Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for automatically generating shared secret key

A shared key and automatic generation technology, applied in the field of information security, can solve problems such as complex management, low security level, and easy eavesdropping, and achieve the effect of protecting privacy

Active Publication Date: 2018-01-16
CHINA TELECOM CORP LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Among the above three methods, the method of manually setting the terminal key is completed manually, which is time-consuming and labor-intensive, the management is complicated, and there is a hidden danger of the key being leaked by personnel; the method of pre-setting the unified public certificate on the terminal can realize the automatic processing of the system, but due The processing of digital certificates requires high terminal processing capabilities; the main problem with SMS delivery is the low security level, and SMS messages are plain text, which is easy to be eavesdropped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for automatically generating shared secret key
  • Method and system for automatically generating shared secret key
  • Method and system for automatically generating shared secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0044] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for an automatically generating a shared secret key. The method comprises the steps: responding to a registration request of an M2M terminal, and enabling an M2M application platform to transmit a first secret key generation request to an M2M safety management platform; enabling an M2M safety management platform to generate a first application layer basic secret key according to a first predetermined parameter, and transmitting the first application layer basic secret key to the M2M application platform; responding to a registration response of the M2M application platform, and enabling the M2M terminal to transmit a second secret key generation request to an SIM card; enabling the SIM card to generate a second application layer basic secret keyaccording to a second predetermined parameter, and transmitting the second application layer basic secret key to the M2M terminal, wherein the first and second predetermined terminals are the same, and the first and second application layer basic secret keys are the same. According to the invention, the SIM card and the M2M safety management platform are triggered to generate the application layerbasic secret keys in the registration process of the M2M terminal in the M2M application platform, thereby achieving the automatic generation and updating of the application layer basic secret keys between the M2M terminal and the M2M application platform, and protecting the privacy of a system secret key.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for automatically generating a shared key. Background technique [0002] It is often necessary to build a secure channel between a resource-constrained M2M (Machine-to-Machine / Man, machine-to-machine) terminal and an M2M application and service application platform. In order to implement encrypted message transmission between the application platform and the M2M terminal, and to authenticate the M2M terminal, it is necessary to set the same shared key between the application platform and the terminal in advance (the key is different for each terminal). A common method of setting a shared key for each M2M terminal is as follows: [0003] The first is to manually set the terminal key, that is, manually configure the basic key one by one on the M2M application side and the terminal side. [0004] The second is that the terminal uniformly presets the same pub...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/70H04W12/04H04W12/041
Inventor 王艺毕家瑜陈正文
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products