CN107070666A - A kind of encryption and decryption method and device - Google Patents

A kind of encryption and decryption method and device Download PDF

Info

Publication number
CN107070666A
CN107070666A CN201710339350.4A CN201710339350A CN107070666A CN 107070666 A CN107070666 A CN 107070666A CN 201710339350 A CN201710339350 A CN 201710339350A CN 107070666 A CN107070666 A CN 107070666A
Authority
CN
China
Prior art keywords
key
biological information
encipher
xor
ciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710339350.4A
Other languages
Chinese (zh)
Inventor
朱小强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hongqin Communication Technology Co Ltd
Original Assignee
Guangdong Hongqin Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hongqin Communication Technology Co Ltd filed Critical Guangdong Hongqin Communication Technology Co Ltd
Priority to CN201710339350.4A priority Critical patent/CN107070666A/en
Publication of CN107070666A publication Critical patent/CN107070666A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses a kind of encryption and decryption method and device, methods described includes generation key;The generation key includes:Obtain biological information and character password;File signature is carried out to the biological information, condition code is obtained;Described document information and the character password are subjected to XOR, key is obtained.The present invention generates the encryption key of customization according to user characteristics and character password, had both improved the flexibility of encryption, security performance is improved again;In addition, in ciphering process and decrypting process, using easy XOR method, ciphering process and the time spent by decrypting process are substantially reduced, the high efficiency of encryption and decryption is realized, it is adaptable to which higher occasion is required to encryption/decryption speed.

Description

A kind of encryption and decryption method and device
Technical field
The present invention relates to field of information security technology, more particularly to a kind of encryption and decryption method and device.
Background technology
At present, today's society is an advanced IT application, the society of networking, and information turns into must in people's daily life Indispensable valuable source.For example, everyone can have a network digital identity of oneself on network, using so Digital identity replace itself.In addition, people with the digital identity can be engaged in various work on network daily It is dynamic, such as:Shopping online, fund are transferred accounts, Web conference etc..During these activities are engaged in, user is not necessarily intended to come to personally Scene, it is only necessary to which some information of interaction can complete various activities.
Information-based, networking being lived for people, work, learn in terms of while offer convenience, also bring Unprecedented the problem of.If the identity information of user is falsely used by other people, or, the confidential information of user is stolen by other people, To all incalculable damage be caused to user.In worldwide every country, because information is let out caused by a variety of causes Penetralia part emerges in an endless stream, and most common is exactly classified papers, sensitive information, significant data, design drawing, formula, software source generation Code etc. is lost in rival and unrelated person hand by different approach, ways and means.
With flourishing for network technology, people propose higher demand to the convenience of network, and wireless network should Transport and give birth to, and our life is entered with gesture with lightning speed, small to personal space (such as Wireless Personal Network WPAN, U.S. State's ieee standard 802.15), regional space (such as WLAN WLAN, U.S.'s ieee standard 802.11), greatly to whole city The radio network technique in space (such as wireless MAN WMAN, U.S.'s ieee standard 802.16) is included.Wireless network band A kind of new online theory is carried out, people have broken away from the constraint of physical circuit, the wireless characteristic freely networked meets people's length The hope of free internet access has been expected since phase.Wireless network is with easy for installation, cost performance height, flexibility and mobility with height Etc. advantage, the trend institute as current network Development to.
However, just because of the untrammeled open and ubiquitous property of wireless network, causing wireless network natural Safety defect.Wireless network using public electromagnetic wave as carrier, electromagnetic wave can through ceiling, glass, floor, The objects such as brick, wall, wireless signal permeates into whole space so that anyone can intercept and capture, and wireless channel lacks strict physics Boundary any can arbitrarily access per capita.For cable network, the Content of Communication of wireless network be easier by Eavesdrop and distort, safety management and the increasingly complex and difficulty of protection.In some sensitive industries, such as security, bank, ecommerce, Security threat develops for the continuation of wireless network produces increasing influence, sometimes even as negative factor.Therefore, nothing Gauze network must take certain security mechanism to solve these safety problems.
At present, the method for realizing information security and information privacy is typically all to be realized using AES, but it is existing plus Close algorithm is mostly more complicated, and ciphering process is time-consuming longer, it is impossible to meet the quick encryption requirements under some application scenarios.Cause And be necessary to provide a kind of easy encryption method, improve encryption efficiency on the basis of security is ensured.
The content of the invention
It is an object of the invention to provide a kind of encryption and decryption method and device, realize and customize encryption, improve security Shorten the time of whole encryption process simultaneously.
For up to this purpose, the present invention uses following technical scheme:
A kind of encipher-decipher method, including generation key;The generation key includes:
Obtain biological information and character password;
File signature is carried out to the biological information, condition code is obtained;
Described document information and the character password are subjected to XOR, key is obtained.
Optionally, the encipher-decipher method also includes plaintext to be encrypted is encrypted;
It is described plaintext to be encrypted is encrypted including:
The key is subjected to XOR with the plaintext to be encrypted, ciphertext is obtained.
Optionally, the encipher-decipher method also includes the ciphertext is decrypted;
It is described ciphertext is decrypted including:
The key and the ciphertext are subjected to XOR, obtained in plain text.
Optionally, the biological information includes any one in fingerprint, iris, face or any combination.
Optionally, it is described that file signature is carried out to biological information, including file signature is carried out using hashing algorithm.
Optionally, the acquisition biological information includes:Collection biological information, or from e-file in real time Obtain the biological information.
Optionally, the character password includes:Any one in numeral, letter, Chinese character, symbol or any combination.
A kind of ciphering and deciphering device, including for generating the Key generating unit of key, the Key generating unit includes:
Data obtaining module, for obtaining biological information and character password;
Computing module, for carrying out file signature to the biological information, obtains condition code, and by described document information XOR is carried out with the character password, key is obtained.
Optionally, the ciphering and deciphering device also includes ciphering unit;
The ciphering unit, ciphertext is obtained for the key and plaintext to be encrypted to be carried out into XOR.
Optionally, the ciphering and deciphering device also includes the decryption unit for being used to the ciphertext is decrypted;
The decryption unit, for the key and the ciphertext to be carried out into XOR, is obtained in plain text.
Compared with prior art, the embodiment of the present invention has the advantages that:
The present invention generates the encryption key of customization according to user characteristics and character password, has both improved the flexible of encryption Property, security performance is improved again;In addition, in ciphering process and decrypting process, using easy XOR method, contracting significantly Time spent by short ciphering process and decrypting process, realize the high efficiency of encryption and decryption, it is adaptable to will to encryption/decryption speed Seek higher occasion.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the encryption method flow chart at encryption end that the embodiment of the present invention one is provided;
Fig. 2 is the decryption method flow chart in decrypting end that the embodiment of the present invention one is provided.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, below in conjunction with the present invention Accompanying drawing in embodiment, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that disclosed below Embodiment be only a part of embodiment of the invention, and not all embodiment.Based on the embodiment in the present invention, this area All other embodiment that those of ordinary skill is obtained under the premise of creative work is not made, belongs to protection of the present invention Scope.
Further illustrate technical scheme below in conjunction with the accompanying drawings and by embodiment.
Embodiment one
A kind of encipher-decipher method is present embodiments provided, the ciphering process and the solution in decrypting end at encryption end is mainly included in Close process.
Referring to Fig. 1, the figure shows the ciphering process of the present embodiment, including step:
Step S101, acquisition biological information and character password.
In this step, the method for obtaining biological information is:
At encryption end, biological information is gathered in real time;Or obtain biological information from e-file, including from It is stored in the e-file received locally or through network and obtains biological information.
Wherein, biological information is used to realize the encryption function customized, can include fingerprint, iris, face etc. and appoint Anticipate one or any combined information;And in character password, including numeral, letter, Chinese character, symbol any one or it is any Combination.
Security is improved while customization to realize, the biological information of encipherer is preferably chosen, and character is close Code is provided by encipherer by the way of input.
Step S102, to biological information carry out file signature, obtain condition code.
File signature is the digital signature to file, and file signature can be specifically carried out using hashing algorithm, and such as MD5 is calculated Method, SHA-1 algorithms etc..
MD5 algorithms have the characteristics that:
Compressibility:The data of random length, the MD5 values length calculated is all fixed;
Easily calculate:MD5 values are calculated from former data to be easy to;
Anti- modification:Former data are made any change, even only changing 1 byte, resulting MD5 values have very big Difference;
Strong impact resistant:Known former data and its MD5 value, want that finding a data with identical MD5 values (forges number According to) it is extremely difficult.
And the thought of SHA-1 algorithms is that plaintext irreversibly is converted into one section of (generally smaller) ciphertext with a kind of, It can also simply be interpreted as taking a string of input codes (being referred to as preliminary mapping or information), and they are converted into length is shorter, digit Fixed output sequence is the process of hashed value (also referred to as informative abstract or message authentication codes).
Compared with MD5 algorithms, more slowly, but SHA-1 message digest is longer for the speed of SHA-1 algorithms, more favorably In the attack that confrontation is barbarous!
Step S103, the character password for inputting condition code and encipherer carry out XOR, obtain key.
Step S104, plaintext to be encrypted read in into internal memory.
Step S105, the key for obtaining step S103, the plaintext to be encrypted with reading carry out circulation XOR by byte Computing, obtains ciphertext.
In this encryption flow, key is on the one hand generated by the biological information and character password of encipherer, realized Customize, improve the security of encryption;On the other hand, key is added with being realized in plain text using simple XOR mode It is close, the encryption times of e-file are greatly shortened, encryption efficiency is improved.
Referring to Fig. 2, the figure shows the decrypting process of the present embodiment, including step:
Step S201, acquisition biological information and character password.
In this step, the method for obtaining biological information is:
In decrypting end, biological information is gathered in real time;Or obtain biological information from e-file, including from It is stored in the e-file received locally or through network and obtains biological information.
Wherein, biological information can include any one or any combination information such as fingerprint, iris, face;And Any one in character password, including numeral, letter, Chinese character, symbol or any combination.
To realize decryption, acquired biological information and character password in this step, it is necessary to institute in ciphering process The biological information and character password of acquisition are completely the same, that is, ensure encipherer and decryption person for same people, and ciphering process Neutralize the character password inputted in decrypting process identical.
Step S202, to biological information carry out file signature, obtain condition code.
File signature is the digital signature to file, and file signature can be specifically carried out using hashing algorithm, and such as MD5 is calculated Method, SHA-1 algorithms etc..
Step S203, the character password for inputting condition code and decryption person carry out XOR, obtain key.
Step S204, ciphertext to be decrypted read in into internal memory.
Step S205, the key for obtaining step S203, the ciphertext to be decrypted with reading carry out circulation XOR by byte Computing, is obtained in plain text.
It should be noted that the generating process of key and the complete phase of generating process of key in ciphering process in decrypting process Together, and according to key the algorithm being encrypted and the algorithm being decrypted according to key are also identical, using simple XOR, so as to ensure that the high efficiency of ciphering process and decrypting process.
Embodiment two
Corresponding with the encipher-decipher method that embodiment one is provided, the present embodiment two provides a kind of ciphering and deciphering device, is located at End or decrypting end are encrypted, including:Key generating unit, ciphering unit and/or decryption unit;
Wherein, Key generating unit includes:
Data obtaining module, for obtaining biological information and character password;
Computing module, for carrying out file signature to the biological information, obtains condition code, and by described document information XOR is carried out with the character password, key is obtained.
Ciphering unit, for generating key using the Key generating unit, the key is carried out with plaintext to be encrypted XOR obtains ciphertext.
Decryption unit, for generating key using the Key generating unit, XOR is carried out by the key and the ciphertext Computing, is obtained in plain text.
Using the ciphering and deciphering device, key is customized not only according to user characteristics generation, flexibility and security is improved, Encryption and decryption speed can also be effectively improved, it is adaptable to which higher occasion is required to encryption/decryption speed.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a kind of encipher-decipher method, including generation key;Characterized in that, the generation key includes:
Obtain biological information and character password;
File signature is carried out to the biological information, condition code is obtained;
Described document information and the character password are subjected to XOR, key is obtained.
2. encipher-decipher method according to claim 1, it is characterised in that the encipher-decipher method also includes to be encrypted It is encrypted in plain text;
It is described plaintext to be encrypted is encrypted including:
The key is subjected to XOR with the plaintext to be encrypted, ciphertext is obtained.
3. encipher-decipher method according to claim 2, it is characterised in that the encipher-decipher method also includes to the ciphertext It is decrypted;
It is described ciphertext is decrypted including:
The key and the ciphertext are subjected to XOR, obtained in plain text.
4. encipher-decipher method according to claim 1, it is characterised in that the biological information include fingerprint, iris, Any one in face or any combination.
5. encipher-decipher method according to claim 1, it is characterised in that described that file label are carried out to biological information Name, including file signature is carried out using hashing algorithm.
6. encipher-decipher method according to claim 3, it is characterised in that the acquisition biological information includes:In real time Biological information is gathered, or obtains from e-file the biological information.
7. encipher-decipher method according to claim 1, it is characterised in that the character password includes:Numeral, letter, the Chinese Any one in word, symbol or any combination.
8. a kind of ciphering and deciphering device, including for generating the Key generating unit of key, it is characterised in that the key generation is single Member includes:
Data obtaining module, for obtaining biological information and character password;
Computing module, for carrying out file signature to the biological information, obtains condition code, and by described document information and institute State character password and carry out XOR, obtain key.
9. ciphering and deciphering device according to claim 8, it is characterised in that the ciphering and deciphering device also includes ciphering unit;
The ciphering unit, ciphertext is obtained for the key and plaintext to be encrypted to be carried out into XOR.
10. ciphering and deciphering device according to claim 9, it is characterised in that the ciphering and deciphering device also includes being used for institute State the decryption unit that ciphertext is decrypted;
The decryption unit, for the key and the ciphertext to be carried out into XOR, is obtained in plain text.
CN201710339350.4A 2017-05-15 2017-05-15 A kind of encryption and decryption method and device Pending CN107070666A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710339350.4A CN107070666A (en) 2017-05-15 2017-05-15 A kind of encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710339350.4A CN107070666A (en) 2017-05-15 2017-05-15 A kind of encryption and decryption method and device

Publications (1)

Publication Number Publication Date
CN107070666A true CN107070666A (en) 2017-08-18

Family

ID=59597629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710339350.4A Pending CN107070666A (en) 2017-05-15 2017-05-15 A kind of encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN107070666A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234116A (en) * 2017-10-26 2018-06-29 广东海翔教育科技有限公司 A kind of data communications method and device
CN111709000A (en) * 2020-06-03 2020-09-25 中科九度(北京)空间信息技术有限责任公司 Encryption and decryption method based on multi-biological-feature fusion and application
CN113515276A (en) * 2021-07-20 2021-10-19 北京金和网络股份有限公司 Method and device for generating point service based on form engine platform

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1281608A (en) * 1997-11-14 2001-01-24 数字人公司 Cryptographic key generation using biometric data
CN101001142A (en) * 2007-01-17 2007-07-18 张建华 Encipher-decipher method based on iterative random number generator
CN101227269A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Method for binding and publishing digital information or cryptographic key based on fingerprint frequency domain
CN101278518A (en) * 2005-09-29 2008-10-01 皇家飞利浦电子股份有限公司 Secure protection of biometric templates
CN101321069A (en) * 2008-06-23 2008-12-10 刘洪利 Mobile phone biological identity certification production and authentication method, and its authentication system
CN101459518A (en) * 2008-12-01 2009-06-17 清华大学 Digital cipher extraction and protection method based on biological characteristic
CN103780391A (en) * 2013-12-10 2014-05-07 北京数字认证股份有限公司 Hand-written electronic signature data protection method based on signature content
US20140365782A1 (en) * 2004-06-14 2014-12-11 Rodney Beatson Method and System for Providing Password-free, Hardware-rooted, ASIC-based Authentication of a Human to a Mobile Device using Biometrics with a Protected, Local Template to Release Trusted Credentials to Relying Parties
CN104769134A (en) * 2012-09-11 2015-07-08 赛拉诺斯股份有限公司 Information management systems and methods using a biological signature

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1281608A (en) * 1997-11-14 2001-01-24 数字人公司 Cryptographic key generation using biometric data
US20140365782A1 (en) * 2004-06-14 2014-12-11 Rodney Beatson Method and System for Providing Password-free, Hardware-rooted, ASIC-based Authentication of a Human to a Mobile Device using Biometrics with a Protected, Local Template to Release Trusted Credentials to Relying Parties
CN101278518A (en) * 2005-09-29 2008-10-01 皇家飞利浦电子股份有限公司 Secure protection of biometric templates
CN101001142A (en) * 2007-01-17 2007-07-18 张建华 Encipher-decipher method based on iterative random number generator
CN101227269A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 Method for binding and publishing digital information or cryptographic key based on fingerprint frequency domain
CN101321069A (en) * 2008-06-23 2008-12-10 刘洪利 Mobile phone biological identity certification production and authentication method, and its authentication system
CN101459518A (en) * 2008-12-01 2009-06-17 清华大学 Digital cipher extraction and protection method based on biological characteristic
CN104769134A (en) * 2012-09-11 2015-07-08 赛拉诺斯股份有限公司 Information management systems and methods using a biological signature
CN103780391A (en) * 2013-12-10 2014-05-07 北京数字认证股份有限公司 Hand-written electronic signature data protection method based on signature content

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
FENG HAO, ROSS ANDERSON, AND JOHN DAUGMAN: "Combining Crypto with Biometrics Effectively", 《IEEE TRANSACTIONS ON COMPUTERS》 *
姚琳,范庆娜,孔祥: "普适环境下基于生物加密的认证机制", 《计算机工程与应用》 *
张宁,臧亚丽,田捷: "生物特征与密码技术的融合——一种新的安全身份认证方案", 《密码学报》 *
王金海,魏宁,崔军,李雪妍,李秀艳: "一种生物证书密钥生成算法", 《哈尔滨工业大学学报》 *
陈泗盛,林艳珍,郭永宁: "一种基于生物特征密钥保护技术的身份认证方案", 《太原师范学院学报(自然科学版)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234116A (en) * 2017-10-26 2018-06-29 广东海翔教育科技有限公司 A kind of data communications method and device
CN111709000A (en) * 2020-06-03 2020-09-25 中科九度(北京)空间信息技术有限责任公司 Encryption and decryption method based on multi-biological-feature fusion and application
CN113515276A (en) * 2021-07-20 2021-10-19 北京金和网络股份有限公司 Method and device for generating point service based on form engine platform
CN113515276B (en) * 2021-07-20 2024-02-02 北京金和网络股份有限公司 Method and device for generating integration service based on form engine platform

Similar Documents

Publication Publication Date Title
TWI750223B (en) Blockchain encrypted radio frequency chip storage design method
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
Atiewi et al. Scalable and secure big data IoT system based on multifactor authentication and lightweight cryptography
Ren et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
CN101350724B (en) Encrypting method base on biology characteristic information
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN107786331B (en) Data processing method, device, system and computer readable storage medium
Abdulraheem et al. An efficient lightweight cryptographic algorithm for IoT security
Mohsin et al. Two factor vs multi-factor, an authentication battle in mobile cloud computing environments
CN111066077A (en) Encryption device, encryption method, decryption device, and decryption method
Han et al. A lightweight authentication mechanism between IoT devices
CN107070666A (en) A kind of encryption and decryption method and device
CN106100823B (en) Password protection device
CN109687966A (en) Encryption method and its system
CN107241184A (en) Personal identification number generation and management method based on improvement AES
KR20130007810A (en) Otp authentification method and system using of qr-code
CN105162592B (en) A kind of method and system of certification wearable device
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN107342865B (en) SM 4-based authentication encryption algorithm
Sheshasaayee et al. A framework to enhance security for otp sms in e-banking environment using cryptography and text steganography
Liu et al. A secure medical information management system for wireless body area networks
Rahnama et al. Securing RFID-based authentication systems using ParseKey+
CN115333753A (en) Internet protocol address generation method and device, storage medium and electronic equipment
US20230070408A1 (en) Secure communication device equipped with quantum encryption chip based quantum random number and method of providing secure communication service using the same
Sridevi et al. Wireless sensor data mining for e-commerce applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170818