CN106487773A - A kind of encryption and decryption method and device - Google Patents

A kind of encryption and decryption method and device Download PDF

Info

Publication number
CN106487773A
CN106487773A CN201510555464.3A CN201510555464A CN106487773A CN 106487773 A CN106487773 A CN 106487773A CN 201510555464 A CN201510555464 A CN 201510555464A CN 106487773 A CN106487773 A CN 106487773A
Authority
CN
China
Prior art keywords
decryption
encryption
black list
switching command
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510555464.3A
Other languages
Chinese (zh)
Inventor
冯磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510555464.3A priority Critical patent/CN106487773A/en
Priority to PCT/CN2016/080921 priority patent/WO2017036158A1/en
Publication of CN106487773A publication Critical patent/CN106487773A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of encryption and decryption method and device, and described encipher-decipher method includes:According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list and object decryption table;Carry out encryption and decryption using the target black list after switching and object decryption table.The solution of the present invention, enters Mobile state adjustment according to switching command, can rapidly repair security breaches to the encryption table and decryption table required for encryption and decryption, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.

Description

A kind of encryption and decryption method and device
Technical field
The present invention relates to communication technical field, more particularly to a kind of encryption and decryption method and device.
Background technology
Currently, encipher-decipher method emerges in an endless stream, and difficulty is also increasing.But, any password is calculated certain Under the cipher mode of method, crack simply matter of time.
Specifically, current end product carries out simple encryption frequently with base64 encoding mechanism, that is, exist WEBUI end, to sensitive parameter, such as modification logging, wifi password, APN parameter, DHCP parameter etc., leads to Cross base64 to be encrypted and be issued to WEBSERVER end, be then decrypted at WEBSERVER end.
But this encipher-decipher method suffers from the drawback that:It is easy to lead to after parameter after encryption is intercepted by hacker Cross HTTP facility and crack out original sensitive parameter, and expand the security breaches of end product;If repaiied Mend security breaches, need to spend substantial amounts of man power and material to go to change software code, upgraded version etc..
Content of the invention
It is an object of the invention to provide a kind of encryption and decryption method and device, solve to add present in prior art The big technical problem of probability that decryption method is cracked, can lift the safety of end product, reduce plus The probability that manner of decryption is cracked.
In order to realize above-mentioned purpose, the present invention provides a kind of encipher-decipher method, for a terminal, including:
According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list With object decryption table;
Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
Preferably, described according to switching command, the encryption table and decryption table that described terminal is currently in use switches Also include before step for target black list and object decryption table:
From cloud server switching command.
Preferably, the described step from cloud server switching command includes:
Within a preset time interval, automatically from cloud server switching command.
Preferably, described according to switching command, the encryption table and decryption table that described terminal is currently in use switches Also include before step for target black list and object decryption table:
Within a preset time interval, automatically generate switching command.
The present invention also provides a kind of ciphering and deciphering device, is arranged at a terminal, including:
Handover module, for according to switching command, the encryption table and decryption table that described terminal is currently in use is cut It is changed to target black list and object decryption table;
Encryption/decryption module, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
Preferably, described ciphering and deciphering device also includes:
Receiver module, for from cloud server switching command.
Preferably, described receiver module is specifically within a preset time interval, automatically from cloud server Switching command.
Preferably, described ciphering and deciphering device also includes:
Generation module, within a preset time interval, automatically generating switching command.
The present invention also provides a kind of encipher-decipher method, for a Cloud Server, including:
Send a switching command a to terminal so that described terminal can be according to described switching command, by it just Switch to target black list and object decryption table in the encryption table and decryption table using, and using the mesh after switching Mark black list and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
Preferably, the described step sending a switching command a to terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
The present invention provides a kind of ciphering and deciphering device again, is arranged at a Cloud Server, including:
Sending module, for sending a switching command a to terminal so that described terminal can be cut according to described Change instruction, the encryption table and decryption table being currently in use switches to target black list and object decryption table, and Carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
Preferably, described sending module is specifically within a preset time interval, automatically sending a switching command To a terminal so that described terminal can be according to described switching command, the black list being currently in use is conciliate Close table switches to target black list and object decryption table, and is carried out using the target black list after switching and target Encryption and decryption.
By the technique scheme of the present invention, the beneficial effects of the present invention is:
The encryption and decryption method and device of the present invention, conciliates to the black list required for encryption and decryption according to switching command Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
Brief description
The flow chart that Fig. 1 represents the encipher-decipher method of one embodiment of the invention.
Fig. 2 represents the structural representation of the ciphering and deciphering device of one embodiment of the invention.
The flow chart that Fig. 3 represents the encipher-decipher method of another embodiment of the present invention.
Fig. 4 represents the structural representation of the ciphering and deciphering device of another embodiment of the present invention.
The flow chart that Fig. 5 represents the encipher-decipher method of the specific embodiment of the invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with accompanying drawing pair Specific embodiment is described in detail.
Shown in Figure 1, the embodiment of the present invention provides a kind of encipher-decipher method, for a terminal, including:
S101:According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target Black list and object decryption table;
S102:Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
The encipher-decipher method of the embodiment of the present invention, conciliates to the black list required for encryption and decryption according to switching command Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
Wherein, in described switching command, there is toggle path information, for the switching of instruction terminal, Ji Jiangzheng Switch to target black list and object decryption table in the encryption table and decryption table using.
In order to realize handoff procedure, according to the size of tag memory, in terminal, preserve at least two sets black lists And decryption table, and the encryption table and decryption table of every suit is all coupling, that is, decryption table is one kind of black list Inversely.When a set of encryption table and decryption table goes wrong, may be switched to another set of encryption table and decryption table, Quick realization change encryption mechanism.
For example, terminal A is currently in use black list 1 and decryption table 1 carries out encryption and decryption, when terminal A Encryption and decryption mode when being cracked, according to switching command, black list 1 and decryption table 1 are switched to target to add Close table 3 and object decryption table 3, and carry out adding using the target black list 3 after switching and object decryption table 3 Deciphering, that is, update encryption and decryption mode, it is to avoid again by hacker's success attack in the short time.
In the specific embodiment of the invention, described according to switching command, the black list that described terminal is currently in use Also include before switching to target black list and the step of object decryption table with decryption table:
From cloud server switching command.
In practical application, when assault successfully a certain area an end product when, this area same Terminal Type product will be easily by success attack, so that safety easily in the similar end product in this area Problem.In order to repair the security breaches of the same money end product in this area, can be switched by Cloud Server The encryption and decryption mode of all same money end products, it is to avoid the expansion further of safety problem.
In order to further lift the safety of end product, the described step from cloud server switching command Rapid inclusion:
Within a preset time interval, automatically from cloud server switching command.
So, within a preset time interval, automatically from cloud server switching command, and cut according to described Change the encryption table and decryption table that instruction dynamic adjustment terminal is used, can greatly increase hack close The difficulty of code, lifts the safety of end product further.
Additionally, it is also possible to carry out encryption and decryption mode in itself using terminal in the case of not against Cloud Server Switching.I.e. in the specific embodiment of the invention, described according to switching command, described terminal is currently in use Encryption table and decryption table switch to target black list and the step of object decryption table before also include:
Within a preset time interval, automatically generate switching command.
So, in the case of economizing on resources, equally ensure that the safety of end product.
It should be noted that the terminal in the present invention is, for example, MBB product, UFI product or CPE product Deng the present invention is not limited.
In the specific embodiment of the invention, in order to increase the difficulty of hack encryption and decryption mode, described encryption Default in table and decryption table is irregular mapping relations of milli between character, i.e. mapping between character is closed System is irregular, or the mapping relations being obtained using the more difficult AES cracking.So, do not knowing about In the case of encryption table and decryption table, it is difficult to the content after cracking encryption, reduce what encryption and decryption mode was cracked Probability.
For example, black list can be as shown in table 1, and matching decryption table can be as shown in table 2:
Character Encryption Character Encryption Character Encryption Character Encryption
a V u a O 23 8 lo7
b B v 12s P sw 9 h7
c AD w 12d Q hy . jj
d SG x d2 R hy , j7
e CD y 5f S sfd g67
q asd K sad12 4 m4
t bg N 2 7 89p
Table 1
Character Deciphering Character Deciphering Character Deciphering Character Deciphering
V a a u 23 O lo7 8
B b 12s v sw P h7 9
AD c 12d w hy Q jj .
SG d d2 x hy R j7 ,
CD e 5f y sfd S g67
asd q sad12 K m4 4
bg t 2 N 89p 7
Table 2
When the decryption table of the black list according to table 1 and table 2 carries out encryption and decryption, such as terminal WEBUI end obtains The login password arriving is a8u7, can obtain encryption parameter Vlo7a89p after table 1 encryption, by encryption ginseng Number Vlo7a89p is issued to WEBSERVER end, then deciphers through table 2 at WEBSERVER end Login password a8u7 just can be obtained afterwards.
Shown in Figure 2, the embodiment of the present invention also provides a kind of ciphering and deciphering device, is arranged at a terminal, with Encipher-decipher method shown in Fig. 1 is corresponding, and described ciphering and deciphering device includes:
Handover module 21, for according to switching command, the black list that be currently in use described terminal and deciphering Table switches to target black list and object decryption table;
Encryption/decryption module 22, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
The ciphering and deciphering device of the embodiment of the present invention, conciliates to the black list required for encryption and decryption according to switching command Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
In practical application, when assault successfully a certain area an end product when, this area same Terminal Type product will be easily by success attack, so that safety easily in the similar end product in this area Problem.In order to repair the security breaches of the same money end product in this area, can be switched by Cloud Server The encryption and decryption mode of all same money end products, it is to avoid the expansion further of safety problem.
Based on the above, in the specific embodiment of the invention, described ciphering and deciphering device also includes:
Receiver module, for from cloud server switching command.
In order to further lift the safety of end product, described receiver module is specifically in Preset Time In interval, automatically from cloud server switching command.
So, within a preset time interval, automatically from cloud server switching command, and cut according to described Change the encryption table and decryption table that instruction dynamic adjustment terminal is used, can greatly increase hack close The difficulty of code, lifts the safety of end product further.
Additionally, it is also possible to carry out encryption and decryption mode in itself using terminal in the case of not against Cloud Server Switching.I.e. in the specific embodiment of the invention, described ciphering and deciphering device also includes:
Generation module, within a preset time interval, automatically generating switching command.
In the specific embodiment of the invention, in order to increase the difficulty of hack encryption and decryption mode, described encryption Default in table and decryption table is irregular mapping relations of milli between character, i.e. mapping between character is closed System is irregular, or the mapping relations being obtained using the more difficult AES cracking.So, do not knowing about In the case of encryption table and decryption table, it is difficult to the content after cracking encryption, reduce what encryption and decryption mode was cracked Probability.
Shown in Figure 3, the embodiment of the present invention also provides a kind of encipher-decipher method, for a Cloud Server, Including:
S301:Send a switching command a to terminal so that described terminal can according to described switching command, The encryption table and decryption table being currently in use switches to target black list and object decryption table, and using switching Target black list afterwards and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
The encipher-decipher method of the embodiment of the present invention, by sending switching command to terminal so that described terminal energy Enough according to described switching command, the encryption table and decryption table being currently in use switches to target black list and mesh Mark decryption table, and carry out encryption and decryption using the target black list after switching and target, can rapidly repair peace Full leak, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of manpower and Material resources go to change software code, upgraded version.
Specifically, in order to further lift the safety of end product, described transmission one switching command to The step of terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
In such manner, it is possible to ensure terminal within a preset time interval, its black list of being used of dynamic switching and Decryption table, greatly increases the difficulty of decryption, lifts the safety of end product further.
Shown in Figure 4, the embodiment of the present invention also provides a kind of ciphering and deciphering device, is arranged at a Cloud Server, Corresponding with the encipher-decipher method shown in Fig. 3, described ciphering and deciphering device includes:
Sending module 41, for sending a switching command a to terminal so that described terminal can be according to institute State switching command, the encryption table and decryption table being currently in use switches to target black list and object decryption table, And carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
The ciphering and deciphering device of the embodiment of the present invention, by sending switching command to terminal so that described terminal energy Enough according to described switching command, the encryption table and decryption table being currently in use switches to target black list and mesh Mark decryption table, and carry out encryption and decryption using the target black list after switching and target, can rapidly repair peace Full leak, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of manpower and Material resources go to change software code, upgraded version.
In the specific embodiment of the invention, described sending module specifically within a preset time interval, automatically Send a switching command a to terminal so that it can be made by described terminal according to described switching command Encryption table and decryption table switches to target black list and object decryption table, and is added using the target after switching Close table and target carry out encryption and decryption.
For the ease of understanding the present invention, below by Fig. 5, detailed Jie is carried out to the encipher-decipher method of the present invention Continue.
Shown in Figure 5, terminal is, for example, UFI product, mainly includes WEBUI end and WEBSERVER End, and between described WEBUI end and WEBSERVER end, pass through security socket layer Hyper text transfer Agreement HTTPS interacts, and n black list is deposited at described WEBUI end, simultaneously described WEBSERVER deposits at end corresponding n decryption table.
In the specific embodiment of the invention, so that switching command is sent for specific application scenarios by Cloud Server Encipher-decipher method provided in an embodiment of the present invention is introduced, specifically, described encipher-decipher method include with Lower step:
S501:Cloud Server sends switching command to terminal, and described switching command instruction terminal is by black list 1 Switch to target black list 2 and object decryption table 2 with decryption table 1;
S502:According to described switching command, the black list 1 that it is currently in use and decryption table 1 are carried out terminal Switching, switches to target black list 2 and object decryption table 2, and utilizes described black list 2 and decryption table 2 Carry out encryption and decryption.
The above is only the preferred embodiment of the present invention it is noted that common for the art For technical staff, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, These improvements and modifications also should be regarded as protection scope of the present invention.

Claims (12)

1. a kind of encipher-decipher method, for a terminal it is characterised in that including:
According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list With object decryption table;
Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
2. encipher-decipher method according to claim 1 it is characterised in that described according to switching command, The encryption table and decryption table that described terminal is currently in use switches to target black list and the step of object decryption table Also include before rapid:
From cloud server switching command.
3. encipher-decipher method according to claim 2 is it is characterised in that described connect from Cloud Server The step receiving switching command includes:
Within a preset time interval, automatically from cloud server switching command.
4. encipher-decipher method according to claim 1 it is characterised in that described according to switching command, The encryption table and decryption table that described terminal is currently in use switches to target black list and the step of object decryption table Also include before rapid:
Within a preset time interval, automatically generate switching command.
5. a kind of ciphering and deciphering device, is arranged at a terminal it is characterised in that including:
Handover module, for according to switching command, the encryption table and decryption table that described terminal is currently in use is cut It is changed to target black list and object decryption table;
Encryption/decryption module, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
6. ciphering and deciphering device according to claim 5 is it is characterised in that also include:
Receiver module, for from cloud server switching command.
7. ciphering and deciphering device according to claim 6 is it is characterised in that described receiver module is concrete For within a preset time interval, automatically from cloud server switching command.
8. ciphering and deciphering device according to claim 5 is it is characterised in that also include:
Generation module, within a preset time interval, automatically generating switching command.
9. a kind of encipher-decipher method, for a Cloud Server it is characterised in that including:
Send a switching command a to terminal so that described terminal can be according to described switching command, by it just Switch to target black list and object decryption table in the encryption table and decryption table using, and using the mesh after switching Mark black list and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
10. encipher-decipher method according to claim 9 is it is characterised in that described transmission one switching refers to The step making a terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
A kind of 11. ciphering and deciphering devices, are arranged at a Cloud Server it is characterised in that including:
Sending module, for sending a switching command a to terminal so that described terminal can be cut according to described Change instruction, the encryption table and decryption table being currently in use switches to target black list and object decryption table, and Carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and Decryption table is all coupling.
12. ciphering and deciphering devices according to claim 11 are it is characterised in that described sending module has Body is used within a preset time interval, automatically sends a switching command a to terminal so that described terminal can According to described switching command, the encryption table and decryption table being currently in use switches to target black list and target Decryption table, and carry out encryption and decryption using the target black list after switching and target.
CN201510555464.3A 2015-09-01 2015-09-01 A kind of encryption and decryption method and device Withdrawn CN106487773A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510555464.3A CN106487773A (en) 2015-09-01 2015-09-01 A kind of encryption and decryption method and device
PCT/CN2016/080921 WO2017036158A1 (en) 2015-09-01 2016-05-03 Method and device for encryption and decryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510555464.3A CN106487773A (en) 2015-09-01 2015-09-01 A kind of encryption and decryption method and device

Publications (1)

Publication Number Publication Date
CN106487773A true CN106487773A (en) 2017-03-08

Family

ID=58188394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510555464.3A Withdrawn CN106487773A (en) 2015-09-01 2015-09-01 A kind of encryption and decryption method and device

Country Status (2)

Country Link
CN (1) CN106487773A (en)
WO (1) WO2017036158A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598151A (en) * 2018-11-29 2019-04-09 中国电子科技集团公司第四十七研究所 Instruction code dynamic encryption and decryption method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1983924A (en) * 2006-05-30 2007-06-20 华为技术有限公司 Decoding switch method, decoder and terminal equipment
AU2007244719A1 (en) * 2006-04-28 2007-11-08 Qualcomm Incorporated Uninterrupted transmission during a change in ciphering configuration
CN101399662A (en) * 2008-09-27 2009-04-01 北京创毅视讯科技有限公司 Method, system, conditional receiving module and customer terminal for obtaining service key
CN101478752A (en) * 2009-01-12 2009-07-08 中兴通讯股份有限公司 Cipher key replacing method, system and device
CN103873895A (en) * 2012-12-14 2014-06-18 中国传媒大学 DVB/IPTV dual-mode interactive business protection system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8369525B2 (en) * 2002-10-24 2013-02-05 At&T Mobility Ii Llc Dynamic password update for wireless encryption system
EP2704389B1 (en) * 2011-11-09 2017-04-05 Huawei Technologies Co., Ltd. Method, device and system for protecting data security in cloud
CN103051963B (en) * 2012-11-30 2018-02-13 北京视博数字电视科技有限公司 A kind of method of controlling security of digital-television terminal equipment
CN103457995A (en) * 2013-06-07 2013-12-18 北京百纳威尔科技有限公司 Data information storage method for terminal equipment, terminal equipment and cloud terminal server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2007244719A1 (en) * 2006-04-28 2007-11-08 Qualcomm Incorporated Uninterrupted transmission during a change in ciphering configuration
CN1983924A (en) * 2006-05-30 2007-06-20 华为技术有限公司 Decoding switch method, decoder and terminal equipment
CN101399662A (en) * 2008-09-27 2009-04-01 北京创毅视讯科技有限公司 Method, system, conditional receiving module and customer terminal for obtaining service key
CN101478752A (en) * 2009-01-12 2009-07-08 中兴通讯股份有限公司 Cipher key replacing method, system and device
CN103873895A (en) * 2012-12-14 2014-06-18 中国传媒大学 DVB/IPTV dual-mode interactive business protection system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598151A (en) * 2018-11-29 2019-04-09 中国电子科技集团公司第四十七研究所 Instruction code dynamic encryption and decryption method
CN109598151B (en) * 2018-11-29 2023-02-21 中国电子科技集团公司第四十七研究所 Dynamic encryption and decryption method for instruction code

Also Published As

Publication number Publication date
WO2017036158A1 (en) 2017-03-09

Similar Documents

Publication Publication Date Title
KR102355340B1 (en) Apparatus and method for mobility procedures involving mobility management entity relocation
KR102567587B1 (en) Apparatuses and methods for wireless communication
CN101232731B (en) Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN
CN101946535A (en) System and method for performing handovers, or key management while performing handovers in a wireless communication system
KR20100021385A (en) Security protected non -access stratum protocol operation supporting method in mobile telecommunication system
US7107051B1 (en) Technique to establish wireless session keys suitable for roaming
CN104202308A (en) Implementation method of safe batch configuration of Wi-Fi Internet of Things system
RU2530331C2 (en) Multicast key negotiation method suitable for group calling system and respective system
CN104065765A (en) WIFI data transmitting method and system and related method thereof
US20150229620A1 (en) Key management in machine type communication system
CN101981892A (en) Systems and methods for group key distribution and management for wireless communications systems
CN101267668A (en) Secret key generation method, device and system
CN102457844A (en) Method and system for managing group key in M2M (machine-to-machine) group authentication
CN109450627B (en) Mobile equipment communication network integrating quantum communication and wireless communication and communication method thereof
KR20100126691A (en) System and method for performing handovers, or key management while performing handovers in a wireless communication system
US10616761B2 (en) Method, server, base station and communication system for configuring security parameters
CN106487773A (en) A kind of encryption and decryption method and device
CN104902473A (en) Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication
CN106028328A (en) NFC-based hotspot authentication method
KR20100092353A (en) Methods and apparatus of managing a traffic encryption key
Southern et al. Wireless security: securing mobile UMTS communications from interoperation of GSM
CN105393567B (en) Method and device for secure transmission of data
KR20120121817A (en) Apparatus and method of secure data communication by multiplexing wifi and wireless communication
CN109451493B (en) WPA-based key configuration method and device
CN102469454A (en) Key setting method in radio network controller (RNC) and wireless network controller as well as terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170308

WW01 Invention patent application withdrawn after publication