CN101296083A - Enciphered data transmission method and system - Google Patents

Enciphered data transmission method and system Download PDF

Info

Publication number
CN101296083A
CN101296083A CNA2008100672959A CN200810067295A CN101296083A CN 101296083 A CN101296083 A CN 101296083A CN A2008100672959 A CNA2008100672959 A CN A2008100672959A CN 200810067295 A CN200810067295 A CN 200810067295A CN 101296083 A CN101296083 A CN 101296083A
Authority
CN
China
Prior art keywords
common parameter
cryptocenter
digital signature
private key
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100672959A
Other languages
Chinese (zh)
Inventor
黄敏
刘利锋
万适
任颜珠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNA2008100672959A priority Critical patent/CN101296083A/en
Publication of CN101296083A publication Critical patent/CN101296083A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for transmitting encrypted data, which comprises the following steps of: receiving common parameters and digital signatures and authenticating the digital signatures, wherein, the common parameters are generated by a password center and the digital signatures are generated by signing the common parameters by the password center using a private key thereof; the common parameters are used for encrypting and transmitting the data needing to be transmitted after passing through the authentication. The method of the embodiment of the invention can guarantee the sources and completeness of the common parameters, prevent an attacker from replacing and amending the common parameters, and enhance the security of the transmitting of the common parameters by signing the common parameters.

Description

A kind of enciphered data transmission method and system
Technical field
The present invention relates to the communications field, particularly a kind of enciphered data transmission method and system.
Background technology
Along with the high speed development of network, ensuring information safety is the problem that network user and producer are concerned about very much.In public cryptosystem, information sender need correctly be obtained recipient's PKI.For resist the assailant to the forgery of the PKI of legal terminal, distort and replace, must realize the binding of PKI and terminal identity.Solution to this problem, that extensively adopt at present is PKIX (public key infrastructure, PKI)/(certificationauthority of certifying organization, CA) technology: by third-party trusted mechanism---the public key certificate that the CA of certifying organization signs and issues, other identification informations (as title, identification card number etc.) of the PKI of terminal and terminal are bundled, thus can be on network the validity of verification terminal PKI.
The inventor finds that when realization is of the present invention in above-mentioned workflow, terminal need obtain common parameter just can carry out encryption and decryption process afterwards.Tube terminal is not in which way from where obtaining common parameter, and (private key generator PKG) provides always to generate the center by private key at first.Existing password based on sign (identity-based encryption, IBE) system thinks that PKG is safe and reliable, the common parameter of its granting is just safe and reliable, but can not guarantee this point in the practical application.The assailant can intercept and capture the message that communicating pair is consulted common parameter, and the PKG that disguises oneself as, and sends false common parameter to communicating pair and destroys communication security with this, and also there are security breaches in therefore existing IBE system.
Summary of the invention
The embodiment of the invention provides a kind of enciphered data transmission method and system, is used to improve safety of data transmission.
For solving the problems of the technologies described above, the embodiment of the invention provides:
A kind of enciphered data transmission method may further comprise the steps:
Receive common parameter and digital signature, described common parameter is generated by cryptocenter, and described digital signature is that cryptocenter uses self private key to the common parameter generation of signing;
Digital signature is authenticated, authenticate by sending after the back data encryption of using described common parameter to send.
A kind of enciphered data transmission method may further comprise the steps:
Data receiver receives common parameter and digital signature, and described common parameter is generated by cryptocenter, and described digital signature is that cryptocenter uses self private key to the common parameter generation of signing;
Data receiver is compared the common parameter that receives and the common parameter that prestores, and after the comparison unanimity, data receiver authenticates digital signature, sends after the data encryption that authentication uses described common parameter to send by the back.
A kind of enciphered data transmission method may further comprise the steps:
Receive common parameter, described common parameter is generated by cryptocenter;
Compare with the common parameter that prestores, the comparison unanimity is then passed through for authentication, and the data encryption that authentication uses described common parameter to send by the back sends.
A kind of encrypted data transmission system comprises cryptocenter and terminal, and described cryptocenter and terminal configuration have the PKI of self,
Described cryptocenter comprises:
The private key generation unit is used for according to the PKI generation cryptocenter of cryptocenter and terminal and the private key of terminal correspondence;
The common parameter generation unit is used to generate common parameter;
Signature unit is used to use self private key to the common parameter generation digital signature of signing;
Described terminal comprises:
Authentication ' unit is used to receive described common parameter and digital signature, and described digital signature is authenticated;
Ciphering unit is used to utilize authenticate send after the common parameter that passes through sends data encryption to need.
A kind of encrypted data transmission system comprises cryptocenter and terminal, and described cryptocenter and terminal configuration have the PKI of self,
Described terminal comprises:
Memory cell is used to store at least one cover common parameter;
Comparing unit is used for the common parameter that will receive and the common parameter of cell stores and compares;
Ciphering unit is used to utilize the consistent common parameter of described comparing unit comparison that need are sent data and encrypts.
A kind of cryptocenter comprises:
The private key generation unit is used for according to the PKI generation cryptocenter of cryptocenter and terminal and the private key of terminal;
The common parameter generation unit is used to generate common parameter;
Signature unit is used to use self private key to the common parameter generation digital signature of signing.
A kind of communication terminal comprises:
Authentication ' unit is used to receive described common parameter and digital signature, and described digital signature is authenticated;
Ciphering unit, the common parameter that is used to utilize authentication to pass through is encrypted the back transmission to need transmission data.
The embodiment of the invention sends by back that common parameter is signed, and the digital signature that receives is authenticated, and can guarantee the source and the integrality of common parameter, prevents that the assailant from replacing and changing common parameter, improves the common parameter safety of transmission.
Description of drawings
Fig. 1 is an embodiment of the invention common parameter authentication method flow chart;
Fig. 2 is an embodiment of the invention enciphered data transmission method flow chart;
Fig. 3 is an embodiment of the invention common parameter Verification System block diagram;
Fig. 4 is an embodiment of the invention encrypted data transmission system block diagram;
Fig. 5 is the another kind of embodiment encrypted data transmission of the present invention system block diagram.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
Be to simplify the cipher key management considerations of conventional public-key cryptographic system, cryptographic technique existing by based on the public key cryptosyst of certificate to IBE (identity-based encryption is based on the password of identity) system development.
Cryptographic system comprises cryptocenter and a plurality of terminal, and cryptocenter can be PKG, also can generate the network entity of private key for other; Terminal is the network entity that need communicate in network.Cryptocenter and terminal all dispose the PKI of self in cryptographic system, and PKI can be the sign of cryptocenter and terminal, and sign can be the IP address of cryptocenter and terminal, also can be different from the sign of other network entities for cryptocenter and terminal.
In the IBE system, terminal need obtain common parameter from cryptocenter just can carry out corresponding encryption and decryption process, and the transmission course of common parameter is easy to be subjected to the third party and attacks, and bigger potential safety hazard is arranged.As shown in Figure 1, the embodiment of the invention 1 provides a kind of common parameter authentication method, specifically may further comprise the steps:
Step 11: cryptocenter generates self private key and common parameter;
The private key of cryptocenter is according to the algorithm of system definition, and PKI and the generation of main private key by cryptocenter have certain corresponding relation between the PKI of cryptocenter and the private key; Each cryptocenter generates one group at random and satisfy the parameter of certain condition, maintains secrecy except main private key in these parameters, and other parameters all need open, and these disclosed parameters are exactly common parameter.Wherein main private key is produced according to PKI and is preserved by cryptocenter, and different with PKI is, main private key is underground, and cryptocenter generates the private key of correspondence according to the PKI of cryptocenter and terminal by main private key;
Step 12: cryptocenter uses self private key to the common parameter generation digital signature of signing, and sends common parameter and digital signature to terminal;
Wherein Qian Ming detailed process can for: cryptocenter connects common parameter with fixed form, the common parameter of series connection is carried out Hash operation, and the private key at the center that accesses to your password is then encrypted the cryptographic Hash that obtains, obtains the digital signature of common parameter; Describe for convenient, the digital signature of common parameter abbreviates digital signature as among the application;
Digital signature can append to common parameter, and wherein Fu Jia particular location is not limit, can be in the back of common parameter, and also can be in the front of common parameter; Digital signature also can be used as and is stored separately and sends, but keeps getting in touch reliably between needs and the common parameter;
Step 13: terminal receives common parameter and digital signature, and the PKI at the center that accesses to your password authenticates signature, if authentication is passed through, uses this common parameter.
In this cryptographic system, terminal need prestore the PKI of the cryptocenter of one or more trusts;
The detailed process that the PKI at center of wherein accessing to your password authenticates signature can for: the access to your password PKI at center of digital signature is decrypted, simultaneously common parameter is carried out Hash operation and obtain cryptographic Hash, cryptographic Hash with decryption content and common parameter compares then, if consistent, then checking is passed through.
Because digital signature is that cryptocenter produces with private key in the present embodiment, the terminal that receives digital signature has only and uses the PKI corresponding with private key to decipher, and can confirm the source of common parameter, prevents that the assailant from replacing common parameter; Owing to apply to Hash operation in the present embodiment, therefore can guarantee the integrality of common parameter, prevent that the assailant from changing the part common parameter, so present embodiment can improve the common parameter safety of transmission.
The verification process of common parameter can specifically be applied to the transmission method of enciphered data among the above embodiment, as shown in Figure 2, suppose that terminal A need send data to terminal B, be that terminal A is a data receiver, terminal B is the data receiver, and a kind of enciphered data transmission method that the embodiment of the invention 2 provides specifically may further comprise the steps:
Step 201: initialization cryptocenter, cryptocenter generates private key and common parameter;
Self private key of cryptocenter is according to the algorithm of system definition, produced by the PKI and the main private key of cryptocenter; The private key of each terminal utilizes main private key to generate according to the PKI of each terminal after by cryptocenter terminal being carried out the status authentication; Common parameter can be system parameters;
Step 202: cryptocenter uses self private key to the common parameter generation digital signature of signing, and sends common parameter and digital signature to terminal B;
Wherein Qian Ming detailed process can for: cryptocenter connects common parameter with fixed form, the common parameter of series connection is carried out Hash operation, and the private key at the center that accesses to your password is then encrypted the cryptographic Hash that obtains, obtains the digital signature of common parameter; Describe for convenient, the digital signature of common parameter abbreviates digital signature as among the application;
Digital signature can append to common parameter, and wherein Fu Jia particular location is not limit, can be in the back of common parameter, and also can be in the front of common parameter; Digital signature also can be used as and is stored separately and sends, but keeps getting in touch reliably between needs and the common parameter;
Step 203: terminal B sends to terminal A with common parameter and digital signature, and the access to your password PKI at center of terminal A authenticates digital signature; If authentication is passed through, execution in step 204 is not if execution in step 206 is passed through in authentication;
In this cryptographic system, terminal need prestore the PKI of the cryptocenter of one or more trusts; PKI can be to obtain by believable channel, and for example the keeper carries out manual configuration in this locality, perhaps uses mobile memory medium directly to be stored in terminal this locality after cryptocenter obtains.
Wherein access to your password detailed process that the PKI at center authenticates digital signature of terminal A can be decrypted the access to your password PKI at center of digital signature for: terminal A, simultaneously common parameter is carried out Hash operation and obtain cryptographic Hash, cryptographic Hash with decryption content and common parameter compares then, if consistent, then authentication is passed through.
Step 204: terminal A uses the PKI of common parameter and terminal B that data are encrypted, and data encrypted is sent to terminal B;
Step 205: terminal B utilizes common parameter and self private key that the data that receive are decrypted;
Step 206: stop communication.
Because digital signature in the present embodiment is because cryptocenter produces with private key, the terminal that receives digital signature has only and uses the PKI corresponding with private key to decipher, and can confirm the source of common parameter, prevents victim replacement common parameter; Owing to apply to Hash operation in the present embodiment, therefore can guarantee the integrality of common parameter, prevent victim change part common parameter, so present embodiment can improve the common parameter safety of transmission.
The embodiment of the invention also provides a kind of common parameter authentication method, the terminal common parameter of cryptocenter issue of one or more sets trusts that can prestore in the embodiment of the invention.The common parameter that prestores can be to obtain by believable channel, and for example the keeper carries out manual configuration in this locality, perhaps uses mobile memory medium directly to be stored in this locality after cryptocenter obtains.The common parameter that terminal will obtain through various channels carries out unified management.Which kind of, no matter received a cover common parameter by channel and method after this common parameter and the common parameter that oneself prestores are compared as the recipient.If the common parameter that the common parameter that receives prestores with oneself is consistent, show that then this common parameter is credible, send after the data encryption of using this common parameter to send; If the common parameter that receives common parameter and oneself prestore is inconsistent, then abandons and receive common parameter.The common parameter that terminal receives might be the encryption common parameter of encrypting with recipient's PKI, needs the recipient to be decrypted with the private key of self before comparison.
The common parameter that terminal prestores has a lot of covers, and the common parameter that both sides need just to use be reached an agreement, and by the reception common parameter, compares and can determine the common parameter that uses.Can guarantee the credibility and the consistency of common parameter by present embodiment.
Present embodiment can also be used in combination with a last common parameter authentication method embodiment, that is: compare when data receiver can receive common parameter and digital signature, compare after also can authenticating, with the credibility of further raising common parameter to digital signature.
Based on technique scheme, the embodiment of the invention also provides a kind of system that authenticates common parameter, as shown in Figure 3, the system of authentication common parameter comprises cryptocenter 31 and at least one terminal 32, cryptocenter 31 and terminal 32 all dispose the PKI of self in the native system, PKI can be the sign of cryptocenter and terminal, and sign can be the IP address of cryptocenter and terminal, also can be different from the sign of other network entities for cryptocenter and terminal.Cryptocenter 31 is used to generate private key and common parameter, utilizes self private key to the common parameter generation digital signature of signing,
Specifically comprise:
Private key generation unit 311 is used for the algorithm according to system definition, by the PKI of cryptocenter 31 and the private key of main private key generation self;
Common parameter generation unit 313 is used to generate common parameter;
Signature unit 312, be used for the common parameter that common parameter generation unit 313 generates is connected with fixed form, common parameter to series connection carries out Hash operation, use then that private key generation unit 311 produces private key the cryptographic Hash that obtains is encrypted, obtain digital signature;
Correspondingly, terminal 32 is used for obtaining described common parameter and digital signature from cryptocenter 31, common parameter and digital signature are authenticated, specifically comprise authentication ' unit 321, be used for the access to your password PKI at center 31 of digital signature is decrypted, simultaneously common parameter carried out Hash operation and obtain cryptographic Hash, the cryptographic Hash with decryption content and common parameter compares then, if consistent, then authentication is passed through.
Because digital signature is that cryptocenter's 31 usefulness private keys produce in the present embodiment, the terminal 32 that receives digital signature has only and uses the PKI corresponding with private key to decipher, and can confirm the source of common parameter, prevents that victim from replacing common parameter; Owing to apply to Hash operation in the present embodiment, therefore can guarantee the integrality of common parameter, prevent victim change part common parameter, so present embodiment can improve the common parameter safety of transmission.
As shown in Figure 4, the embodiment of the invention also provides a kind of encrypted data transmission system, comprise cryptocenter 31 and at least one terminal 41, cryptocenter 31 and terminal 41 all dispose the PKI of self in the native system, PKI can be the sign of cryptocenter and terminal, sign can be the IP address of cryptocenter and terminal, also can be different from the sign of other network entities for cryptocenter and terminal.Cryptocenter 31 is used to generate private key and common parameter, utilizes self private key to the common parameter generation digital signature of signing, and specifically comprises:
Private key generation unit 311 is used for the algorithm according to system definition, by PKI and the private key of main private key generation self and the private key of each terminal of cryptocenter;
Common parameter generation unit 313 is used to generate common parameter;
Signature unit 312 is used for common parameter and connects with fixed form, and the common parameter of connecting is carried out Hash operation, and the private key at the center that accesses to your password is then encrypted the cryptographic Hash that obtains, and obtains digital signature.
Correspondingly, terminal 41 is used for common parameter and digital signature are authenticated, and passes through as authentication, utilizes common parameter that data are encrypted, and sends enciphered data, perhaps receives the enciphered data that another terminal is sent, and utilizes common parameter to be decrypted, and specifically comprises:
Authentication ' unit 321 is used for the access to your password PKI at center of digital signature is decrypted, and simultaneously common parameter is carried out Hash operation and obtains cryptographic Hash, and the cryptographic Hash with decryption content and common parameter compares then, if consistent, then authentication is passed through,
Ciphering unit 411 is used to utilize common parameter that authentication passes through and data receiver's PKI that need are sent data and encrypts, and sends enciphered data,
Decrypting device 412 is used to receive the enciphered data that another terminal sends, and the common parameter and self private key that utilize authentication to pass through are decrypted enciphered data.
Be applied to the IBE system as present embodiment, cryptocenter can be PKG, present embodiment can be confirmed the source and the integrality of common parameter, thereby guaranteed that terminal in the IBE system communication process receives the credibility of common parameter, thereby improved the fail safe of whole communication process, IBE can be more widely used.
For further improving safety of data transmission, as shown in Figure 5, the present invention also provides another kind of encrypted data transmission system, specifically comprise cryptocenter 51 and at least one terminal 52, cryptocenter 51 and terminal 52 all dispose the PKI of self in the native system, PKI can be the sign of cryptocenter and terminal, and sign can be the IP address of cryptocenter and terminal, also can be different from the sign of other network entities for cryptocenter and terminal.
Cryptocenter 51 comprises private key generation unit 511, is used to generate cryptocenter and terminal secret key, also comprises common parameter generation unit 512, is used to generate common parameter;
Terminal 52 specifically comprises:
Memory cell 522 is used to store common parameter;
Comparing unit 521, the common parameter that is used for the common parameter that will receive and memory cell 522 storages is compared, if comparison is consistent, then authentication is passed through;
Ciphering unit 411 is used to utilize common parameter that authentication passes through and data receiver's PKI that need are sent data and encrypts, and sends enciphered data,
Decrypting device 412 is used to receive the enciphered data that another terminal sends, and the common parameter and self private key that utilize authentication to pass through are decrypted enciphered data.
Present embodiment can be used in combination with a last embodiment encrypted data transmission system, further improves the fail safe of common parameter.Be applied to the IBE system as present embodiment, cryptocenter can be PKG, present embodiment can be confirmed the source and the integrality of common parameter, thereby guaranteed that terminal in the IBE system communication process receives the credibility of common parameter, thereby improved the fail safe of whole communication process, IBE can be more widely used.
Device embodiment described above only is schematic, wherein said unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, promptly can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select wherein some or all of module to realize the purpose of present embodiment scheme according to the actual needs.Those of ordinary skills promptly can understand and implement under the situation of not paying performing creative labour.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform, can certainly realize by hardware.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in the storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be a personal computer, server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the present invention or embodiment.
Above-described embodiment of the present invention does not constitute the qualification to protection range of the present invention.Any modification of being done within the spirit and principles in the present invention, be equal to and replace and improvement etc., all should be included within protection scope of the present invention.

Claims (14)

1, a kind of enciphered data transmission method is characterized in that, may further comprise the steps:
Receive common parameter and digital signature, described common parameter is generated by cryptocenter, and described digital signature is that cryptocenter uses self private key to the common parameter generation of signing;
Digital signature is authenticated, authenticate by sending after the back data encryption of using described common parameter to send.
2, enciphered data transmission method as claimed in claim 1 is characterized in that, described digital signature is that cryptocenter uses self private key that common parameter is signed to generate specifically to comprise:
Cryptocenter connects common parameter with fixed form, the common parameter of connecting is carried out Hash operation obtain cryptographic Hash, and the private key at the center that accesses to your password is encrypted described cryptographic Hash, obtains digital signature.
3, enciphered data transmission method as claimed in claim 2 is characterized in that, described digital signature is authenticated specifically comprises:
The access to your password PKI at center of digital signature is decrypted, simultaneously common parameter is carried out Hash operation and obtain cryptographic Hash, the cryptographic Hash with decryption content and common parameter compares then, if consistent, then authentication is passed through.
4, a kind of enciphered data transmission method is characterized in that, may further comprise the steps:
Data receiver receives common parameter and digital signature, and described common parameter is generated by cryptocenter, and described digital signature is that cryptocenter uses self private key to the common parameter generation of signing;
Data receiver is compared the common parameter that receives and the common parameter that prestores, and after the comparison unanimity, data receiver authenticates digital signature, sends after the data encryption that authentication uses described common parameter to send by the back.
5, enciphered data transmission method as claimed in claim 4 is characterized in that, described digital signature is that cryptocenter uses self private key that common parameter is signed to generate specifically to comprise:
Cryptocenter connects common parameter with fixed form, the common parameter of connecting is carried out Hash operation obtain cryptographic Hash, and the private key at the center that accesses to your password is encrypted described cryptographic Hash, obtains digital signature.
6, a kind of enciphered data transmission method is characterized in that, may further comprise the steps:
Receive common parameter, described common parameter is generated by cryptocenter;
Compare with the common parameter that prestores receiving common parameter, the comparison unanimity is then passed through for authentication, and the data encryption that authentication uses described common parameter to send by the back sends.
7, enciphered data transmission method as claimed in claim 6 is characterized in that, described reception common parameter specifically comprises: the common parameter of receive encrypting is decrypted common parameter with self private key.
8, a kind of encrypted data transmission system comprises cryptocenter and terminal, and described cryptocenter and terminal configuration have the PKI of self, it is characterized in that,
Described cryptocenter comprises:
The private key generation unit is used for according to the PKI generation cryptocenter of cryptocenter and terminal and the private key of terminal correspondence;
The common parameter generation unit is used to generate common parameter;
Signature unit is used to use self private key to the common parameter generation digital signature of signing;
Described terminal comprises:
Authentication ' unit is used to receive described common parameter and digital signature, and described digital signature is authenticated;
Ciphering unit is used to utilize authenticate send after the common parameter that passes through sends data encryption to need.
9, encrypted data transmission as claimed in claim 8 system is characterized in that described terminal also comprises decrypting device, is used to receive the enciphered data that other-end sends, and the common parameter and self private key that utilize authentication to pass through are decrypted enciphered data.
10, encrypted data transmission as claimed in claim 8 system is characterized in that, also comprises:
Memory cell is used to store at least one cover common parameter;
Comparing unit is used for the common parameter that will receive and the common parameter of cell stores and compares, and comparison triggers ciphering unit by the back.
11, a kind of encrypted data transmission system comprises cryptocenter and terminal, and described cryptocenter and terminal configuration have the PKI of self, it is characterized in that,
Described terminal comprises:
Memory cell is used to store at least one cover common parameter;
Comparing unit is used for the common parameter that will receive and the common parameter of cell stores and compares;
Ciphering unit is used to utilize the consistent common parameter of described comparing unit comparison that need are sent data and encrypts.
12, a kind of cryptocenter is characterized in that, comprising:
The private key generation unit is used for according to the PKI generation cryptocenter of cryptocenter and terminal and the private key of terminal;
The common parameter generation unit is used to generate common parameter;
Signature unit is used to use self private key to the common parameter generation digital signature of signing.
13, a kind of communication terminal is characterized in that, comprising:
Authentication ' unit is used to receive described common parameter and digital signature, and described digital signature is authenticated;
Ciphering unit, the common parameter that is used to utilize authentication to pass through is encrypted the back transmission to need transmission data.
14, communication terminal as claimed in claim 13 is characterized in that, also comprises decrypting device, is used to receive the enciphered data that other communication terminals send, and the common parameter and self private key that utilize authentication to pass through are decrypted enciphered data.
CNA2008100672959A 2008-05-14 2008-05-14 Enciphered data transmission method and system Pending CN101296083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100672959A CN101296083A (en) 2008-05-14 2008-05-14 Enciphered data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100672959A CN101296083A (en) 2008-05-14 2008-05-14 Enciphered data transmission method and system

Publications (1)

Publication Number Publication Date
CN101296083A true CN101296083A (en) 2008-10-29

Family

ID=40066119

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100672959A Pending CN101296083A (en) 2008-05-14 2008-05-14 Enciphered data transmission method and system

Country Status (1)

Country Link
CN (1) CN101296083A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011000163A1 (en) * 2009-07-02 2011-01-06 成都市华为赛门铁克科技有限公司 Method, client end and server for key negotiation
CN101420303B (en) * 2008-12-12 2011-02-02 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
CN105471845A (en) * 2015-11-16 2016-04-06 数据通信科学技术研究所 Communication method and communication system for preventing man-in-the-middle attack
CN105827411A (en) * 2016-03-11 2016-08-03 联想(北京)有限公司 Information processing method and apparatus
CN108768958A (en) * 2018-05-07 2018-11-06 上海海事大学 It is not revealed based on third party and is tested the data integrity of information and the verification method in source
CN108965342A (en) * 2018-09-28 2018-12-07 真相网络科技(北京)有限公司 The method for authenticating and system of request of data side's access data source
CN109845185A (en) * 2016-10-31 2019-06-04 华为技术有限公司 A kind of data transmission method, terminal, node device and system
CN110446168A (en) * 2019-08-14 2019-11-12 中国联合网络通信集团有限公司 A kind of target vehicle method for tracing and system
CN110690966A (en) * 2019-11-08 2020-01-14 北京金茂绿建科技有限公司 Method, system, equipment and storage medium for connecting terminal and service server
CN110851891A (en) * 2019-11-08 2020-02-28 北京金茂绿建科技有限公司 Method, device, system, equipment and medium for guaranteeing safety after terminal loss
CN112367171A (en) * 2020-10-27 2021-02-12 杭州安恒信息技术股份有限公司 Data transmission method and assembly based on rsa and MD5

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420303B (en) * 2008-12-12 2011-02-02 广州杰赛科技股份有限公司 Communication method for audio data and apparatus thereof
WO2011000163A1 (en) * 2009-07-02 2011-01-06 成都市华为赛门铁克科技有限公司 Method, client end and server for key negotiation
CN105471845A (en) * 2015-11-16 2016-04-06 数据通信科学技术研究所 Communication method and communication system for preventing man-in-the-middle attack
CN105471845B (en) * 2015-11-16 2018-10-19 数据通信科学技术研究所 Prevent the communication means and system of man-in-the-middle attack
CN105827411A (en) * 2016-03-11 2016-08-03 联想(北京)有限公司 Information processing method and apparatus
CN109845185B (en) * 2016-10-31 2020-11-10 华为技术有限公司 Data transmission method, terminal, node equipment and system
CN109845185A (en) * 2016-10-31 2019-06-04 华为技术有限公司 A kind of data transmission method, terminal, node device and system
CN108768958A (en) * 2018-05-07 2018-11-06 上海海事大学 It is not revealed based on third party and is tested the data integrity of information and the verification method in source
CN108965342A (en) * 2018-09-28 2018-12-07 真相网络科技(北京)有限公司 The method for authenticating and system of request of data side's access data source
CN110446168A (en) * 2019-08-14 2019-11-12 中国联合网络通信集团有限公司 A kind of target vehicle method for tracing and system
CN110690966A (en) * 2019-11-08 2020-01-14 北京金茂绿建科技有限公司 Method, system, equipment and storage medium for connecting terminal and service server
CN110851891A (en) * 2019-11-08 2020-02-28 北京金茂绿建科技有限公司 Method, device, system, equipment and medium for guaranteeing safety after terminal loss
CN110851891B (en) * 2019-11-08 2020-10-09 北京金茂绿建科技有限公司 Method, device, system, equipment and medium for guaranteeing safety after terminal loss
CN110690966B (en) * 2019-11-08 2020-10-09 北京金茂绿建科技有限公司 Method, system, equipment and storage medium for connecting terminal and service server
CN112367171A (en) * 2020-10-27 2021-02-12 杭州安恒信息技术股份有限公司 Data transmission method and assembly based on rsa and MD5

Similar Documents

Publication Publication Date Title
US11108565B2 (en) Secure communications providing forward secrecy
CN107810617B (en) Secret authentication and provisioning
CN101296083A (en) Enciphered data transmission method and system
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
CN101212293B (en) Identity authentication method and system
CN108924147B (en) Communication terminal digital certificate issuing method, server and communication terminal
CN110598422A (en) Trusted identity authentication system and method based on mobile digital certificate
CN105553951A (en) Data transmission method and data transmission device
JP2011515961A (en) Authentication storage method and authentication storage system for client side certificate authentication information
CN102572817A (en) Method and intelligent memory card for realizing mobile communication confidentiality
CN1980121A (en) Electronic signing mobile terminal, system and method
US10693645B2 (en) Security management system for performing a secure transmission of data from a token to a service provider server by means of an identity provider server
CN104424446A (en) Safety verification and transmission method and system
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN103905384A (en) Embedded inter-terminal session handshake realization method based on security digital certificate
CN105812334A (en) Network authentication method
CN112020038A (en) Domestic encryption terminal suitable for rail transit mobile application
CN112564906A (en) Block chain-based data security interaction method and system
CN104579687A (en) CSP implementation based on USBKEY
CN111539496A (en) Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
CN111065081A (en) Bluetooth-based information interaction method and device
CN114331456A (en) Communication method, device, system and readable storage medium
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
KR20140071775A (en) Cryptography key management system and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: CHENGDU CITY HUAWEI SAIMENTEKE SCIENCE CO., LTD.

Free format text: FORMER OWNER: HUAWEI TECHNOLOGY CO., LTD.

Effective date: 20090508

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20090508

Address after: Qingshui River District, Chengdu high tech Zone, Sichuan Province, China: 611731

Applicant after: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES Co.,Ltd.

Address before: Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen Province, China: 518129

Applicant before: HUAWEI TECHNOLOGIES Co.,Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081029

C49 Reinstatement of patent right or utility model
RA01 Restoration of patent right

Former decision: deemed withdrawal of patent application after publication

Former decision publication date: 20120627

ASS Succession or assignment of patent right

Owner name: HUAWEI TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: HUAWEI DIGITAL TECHNOLOGY (CHENGDU) CO., LTD.

Effective date: 20130930

C41 Transfer of patent application or patent right or utility model
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 611731 Chengdu high tech Zone, Sichuan, West Park, Qingshui River

Applicant after: HUAWEI DIGITAL TECHNOLOGIES (CHENG DU) Co.,Ltd.

Address before: 611731 Chengdu high tech Zone, Sichuan, West Park, Qingshui River

Applicant before: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES Co.,Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: CHENGDU HUAWEI SYMANTEC TECHNOLOGIES CO., LTD. TO: HUAWEI DIGITAL TECHNOLOGY (CHENGDU) CO., LTD.

Free format text: CORRECT: ADDRESS; FROM: 611731 CHENGDU, SICHUAN PROVINCE TO: 518129 SHENZHEN, GUANGDONG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20130930

Address after: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Applicant after: HUAWEI TECHNOLOGIES Co.,Ltd.

Address before: 611731 Chengdu high tech Zone, Sichuan, West Park, Qingshui River

Applicant before: HUAWEI DIGITAL TECHNOLOGIES (CHENG DU) Co.,Ltd.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20081029