CN100454807C - Method for protecting information integrity - Google Patents
Method for protecting information integrity Download PDFInfo
- Publication number
- CN100454807C CN100454807C CNB031561039A CN03156103A CN100454807C CN 100454807 C CN100454807 C CN 100454807C CN B031561039 A CNB031561039 A CN B031561039A CN 03156103 A CN03156103 A CN 03156103A CN 100454807 C CN100454807 C CN 100454807C
- Authority
- CN
- China
- Prior art keywords
- multicast
- information
- user
- pki
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Abstract
The present invention discloses a method for protecting information integrity, which is used in the wireless field. The method comprises the steps that a user obtains and stores a public key of a multicast/broadcast server; the multicast/broadcast server sends information of which the integrity is protected to the user, the user utilizes the public key to check whether integrity protected information in the received information is effective, and if the information is effective, the user can judge that the information has integrity; otherwise the user can judge that the information doesn't have integrity. If the method of the present invention is utilized to protect the safety of information sent by the multicast/broadcast server, users can check received information, so that the users can make sure that whether the received information has integrity and whether a message source which sends the information is reliable, and information can be effectively prevented from being juggled or forged in a multicast/broadcast service. In addition, the present invention additionally adds a time limit to information sent by the multicast/broadcast server, so that the information can be prevented from being repeatedly used by people.
Description
Technical field
The present invention relates to the information security technology in the multicast/broadcast business, be meant a kind of guard method of information integrity especially.
Background technology
In cordless communication network, multicast/broadcast business is meant the unidirectional bearer service that a bit arrives multiple spot, data message is sent to a plurality of receiving entities by a former entity, data message is sent to a plurality of subscriber equipmenies by multicast, these are by some data message to multileaving, can be multicast/broadcast business information, also can be the signaling information that is used for controlling multicast/broadcast business.Signaling information is compared with business information and is wanted much less, but signaling information wants much important with respect to business information, because signaling information is the control multicast/broadcast business.Multicast is meant can provide the multicast/broadcast business service, have the functional entity that key generates management function concurrently, can be functional entity newly-increased in cordless communication network, also can be the functional entity in the existing wireless communications network or the combination of a plurality of functional entitys.
At present, the business information in the multicast/broadcast business being encrypted the back sends, for example, multicast is used the user owns together in itself and the group group to share and is sent to user in the group after key is encrypted business information, the user uses the shared key of owned group that the business information of receiving is decrypted in the group, and then obtains multicast/broadcast business information.Yet the signaling information in the multicast/broadcast business is not just encrypted directly broadcast transmission usually, this is because some signaling informations are unsuitable for encrypting, for example be used to control the broadcast signaling information of the shared key of which group of the current use of user in the group, if this signaling information is encrypted, will make those originally not in multicast/broadcast business group, and just having added multicast/broadcast business group, the user who does not but also use correct group to share key can't receive this signaling information of broadcasting; In addition, generally do not carry the information content of need to be keep secret in the signaling information,, still,, therefore need highly guarantee the integrality of signaling information because signaling information is used to control multicast/broadcast business so do not need to encrypt.
If the signaling information victim of multicast broadcasting is revised in sending the way, then may cause the multicast/broadcast business system can't operate as normal.For example, the user uses and is numbered 5 the shared follow-up business information of receiving of secret key decryption of group in the multicast notice group, because this signaling information has only carried the numbering of the shared key of group, do not carry corresponding group and share key, so this signaling information can adopt expressly transmission; Because this signaling information does not carry out corresponding integrity protection; so just might be under attack; the assailant is revised as 3 by 5 with this signaling information in sending the way; after the user receives signaling information in the group; and do not know that this signaling information is modified; just use to be numbered 3 group and to share the business information that secret key decryption is received, will cause so that the user can't normally receive follow-up multicast/broadcast business information in all groups according to the indication in the signaling information.Also available oneself the information of assailant replaces the signaling information of real multicast broadcast transmission, or directly pretend to be multicast broadcast transmission signaling information, to cause all that the user can't normally receive multicast/broadcast business information, the serious consequence that the multicast/broadcast business system can't normally move in the group.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of guard method of information integrity, and the user normally receives the information of multicast/broadcast business in the assurance group, guarantees the normal operation of multicast/broadcast business system simultaneously.
In order to achieve the above object, the invention provides a kind of guard method of information integrity, the method includes the steps of:
A, user obtain the PKI through the multicast of integrity protection and encryption, to described PKI be decrypted with completeness check after, store; Perhaps, it is the public key certificate that multicast is issued that the user obtains certificate agency, and the PKI in the described public key certificate is stored;
B, user receive the information that multicast has been carried out integrity protection;
C, user use the PKI check of being stored to receive whether the integrity protection information in the information is effective, if, judge that described information has integrality, otherwise, judge that described information does not have integrality.
The PKI of the multicast of steps A described process integrity protection and encryption is: Integrity Key and encryption key that multicast uses the user to add the generation of multicast/broadcast business verification process carry out integrity protection and encryption to the multicast PKI.
The public key certificate that the described certificate agency of described steps A is issued for multicast is that multicast provides the multicast PKI to certificate agency, after certificate agency generates and comprises the public key certificate of multicast PKI, use the public key certificate of the encrypted private key multicast of certificate agency, become certificate agency and be public key certificate that multicast issues, described step C comprises: the user uses the PKI check in the multicast public key certificate to receive whether the digital signature in the information is effective.
It is that the public key certificate that multicast is issued further comprises before that the described user of steps A obtains certificate agency: the user asks certificate agency to provide and the corresponding PKI of certificate agency private key to it, the described certificate agency PKI that user storage is received, and use the certificate agency PKI to check the validity of described public key certificate, if effectively, the described public key certificate of user storage then; Otherwise the user abandons described public key certificate.
Preferably, described step B comprises: the user receives the information after the corresponding multicast private key of PKI described in multicast use and the steps A carries out digital signature; Described step C comprises: the user uses the check of PKI described in the steps A to receive whether the digital signature in the information is effective.
Described step B further may further comprise the steps: B1, user receive multicast and use make a summary the information content after handling of digest algorithm, and multicast is used the summary after described multicast private key is encrypted; After B2, user receive information, use described digest algorithm that the information content is made a summary and obtain summary after handling; B3, user use the summary that dock in the breath content of collecting mail with the corresponding multicast PKI of multicast private key to be decrypted, and whether with summary that user calculate consistent in judgement if deciphering the summary that obtains then.
Further comprise in the described information of described step B: the timestamp of multicast additional identification information transmitting time in the content of this information; Judge described in the step C that described information further comprises after having integrality: whether the timestamp of user judgment information is later than the timestamp that self stores, if be the timestamp of receiving information with the update of time stamp of self storing; Otherwise, think that this message is illegally reusable, abandons this message.
Judge described in the step C that described information further comprises D after not having integrality: user's elapsed time postpones the back to multicast feedback abnormal information.
Further comprise E after the described step D: all users stop to feed back abnormal information under the notice of multicast.
Different user has different described time delays.
If described information is multicast/broadcast business information, then described multicast/broadcast business information is encrypted by multicast.
According to the proposed method; the information that multicast sends is carried out the fail safe protection; the user can be tested to the information of receiving; thereby determine whether the information of receiving has integrality; and whether the message source of determining this information of transmission is reliable, prevents that effectively information is distorted or forged by other people malice in the multicast/broadcast business.In addition, the present invention stabs by the information additional period that multicast is sent, and the information that prevents is reused by other people.The present invention also provides numerous embodiments, can select flexibly according to practical application; When adopting digital signature mode guarantee information integrality and fail safe, multicast sends to the user after with public key encryption, can prevent from that the assailant from sending in the way at PKI to distort or replace.
Description of drawings
Fig. 1 is for realizing the flow chart of signaling information integrality and fail safe among the present invention;
Fig. 2 is another embodiment schematic diagram among the present invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with accompanying drawing.
Among the present invention; multicast uses private key that the information content that sends is carried out integrity protection; whether the user uses the integrity information in the information of receiving with the corresponding PKI check of private key in the group effective; if; prove that then the information content is reliable less than the message source that is not modified and sends information in sending the way; therefore information has integrality; corresponding operating is carried out in indication according to information; otherwise; information does not have integrality; the information of receiving is not handled, thereby guaranteed that the user receives the complete reliability of information.
Fig. 1 as shown in Figure 1, realizes that the handling process of signaling information integrality and fail safe may further comprise the steps for realizing the flow chart of signaling information integrality and fail safe among the present invention:
Step 101~step 103: multicast user in group sends the PKI of self.Multicast is used with the corresponding private key of PKI signalling information content is carried out digital signature, is broadcast to user in the group then; The user uses public-key and verifies whether the digital signature in the signaling information is effective in the group, if, prove that then signalling information content is reliable less than the message source that is not modified and sends signaling information in sending the way, therefore signaling information has integrality and fail safe, corresponding operating is carried out in indication according to signaling information, otherwise, the signaling information of receiving is not handled, or through execution in step 104 after the regular hour delay.
For increasing the fail safe of PKI; prevent that PKI from being distorted by other people malice in sending the way; multicast can carry out PKI sending to user in the group after integrity protection and the encryption, and the user just stores after the PKI of receiving is decrypted and verifies integrality in the group.
Step 104~step 105: after the regular hour delay, the user feeds back abnormal information to multicast in the group, after multicast is received the abnormal information of user feedback in the group, can notify that the user stops to feed back abnormal information in all groups according to corresponding strategy, avoid the identical abnormal information of user feedback in all groups, cause the multicast/broadcast business resource waste, corresponding strategy can be that the user surpasses certain number and just sends and stop feedback and notify in the unusual group of feedback, because self mistake in the time of may occurring that the user does completeness check in certain group, rather than real signaling information is modified, so just do not have user feedback in a large amount of groups, the notice that stops to feed back also just there is no need, if user self has occurred will entering other handling process unusually in the group, do not describe within the scope in the present invention.The user feeds back identical abnormal information to multicast at one time in a large amount of groups in order to avoid, more effectively avoid the multicast/broadcast business resource waste, can make the time delay of user in the different groups inequality, like this, after as long as multicast is received the abnormal information of user feedback in the relative small number group, just can notify that the user stops to feed back abnormal information in all groups.
Reused by other people for effectively preventing the signaling information that carries out digital signature, can in the signaling information of multicast broadcasting, further increase timestamp, multicast is carried out digital signature together to signalling information content and timestamp, in the group user rs authentication digital signature effectively after, continuation judges by timestamp whether the current signaling information of receiving is up-to-date, be whether the judgement time stamp is fresh, if then carry out corresponding operating according to the indication of signaling information; Otherwise, the signaling information of receiving is not handled.
User storage has multicast to send the time variable of signaling information in the group, send the initial value of the timestamp of signaling information for the first time with multicast as time variable, the user whenever receives a signaling information with integrality and fail safe in the group, is the current timestamp of receiving signaling information with regard to upgrading the time variable of self storing.Whether judgement time stabs is that fresh process is: after the user receives signaling information in the group, timestamp in this signaling information is compared with the timestamp of self storing, if the current timestamp of receiving signaling information is more late than the timestamp of self storage, confirm that then this signaling information is effectively new signaling information, carrying out corresponding operating and upgrade the timestamp of self storing according to the indication of signaling information is the current timestamp of receiving signaling information; If the current timestamp of receiving signaling information is more Zao or identical than the timestamp of self storage, confirm that then this signaling information is invalid signaling information, does not handle the signaling information of receiving.If a plurality of multicast are arranged, then the user stores and the corresponding time variable of each multicast at different multicast in the group.
Fig. 2 is another embodiment schematic diagram among the present invention, as shown in Figure 2, realizes in the present embodiment that the handling process of signaling information integrality and fail safe may further comprise the steps:
Step 201~step 202: the user asks to add multicast/broadcast business, multicast is verified user identity, in the time of identifying user identity, multicast and user generate and store encryption key simultaneously and are used for the Integrity Key of integrity protection; If the user is by authentication, then the user be multicast/broadcasting server confirms as user in the group, multicast user in group sends the PKI through Integrity Key protection and encryption keys; After the user receives the PKI of encryption in the group, use the encryption key and the Integrity Key of self storage to be decrypted and to carry out completeness check, from successful decryption and completeness check by this PKI of back storage.If the user is not by authentication, then the multicast refusal provides the multicast/broadcast business service to it.
Step 203~step 204: multicast is used and with the corresponding private key of PKI signalling information content and timestamp is carried out digital signature, broadcasts to user in the group then; The user uses public-key and verifies whether the digital signature in the signaling information is effective in the group, if, prove that then signalling information content and timestamp are not modified in sending the way, and the message source that sends signaling information is reliable, therefore signaling information has integrality and fail safe, and execution in step 205 then, otherwise, the signaling information of receiving is not handled, or through execution in step 206 after the regular hour delay.
Can carry out digital signature together to signalling information content and timestamp by digest algorithm, spendable digest algorithm comprises MD5 algorithm, SHA-1 algorithm etc., use digest algorithm to the processing of making a summary together of content in the signaling information and timestamp, use the private key that has only multicast oneself to know that summary is encrypted then, summary after will encrypting at last is attached to the back of signalling information content and timestamp, become the digital signature of signalling information content and timestamp, broadcast to user in the group.
After the user receives signaling information in the group, whether use with the corresponding PKI of private key checks the digital signature in the signaling information effective, the process of check is: uses identical digest algorithm that signalling information content and timestamp are made a summary and obtain making a summary after handling, use public-key then digital signature is decrypted, the summary that self is calculated compares with the summary that deciphering obtains, if it is consistent, prove that then signalling information content and timestamp are not modified in sending the way, and the message source that sends signaling information is reliably, has integrality and fail safe; Otherwise signaling information does not have integrality and fail safe.
Digest algorithm can calculate the output of regular length to the input of regular length not, and can't release instead according to output what input is, the output of different input correspondences is different, even very little change is carried out in input, the capital obtains different output, even causes changing very large output.Because private key has only multicast oneself to know, therefore make other people can't palm off multicast users broadcasting signaling information in group by digital signature; And, make other people in the transmission way of signaling information, revise signalling information content and timestamp, and do not found by user in the group by checking to digital signature.
Step 205: whether the timestamp of customer inspection signaling information is fresh in the group, if upgrading the time variable of self storing is the current timestamp of receiving signaling information, and carries out corresponding operating according to the indication of signaling information; Otherwise, the signaling information of receiving is not handled, or through execution in step 206 after the regular hour delay.
Step 206~step 207: user's time delay has nothing in common with each other in the group, in certain group the user through certain self time delay after, to multicast feedback abnormal information, after multicast is received the abnormal information of user feedback in the group, notify that the user stops to feed back abnormal information in all groups, avoid the identical abnormal information of user feedback in all groups, cause the multicast/broadcast business resource waste.
In addition, cordless communication network can combine with Public Key Infrastructure(PKI).The PKI system is made up of some equipment, and an applied environment trusty is provided, and makes the method for above-mentioned public/deciphering can be applied to the miscellaneous service service.Comprise certificate agency (CA) in the PKI system, certificate agency is one and weighs into mechanism, can be trusted fully by all users or entity.
Multicast with its public key safety offer certificate agency, make public key certificate by certificate agency, public key certificate comprises the PKI and the private information of multicast, private information comprises information such as title, address.Certificate agency makes public key certificate with the PKI and the private information of multicast, and uses the private key of self that public key certificate is carried out digital signature and becomes formal public key certificate, and the digital signature of certificate agency proves that this public key certificate is that it is issued.Because certificate agency is an authoritative institution, so all users or entity can its public key certificate of issuing of utmost good faith.The private key of certificate agency is to need extremely to maintain secrecy; With the corresponding PKI of the private key of certificate agency be disclosed, in the group behind the PKI that obtains certificate agency of user security, just can use the validity of public key certificate of the PKI check multicast and broadcast server of certificate agency.
For example, the PKI of the user storage certificate agency that safety is obtained from certificate agency in the group.Multicast user in group sends the public key certificate of oneself, this process of transmitting is not need to be keep secret, the user is after receiving the public key certificate of multicast in the group, use the PKI of certificate agency that the public key certificate that obtains is verified, check whether it is that certificate agency is issued, if just think the legal public key certificate of multicast, this public key certificate of user storage.After the user receives the signaling information of process multicast digital signature, digital signature in the public key verifications signaling information in the certificate uses public-key, if be proved to be successful, prove that then signaling information is not modified in sending the way, and the message source that sends signaling information is reliably, so signaling information has integrality and fail safe; Otherwise, the signaling information of receiving is not handled.
In actual applications, when cordless communication network combines with Public Key Infrastructure(PKI), can increase timestamp equally, be reused by other people in order to prevent signaling information; When the user finds that signaling information is invalid in the group, can feed back abnormal information to multicast.
In addition, when the ability of terminal equipment and wireless bandwidth are enough, said method can be applied to the business information in the multicast/broadcast business.
In a word, the above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.
Claims (11)
1, a kind of guard method of information integrity is characterized in that the method includes the steps of:
A, user obtain the PKI through the multicast of integrity protection and encryption, to described PKI be decrypted with completeness check after store; Perhaps, it is the public key certificate that multicast is issued that the user obtains certificate agency, and the PKI in the described public key certificate is stored;
B, user receive the information that multicast has been carried out integrity protection;
C, user use the PKI check of being stored to receive whether the integrity protection information in the information is effective, if, judge that described information has integrality, otherwise, judge that described information does not have integrality.
2, method according to claim 1; it is characterized in that the PKI of the multicast of steps A described process integrity protection and encryption is: Integrity Key and encryption key that multicast uses the user to add the generation of multicast/broadcast business verification process carry out integrity protection and encryption to the multicast PKI.
3, method according to claim 1 is characterized in that,
The public key certificate that the described certificate agency of steps A is issued for multicast is that multicast provides the multicast PKI to certificate agency, after certificate agency generates and comprises the public key certificate of multicast PKI, form behind the public key certificate of the encrypted private key multicast of use certificate agency;
Described step C comprises: the user uses the PKI check in the multicast public key certificate to receive whether the digital signature in the information is effective.
4, method according to claim 3, it is characterized in that, it is that the public key certificate that multicast is issued further comprises before that the described user of steps A obtains certificate agency: the user asks certificate agency to provide and the corresponding PKI of certificate agency private key to it, the described certificate agency PKI that user storage is received, and use the certificate agency PKI to check the validity of described public key certificate, if effectively, the described public key certificate of user storage then; Otherwise the user abandons described public key certificate.
5, method according to claim 1 is characterized in that,
Described step B comprises: the user receives the information after the corresponding multicast private key of PKI described in multicast use and the steps A carries out digital signature;
Described step C comprises: the user uses the check of PKI described in the steps A to receive whether the digital signature in the information is effective.
6, method according to claim 5 is characterized in that, described step B further may further comprise the steps:
B1, user receive multicast and use make a summary the information content after handling of digest algorithm, and multicast is used the summary after described multicast private key is encrypted;
After B2, user receive information, use described digest algorithm that the information content is made a summary and obtain summary after handling;
B3, user use the summary that dock in the breath content of collecting mail with the corresponding multicast PKI of multicast private key to be decrypted, and whether with summary that user calculate consistent in judgement if deciphering the summary that obtains then.
7, method according to claim 1 is characterized in that,
Further comprise in the described information of step B: the timestamp of multicast additional identification information transmitting time in the content of this information;
Judge described in the step C that described information further comprises after having integrality: whether the timestamp of user judgment information is later than the timestamp that self stores, if be the timestamp of receiving information with the update of time stamp of self storing; Otherwise, think that this message is illegally reusable, abandons this message.
8, method according to claim 1 is characterized in that, judge described in the step C that described information further comprises D after not having integrality: user's elapsed time postpones the back to multicast feedback abnormal information.
9, method according to claim 8 is characterized in that, further comprise E after the described step D: all users stop to feed back abnormal information under the notice of multicast.
10, method according to claim 8 is characterized in that, different user has different described time delays.
11, method according to claim 1 is characterized in that, if described information is multicast/broadcast business information, then described multicast/broadcast business information is encrypted by multicast.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031561039A CN100454807C (en) | 2003-08-29 | 2003-08-29 | Method for protecting information integrity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031561039A CN100454807C (en) | 2003-08-29 | 2003-08-29 | Method for protecting information integrity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1592195A CN1592195A (en) | 2005-03-09 |
CN100454807C true CN100454807C (en) | 2009-01-21 |
Family
ID=34598311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031561039A Expired - Fee Related CN100454807C (en) | 2003-08-29 | 2003-08-29 | Method for protecting information integrity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100454807C (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932143B (en) * | 2011-08-10 | 2016-04-06 | 上海康纬斯电子技术有限公司 | Certification in digital interrogation device, encrypting and decrypting and tamper resistant method |
CN103986541B (en) * | 2014-05-22 | 2017-01-11 | 北京视博数字电视科技有限公司 | Emergency broadcasting system |
CN105469510B (en) * | 2014-10-12 | 2018-01-09 | 吴思进 | The encryption currency wallet that delay pays or given for change can be predicted |
GB2546340A (en) * | 2016-01-18 | 2017-07-19 | Isis Innovation | Improving security protocols |
CN110149324B (en) * | 2019-05-13 | 2020-02-14 | 特斯联(北京)科技有限公司 | Network attack prevention method, device and equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1147656A (en) * | 1995-03-31 | 1997-04-16 | 皮特尼鲍斯股份有限公司 | Cryptographic key management and validation system |
CN1202288A (en) * | 1995-09-15 | 1998-12-16 | 文件证实系统公司 | Document authentication system and method |
WO2003034732A1 (en) * | 2001-10-19 | 2003-04-24 | Viaccess | Interactive protocol for remote management of access control to scrambled data |
WO2003056745A1 (en) * | 2001-12-21 | 2003-07-10 | Qualcomm, Incorporated | Method and apparatus for simplified audio authentication |
-
2003
- 2003-08-29 CN CNB031561039A patent/CN100454807C/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1147656A (en) * | 1995-03-31 | 1997-04-16 | 皮特尼鲍斯股份有限公司 | Cryptographic key management and validation system |
CN1202288A (en) * | 1995-09-15 | 1998-12-16 | 文件证实系统公司 | Document authentication system and method |
WO2003034732A1 (en) * | 2001-10-19 | 2003-04-24 | Viaccess | Interactive protocol for remote management of access control to scrambled data |
WO2003056745A1 (en) * | 2001-12-21 | 2003-07-10 | Qualcomm, Incorporated | Method and apparatus for simplified audio authentication |
Non-Patent Citations (2)
Title |
---|
数字签名技术及其在网络通信安全中的应用. 范红.中国科学院研究生院学报,第18卷第2期. 2001 |
数字签名技术及其在网络通信安全中的应用. 范红.中国科学院研究生院学报,第18卷第2期. 2001 * |
Also Published As
Publication number | Publication date |
---|---|
CN1592195A (en) | 2005-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6584565B1 (en) | Method and apparatus for long term verification of digital signatures | |
EP0861541B1 (en) | Root key compromise recovery | |
US6782103B1 (en) | Cryptographic key management | |
US5745574A (en) | Security infrastructure for electronic transactions | |
US20020136410A1 (en) | Method and apparatus for extinguishing ephemeral keys | |
CN113923044B (en) | Cross-chain system and method based on trusted execution environment | |
JP2007282295A (en) | Cryptographic system and method with key escrow feature | |
EP3585023A1 (en) | Data protection method and system | |
Zhang et al. | Achieving non-repudiation of receipt | |
KR20060049245A (en) | Method and system for electronic voting over a high-security network | |
CN101399825A (en) | Method, device and system for sharing matched pair information between equipments | |
GB2454641A (en) | Security in a telecommunications network | |
Phoha | Internet security dictionary | |
CN110634072B (en) | Block chain transaction system based on multi-signature and hardware encryption | |
CN100454807C (en) | Method for protecting information integrity | |
CN1998181B (en) | Batch OCSP and batch distributed OCSP | |
CN100414875C (en) | Method of information integrity protection in multicast/broadcast | |
CN115174277B (en) | Data communication and file exchange method based on block chain | |
Kline et al. | Public key vs. conventional key encryption | |
EP1048142B1 (en) | Key management system | |
CN105432055B (en) | Method for protecting telecommunication communication data | |
Barker | Draft NIST SP 800-71, Recommendation for Key Establishment Using Symmetric Block Ciphers | |
BOOK | CCSDS BUNDLE PROTOCOL SECURITY SPECIFICATION | |
JPH08185376A (en) | Message trust system | |
JPH07297822A (en) | Message transmission system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090121 Termination date: 20130829 |