Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Seamless key exchanging technology based on secret communication

A technology of secure communication and seamless key change, which is applied in the field of seamless key change technology, can solve problems such as communication interruption, meet the needs of operation, overcome cumbersome operations, and improve cost performance

Inactive Publication Date: 2004-07-14
中电科网络安全科技股份有限公司
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to solve the disadvantages of communication interruption that must occur in the process of changing keys in the previous secure and confidential communication systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Seamless key exchanging technology based on secret communication
  • Seamless key exchanging technology based on secret communication
  • Seamless key exchanging technology based on secret communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]In the process of full-duplex communication, each cipher machine mainly has two aspects of work, one is to encrypt the data received by the terminal, and then send the ciphertext to the network; the other is to encrypt the data received by the network The data is decrypted, and then the decrypted plaintext is sent to the terminal. correspond figure 1 As shown, there are two independent transmission channels, channel 1 and channel 2. For simplicity, we only discuss the data transfer processing in one channel direction.

[0042] Such as figure 1 As shown, when the data passes through the cipher machine A at the sending end, the cipher machine A encrypts the data; The channel between cipher machines is always in ciphertext state. Here, we refer to cipher machine A as an encryption cipher machine, and cipher machine B as a decryption cipher machine.

[0043] The seamless key exchange technology is mainly composed of two parts. One is the regular replacement of the netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The KDMC carries out key-encrypting key base on-line replacement to related cryptces uniformly in the full-duplex secure communication system based on cryptoes. Based on the traditional way of key-encrypting key base replacement, the base buffer storage and MK handshaking switching technology are applied and improved to realize seamless key-encrypting key replacement of normal data secure communications among cryptoes continuously.

Description

technical field [0001] The invention relates to an application in a full-duplex secure and confidential communication system, aiming at the key distribution management center to perform regular online replacement of the key database of each cipher machine in the system, and the cipher machine itself does not interrupt when changing the session message key at regular intervals Seamless key changing technology for normal communication. technical background [0002] In a secure and confidential communication system based on a cipher machine, the system key change is mainly for the regular (or timing) replacement of the working key storehouse of the cipher machine (hereinafter referred to as the key storehouse) and the session message key used in each session . Among them, the management of the encryption machine key store is a very important part of the whole system. [0003] At present, quite a lot of security systems generally adopt online key management, that is, the manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04K1/00H04L9/00
Inventor 袁健刘振钧霍卫华王银
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products