Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

4 results about "Session key" patented technology

A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content encryption key (CEK), traffic encryption key (TEK), or multicast key which refers to any key used to encrypt messages, as opposed to other uses, like encrypting other keys (key encryption key (KEK) or key wrapping key).

Communication System And Communication Device

InactiveUS20080020707A1Easy to identifyReduce riskKey distribution for secure communicationMultiple keys/algorithms usageComputer hardwareCommunications system
A communication apparatus capable of easily identifying a communication partner and securely sharing a session key between the communication apparatus and the communication partner even if the communication apparatus has a processing power that is not so high includes a short-range active communication unit 101 transmitting an inquiry signal to a short-range external communication apparatus by electromagnetic waves and waiting for a response to the inquiry signal; a long-range communication unit 104 capable of communication by the electromagnetic waves in a range wider than the communication area of the short-range active communication means; a switching unit 111 switching to either the short-range active communication unit or the long-range communication unit; and an asymmetric key generator 102 generating a pair of an encryption key and a decryption key corresponding to the encryption key. The communication apparatus is characterized by using the decryption key to decrypt an encrypted session key transmitted from the external communication apparatus and transmitting to the external communication apparatus a communication switching request signal to request the switching to the long-range communication unit and communication by using the long-range communication unit.
Owner:SONY CORP

CDMA port-to-port encryption communication system and key distribution method thereof

InactiveCN101635924AImprove securityReduce security risksSecurity arrangementCommunications securityCommunications system
The invention discloses a CDMA port-to-port encryption communication system and a key distribution method thereof, the CDMA port-to-port encryption communication system comprises a CDMA network and a terminal mobile telephone thereof, a public switched telephone network and a terminal fixed-line telephone thereof, a short message service center as well as the following three cipher processing units including a cipher chip of a mobile telephone terminal, a key distribution management center (KDMC) and a Firmware cipher module of a gateway mobile switching center. The key distribution management center is used for key distribution management of the communication system. The key distribution is realized by a layered distribution method, i.e. a first layer is an equipment key which is distributed in the process of initialization; a second layer is a key-encryption key and a short message service key which are distributed in startup of an enciphered mobile telephone; and a third layer is a session key which is distributed every time a session is launched between the enciphered mobile telephones. At the same time, by adopting a bidirectional certification technology for key distribution and combination of a key update and remote destroying method, the safety risk in key exposure is reduced, and the communication safety is improved.
Owner:CETC CYBERSPACE SECURITY TECH CO LTD

Digital identity authentication method and system based on secure two-dimensional code

ActiveCN108712382APrevent leakageSecure loginTransmissionDigital identityThird party
The invention provides a digital identity authentication method based on a secure two-dimensional code, comprising that: the third party application initiates an authorization login request; the identity authentication SDK obtains a session key from the server; the identity authentication SDK encrypts the information of the third party application through the session key, and sends the encrypted information and the authorized login request to the server; the server decrypts through the session key to obtain the information of the third-party application, generates a two-dimensional code and atwo-dimensional code url, and encrypts the two-dimensional code url by using a key, and the identity authentication SDK obtains the encrypted two-dimensional code url; the identity authentication SDKdecrypts the encrypted two-dimensional code url, then the third-party application jumps according to the two-dimensional code url to display the two-dimensional code; and the user scans the two-dimensional code for authentication to authorize the third-party application to log in. The invention also provides a digital identity authentication system based on the secure two-dimensional code to ensure the security of the authorization process and the secure login of the third-party application.
Owner:新大陆(福建)公共服务有限公司

Information encryption, decryption and control method and device and electronic equipment

InactiveCN112260832AImplement the encryption functionImplement the decryption functionKey distribution for secure communicationTelevision conference systemsStationInternet privacy
The invention discloses an information encryption, decryption and control method and device and electronic equipment. The method comprises the steps of: enabling an initiator to obtain a secret key IDwhich is sent by a server and used for identifying a communication service and a secret key corresponding to the secret key ID at a terminal; decrypting a session key for encrypting and decrypting the communication service according to the key; and encrypting the communication service according to the session key so as to realize an encryption function on the communication service; enabling the participant to obtain a secret key ID sent by the initiator at the terminal; obtaining a secret key corresponding to the secret key ID from a server according to the secret key ID; decrypting a group session key used for decrypting the communication service according to the key so as to realize a function of decrypting the communication service; and enabling the server to generate the same secret key at different secret key management service sites, so that the same secret key can be obtained when a plurality of nodes communicate at the same time, and each terminal can perform encryption communication service conveniently.
Owner:南京易科腾信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products