CN101056166A - A method for improving the data transmission security - Google Patents

A method for improving the data transmission security Download PDF

Info

Publication number
CN101056166A
CN101056166A CN 200710099673 CN200710099673A CN101056166A CN 101056166 A CN101056166 A CN 101056166A CN 200710099673 CN200710099673 CN 200710099673 CN 200710099673 A CN200710099673 A CN 200710099673A CN 101056166 A CN101056166 A CN 101056166A
Authority
CN
China
Prior art keywords
random number
intelligent key
main frame
key apparatus
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710099673
Other languages
Chinese (zh)
Other versions
CN101056166B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN2007100996737A priority Critical patent/CN101056166B/en
Publication of CN101056166A publication Critical patent/CN101056166A/en
Application granted granted Critical
Publication of CN101056166B publication Critical patent/CN101056166B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method of improving the security of data transmitting. An intelligent key device is connected to a host, and the intelligent key device and the host generate a random number respectively; the intelligent key device performs an encrypting computing to the random number and sends the computing result to the host which encrypts the data having been decrypted by the host by using the instantaneous key and sends the result to the intelligent key device to realize the mutual identity authentication. A communication between the host and the intelligent key device is established after the authentication that data is encrypted and transmitted by using the communication key between the host and the intelligent key device, and a instantaneous key/communication key technology is added in the process. In the present invention, the second step of the mutual identity authentication improves the data transmitting safety by using the instantaneous key in the comparing of the prior art. The instantaneous key is used as the communication key in the encrypted data transmitting and the communication key is invalid when the set time is over, thus, the safety of the transmitting is improved.

Description

A kind of method that improves data transmission security
Technical field
The invention belongs to information security field, relate in particular to a kind of method that improves data transmission security.
Background technology
Intelligent key apparatus is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.Intelligent key apparatus adopts the legitimacy of PIN code identifying user identity, when carrying out authentication, intelligent key apparatus is linked to each other with computer, the user imports PIN code on computers, the correctness of automatic this PIN code of verification of intelligent key apparatus meeting, when having only the PIN code of importing as the user correct, just allow user's operative intelligence key device.Intelligent key apparatus also has the key systematic function, but and safe storage key and preset cryptographic algorithm.The intelligent key apparatus computing relevant with key be fully at the device internal operation, and intelligent key apparatus has the anti-characteristic of attacking of physics, and fail safe is high, and intelligent key apparatus commonly used links to each other with computer by USB interface.
Modern society is the society of an advanced IT application, and information security has been penetrated into the various aspects of people's daily life.Simultaneously, because the develop rapidly of industries such as bank, traffic, network, communication, the related field of information security is also more and more wider.The difficulty and the importance of information security are also more and more outstanding.Be used to confirm the core technology of the authentication of identity uniqueness and legitimacy, just more and more paid attention to by people as the information security industry.Authentication has also had quite widely in information such as bank, public security system and security fields uses.Yet, for strengthening fail safe, increase work efficiency, require authentication must discern certified person's characteristic information quickly and accurately, verify certified person's true identity.And the authentication in the information security be unable to do without cryptographic technique.
Meat and potatoes is encryption system or cryptographic algorithm in the cryptographic technique.Encryption system has defined a pair of transfer process of data, is called encryption and decryption.Encryption is to carry out being called data expressly, has expressly directly represented the information of certain message with the form of literal or numeral, is intercepted and captured easily.Encrypt and convert clear data to can't understand data mode exactly, be called ciphertext, transmit, improved safety of transmission to a certain extent.Deciphering reverts to original plaintext again with ciphertext exactly.For the fail safe that guarantees that some sensitive datas transmit, the safety issue of key is most important.Yet adopt fixing key or key to transmit, all can not reach gratifying secret effect with data.
Summary of the invention
A kind of method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus is done functional operation to random number X, and carries out cryptographic calculation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host.
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
Described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and is comprised symmetry algorithm.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, again the functional operation value is done cryptographic calculation with asymmetric arithmetic, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
Described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
Described step 3 also comprises number does the encryption and decryption computing to hardware ID.
Described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
The functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
Described asymmetric arithmetic can be replaced by symmetry algorithm.
Described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
Be instantaneous key with Z in the described step 3, described instantaneous key becomes session key after session is set up.
After session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting;
The time of described setting realizes when the intelligent key apparatus initialization.
After session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart.
Compared with prior art, beneficial effect of the present invention is:
In the present invention, adopt two-way authentication, wherein the authentication of second step uses instantaneous key to improve safety of data transmission.
In the present invention, adopt the process of instantaneous key, improved safety of data transmission as the session key transfer of data.
In the present invention, described session key lost efficacy after exceeding setting-up time, had improved safety of data transmission.
Description of drawings
Fig. 1 is a kind of method flow diagram that improves data transmission security of embodiment.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
Embodiment
The asymmetric arithmetic that is adopted is a RSA Algorithm in the present embodiment, and the symmetry algorithm of employing is the 3DES algorithm.Referring to Fig. 1, the embodiment of the invention provides a kind of method that improves data transmission security, specifically may further comprise the steps:
Step 101: main frame generates random number X, and sends to intelligent key apparatus, simultaneously the requests verification intelligent key apparatus;
Step 102: intelligent key apparatus generates random number Y, Z;
Step 103: intelligent key apparatus is done functional operation to the random number X that receives and the random number Z of generation, A and C;
Step 104: intelligent key apparatus is used RSA cryptographic algorithms and is encrypted A, Y, C and hardware ID number, and encrypted result is divided into two parts R1, R2;
Step 105: intelligent key apparatus sends to main frame with R1, and under the request of main frame R2 is sent to main frame;
Step 106: main frame becomes whole encrypted result with R1, R2 according to cutting apart rule merging R1, R2;
Step 107: main frame is with corresponding secret key decryption encrypted result, A, Y, C and hardware ID number;
Step 108: main frame is done the functional operation identical with intelligent key apparatus to its random number X that begins to generate, and relatively this value and the A that obtains of deciphering;
Step 109: judge whether to equate, be, execution in step 111, otherwise execution in step 110;
Step 110: search next intelligent key apparatus;
Step 111: main frame is done functional operation to random number Y, gets D, simultaneously functional value C is done the inverse function computing, solves Z;
Step 112: main frame is that instantaneous key is encrypted with the 3DES cryptographic algorithm to functional value D with random number Z, and encrypted result is sent to intelligent key apparatus;
Step 113: as instantaneous key, the encrypted result deciphering to receiving obtains functional value D to intelligent key apparatus random number Z;
Step 114: intelligent key apparatus is done functional operation to random number Y and is got its functional value, and compares D and this functional value;
Step 115: judge whether to equate, equate execution in step 117, otherwise execution in step 116;
Step 116: show mistake;
Step 117: session is set up, and random number Z uses as session key;
Step 118: begin transfer of data between main frame, intelligent key apparatus;
Step 119: judge whether session key exceeds the time that intelligent key apparatus is set;
Step 120: not, transfer of data continues, otherwise, return step 101.
In the present embodiment, RSA Algorithm can be replaced by the 3DES algorithm.
In the present embodiment, the intelligent key apparatus storage inside two kinds of algorithms of RSA, 3DES.
In the present embodiment, hardware ID described in the step 104 number is when intelligent key apparatus is downloaded COS, writes in the intelligent key apparatus.
In the present embodiment, the random number Z in the step 112 is used as instantaneous key.
In the present embodiment, random number Z used as session key after session was set up.
In the present embodiment, random number Z is as session key, loses efficacy after this session key exceeds the time that intelligent key apparatus sets, and returns step 101 and generates new random number Z as session key.
In the present embodiment, the order of main frame authentication intelligent key device and intelligent key apparatus authenticating host can be put upside down.
In the present embodiment, the time that intelligent key apparatus is set is when the intelligent key apparatus initialization, is realized by programming.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (12)

1. method that improves data transmission security, it is characterized in that, at first intelligent key apparatus is linked to each other with main frame, main frame, each self-generating random number of intelligent key apparatus, carry out the encryption and decryption computing to realize bidirectional identity authentication, after authentication was passed through, session was set up, utility cession secret key encryption transmission data between main frame and intelligent key apparatus, realize that the concrete steps of this method are as follows:
Step 1: main frame generates random number X, sends random number X to intelligent key apparatus, proposes authentication request;
Step 2: intelligent key apparatus generates random number Y, Z;
Step 3: main frame, intelligent key apparatus carry out two-way authentication:
Main frame authentication intelligent key device: intelligent key apparatus carries out cryptographic calculation after random number X is done functional operation, sends main frame, realizes main frame authentication intelligent key device;
The intelligent key apparatus authenticating host: main frame is done functional operation to the random number Y that intelligent key apparatus produces, and is instantaneous secret key encryption by random number Z, sends intelligent key apparatus, realizes the intelligent key apparatus authenticating host.
Step 4: after authentication is passed through, random number Z as session key, is used this session key transmission data between main frame and intelligent key apparatus.
2. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, it is asymmetric arithmetic that main frame authentication intelligent key device is done the used algorithm of encryption and decryption computing, and the intelligent key apparatus authenticating host is done the used algorithm of encryption and decryption computing and comprised symmetry algorithm.
3. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, main frame authentication intelligent key device is specially:
1) intelligent key apparatus is done functional operation to random number X, the functional operation value is encrypted with rivest, shamir, adelman again, and encrypted result is sent to main frame;
2) main frame is deciphered the functional value that the encrypted result of being sent by intelligent key gets random number X with corresponding algorithm;
3) main frame is done functional operation to the random number X of its generation, and the functional value of the random number X that the functional value that obtains and deciphering are obtained compares, if unanimity as a result, intelligent key begins authenticating host, otherwise main frame continues to search intelligent key apparatus.
4. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3, the intelligent key apparatus authenticating host is specially:
1) intelligent key apparatus sends to main frame with functional value and the random number Y of random number Z through the asymmetric arithmetic encryption, and the back functional operation result to random number Z of main frame deciphering does the inverse function computing and gets random number Z;
2) main frame is done functional operation to random number Y and is got its value, and with the functional value that random number Z is instantaneous key usefulness symmetric encipherment algorithm encrypted random number Y, sends intelligent key apparatus;
3) intelligent key apparatus is the functional value that decruption key gets random number Y with random number Z, and intelligent key apparatus is done functional operation to random number Y again;
4) functional value of the functional value of the random number Y of intelligent key apparatus contrast function computing gained and the resulting random number Y of deciphering, if unanimity as a result, the main frame authentication is passed through, otherwise, return error message.
5. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described step 3 also comprises number does the encryption and decryption computing to hardware ID.
6. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus is done functional operation to random number X and random number Z synchronously.
7. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: the functional operation value of described intelligent key apparatus encrypted random number X has been encrypted the functional operation value of random number Y and random number Z simultaneously, and sends simultaneously.
8. according to the described a kind of method that improves data transmission security of claim 2, it is characterized in that: described asymmetric arithmetic can be replaced by symmetry algorithm.
9. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: described intelligent key apparatus storage inside the symmetry, asymmetric two kinds of algorithms.
10. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: after session was set up in the described step 4, described session key lost efficacy after the time that exceeds the intelligent key apparatus setting.
11. according to the described a kind of method that improves data transmission security of claim 1, it is characterized in that: the time of described setting realizes when the intelligent key apparatus initialization.
12., it is characterized in that: after session is set up in the described step 4, after described session key lost efficacy, use the session key function of this session key, return step 1 and restart according to the described a kind of method that improves data transmission security of claim 10.
CN2007100996737A 2007-05-28 2007-05-28 A method for improving the data transmission security Expired - Fee Related CN101056166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100996737A CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100996737A CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Publications (2)

Publication Number Publication Date
CN101056166A true CN101056166A (en) 2007-10-17
CN101056166B CN101056166B (en) 2010-04-21

Family

ID=38795797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100996737A Expired - Fee Related CN101056166B (en) 2007-05-28 2007-05-28 A method for improving the data transmission security

Country Status (1)

Country Link
CN (1) CN101056166B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101540675B (en) * 2008-12-31 2010-12-29 北京飞天诚信科技有限公司 Smart key equipment and communication method and system of application software
CN101986663A (en) * 2010-11-29 2011-03-16 北京卓微天成科技咨询有限公司 OTP-based cloud storage data storing method, device and system
CN102215106A (en) * 2011-05-31 2011-10-12 飞天诚信科技股份有限公司 Wireless intelligent key device and signature method thereof
CN102394749A (en) * 2011-09-26 2012-03-28 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102413132A (en) * 2011-11-16 2012-04-11 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
CN102427444A (en) * 2011-08-25 2012-04-25 飞天诚信科技股份有限公司 Method for computer to process data flow
CN102801730A (en) * 2012-08-16 2012-11-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN103714642A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
CN103873227A (en) * 2012-12-13 2014-06-18 艺伦半导体技术股份有限公司 Decoding circuit and decoding method for FPGA encryption data flow
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN101682501B (en) * 2007-05-24 2016-04-06 微软技术许可有限责任公司 For performing method and the portable memory apparatus of authentication protocol
CN105636037A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method and apparatus and electronic device
CN105813076A (en) * 2016-03-10 2016-07-27 北京芯杰科技有限公司 Communication method and device
CN105871920A (en) * 2016-06-08 2016-08-17 美的集团股份有限公司 Communication system and method of terminal and cloud server as well as terminal and cloud server
CN106650372A (en) * 2016-12-06 2017-05-10 厦门中控生物识别信息技术有限公司 open method and device of administrator authority
CN109165683A (en) * 2018-08-10 2019-01-08 深圳前海微众银行股份有限公司 Sample predictions method, apparatus and storage medium based on federation's training
CN110691359A (en) * 2019-09-24 2020-01-14 中国电力科学研究院有限公司 Safety protection method for power marketing professional Bluetooth communication

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2942913B2 (en) * 1993-06-10 1999-08-30 ケイディディ株式会社 Remote party authentication / encryption key distribution method
US6918035B1 (en) * 1998-07-31 2005-07-12 Lucent Technologies Inc. Method for two-party authentication and key agreement
FR2810139B1 (en) * 2000-06-08 2002-08-23 Bull Cp8 METHOD FOR SECURING THE PRE-INITIALIZATION PHASE OF AN ON-BOARD ELECTRONIC CHIP SYSTEM, ESPECIALLY A CHIP CARD, AND ON-BOARD SYSTEM IMPLEMENTING THE METHOD
JP2004023662A (en) * 2002-06-19 2004-01-22 Acs:Kk Mutual authentication method
KR101282972B1 (en) * 2004-03-22 2013-07-08 삼성전자주식회사 Authentication between a device and a portable storage
CN100359845C (en) * 2004-03-26 2008-01-02 中兴通讯股份有限公司 Self arranged net mode shared key authentication and conversation key consulant method of radio LAN
CN100544249C (en) * 2004-10-29 2009-09-23 大唐移动通信设备有限公司 Mobile communication user certification and cryptographic key negotiation method
CN100358282C (en) * 2005-03-23 2007-12-26 西安电子科技大学 Key agreement method in WAPI authentication mechanism
CN1819515B (en) * 2006-03-20 2012-07-04 胡祥义 Realizing method of security symmetric coding algorithm

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101682501B (en) * 2007-05-24 2016-04-06 微软技术许可有限责任公司 For performing method and the portable memory apparatus of authentication protocol
CN101540675B (en) * 2008-12-31 2010-12-29 北京飞天诚信科技有限公司 Smart key equipment and communication method and system of application software
CN101986663A (en) * 2010-11-29 2011-03-16 北京卓微天成科技咨询有限公司 OTP-based cloud storage data storing method, device and system
CN102215106A (en) * 2011-05-31 2011-10-12 飞天诚信科技股份有限公司 Wireless intelligent key device and signature method thereof
CN102427444B (en) * 2011-08-25 2014-04-30 飞天诚信科技股份有限公司 Method for computer to process data flow
CN102427444A (en) * 2011-08-25 2012-04-25 飞天诚信科技股份有限公司 Method for computer to process data flow
CN102394749A (en) * 2011-09-26 2012-03-28 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102394749B (en) * 2011-09-26 2014-03-05 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102413132A (en) * 2011-11-16 2012-04-11 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
CN102413132B (en) * 2011-11-16 2014-12-17 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
CN102801730A (en) * 2012-08-16 2012-11-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN102801730B (en) * 2012-08-16 2015-01-28 厦门市美亚柏科信息股份有限公司 Information protection method and device for communication and portable devices
CN103873227A (en) * 2012-12-13 2014-06-18 艺伦半导体技术股份有限公司 Decoding circuit and decoding method for FPGA encryption data flow
CN103714642A (en) * 2013-03-15 2014-04-09 福建联迪商用设备有限公司 Secret key download method, management method, download management method, secret key download device, secret key management device and secret key download management system
WO2014139342A1 (en) * 2013-03-15 2014-09-18 福建联迪商用设备有限公司 Key downloading method, management method, downloading management method, device and system
US9806889B2 (en) 2013-03-15 2017-10-31 Fujian Landi Commercial Equipment Co., Ltd. Key downloading method, management method, downloading management method, device and system
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN104158567B (en) * 2014-07-25 2016-05-18 天地融科技股份有限公司 Matching method between bluetooth equipment and system, data interactive method and system
CN105636037A (en) * 2015-06-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Authentication method and apparatus and electronic device
CN105813076A (en) * 2016-03-10 2016-07-27 北京芯杰科技有限公司 Communication method and device
CN105871920A (en) * 2016-06-08 2016-08-17 美的集团股份有限公司 Communication system and method of terminal and cloud server as well as terminal and cloud server
CN106650372A (en) * 2016-12-06 2017-05-10 厦门中控生物识别信息技术有限公司 open method and device of administrator authority
CN106650372B (en) * 2016-12-06 2019-05-03 厦门中控智慧信息技术有限公司 The activating method and device of administrator right
CN109165683A (en) * 2018-08-10 2019-01-08 深圳前海微众银行股份有限公司 Sample predictions method, apparatus and storage medium based on federation's training
CN109165683B (en) * 2018-08-10 2023-09-12 深圳前海微众银行股份有限公司 Sample prediction method, device and storage medium based on federal training
CN110691359A (en) * 2019-09-24 2020-01-14 中国电力科学研究院有限公司 Safety protection method for power marketing professional Bluetooth communication

Also Published As

Publication number Publication date
CN101056166B (en) 2010-04-21

Similar Documents

Publication Publication Date Title
CN101056166A (en) A method for improving the data transmission security
US8239679B2 (en) Authentication method, client, server and system
CN1702999A (en) A method for backup and recovery of encryption key
CN1297881C (en) Print control method for ensuring data transmission security
CN106027235A (en) PCI password card, and password operation method and system for massive keys
CN101032117A (en) Method of authentication based on polynomials
CN1960363A (en) Method and equipment for implementing remote updating information security devices through network
CN100350816C (en) Method for implementing wireless authentication and data safety transmission based on GSM network
CN103716166A (en) Self-adaptation hybrid encryption method and device and encryption communication system
CN112740615A (en) Multi-party computed key management
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
Al-Mashhadani et al. IoT security using AES encryption technology based ESP32 platform.
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN1881874A (en) Public key cipher encrypting and decrypting method based on nerval network chaotic attractor
CN100464337C (en) Method and equipment for carrying out safety communication between USB device and host
CN1697365A (en) Secure transmission method oriented to mobile agent
CN1199110C (en) Software protection method
CN2847708Y (en) Enciphering and deciphering safety system for key data using feature code
CN1949196A (en) Method, device and system for storage data in portable device safely
CN115694922A (en) File transmission encryption method and equipment under domestic CPU and OS
US11496287B2 (en) Privacy preserving fully homomorphic encryption with circuit verification
CN1889431A (en) Multifunction intelligent key equipment and safety controlling method thereof
CN2770239Y (en) High-speed data encrypted card based on network card
CN1448851A (en) Virtual private network applying hardware encipher/decipher
CN1208924C (en) An information transmission encryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN TECHNOLOGY CO., LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100421