[go: up one dir, main page]

CN101789865B - Dedicated server used for encryption and encryption method - Google Patents

Dedicated server used for encryption and encryption method Download PDF

Info

Publication number
CN101789865B
CN101789865B CN2010101183158A CN201010118315A CN101789865B CN 101789865 B CN101789865 B CN 101789865B CN 2010101183158 A CN2010101183158 A CN 2010101183158A CN 201010118315 A CN201010118315 A CN 201010118315A CN 101789865 B CN101789865 B CN 101789865B
Authority
CN
China
Prior art keywords
private key
receiving terminal
server
key
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2010101183158A
Other languages
Chinese (zh)
Other versions
CN101789865A (en
Inventor
程朝辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian information security technology Co., Ltd
Original Assignee
NISC Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NISC Inc filed Critical NISC Inc
Priority to CN2010101183158A priority Critical patent/CN101789865B/en
Publication of CN101789865A publication Critical patent/CN101789865A/en
Application granted granted Critical
Publication of CN101789865B publication Critical patent/CN101789865B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a dedicated server used for encryption and an encryption method, solving the technical problems that a receiving terminal can confirm the origin of ciphertext information after decryption, and the ciphertext information can not be revealed outwards in the sending process. The adopted technical scheme is that the method is realized in the process that a sending terminal sends the ciphertext information with a clear text to the receiving terminal, and the method is performed on a basis that the dedicated server with a password generation center is established; the method comprises: firstly, the sending terminal gives an application for the password generation center by an identification A of the sending terminal and acquires a private key A; the sending terminal is used for encrypting the private key A and an identification B used by ciphertext information with the identification B of the receiving terminal and then sending the encrypted private key A and the encrypted identification B to the receiving terminal; the receiving terminal gives an application for the password generation center by the identification B of the receiving terminal and acquires a private key B; and the receiving terminal is used for decrypting the ciphertext information by virtue of the identification A and the private key B of the sending terminal; if the decryption is successful, the receiving terminal can obtain the clear text of the ciphertext information, if not, the decryption is failed.

Description

A kind of private server that is used to encrypt and encryption method
Technical field
The invention belongs to information security field, specifically designed a kind of private server that is used to encrypt and encryption method.
Background technology
In the system based on sign, each entity has one or more signs.Each sign can be any significant character string.But with not being both of conventional public-key system maximum, in the system based on sign, the sign of entity itself just can be as the public-key cryptography of entity.Because sign itself is exactly the PKI of entity, this type systematic just no longer relies on certificate and certificate management system such as PKI, thereby has greatly simplified the complexity of administrator password system.
The sign cryptographic algorithm that authentication is arranged, promptly under the situation of its private key safety, receiving terminal can affirm that its ciphertext of receiving is only just can be generated by the entity with transmitting terminal private key.So such mark encryption algorithm has a remarkable advantages compared to common mark encryption algorithm: receiving terminal can be confirmed the transmission source of cipher-text message, and for example the mail reception end can be confirmed the sender of ciphertext mail.For the exigent file of confidentiality, prior art can not give reliable assurance.
Summary of the invention
The objective of the invention is after deciphering, to confirm the transmission source of cipher-text information in order to solve receiving terminal, and the technical problem that assurance is not outwards revealed in the cipher-text information process of transmitting, a kind of private server that is used to encrypt and encryption method have been designed, by server with password generation center, by transmission channel the sign of transmitting terminal and ciphertext packing are sent to receiving terminal, recipient's successful decryption can recover expressly and can confirm the identity of transmitting terminal, and the deciphering failure can confirm that cipher-text information is to forge or distorted in transmittance process.
The present invention for realizing the technical scheme that goal of the invention adopts is, a kind of encryption method, above encryption method are will be packaged with in the process that cipher-text information expressly sends to receiving terminal at transmitting terminal to realize that concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm, described server is the private server that is used to encrypt, and it comprises password generation center, CPU, memory cell and the short message receiving-transmitting unit that generates private key by software kit;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains, if successful decryption, receiving terminal obtains the plaintext of cipher-text information and can determine that the transmitting terminal of ciphertext is A, if deciphering failure, can conclude that then cipher-text information pretends to be A to forge for other people or distorted
Wherein step 2. the server concrete grammar that carries out private key distribution be:
I. client comprises transmitting terminal or receiving terminal, uses server identification C encryption to be sent to server the services password of its sign, phone number and customer selecting and asks;
Ii. after server uses the corresponding private key C deciphering of its sign, obtain client identification, phone number and services password;
Iii. server sends to a random number on client's mobile phone by note;
Iv. server generates the private key corresponding with client identification with supporting algorithm and master key,
V. server derives from a symmetric key with the services password and the random number among the iii of supporting algorithm from ii,
Vi. server is issued to client with the symmetric key encryption private key that generates among supporting algorithm and the v,
Vii. client uses random number that the iii that receives on the services password selected among the i and the client's mobile phone sends to derive from symmetric key according to the method for v, and with this secret key decryption and store the private key that vi issues.
Key of the present invention is that the encryption of transmitting terminal or receiving terminal or the private key generation and the distribution of decrypting process all will depend on the server with password generation center, server is at first set up master key in mailbox memory, client is applied for private key by submit the register requirement that comprises its sign and services password to password generation center, and server then can authenticate distribution customer terminal sign corresponding private key in back to the request of client.Transmitting terminal is encrypting plaintext information after obtaining private key, includes the sign A of transmitting terminal in the cipher-text information of generation, if the receiving terminal successful decryption has the private key of sign A correspondence just can determine the transmitting terminal of this cipher-text information, and then the identity of definite transmit leg.
The present invention is described in detail below in conjunction with accompanying drawing.
Description of drawings
Accompanying drawing is a method flow block diagram of the present invention.
Embodiment
Referring to accompanying drawing, a kind of encryption method, above method are will be packaged with in the process that expressly cipher-text information sends to receiving terminal at transmitting terminal to realize that concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm, described server is the private server that is used to encrypt, and it comprises password generation center, CPU, memory cell and the short message receiving-transmitting unit that generates private key by software kit;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains, if successful decryption, receiving terminal obtains the plaintext of cipher-text information and can determine that the transmitting terminal of ciphertext is A, if deciphering failure can conclude that then cipher-text information pretends to be A to forge for other people or distorted.
Above-mentioned step 2. server is carried out the concrete grammar that private key distributes and is:
I. client is used the services password of client's sign, phone number and customer selecting server identification C encrypt to be sent to server and is asked,
Ii. after server uses the corresponding private key C deciphering of its sign, obtain client identification, phone number and services password,
Iii. server sends to a random number on client's mobile phone by note,
Iv. server generates the private key corresponding with client identification with supporting algorithm and master key,
V. server derives from a symmetric key with the services password and the random number among the iii of supporting algorithm from ii,
Vi. server is issued to client with the symmetric key encryption private key that generates among supporting algorithm and the v,
Vii. client uses random number that the iii that receives on the services password selected among the i and the client's mobile phone sends to derive from symmetric key according to the method for v, and with this secret key decryption and store the private key that vi issues.
If transmitting terminal has obtained private key A, then directly carry out step 3., otherwise, at first carry out step 2., the services password that the transmitting terminal end identifies A and corresponding cell-phone number and selection with transmitting terminal is sent to server asks.
If receiving terminal has obtained private key B, then directly carry out step 4., otherwise, at first carry out step 2., the services password that receiving terminal identifies B and corresponding cell-phone number and selection with receiving terminal is sent to server asks.
When transmitting terminal is encrypted each cleartext information, come encrypting plaintext with using a unique number to mix the key that calculates by private key A and sign B.Described unique number can be the cumulative number of current transmission ciphertext between transmitting terminal and the receiving terminal, and transmitting terminal adds 1 each the encryption to behind the receiving terminal of appointment with this counting, and receiving terminal compares the counting in local counting and the cipher-text information at every turn after successfully deciphering.If the counting in the cipher-text information is counted greater than this locality, the local counting of then receiving and deciphering result, and renewal is the counting in the cipher-text information.Described unique number also can be a random number by the transmitting terminal generation.In this case, receiving terminal need not record and this information relatively.
Above-mentioned sign A or sign B are the phone number or the user ID registered mistake, that authorize of transmitting terminal or receiving terminal.
Utilize above said fixedly algorithm to set up master key, distribute the process of private key and encryption and decryption to be:
1, at first sets up also initialization system.Generate center generation system parameter and master key by key.
1-1), key generates the center and at first generates relevant open system parameters.Comprise: be defined in a territory F pElliptic curve (or hyperelliptic curve) E on (p is that the power of a prime number or prime number is taken advantage of); Two point group: G on the curve 1(power is the q cyclic group), point group G 2(rank are the group of q); One can be calculated Homomorphic Mapping
Figure GSB00000600691600051
G 2→ G 1On the curve one can calculate to as: Tate is right, Ate to or the Weil equity; A function H who message is embedded into curve 1(this function can be with any message maps point group G to the curve 2In, its computational methods and G 2Expression way relevant [VS07]); The unique several generating modes of Password Operations: as cryptographic operation numeration (as the numeration of the encryption number of times between transmit leg and recipient) or random number; Cipher key derivation function KDF[ISO18033-2]; Mechanism of Data Encapsulation Ω [ISO18033-2].
1-2), key generates the center and at first generates master key: promptly select a random number s between [0, q-1] as master key.At G 1In select a generator P at random 1, announce P simultaneously 1[s] P 1Part for system parameters.
2, after key generation center is set up,
2-1), the user is to the private key of corresponding its sign of key generation center application ID.
A, user select a services password P, adopt mark encryption algorithm such as the BF-IBE algorithm for encryption services password and the subscriber phone number of standard.The recipient who encrypts generates center SMS module number for key.
B, key generation center use its SMS module number as the corresponding private key decoding request of sign, obtain user's services password P and phone number.
C, key generate random number R of center picked at random, send to user mobile phone by SMS module.
D, key generation center use cipher key derivation function KDF to derive from a key W from P and R.
2-2), cryptocenter will identify ID and adopt message imbedding function H 1Sign is mapped to the point group G that selects in (1) 2In some Q ID=H 1(ID), calculate the private key d of corresponding sign again ID=[s] Q ID.
2-3), key generates the center and will identify after private key adopts W to identify private key as key and Mechanism of Data Encapsulation Ω encrypting user, sends to the user of application.
2-4), the user after obtaining sign private key ciphertext and comprising the note of random number R, derive key W according to KDF, then according to Mechanism of Data Encapsulation Ω, deciphering sign private key d IDCan verify the correctness of private key in the following way: judge e (P 1, Q ID) whether equal e ([s] P 1, d ID).If not etc., private key mistake then.
3, after getting access to the sign private key, the user just can adopt the cryptographic algorithm encrypting messages to give the recipient of appointment.
3-1), transmit leg calculates earlier and has only transmit leg and receive the shared secret that can generate just now.The steps include:
3-1a), the recipient is identified recipient ID RUse message imbedding function H 1Be mapped to G 2In a some Q R=H 1(ID R).
3-1b), transmit leg utilizes its private key d SAnd Q RCalculate shared secret
Figure GSB00000600691600071
Transmit leg also can calculate
3-2), transmit leg is determined and unique several U of this time encryption.This number need can be random number or the encryption number of times register of selecting from a large space in each all differences of encrypting.If U is the current encryption numeration between transmit leg and the recipient, then need upgrade U=U+1.
3-3), the shared secret that use to calculate of transmit leg, encrypt of the input of unique several U and recipient sign, session key K as cipher key derivation function KDF at every turn.
3-4), transmit leg uses session key K and Mechanism of Data Encapsulation DEM encapsulation clear-text message m, generate encapsulation ciphertext C ← DEM (K, m).To encrypt unique several U, encapsulation ciphertext C and transmitting side marking ID SSend to the recipient as cipher-text information together.
4, the recipient carries out following operation and is decrypted after receiving cipher-text information:
If 4-1) unique several U is the encryption number of times numeration between transmit leg and recipient, the then relatively current encryption number of times numeration between U and transmit leg and the recipient.If U is less than or equal to current numeration, then end deciphering;
4-2), the recipient calculates and has only transmit leg and receive the shared secret that can generate just now.The steps include:
4-2a), with transmitting side marking recipient ID SUse message imbedding function H 1Be mapped to G 2In a some Q S=H 1(ID S).
4-2b), the recipient utilizes its private key d RAnd Q SCalculate shared secret If transmit leg calculates
Figure GSB00000600691600082
Then the recipient calculates
Figure GSB00000600691600083
4-3), the recipient uses the shared secret of calculating, encrypts the input of unique several U and recipient sign as cipher key derivation function KDF, session key K.
4-4), the recipient uses the decapsulation mechanism in the Mechanism of Data Encapsulation, calculating output DEM -1(K, X) result.
If 4-5) successful decryption and to encrypt unique number be current encryption numeration between transmit leg and the recipient then need upgrade local current encryption number of times numeration and be U.
Now enumerate the detailed process that a specific embodiment further specifies client-requested private key in this method.
This encryption method can following equipment as: realize on smart card, mobile phone, USB device, the computer.Wherein smart card, USB device realize adding, deciphering at device interior, and the high security protection of private key is provided.Utilize the supporting algorithm of key encapsulation mechanism and Mechanism of Data Encapsulation to carry out combining encryption, be specially adapted to short message and encrypt.Be set forth in below and realize encrypted process on the mobile phone.
If realizing above method on the SIM card: need to install the STK that realizes above encrypting method on user's the SIM card and use.
1), user's (transmitting terminal or receiving terminal) selects application to open cryptographic services by the STK menu.After STK application requirements user imports a services password, adopt the mark encryption algorithm such as the BF-IBE algorithm for encryption services password of standard.The recipient who encrypts is designated key and generates center SMS module number.Send this cipher-text information after encryption is finished and generate the center SMS module to key.
2), after password generates the center SMS module and receive this encryptions note, use the private key of its note number correspondence to decipher, obtain services password, obtain user's phone number simultaneously by note.
3), password generation center selects the random code of 6 characters, send on the user mobile phone by note.Password generates the center according to the KDF that realizes services password and key W of random code derivation from the user.
4), after password generates the center and generate the sign private key of respective user phone number according to the sign private key generating algorithm that realizes, use W as key and data encapsulation algorithm for encryption sign private key.Password generation center will identify the private key ciphertext by SMS module and send to user mobile phone with messaging format.
5), SIM card after receiving note, the STK application requirements user of encrypting method imports 1) services password and 3 determined) after the random code sent, according to KDF derivative key W, deciphering sign private key ciphertext is recovered and the storaging mark private key.
6), the user will send when encrypting note, start the encryption note menu of STK menu, after the user imports recipient's phone number and short message content, STK use 5) the sign private key that obtains in and recipient's note number send to recipient's mobile phone with ciphertext by note after encrypting short message content according to aforesaid ciphering process.
When 7), the user wants the enabling decryption of encrypted note, start the deciphering note menu of STK menu, STK use 5) the sign private key that obtains in and sender's phone number are according to aforesaid decrypting process deciphering short message content, if successful decryption then shows short message content and sender's phone number.If failure then points out user's note system to forge or altered.

Claims (7)

1. encryption method, above encryption method are will be packaged with in the process that cipher-text information expressly sends to receiving terminal at transmitting terminal to realize that it is characterized in that: concrete steps are as follows:
1., at first in the mailbox memory of server, set up master key by supporting fixedly algorithm, described server is the private server that is used to encrypt, and it comprises password generation center, CPU, memory cell and the short message receiving-transmitting unit that generates private key by software kit;
2., obtain the request of private key and the sign of client, server carries out private key by master key and generates, and the private key that generates is issued to client safely, and client is the transmitting terminal or the receiving terminal of cipher-text information according to client;
3., transmitting terminal by the private key A that obtains and receiving terminal sign B with plain text encryption, encapsulate the back with transmitting terminal sign A and generate cipher-text information, be sent to receiving terminal;
4., receiving terminal is decrypted the cipher-text information that receives by private key B and the transmitting terminal sign A that obtains, if successful decryption, receiving terminal obtains the plaintext of cipher-text information and can determine that the transmitting terminal of ciphertext is A, if deciphering failure, can conclude that then cipher-text information pretends to be A to forge for other people or distorted
Wherein step 2. the server concrete grammar that carries out private key distribution be:
I. client comprises transmitting terminal or receiving terminal, uses server identification C encryption to be sent to server the services password of its sign, phone number and customer selecting and asks;
Ii. after server uses the corresponding private key C deciphering of its sign, obtain client identification, phone number and services password;
Iii. server sends to a random number on client's mobile phone by note;
Iv. server generates the private key corresponding with client identification with supporting algorithm and master key,
V. server derives from a symmetric key with the services password and the random number among the iii of supporting algorithm from ii,
Vi. server is issued to client with the symmetric key encryption private key that generates among supporting algorithm and the v,
Vii. client uses random number that the iii that receives on the services password selected among the i and the client's mobile phone sends to derive from symmetric key according to the method for v, and with this secret key decryption and store the private key that vi issues.
2. a kind of encryption method according to claim 1, it is characterized in that: if transmitting terminal has obtained private key A, then directly carry out step 3., otherwise, at first carry out step 2., the services password that transmitting terminal identifies A and corresponding cell-phone number and selection with transmitting terminal is encrypted and is sent to server and asks.
3. a kind of encryption method according to claim 1, it is characterized in that: if receiving terminal has obtained private key B, then directly carry out step 4., otherwise, at first carry out step 2., the services password that receiving terminal identifies B and corresponding cell-phone number and selection with receiving terminal is encrypted and is sent to server and asks.
4. a kind of encryption method according to claim 1 is characterized in that: when transmitting terminal is encrypted each cleartext information, come encrypting plaintext with using a unique number to mix the key that is calculated by private key A and sign B.
5. a kind of encryption method according to claim 4, it is characterized in that: described unique number is the cumulative number of current transmission ciphertext between transmitting terminal and the receiving terminal, transmitting terminal adds 1 each the encryption to behind the receiving terminal of appointment with this counting, receiving terminal after successfully deciphering at every turn, counting in relatively more local counting and the cipher-text information, if the counting in the cipher-text information is counted greater than this locality, the local counting of then receiving and deciphering result, and renewal is the counting in the cipher-text information.
6. a kind of encryption method according to claim 4 is characterized in that: described unique number can be a random number by the transmitting terminal generation.
7. a kind of encryption method according to claim 1 is characterized in that: described sign A or sign B are the phone number or the user ID registered mistake, that authorize of transmitting terminal or receiving terminal.
CN2010101183158A 2010-03-04 2010-03-04 Dedicated server used for encryption and encryption method Active CN101789865B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101183158A CN101789865B (en) 2010-03-04 2010-03-04 Dedicated server used for encryption and encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101183158A CN101789865B (en) 2010-03-04 2010-03-04 Dedicated server used for encryption and encryption method

Publications (2)

Publication Number Publication Date
CN101789865A CN101789865A (en) 2010-07-28
CN101789865B true CN101789865B (en) 2011-11-30

Family

ID=42532933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101183158A Active CN101789865B (en) 2010-03-04 2010-03-04 Dedicated server used for encryption and encryption method

Country Status (1)

Country Link
CN (1) CN101789865B (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281303A (en) * 2011-08-31 2011-12-14 北京海泰方圆科技有限公司 Data exchange method
CN102448033B (en) * 2011-11-24 2014-03-12 中国钓具技术标准化(北仑海伯)研究中心 Short message security certification method
CN102523563B (en) * 2011-12-26 2015-04-15 深圳奥联信息安全技术有限公司 Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN103379094A (en) * 2012-04-18 2013-10-30 中兴通讯股份有限公司 Method for protecting DHCP (Dynamic Host Configuration Protocol), sender and receiver
KR101493212B1 (en) * 2012-10-31 2015-02-23 삼성에스디에스 주식회사 Method and system for id-based encryption and decryption
CN102958021A (en) * 2012-11-07 2013-03-06 华东师范大学 Short message encryption and decryption communication system and communication method thereof
CN103067892B (en) * 2012-12-21 2015-06-03 深圳一卡通新技术有限公司 Short message transmission method using watermark
CN104579657A (en) * 2013-10-11 2015-04-29 北大方正集团有限公司 Method and device for identity authentication
CN104270516B (en) * 2014-09-23 2019-05-24 中兴通讯股份有限公司 Decryption method and mobile terminal
CN104506483A (en) * 2014-10-21 2015-04-08 中兴通讯股份有限公司 Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104507083B (en) * 2014-12-25 2019-05-14 宇龙计算机通信科技(深圳)有限公司 Information ciphering method, server and terminal
CN104735064B (en) * 2015-03-16 2018-03-27 深圳奥联信息安全技术有限公司 The method that safety is cancelled and updated is identified in a kind of id password system
JP6721266B2 (en) * 2017-04-14 2020-07-08 三菱電機株式会社 Key management system, communication device, and key sharing method
CN109873787B (en) * 2017-12-01 2022-09-23 北京安云世纪科技有限公司 Access authentication method, device and system
CN110536291B (en) * 2019-01-18 2024-11-01 中兴通讯股份有限公司 Authentication method, device and system
CN109802829B (en) * 2019-02-15 2021-07-06 重庆邮电大学 Identity authentication method of information center network content requesting user
CN111526128B (en) * 2020-03-31 2022-07-19 中国建设银行股份有限公司 Encryption management method and device
CN111585983A (en) * 2020-04-24 2020-08-25 苏州细无声信息科技服务有限公司 Intellectual property consulting information management method, device, computer and storage medium
CN111783120A (en) * 2020-06-30 2020-10-16 曙光信息产业(北京)有限公司 A data interaction method, computing device, BMC chip and electronic device
CN112769778B (en) * 2020-12-28 2023-05-23 福建正孚软件有限公司 Encryption and decryption processing method and system based on cross-network cross-border data security transmission
CN112788005B (en) * 2020-12-29 2023-05-23 福建正孚软件有限公司 Cross-border transmission method and system for improving safety by combining software and hardware
CN112702355B (en) * 2020-12-29 2023-07-25 福建正孚软件有限公司 Cross-border file transmission method and system integrating operation and maintenance system
CN112910846B (en) * 2021-01-15 2024-02-27 常熟理工学院 Communication method based on trusted third party authentication
CN113824702B (en) * 2021-09-02 2024-02-02 积至(海南)信息技术有限公司 Mail system based on IBE identity authentication technology
CN115935388B (en) * 2022-12-05 2023-06-23 广州通则康威智能科技有限公司 Software package safe sending method, device, equipment and storage medium
CN117353916B (en) * 2023-11-01 2024-07-26 北京中宏立达科技发展有限公司 Key distribution acquisition method and system based on encrypted two-dimensional code

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7657037B2 (en) * 2004-09-20 2010-02-02 Pgp Corporation Apparatus and method for identity-based encryption within a conventional public-key infrastructure
CN101166088A (en) * 2007-09-27 2008-04-23 航天信息股份有限公司 Encryption and decryption method based on user identity identifier
CN101567784B (en) * 2008-04-21 2016-03-30 华为数字技术(成都)有限公司 A kind of method, system and equipment obtaining key

Also Published As

Publication number Publication date
CN101789865A (en) 2010-07-28

Similar Documents

Publication Publication Date Title
CN101789865B (en) Dedicated server used for encryption and encryption method
CN109495274B (en) Decentralized intelligent lock electronic key distribution method and system
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN102394749B (en) Line protection method, system, information safety equipment and application equipment for data transmission
CN102082790B (en) Method and device for encryption/decryption of digital signature
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103297403A (en) Method and system for achieving dynamic password authentication
CN102118710A (en) System and method for transmitting data between mobile terminals
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN107425971B (en) Certificateless data encryption/decryption method and device and terminal
CN102333093A (en) Data encryption transmission method and system
CN101540669A (en) Method for distributing keys and protecting information for wireless mobile communication network
CN101917710A (en) Method, system and related device for mobile internet encryption communication
CN103051459B (en) The management method of the transaction key of safety card and device
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN110535626B (en) Secret communication method and system for identity-based quantum communication service station
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN105553654A (en) Key information query processing method and device and key information management system
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN108155987A (en) Group message sending method, method of reseptance and its system and communicating terminal
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN105281910A (en) Internet of things lock with CA digital certificate serving as network access identity identifier and network access identity identification method
CN101789863B (en) Safe data information transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHENZHEN AOLIAN INFORMATION SECURITY TECHNOLOGY CO

Free format text: FORMER NAME: NISC INC.

CP03 Change of name, title or address

Address after: 518000 Guangdong City, Shenzhen Province, Xin'an street, Metro Avenue, Mong Kok, Mong Kok, Mong Kok, 1 shopping malls, 334 of the Seventeen of the

Patentee after: Shenzhen Ao Lian information security technology Co., Ltd

Address before: Nanshan District Shenzhen City, Guangdong province 518052 Shennan Road No. 188 building 5E Grand View

Patentee before: NISC Inc.