Key generation method and device, computer readable storage medium and terminal equipment

A key generation and computer technology, applied in the computer field, can solve the problems of key generation method complexity and high cost, and achieve the effect of easy implementation, low complexity and low cost

Active Publication Date: 2020-01-24
SECZONE TECH CO LTD +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

It describes an improved way to create keys from data transmitted over networks like Control Area Networks (CAN). By sending both bits together simultaneously or one after another, we get multiple copies of them onto their own communication line instead of just adding ones beforehand. These techniques simplify the process while also reducing its costs compared to previous methods such as assigning binary numbers directly into memory devices.

Problems solved by technology

The technical problem addressed by this patented technology relates to improving safety measures during vehicle/industrial network communications without compromising its confidential nature. Current methods rely heavily upon secure protocol standards such as Transport Layer Security Protocol version 4 (TLS-4), which requires both time and computation resources. However, there has also become an issue where certain types of vulnerabilities were discovered through cyberattacks. These weaknesses make them difficult targets for detectors because existing solutions require complex calculations and expensive key generation techniques.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and device, computer readable storage medium and terminal equipment
  • Key generation method and device, computer readable storage medium and terminal equipment
  • Key generation method and device, computer readable storage medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0053] It should be understood that when used in this specification and the appended claims, the term "comprising" indicates the presence of described features, integers, steps, operations, elements and / or components, but does not exclude one or more other features. , whole, step, operation, element, component and / or the presence or addi

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computers, and particularly relates to a key generation method and device, a computer readable storage medium and terminal equipment. The method is applied to a first node in a preset controller local area network, the first node is any node in the controller local area network, and the method comprises the following steps: generating a first bit sequence; sending the first bit sequence in a bus of the controller area network; receiving a superimposed bit sequence in a bus of the controller area network, wherein the superposed bit sequence is a bit sequence formed by superposing the first bit sequence and the second bit sequence, the second bit sequence is a bit sequence generated by a second node, the length of the second bit sequence is equal to that of the second bit sequence, and the second bit sequence and the first bit sequence are sent in a bus of the controller local area network at the same time; and generating a key according tothe superposed bit sequence.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products