Key generation method of communication system

The invention provides a secret key generation method of a communication system, which comprises four stages: the first stage is a system initial stage, the second stage is a registration stage, the third stage is a verification stage, and the fourth stage is a secret key exchange stage. The inventi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CHENG BAOGANG, XU XIAOFENG, PI HUIBIN, HAN CHEOL-KIL, GUAN MINGYAO, HAN FENGJIAO, WEI LIN, CHAI XIAOJUAN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CHENG BAOGANG
XU XIAOFENG
PI HUIBIN
HAN CHEOL-KIL
GUAN MINGYAO
HAN FENGJIAO
WEI LIN
CHAI XIAOJUAN
description The invention provides a secret key generation method of a communication system, which comprises four stages: the first stage is a system initial stage, the second stage is a registration stage, the third stage is a verification stage, and the fourth stage is a secret key exchange stage. The invention further provides a secret key generation device of the enhanced communication system, and the secret key generation device comprises a memory which is used for storing instructions executed by the computer; and the processor is used for executing the computer instructions stored in the memory so as to realize the functional steps of the method. By adopting the technical scheme provided by the invention, the security between transmission of an army communication system can be thoroughly solved, the situation that related information is obtained or is stolen during transmission due to local disguising and pretending identity is avoided, the communication efficiency can be improved, and the calculation amount is re
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN114710273A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN114710273A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN114710273A3</originalsourceid><addsrcrecordid>eNrjZND1Tq1USE_NSy1KLMnMz1PITS3JyE9RyE9TSM7PzS3Ny0yGiBdXFpek5vIwsKYl5hSn8kJpbgZFN9cQZw_d1IL8-NTigsRkoEkl8c5-hoYm5oYGRubGjsbEqAEA4jMqbg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Key generation method of communication system</title><source>esp@cenet</source><creator>CHENG BAOGANG ; XU XIAOFENG ; PI HUIBIN ; HAN CHEOL-KIL ; GUAN MINGYAO ; HAN FENGJIAO ; WEI LIN ; CHAI XIAOJUAN</creator><creatorcontrib>CHENG BAOGANG ; XU XIAOFENG ; PI HUIBIN ; HAN CHEOL-KIL ; GUAN MINGYAO ; HAN FENGJIAO ; WEI LIN ; CHAI XIAOJUAN</creatorcontrib><description>The invention provides a secret key generation method of a communication system, which comprises four stages: the first stage is a system initial stage, the second stage is a registration stage, the third stage is a verification stage, and the fourth stage is a secret key exchange stage. The invention further provides a secret key generation device of the enhanced communication system, and the secret key generation device comprises a memory which is used for storing instructions executed by the computer; and the processor is used for executing the computer instructions stored in the memory so as to realize the functional steps of the method. By adopting the technical scheme provided by the invention, the security between transmission of an army communication system can be thoroughly solved, the situation that related information is obtained or is stolen during transmission due to local disguising and pretending identity is avoided, the communication efficiency can be improved, and the calculation amount is re</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220705&amp;DB=EPODOC&amp;CC=CN&amp;NR=114710273A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220705&amp;DB=EPODOC&amp;CC=CN&amp;NR=114710273A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CHENG BAOGANG</creatorcontrib><creatorcontrib>XU XIAOFENG</creatorcontrib><creatorcontrib>PI HUIBIN</creatorcontrib><creatorcontrib>HAN CHEOL-KIL</creatorcontrib><creatorcontrib>GUAN MINGYAO</creatorcontrib><creatorcontrib>HAN FENGJIAO</creatorcontrib><creatorcontrib>WEI LIN</creatorcontrib><creatorcontrib>CHAI XIAOJUAN</creatorcontrib><title>Key generation method of communication system</title><description>The invention provides a secret key generation method of a communication system, which comprises four stages: the first stage is a system initial stage, the second stage is a registration stage, the third stage is a verification stage, and the fourth stage is a secret key exchange stage. The invention further provides a secret key generation device of the enhanced communication system, and the secret key generation device comprises a memory which is used for storing instructions executed by the computer; and the processor is used for executing the computer instructions stored in the memory so as to realize the functional steps of the method. By adopting the technical scheme provided by the invention, the security between transmission of an army communication system can be thoroughly solved, the situation that related information is obtained or is stolen during transmission due to local disguising and pretending identity is avoided, the communication efficiency can be improved, and the calculation amount is re</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZND1Tq1USE_NSy1KLMnMz1PITS3JyE9RyE9TSM7PzS3Ny0yGiBdXFpek5vIwsKYl5hSn8kJpbgZFN9cQZw_d1IL8-NTigsRkoEkl8c5-hoYm5oYGRubGjsbEqAEA4jMqbg</recordid><startdate>20220705</startdate><enddate>20220705</enddate><creator>CHENG BAOGANG</creator><creator>XU XIAOFENG</creator><creator>PI HUIBIN</creator><creator>HAN CHEOL-KIL</creator><creator>GUAN MINGYAO</creator><creator>HAN FENGJIAO</creator><creator>WEI LIN</creator><creator>CHAI XIAOJUAN</creator><scope>EVB</scope></search><sort><creationdate>20220705</creationdate><title>Key generation method of communication system</title><author>CHENG BAOGANG ; XU XIAOFENG ; PI HUIBIN ; HAN CHEOL-KIL ; GUAN MINGYAO ; HAN FENGJIAO ; WEI LIN ; CHAI XIAOJUAN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN114710273A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2022</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>CHENG BAOGANG</creatorcontrib><creatorcontrib>XU XIAOFENG</creatorcontrib><creatorcontrib>PI HUIBIN</creatorcontrib><creatorcontrib>HAN CHEOL-KIL</creatorcontrib><creatorcontrib>GUAN MINGYAO</creatorcontrib><creatorcontrib>HAN FENGJIAO</creatorcontrib><creatorcontrib>WEI LIN</creatorcontrib><creatorcontrib>CHAI XIAOJUAN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CHENG BAOGANG</au><au>XU XIAOFENG</au><au>PI HUIBIN</au><au>HAN CHEOL-KIL</au><au>GUAN MINGYAO</au><au>HAN FENGJIAO</au><au>WEI LIN</au><au>CHAI XIAOJUAN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Key generation method of communication system</title><date>2022-07-05</date><risdate>2022</risdate><abstract>The invention provides a secret key generation method of a communication system, which comprises four stages: the first stage is a system initial stage, the second stage is a registration stage, the third stage is a verification stage, and the fourth stage is a secret key exchange stage. The invention further provides a secret key generation device of the enhanced communication system, and the secret key generation device comprises a memory which is used for storing instructions executed by the computer; and the processor is used for executing the computer instructions stored in the memory so as to realize the functional steps of the method. By adopting the technical scheme provided by the invention, the security between transmission of an army communication system can be thoroughly solved, the situation that related information is obtained or is stolen during transmission due to local disguising and pretending identity is avoided, the communication efficiency can be improved, and the calculation amount is re</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN114710273A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Key generation method of communication system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T14%3A51%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CHENG%20BAOGANG&rft.date=2022-07-05&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN114710273A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true