Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

190 results about "Rekeying" patented technology

Rekeying a lock is replacing the old lock pins with new lock pins.

Method for safety communication of ECUs (Electronic Control Unit) in CAN (controller area network) bus

The invention discloses a method for safety communication of ECUs (Electronic Control Unit) in a CAN (controller area network) bus, which comprises the steps that: 1, a system model is established; 2, an GECU (Gateway Electronic Control Unit) loads a session key into a safety storage of the GECU; 3, the GECU carries out session key distribution on each ECU in the CAN bus; 4, a receiver ECUr carries out authentication on an encrypted data frame sent by a sender ECUs; 5, the GECU updates an encryption key and an authentication key which are used for communication, wherein update is mainly divided into two stages of in-vehicle ECU key update and key update when a connection of external equipment is released; and 6, when a vehicle is connected with the external equipment, designing an additional authentication and key distribution method so as to ensure legality of the accessed external equipment. According to the method disclosed by the invention, calculation cost can be obviously reduced, and a load of the CAN bus is reduced; and optimization is carried out for a key distribution protocol in the in-vehicle CAN bus, a key update problem generated when the external equipment is connected and released is considered, a counter is used for generating a random number to change a parameter for key generation, and a relay attack is effectively prevented.
Owner:JIANGSU UNIV

Encryption communication method and device

The device includes sending end device and receiving end device. The former includes requester for new cipher key, storage group for new cipher key, storage for encryption key, renewal decision-maker for cipher key and encipherer. The latter includes creator for new cipher key, storage for new cipher key, storage for deciphered cipher key, decipherer; and renewal decision-maker for deciphered cipher key. The method includes following steps. Sending end sends request for new cipher key, and receiving end sends new cipher key. Sending end checks-up received new cipher key. If it is correct, the new cipher key is put into use, and needed encryption information is sent out in encryption mode. The receiving end deciphers the encryption information by using new and old cipher key. If tested result is correct, the new cipher key is put into use, and correct decryption information is output. The invention simplifies steps for updating cipher key, raises efficiency and lowers cost.
Owner:HUAWEI TECH CO LTD

Ciphering key management and distribution in mbms

A method for key management and assignment in MBMS service, the method includes following steps: the group key locates in the root node on the highest layer, which only has child nodes and doesn't have parent nodes; private keys corresponding to users locate in leaf nodes; the described intermediate node that owns both one parent node and one or more child nodes holds it own key. This invention deploys the method of combining point-to-point mode and point-to-multipoint mode during the process of key update; compared with the key update method only deploying point-to-point mode, this method can reduce the times necessary for information transmission, reduce the system load as well as the time needed for one key update process. Compared with the key update method only deploying point-to-multipoint mode, this solves the security problem of key exposure.
Owner:SAMSUNG ELECTRONICS CO LTD +1

Steganography-based key transmission and key updating method

The invention provides a steganography-based key transmission and key updating method, which is applied to the field of information safety. The method comprises the steps that a communication party A sets a communication type, an encryption algorithm an steganography algorithm, selects a steganography carrier and generates a communication identifier and then performs the updating of a transmission key or the transmission process of a conversion key; a new transmission key is selected when in updating, a time stamp and a signature are generated to encrypt and steganograph the transmission key, the key updating information is generated to be transmitted to a communication party B, and the communication party B performs the verification, de-staganography and deciphering to obtain the transmission key; and the conversion key is selected in transmission to generate a time stamp and a signature so as to encrypt and steganograph the conversion key, the key transmission information is generated to be transmitted to the communication party B, and the communication party B performs the verification, de-steganography and deciphering to obtain the conversation key. The key is concealed by utilizing the steganography, so that an encrypted data format in the key transmission process and the key updating process can be effectively protected, and the safety transmission of multiple encryption and decryption algorithm conversation keys can be realized.
Owner:BEIHANG UNIV

High-efficiency secret key distribution method based on attribute encryption

The invention discloses a high-efficiency secret key distribution method based on attribute encryption. An attribute encryption system is widely applied, yet a strategy is needed in an objective sense for mitigating the burden of an attribute authentication center and also ensuring system security in the process of attribute cancellation and secret key updating. A system related to by the method comprises six modules including the attribute authentication center, a secret key aid, a data sender, a data receiver, a base station, a data server and the like. The attribute authentication center is in charge of managing attributes of users and distributes initial private keys to the users. The secret key aid is in charge of updating private keys of the users when each time fragment of the system begins. According to the invention, the life cycle of the system is divided into a plurality of time fragments, and in case of attribute cancelation or secret key leakage, forward and backward security of the system can be ensured through updating the private keys of valid users. The secret key aid can help the users to update the secret keys and thus the burden of the authentication center is effectively mitigated.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products