation is successful, execute step 40, if the session key negotiation fails, the process ends, and re-execute step 10;
[0029] Among them, such as figure 2 As shown, session key negotiation includes the following steps:
[0030] Step 301: the client generates a random number r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com