CN100454807C - Method for protecting information integrity - Google Patents

Method for protecting information integrity Download PDF

Info

Publication number
CN100454807C
CN100454807C CNB031561039A CN03156103A CN100454807C CN 100454807 C CN100454807 C CN 100454807C CN B031561039 A CNB031561039 A CN B031561039A CN 03156103 A CN03156103 A CN 03156103A CN 100454807 C CN100454807 C CN 100454807C
Authority
CN
China
Prior art keywords
multicast
information
user
pki
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB031561039A
Other languages
Chinese (zh)
Other versions
CN1592195A (en
Inventor
黄迎新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB031561039A priority Critical patent/CN100454807C/en
Publication of CN1592195A publication Critical patent/CN1592195A/en
Application granted granted Critical
Publication of CN100454807C publication Critical patent/CN100454807C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Abstract

The present invention discloses a method for protecting information integrity, which is used in the wireless field. The method comprises the steps that a user obtains and stores a public key of a multicast/broadcast server; the multicast/broadcast server sends information of which the integrity is protected to the user, the user utilizes the public key to check whether integrity protected information in the received information is effective, and if the information is effective, the user can judge that the information has integrity; otherwise the user can judge that the information doesn't have integrity. If the method of the present invention is utilized to protect the safety of information sent by the multicast/broadcast server, users can check received information, so that the users can make sure that whether the received information has integrity and whether a message source which sends the information is reliable, and information can be effectively prevented from being juggled or forged in a multicast/broadcast service. In addition, the present invention additionally adds a time limit to information sent by the multicast/broadcast server, so that the information can be prevented from being repeatedly used by people.

Description

A kind of guard method of information integrity
Technical field
The present invention relates to the information security technology in the multicast/broadcast business, be meant a kind of guard method of information integrity especially.
Background technology
In cordless communication network, multicast/broadcast business is meant the unidirectional bearer service that a bit arrives multiple spot, data message is sent to a plurality of receiving entities by a former entity, data message is sent to a plurality of subscriber equipmenies by multicast, these are by some data message to multileaving, can be multicast/broadcast business information, also can be the signaling information that is used for controlling multicast/broadcast business.Signaling information is compared with business information and is wanted much less, but signaling information wants much important with respect to business information, because signaling information is the control multicast/broadcast business.Multicast is meant can provide the multicast/broadcast business service, have the functional entity that key generates management function concurrently, can be functional entity newly-increased in cordless communication network, also can be the functional entity in the existing wireless communications network or the combination of a plurality of functional entitys.
At present, the business information in the multicast/broadcast business being encrypted the back sends, for example, multicast is used the user owns together in itself and the group group to share and is sent to user in the group after key is encrypted business information, the user uses the shared key of owned group that the business information of receiving is decrypted in the group, and then obtains multicast/broadcast business information.Yet the signaling information in the multicast/broadcast business is not just encrypted directly broadcast transmission usually, this is because some signaling informations are unsuitable for encrypting, for example be used to control the broadcast signaling information of the shared key of which group of the current use of user in the group, if this signaling information is encrypted, will make those originally not in multicast/broadcast business group, and just having added multicast/broadcast business group, the user who does not but also use correct group to share key can't receive this signaling information of broadcasting; In addition, generally do not carry the information content of need to be keep secret in the signaling information,, still,, therefore need highly guarantee the integrality of signaling information because signaling information is used to control multicast/broadcast business so do not need to encrypt.
If the signaling information victim of multicast broadcasting is revised in sending the way, then may cause the multicast/broadcast business system can't operate as normal.For example, the user uses and is numbered 5 the shared follow-up business information of receiving of secret key decryption of group in the multicast notice group, because this signaling information has only carried the numbering of the shared key of group, do not carry corresponding group and share key, so this signaling information can adopt expressly transmission; Because this signaling information does not carry out corresponding integrity protection; so just might be under attack; the assailant is revised as 3 by 5 with this signaling information in sending the way; after the user receives signaling information in the group; and do not know that this signaling information is modified; just use to be numbered 3 group and to share the business information that secret key decryption is received, will cause so that the user can't normally receive follow-up multicast/broadcast business information in all groups according to the indication in the signaling information.Also available oneself the information of assailant replaces the signaling information of real multicast broadcast transmission, or directly pretend to be multicast broadcast transmission signaling information, to cause all that the user can't normally receive multicast/broadcast business information, the serious consequence that the multicast/broadcast business system can't normally move in the group.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of guard method of information integrity, and the user normally receives the information of multicast/broadcast business in the assurance group, guarantees the normal operation of multicast/broadcast business system simultaneously.
In order to achieve the above object, the invention provides a kind of guard method of information integrity, the method includes the steps of:
A, user obtain the PKI through the multicast of integrity protection and encryption, to described PKI be decrypted with completeness check after, store; Perhaps, it is the public key certificate that multicast is issued that the user obtains certificate agency, and the PKI in the described public key certificate is stored;
B, user receive the information that multicast has been carried out integrity protection;
C, user use the PKI check of being stored to receive whether the integrity protection information in the information is effective, if, judge that described information has integrality, otherwise, judge that described information does not have integrality.
The PKI of the multicast of steps A described process integrity protection and encryption is: Integrity Key and encryption key that multicast uses the user to add the generation of multicast/broadcast business verification process carry out integrity protection and encryption to the multicast PKI.
The public key certificate that the described certificate agency of described steps A is issued for multicast is that multicast provides the multicast PKI to certificate agency, after certificate agency generates and comprises the public key certificate of multicast PKI, use the public key certificate of the encrypted private key multicast of certificate agency, become certificate agency and be public key certificate that multicast issues, described step C comprises: the user uses the PKI check in the multicast public key certificate to receive whether the digital signature in the information is effective.
It is that the public key certificate that multicast is issued further comprises before that the described user of steps A obtains certificate agency: the user asks certificate agency to provide and the corresponding PKI of certificate agency private key to it, the described certificate agency PKI that user storage is received, and use the certificate agency PKI to check the validity of described public key certificate, if effectively, the described public key certificate of user storage then; Otherwise the user abandons described public key certificate.
Preferably, described step B comprises: the user receives the information after the corresponding multicast private key of PKI described in multicast use and the steps A carries out digital signature; Described step C comprises: the user uses the check of PKI described in the steps A to receive whether the digital signature in the information is effective.
Described step B further may further comprise the steps: B1, user receive multicast and use make a summary the information content after handling of digest algorithm, and multicast is used the summary after described multicast private key is encrypted; After B2, user receive information, use described digest algorithm that the information content is made a summary and obtain summary after handling; B3, user use the summary that dock in the breath content of collecting mail with the corresponding multicast PKI of multicast private key to be decrypted, and whether with summary that user calculate consistent in judgement if deciphering the summary that obtains then.
Further comprise in the described information of described step B: the timestamp of multicast additional identification information transmitting time in the content of this information; Judge described in the step C that described information further comprises after having integrality: whether the timestamp of user judgment information is later than the timestamp that self stores, if be the timestamp of receiving information with the update of time stamp of self storing; Otherwise, think that this message is illegally reusable, abandons this message.
Judge described in the step C that described information further comprises D after not having integrality: user's elapsed time postpones the back to multicast feedback abnormal information.
Further comprise E after the described step D: all users stop to feed back abnormal information under the notice of multicast.
Different user has different described time delays.
If described information is multicast/broadcast business information, then described multicast/broadcast business information is encrypted by multicast.
According to the proposed method; the information that multicast sends is carried out the fail safe protection; the user can be tested to the information of receiving; thereby determine whether the information of receiving has integrality; and whether the message source of determining this information of transmission is reliable, prevents that effectively information is distorted or forged by other people malice in the multicast/broadcast business.In addition, the present invention stabs by the information additional period that multicast is sent, and the information that prevents is reused by other people.The present invention also provides numerous embodiments, can select flexibly according to practical application; When adopting digital signature mode guarantee information integrality and fail safe, multicast sends to the user after with public key encryption, can prevent from that the assailant from sending in the way at PKI to distort or replace.
Description of drawings
Fig. 1 is for realizing the flow chart of signaling information integrality and fail safe among the present invention;
Fig. 2 is another embodiment schematic diagram among the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Among the present invention; multicast uses private key that the information content that sends is carried out integrity protection; whether the user uses the integrity information in the information of receiving with the corresponding PKI check of private key in the group effective; if; prove that then the information content is reliable less than the message source that is not modified and sends information in sending the way; therefore information has integrality; corresponding operating is carried out in indication according to information; otherwise; information does not have integrality; the information of receiving is not handled, thereby guaranteed that the user receives the complete reliability of information.
Fig. 1 as shown in Figure 1, realizes that the handling process of signaling information integrality and fail safe may further comprise the steps for realizing the flow chart of signaling information integrality and fail safe among the present invention:
Step 101~step 103: multicast user in group sends the PKI of self.Multicast is used with the corresponding private key of PKI signalling information content is carried out digital signature, is broadcast to user in the group then; The user uses public-key and verifies whether the digital signature in the signaling information is effective in the group, if, prove that then signalling information content is reliable less than the message source that is not modified and sends signaling information in sending the way, therefore signaling information has integrality and fail safe, corresponding operating is carried out in indication according to signaling information, otherwise, the signaling information of receiving is not handled, or through execution in step 104 after the regular hour delay.
For increasing the fail safe of PKI; prevent that PKI from being distorted by other people malice in sending the way; multicast can carry out PKI sending to user in the group after integrity protection and the encryption, and the user just stores after the PKI of receiving is decrypted and verifies integrality in the group.
Step 104~step 105: after the regular hour delay, the user feeds back abnormal information to multicast in the group, after multicast is received the abnormal information of user feedback in the group, can notify that the user stops to feed back abnormal information in all groups according to corresponding strategy, avoid the identical abnormal information of user feedback in all groups, cause the multicast/broadcast business resource waste, corresponding strategy can be that the user surpasses certain number and just sends and stop feedback and notify in the unusual group of feedback, because self mistake in the time of may occurring that the user does completeness check in certain group, rather than real signaling information is modified, so just do not have user feedback in a large amount of groups, the notice that stops to feed back also just there is no need, if user self has occurred will entering other handling process unusually in the group, do not describe within the scope in the present invention.The user feeds back identical abnormal information to multicast at one time in a large amount of groups in order to avoid, more effectively avoid the multicast/broadcast business resource waste, can make the time delay of user in the different groups inequality, like this, after as long as multicast is received the abnormal information of user feedback in the relative small number group, just can notify that the user stops to feed back abnormal information in all groups.
Reused by other people for effectively preventing the signaling information that carries out digital signature, can in the signaling information of multicast broadcasting, further increase timestamp, multicast is carried out digital signature together to signalling information content and timestamp, in the group user rs authentication digital signature effectively after, continuation judges by timestamp whether the current signaling information of receiving is up-to-date, be whether the judgement time stamp is fresh, if then carry out corresponding operating according to the indication of signaling information; Otherwise, the signaling information of receiving is not handled.
User storage has multicast to send the time variable of signaling information in the group, send the initial value of the timestamp of signaling information for the first time with multicast as time variable, the user whenever receives a signaling information with integrality and fail safe in the group, is the current timestamp of receiving signaling information with regard to upgrading the time variable of self storing.Whether judgement time stabs is that fresh process is: after the user receives signaling information in the group, timestamp in this signaling information is compared with the timestamp of self storing, if the current timestamp of receiving signaling information is more late than the timestamp of self storage, confirm that then this signaling information is effectively new signaling information, carrying out corresponding operating and upgrade the timestamp of self storing according to the indication of signaling information is the current timestamp of receiving signaling information; If the current timestamp of receiving signaling information is more Zao or identical than the timestamp of self storage, confirm that then this signaling information is invalid signaling information, does not handle the signaling information of receiving.If a plurality of multicast are arranged, then the user stores and the corresponding time variable of each multicast at different multicast in the group.
Fig. 2 is another embodiment schematic diagram among the present invention, as shown in Figure 2, realizes in the present embodiment that the handling process of signaling information integrality and fail safe may further comprise the steps:
Step 201~step 202: the user asks to add multicast/broadcast business, multicast is verified user identity, in the time of identifying user identity, multicast and user generate and store encryption key simultaneously and are used for the Integrity Key of integrity protection; If the user is by authentication, then the user be multicast/broadcasting server confirms as user in the group, multicast user in group sends the PKI through Integrity Key protection and encryption keys; After the user receives the PKI of encryption in the group, use the encryption key and the Integrity Key of self storage to be decrypted and to carry out completeness check, from successful decryption and completeness check by this PKI of back storage.If the user is not by authentication, then the multicast refusal provides the multicast/broadcast business service to it.
Step 203~step 204: multicast is used and with the corresponding private key of PKI signalling information content and timestamp is carried out digital signature, broadcasts to user in the group then; The user uses public-key and verifies whether the digital signature in the signaling information is effective in the group, if, prove that then signalling information content and timestamp are not modified in sending the way, and the message source that sends signaling information is reliable, therefore signaling information has integrality and fail safe, and execution in step 205 then, otherwise, the signaling information of receiving is not handled, or through execution in step 206 after the regular hour delay.
Can carry out digital signature together to signalling information content and timestamp by digest algorithm, spendable digest algorithm comprises MD5 algorithm, SHA-1 algorithm etc., use digest algorithm to the processing of making a summary together of content in the signaling information and timestamp, use the private key that has only multicast oneself to know that summary is encrypted then, summary after will encrypting at last is attached to the back of signalling information content and timestamp, become the digital signature of signalling information content and timestamp, broadcast to user in the group.
After the user receives signaling information in the group, whether use with the corresponding PKI of private key checks the digital signature in the signaling information effective, the process of check is: uses identical digest algorithm that signalling information content and timestamp are made a summary and obtain making a summary after handling, use public-key then digital signature is decrypted, the summary that self is calculated compares with the summary that deciphering obtains, if it is consistent, prove that then signalling information content and timestamp are not modified in sending the way, and the message source that sends signaling information is reliably, has integrality and fail safe; Otherwise signaling information does not have integrality and fail safe.
Digest algorithm can calculate the output of regular length to the input of regular length not, and can't release instead according to output what input is, the output of different input correspondences is different, even very little change is carried out in input, the capital obtains different output, even causes changing very large output.Because private key has only multicast oneself to know, therefore make other people can't palm off multicast users broadcasting signaling information in group by digital signature; And, make other people in the transmission way of signaling information, revise signalling information content and timestamp, and do not found by user in the group by checking to digital signature.
Step 205: whether the timestamp of customer inspection signaling information is fresh in the group, if upgrading the time variable of self storing is the current timestamp of receiving signaling information, and carries out corresponding operating according to the indication of signaling information; Otherwise, the signaling information of receiving is not handled, or through execution in step 206 after the regular hour delay.
Step 206~step 207: user's time delay has nothing in common with each other in the group, in certain group the user through certain self time delay after, to multicast feedback abnormal information, after multicast is received the abnormal information of user feedback in the group, notify that the user stops to feed back abnormal information in all groups, avoid the identical abnormal information of user feedback in all groups, cause the multicast/broadcast business resource waste.
In addition, cordless communication network can combine with Public Key Infrastructure(PKI).The PKI system is made up of some equipment, and an applied environment trusty is provided, and makes the method for above-mentioned public/deciphering can be applied to the miscellaneous service service.Comprise certificate agency (CA) in the PKI system, certificate agency is one and weighs into mechanism, can be trusted fully by all users or entity.
Multicast with its public key safety offer certificate agency, make public key certificate by certificate agency, public key certificate comprises the PKI and the private information of multicast, private information comprises information such as title, address.Certificate agency makes public key certificate with the PKI and the private information of multicast, and uses the private key of self that public key certificate is carried out digital signature and becomes formal public key certificate, and the digital signature of certificate agency proves that this public key certificate is that it is issued.Because certificate agency is an authoritative institution, so all users or entity can its public key certificate of issuing of utmost good faith.The private key of certificate agency is to need extremely to maintain secrecy; With the corresponding PKI of the private key of certificate agency be disclosed, in the group behind the PKI that obtains certificate agency of user security, just can use the validity of public key certificate of the PKI check multicast and broadcast server of certificate agency.
For example, the PKI of the user storage certificate agency that safety is obtained from certificate agency in the group.Multicast user in group sends the public key certificate of oneself, this process of transmitting is not need to be keep secret, the user is after receiving the public key certificate of multicast in the group, use the PKI of certificate agency that the public key certificate that obtains is verified, check whether it is that certificate agency is issued, if just think the legal public key certificate of multicast, this public key certificate of user storage.After the user receives the signaling information of process multicast digital signature, digital signature in the public key verifications signaling information in the certificate uses public-key, if be proved to be successful, prove that then signaling information is not modified in sending the way, and the message source that sends signaling information is reliably, so signaling information has integrality and fail safe; Otherwise, the signaling information of receiving is not handled.
In actual applications, when cordless communication network combines with Public Key Infrastructure(PKI), can increase timestamp equally, be reused by other people in order to prevent signaling information; When the user finds that signaling information is invalid in the group, can feed back abnormal information to multicast.
In addition, when the ability of terminal equipment and wireless bandwidth are enough, said method can be applied to the business information in the multicast/broadcast business.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (11)

1, a kind of guard method of information integrity is characterized in that the method includes the steps of:
A, user obtain the PKI through the multicast of integrity protection and encryption, to described PKI be decrypted with completeness check after store; Perhaps, it is the public key certificate that multicast is issued that the user obtains certificate agency, and the PKI in the described public key certificate is stored;
B, user receive the information that multicast has been carried out integrity protection;
C, user use the PKI check of being stored to receive whether the integrity protection information in the information is effective, if, judge that described information has integrality, otherwise, judge that described information does not have integrality.
2, method according to claim 1; it is characterized in that the PKI of the multicast of steps A described process integrity protection and encryption is: Integrity Key and encryption key that multicast uses the user to add the generation of multicast/broadcast business verification process carry out integrity protection and encryption to the multicast PKI.
3, method according to claim 1 is characterized in that,
The public key certificate that the described certificate agency of steps A is issued for multicast is that multicast provides the multicast PKI to certificate agency, after certificate agency generates and comprises the public key certificate of multicast PKI, form behind the public key certificate of the encrypted private key multicast of use certificate agency;
Described step C comprises: the user uses the PKI check in the multicast public key certificate to receive whether the digital signature in the information is effective.
4, method according to claim 3, it is characterized in that, it is that the public key certificate that multicast is issued further comprises before that the described user of steps A obtains certificate agency: the user asks certificate agency to provide and the corresponding PKI of certificate agency private key to it, the described certificate agency PKI that user storage is received, and use the certificate agency PKI to check the validity of described public key certificate, if effectively, the described public key certificate of user storage then; Otherwise the user abandons described public key certificate.
5, method according to claim 1 is characterized in that,
Described step B comprises: the user receives the information after the corresponding multicast private key of PKI described in multicast use and the steps A carries out digital signature;
Described step C comprises: the user uses the check of PKI described in the steps A to receive whether the digital signature in the information is effective.
6, method according to claim 5 is characterized in that, described step B further may further comprise the steps:
B1, user receive multicast and use make a summary the information content after handling of digest algorithm, and multicast is used the summary after described multicast private key is encrypted;
After B2, user receive information, use described digest algorithm that the information content is made a summary and obtain summary after handling;
B3, user use the summary that dock in the breath content of collecting mail with the corresponding multicast PKI of multicast private key to be decrypted, and whether with summary that user calculate consistent in judgement if deciphering the summary that obtains then.
7, method according to claim 1 is characterized in that,
Further comprise in the described information of step B: the timestamp of multicast additional identification information transmitting time in the content of this information;
Judge described in the step C that described information further comprises after having integrality: whether the timestamp of user judgment information is later than the timestamp that self stores, if be the timestamp of receiving information with the update of time stamp of self storing; Otherwise, think that this message is illegally reusable, abandons this message.
8, method according to claim 1 is characterized in that, judge described in the step C that described information further comprises D after not having integrality: user's elapsed time postpones the back to multicast feedback abnormal information.
9, method according to claim 8 is characterized in that, further comprise E after the described step D: all users stop to feed back abnormal information under the notice of multicast.
10, method according to claim 8 is characterized in that, different user has different described time delays.
11, method according to claim 1 is characterized in that, if described information is multicast/broadcast business information, then described multicast/broadcast business information is encrypted by multicast.
CNB031561039A 2003-08-29 2003-08-29 Method for protecting information integrity Expired - Fee Related CN100454807C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB031561039A CN100454807C (en) 2003-08-29 2003-08-29 Method for protecting information integrity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB031561039A CN100454807C (en) 2003-08-29 2003-08-29 Method for protecting information integrity

Publications (2)

Publication Number Publication Date
CN1592195A CN1592195A (en) 2005-03-09
CN100454807C true CN100454807C (en) 2009-01-21

Family

ID=34598311

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB031561039A Expired - Fee Related CN100454807C (en) 2003-08-29 2003-08-29 Method for protecting information integrity

Country Status (1)

Country Link
CN (1) CN100454807C (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932143B (en) * 2011-08-10 2016-04-06 上海康纬斯电子技术有限公司 Certification in digital interrogation device, encrypting and decrypting and tamper resistant method
CN103986541B (en) * 2014-05-22 2017-01-11 北京视博数字电视科技有限公司 Emergency broadcasting system
CN105469510B (en) * 2014-10-12 2018-01-09 吴思进 The encryption currency wallet that delay pays or given for change can be predicted
GB2546340A (en) * 2016-01-18 2017-07-19 Isis Innovation Improving security protocols
CN110149324B (en) * 2019-05-13 2020-02-14 特斯联(北京)科技有限公司 Network attack prevention method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1147656A (en) * 1995-03-31 1997-04-16 皮特尼鲍斯股份有限公司 Cryptographic key management and validation system
CN1202288A (en) * 1995-09-15 1998-12-16 文件证实系统公司 Document authentication system and method
WO2003034732A1 (en) * 2001-10-19 2003-04-24 Viaccess Interactive protocol for remote management of access control to scrambled data
WO2003056745A1 (en) * 2001-12-21 2003-07-10 Qualcomm, Incorporated Method and apparatus for simplified audio authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1147656A (en) * 1995-03-31 1997-04-16 皮特尼鲍斯股份有限公司 Cryptographic key management and validation system
CN1202288A (en) * 1995-09-15 1998-12-16 文件证实系统公司 Document authentication system and method
WO2003034732A1 (en) * 2001-10-19 2003-04-24 Viaccess Interactive protocol for remote management of access control to scrambled data
WO2003056745A1 (en) * 2001-12-21 2003-07-10 Qualcomm, Incorporated Method and apparatus for simplified audio authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
数字签名技术及其在网络通信安全中的应用. 范红.中国科学院研究生院学报,第18卷第2期. 2001
数字签名技术及其在网络通信安全中的应用. 范红.中国科学院研究生院学报,第18卷第2期. 2001 *

Also Published As

Publication number Publication date
CN1592195A (en) 2005-03-09

Similar Documents

Publication Publication Date Title
US6584565B1 (en) Method and apparatus for long term verification of digital signatures
EP0861541B1 (en) Root key compromise recovery
US6782103B1 (en) Cryptographic key management
US5745574A (en) Security infrastructure for electronic transactions
US20020136410A1 (en) Method and apparatus for extinguishing ephemeral keys
CN113923044B (en) Cross-chain system and method based on trusted execution environment
JP2007282295A (en) Cryptographic system and method with key escrow feature
EP3585023A1 (en) Data protection method and system
Zhang et al. Achieving non-repudiation of receipt
KR20060049245A (en) Method and system for electronic voting over a high-security network
CN101399825A (en) Method, device and system for sharing matched pair information between equipments
GB2454641A (en) Security in a telecommunications network
Phoha Internet security dictionary
CN110634072B (en) Block chain transaction system based on multi-signature and hardware encryption
CN100454807C (en) Method for protecting information integrity
CN1998181B (en) Batch OCSP and batch distributed OCSP
CN100414875C (en) Method of information integrity protection in multicast/broadcast
CN115174277B (en) Data communication and file exchange method based on block chain
Kline et al. Public key vs. conventional key encryption
EP1048142B1 (en) Key management system
CN105432055B (en) Method for protecting telecommunication communication data
Barker Draft NIST SP 800-71, Recommendation for Key Establishment Using Symmetric Block Ciphers
BOOK CCSDS BUNDLE PROTOCOL SECURITY SPECIFICATION
JPH08185376A (en) Message trust system
JPH07297822A (en) Message transmission system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090121

Termination date: 20130829