Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Key negotiation method and device, computer equipment and storage medium

A technology of key negotiation and computer program, applied in the fields of key negotiation methods, computer equipment and storage media, and devices, can solve the problems of inconsistent session keys, frequent packet loss of communication data, short session lifetime, etc., so as to avoid communication The effect of data loss and improving communication stability

Active Publication Date: 2019-07-05
SHENZHEN COMTOP INFORMATION TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the session lifetime ends, if the key switch of the peer device is not synchronized, the session keys switched by the devices at both ends are inconsistent, which will lead to the problem of communication data packet loss
The shorter the session lifetime, the more frequent the packet loss of communication data, which may cause the VPN tunnel to break in severe cases
[0005] Therefore, the prior art key agreement method has the problem of communication data packet loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and device, computer equipment and storage medium
  • Key negotiation method and device, computer equipment and storage medium
  • Key negotiation method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions, and advantages of this application clearer, the following further describes the application in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the application, and not used to limit the application.

[0056] In one embodiment, such as figure 1 As shown, a key agreement method is provided. The key agreement method provided in this embodiment can be applied to figure 2 In the application environment shown.

[0057] Among them, the peer device 210 and the local device 220 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. It should be noted that the naming of the peer device 210 and the local device 220 is to distinguish the two devices. In practical applications, the device that executes the key agreement method in the embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key negotiation method and device, computer equipment and a storage medium. The method comprises the following steps: carrying out session with opposite-end equipment; pre-negotiating with the opposite-end equipment before the end of the session lifetime to obtain a session key and a security parameter index of the opposite-end equipment; and recording a corresponding relation between the security parameter index and the session key, so as to find the corresponding session key according to the security parameter index of the opposite end equipment when the session with the opposite end equipment is carried out after the session lifetime is finished. By adopting the method, the problem of communication data loss caused by asynchronous session key switching can beavoided, and the communication stability is improved.

Description

Technical field [0001] This application relates to the field of communication security, in particular to a key agreement method, device, computer equipment and storage medium. Background technique [0002] IPSec VPN (Internet Protocol Security Virtual Private Network, virtual private network security protocol) key exchange protocols need to be designed and implemented in accordance with the standards in the "IPSec VPN Technical Specifications" of the State Cryptography Bureau. All IPSec VPN products need to follow the key exchange protocol for key negotiation in order to establish a VPN secure tunnel with the central side or peer device to complete normal communication. [0003] During the IPSec communication process, the peer device establishes a session and negotiates a session key for encrypted communication. A session has a session lifetime, that is, the effective time of the session key. When the session lifetime ends, the current session key becomes invalid, and the new ses...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L12/46
CPCH04L9/0838H04L12/4641
Inventor 张丽娟陈海倩孙宏棣赖宇阳
Owner SHENZHEN COMTOP INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products