CN108875398A - Encrypting and deciphering system and its application method based on certificate chain technology - Google Patents

Encrypting and deciphering system and its application method based on certificate chain technology Download PDF

Info

Publication number
CN108875398A
CN108875398A CN201811039039.9A CN201811039039A CN108875398A CN 108875398 A CN108875398 A CN 108875398A CN 201811039039 A CN201811039039 A CN 201811039039A CN 108875398 A CN108875398 A CN 108875398A
Authority
CN
China
Prior art keywords
computer
certificate
decryption
encryption
controlling terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811039039.9A
Other languages
Chinese (zh)
Other versions
CN108875398B (en
Inventor
李俊
张琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Special Faith Universal Information Technology Co Ltd
Original Assignee
Shanxi Special Faith Universal Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Special Faith Universal Information Technology Co Ltd filed Critical Shanxi Special Faith Universal Information Technology Co Ltd
Priority to CN201811039039.9A priority Critical patent/CN108875398B/en
Publication of CN108875398A publication Critical patent/CN108875398A/en
Application granted granted Critical
Publication of CN108875398B publication Critical patent/CN108875398B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The present invention is based on the encrypting and deciphering system and its application method of certificate chain technology, belong to the encrypting and deciphering system technical field based on certificate chain technology;Technical problem to be solved is:Solves the risk problem of irreversibility of the existing technology and safety, storage limitation and network attack;Solve the technical solution that the technical problem uses for:Including the central controller being arranged in controlling terminal, the signal input part of the central controller is connected with data acquisition module, and the power input of the central controller is connected with power module;The central controller is connected by conducting wire with wireless communication module, and the wireless communication module is connect with ciphering computer, decryption computer radio respectively by wireless network;The ciphering computer and the communication port for decrypting computer are connected by on-scene communication bus with server computer, and the server computer includes certificate storage computer, data verification computer, data storage computer;The present invention is applied to certificate chain encryption and decryption field.

Description

Encrypting and deciphering system and its application method based on certificate chain technology
Technical field
The present invention is based on the encrypting and deciphering system and its application method of certificate chain technology, belong to based on certificate chain technology plus solution Close systems technology field.
Background technique
Current internet technology is in an increasingly wide range of applications, while also bringing information security potential problem how Carrying out the information security issue under " internet+" epoch always is one of focus concerned by people.Although China is pacified for information Full problem proposes many strategies, but all cannot fundamentally solve safety problem, and leaking data, hacker attack are often sent out It is raw.Current block chain technology mainly uses the technology of decentralization, realizes the point-to-point trade system side for going foundation of trust Method.Existing block chain technology is the breakthrough of filed of network information security, because it can ensure that the data secret of highest level Property, availability and safety.But there is also the deficiencies of following several respects for existing block chain technology:
One, irreversibility and safety issue:In block chain technical field, private key is then uniquely to be used to identity user identity , if user loses or forget private key needed for decrypting code key, there are the risks that encryption data possibly can not be restored, and deposit In security risk.
Two, restricted problem is stored:The each piece of data that may include no more than 1Mb, block chain is averagely per second can only to handle 7 A task, constrained storage, memory space are little.If data volume is very big, network congestion is easily caused.
Three, the risk of network attack:Although block chain greatly reduces the risk of malicious attack, from current technical conditions From the point of view of be not possible to realize " efficient low energy ", " decentralization " and " safety " three all must block chain technology, therefore be easy to cause Network attack.
Summary of the invention
The present invention overcomes the shortcomings of the prior art, technical problem to be solved is:A kind of certificate chain skill is provided The encrypting and deciphering system and method for art, solve irreversibility of the existing technology and safety, storage limitation and network are attacked The risk problem hit;In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:Based on certificate chain technology plus solution Close system, including the central controller being arranged in controlling terminal, the signal input part and data of the central controller are acquired Module is connected, and the power input of the central controller is connected with power module;
The central controller is connected by conducting wire with wireless communication module, and the wireless communication module is distinguished by wireless network It is connect with ciphering computer, decryption computer radio;
The ciphering computer and the communication port for decrypting computer are connected by on-scene communication bus with server computer, institute Stating server computer includes certificate storage computer, data verification computer, data storage computer.
The application method of encrypting and deciphering system based on certificate chain technology, including cryptographic operation and decryption oprerations;
Steps are as follows for the cryptographic operation of the encrypting and deciphering system of the certificate chain technology:
Step 1:User or business entity open encryption application function using encryption and decryption controlling terminal application;
Step 2:Using encryption and decryption controlling terminal by network from certificate store computer request personal electric identity card or Business-electronic license;The personal electric identity card combines random array using Encryption Algorithm by ID card information and biological information Conjunction mode generates;The business-electronic license by certificate information, legal person's electronic ID card information, representative authority administrator's electronics ID card information is generated using Encryption Algorithm and random number combination;
Step 3:Stored after computer obtains electronic certificate by certificate, user or business entity encryption and decryption controlling terminal into Row cryptographic operation, using encryption application function need by data verification computer verify, including authentication, certificate verification and Biometric authentication;ID card information is verified in the authentication, and the certificate verification verifies enterprise's certificate information, The biometric authentication is using biological informations combined authentications such as recognition of face, finger print information, iris information and voiceprints;Enterprise needs Enterprise's certificate information is verified, ordinary user needs to verify ID card information;After being verified by data verification computer, data will It is uploaded to ciphering computer;
Step 4:Computer is stored by network connection data using encryption and decryption controlling terminal, the data storage computer is real The multicenter of the multicenter storage and verification result of now verifying record is presented, and the multicenter presentation of verification result will be according to user's Permission and specific application scenarios show different verification results;
Step 5:User or business entity upload file or file to be encrypted using encryption and decryption controlling terminal, are being transmitted across File or folder automatic transparent is encrypted in journey;
Step 6:Using encryption and decryption controlling terminal by the electronic certificate information and transmission process of ownership people data folder or File is bound, and by high-intensitive Encryption Algorithm, encryption generates unique identification code;
Step 7:User or business entity can download encrypted file or file by using encryption and decryption controlling terminal.
Steps are as follows for the decryption oprerations of the encrypting and deciphering system of the certificate chain technology:
Step 1:User or business entity open decryption application function using encryption and decryption controlling terminal application;
Step 2:Computer is stored to certificate by network using encryption and decryption controlling terminal and issues request, obtains personal electric body Part card or business-electronic license;
Step 3:After storing computer acquisition electronic certificate by certificate, application is opened decryption application and is needed using encryption and decryption control Terminal processed is issued to data verification computer and is requested, and realizes biometric information verifications and the bodies such as certificate verification, face, fingerprint and iris Part verifying;
Step 4:If data verification computer is verified, permits user or business entity and decryption computer establishes connection; Connection is established by network and data storage computer using encryption and decryption controlling terminal and issues checking request, realizes verifying record Multicenter storage and verification result multicenter present;
Step 5:User or business entity upload file or file to be decrypted using encryption and decryption controlling terminal;
Step 6:File or file are decrypted by decipherment algorithm using encryption and decryption controlling terminal, the electronics that decryption is obtained Certificate information is matched with the certificate information in certificate storage computer;
Step 7:If matching is consistent, successful decryption, user or business entity use encryption and decryption controlling terminal according to file Operating right is downloaded, checks, online reading.
Compared with the prior art, the invention has the beneficial effects that:Encrypting and deciphering system provided by the invention includes that certificate is deposited Store up computer, data verification computer, data storage computer, ciphering computer and decryption computer, the ciphering computer Certificate information is obtained by storing computer from certificate with decryption computer, then is verified and is counted by data verification computer Information is stored according to storage computer, realizes that multiserver computer participates in encryption and decryption;The electricity that ciphering computer will acquire Sub- certificate and data file to be encrypted are encrypted by Encryption Algorithm, ciphering computer and decryption computer and above-mentioned each clothes Business device computer establishes network communication to carry out data verification and upload, and realizes secret protection, the network security that can not be distorted is answered With.
Detailed description of the invention
The present invention will be further described with reference to the accompanying drawing:
Fig. 1 is the structural diagram of the present invention;
Fig. 2 is the circuit diagram of wireless communication module of the present invention;
Fig. 3 is the circuit diagram of power module of the present invention;
Fig. 4 is the flow chart of encryption method of the present invention;
Fig. 5 is the flow chart of decryption method of the present invention;
In figure:1 be central controller, 2 be data acquisition module, 3 be power module, 4 be wireless communication module, 5 be encryption meter Calculation machine, 6 be decryption computer, 7 be certificate storage computer, 8 be data verification computer, 9 be data storage computer.
Specific embodiment
As shown in Figure 1 to Figure 3, the present invention provides a kind of encrypting and deciphering system based on certificate chain technology, including setting is being controlled The signal input part of central controller 1 in terminal processed, the central controller 1 is connected with data acquisition module 2, the center The power input of controller 1 is connected with power module 3;
The central controller 1 is connected by conducting wire with wireless communication module 4, and the wireless communication module 4 passes through wireless network It is wirelessly connected respectively with ciphering computer 5, decryption computer 6;
The ciphering computer 5 and the communication port for decrypting computer 6 are connected by on-scene communication bus with server computer, The server computer includes certificate storage computer 7, data verification computer 8, data storage computer 9.
The chip that the wireless communication module 4 uses is amplifier chip U1, the communication that the wireless communication module 4 is arranged Antenna is transmitting antenna E1, and the circuit structure of the wireless communication module 4 is:
The connecting pin of the transmitting antenna E1 and the one end for meeting inductance L1 are connected behind one end of capacitor C1 with one end of capacitor C2, It is grounded after the other end of the other end shunt-wound capacitance C1 of the inductance L1, the other end of the capacitor C2 and one end of connecting resistance R1 It is connected afterwards with triode Q1 base stage;
It is connected behind the other end of the resistance R1 and one end of connecting resistance R2 with one end of resistance R3, the current collection of the triode Q1 It is connected after the other end of pole and connecting resistance R2 with one end of capacitor C4;
One end of other end shunt-wound capacitance C3, one end of resistance R4 of the resistance R3 is followed by 5V input power;
It is grounded behind one end of the other end of the capacitor C3 and connecting resistance R5, the other end of the resistance R4 and connecting resistance R5's is another It is connected behind one end with the base stage of triode Q2;
One end of the other end of the capacitor C4 successively shunt-wound capacitance C5, one end of resistance R6, behind one end of inductance L2 with resistance One end of R7 is connected, and the other end of the resistance R6 is simultaneously grounded after connecing the emitter of triode Q1;
The other end of the capacitor C5 is connected with one end of capacitor C6, the other end of the capacitor C6 and after connecing one end of inductance L3 It is connected with one end of capacitor C7, the collector phase after the other end of the other end shunt-wound capacitance C7 of the inductance L3 with triode Q2 Even;
The other end of the inductance L2 is simultaneously connected after connecing the emitter of triode Q2 with one end of capacitor C10;
It is connected after the other end of the collector shunt-wound capacitance C10 of the triode Q2 with one end of resistance R8, the resistance R8's One end of the other end and connecting resistance R9 are followed by 5V input power;
The other end of the resistance R7 is connected with one end of capacitor C8, one end of the other end shunt-wound capacitance C9 of the capacitor C8, It is connected behind one end of resistance R10 with 5 feet of amplifier chip U1, the other end of the capacitor C9 and the other end of connecting resistance R10 After be grounded;
It is connected behind 6 feet of the amplifier chip U1 and one end of connecting resistance R14 with one end of resistance R15, the resistance R14's Other end ground connection, the other end of the resistance R15 are simultaneously connected after connecing 7 feet of amplifier chip U1 with one end of capacitor C12;
One end of the 8 foot shunt-wound capacitance C11 of the amplifier chip U1 is followed by 5V input power, the other end of the capacitor C11 Ground connection;
It is connected behind 1 foot of the amplifier chip U1 and one end of connecting resistance R13 with central controller 1, the resistance R13 is another The other end of shunt-wound capacitance C12 is held, one end of resistance R11 is followed by 3 feet of amplifier chip U1, the other end of the resistance R11 And the other end of connecting resistance R9, one end of resistance R12 are followed by 2 feet of amplifier chip U1, another termination of the resistance R12 Ground;
4 feet of the amplifier chip U1 are grounded.
The chip that the power module 3 uses is voltage-stablizer U2 and voltage-stablizer U3, the circuit structure of the power module 3 For:
1 foot of the voltage-stablizer U2 and the anode for being connected to electrode capacitance C14 have one end after the anode of electrode capacitance C13 with switch S1 It is connected, another termination attaching plug of the switch S1;
2 feet of the voltage-stablizer U2 and the cathode for being connected to electrode capacitance C14, there is the cathode of electrode capacitance C13, there is bearing for electrode capacitance C15 Pole is grounded after the cathode for having electrode capacitance C16;
3 feet of the voltage-stablizer U2 and the anode for being connected to electrode capacitance C15, have the anode of electrode capacitance C16, are having electrode capacitance C17 just Pole is connected after having the anode of electrode capacitance C18 with 3 feet of voltage-stablizer U3, and 1 foot of the voltage-stablizer U3 is simultaneously connected to electrode capacitance C17's Cathode has the cathode of electrode capacitance C18, there is the cathode of electrode capacitance C19, is grounded after the cathode for having electrode capacitance C20;
2 feet of the voltage-stablizer U3 and the anode for being connected to electrode capacitance C19, there is an anode of electrode capacitance C20, after VCC input power with The power input of central controller 1 is connected.
The model LM358 of the amplifier chip U1;The model 78M05, the voltage-stablizer U3 of the voltage-stablizer U2 Model LM1117.
The encrypting and deciphering system and method for a kind of certificate chain technology provided by the invention, server computer include certificate storage Computer, data verification computer, data storage computer, ciphering computer and decryption computer.Wherein, ciphering computer and It decrypts computer and computer acquisition electronic certificate is stored by certificate;Data verification computer to ownership people carry out authentication, Biometric authentication and certificate verification, it includes that verifying record multicenter storage and verification result multicenter are presented that data, which store computer, Record storage server beyond the clouds will be verified;The electronic certificate and data text to be encrypted that ciphering computer obtains ownership people Part is encrypted by Encryption Algorithm, and ciphering computer and decryption computer and certificate storage computer, data verification calculate Machine, data storage computer are connected by network or wireless communication, realize the network security application of certificate chain technology.
The encryption and decryption controlling terminal that the present invention uses is provided with dedicated wireless communication module, can be with precise and high efficiency to letter It number is received and dispatched, the amplifier chip U1 used can amplify receiving and transmitting signal, and the present invention is additionally provided with individual confession Electric module is battery using power supply, can be that central controller and wireless communication module are mentioned by power module voltage regulator circuit For stable 5V power supply.
Further, the information of the certificate storage calculator memory storage of the certificate chain technology includes:Machine information, biology Information and certificate information;Wherein, machine information includes that cell-phone number, cell phone apparatus IMEI code and identification card number, biological information include Face information, finger print information, voiceprint and iris information etc., certificate information include personal identity card information or enterprise's license letter Breath etc..
Further, the verifying content of the data verification computer of the certificate chain technology includes:Authentication, certificate are tested Card and biometric authentication.Wherein, authentication is verified to ID card information, and certificate verification is audited to electronic certificate Verifying, life assemblage verifying is the unique features using bio-identification, biological to face information, finger print information and iris information etc. Combined information is verified;Multiagent, the multicenter formed by triple verifyings of identity information, certificate information and biological information The validation database of " certificate chain " technology;Authentication, certificate verification and life assemblage verifying, Ke Yishi are carried out by different subjects Now multi-party supervision, guarantee identity privacy and can not tamper;The main gatekeepers of governmental action " certificate chain " technology, have Authoritative and fairness.
Further, the data storage computer storage information of the certificate chain technology includes:Verifying record multicenter is deposited It stores up module and verification result multicenter and module is presented, and shown according to the permission of different role and different application scenarios different Verification result realizes the multicenter storage of verification result;By storing the classification and multi-zone supervision of Cloud Server, formed in mostly The storing process of the heart, multiagent " certificate chain " technology;The storage of verifying record is more advantageous to supervision and tracking, traceable, anti- It distorts with security advantages.
As shown in figure 4, a kind of encryption method of the encrypting and deciphering system of certificate chain technology follows these steps to implement:
(1)Encryption and decryption controlling terminal stores computer request personal electric body from certificate by network or wireless communication technique Part card or business-electronic license;Personal electric identity card is combined random by ID card information and biological information using Encryption Algorithm Number combination generates;Business-electronic license by certificate information, legal person's electronic ID card information, representative authority administrator's electronics ID card information is generated using Encryption Algorithm and random number combination.It participates in encrypting by more certificate centers, forms a kind of card The encryption system of part chain technology;
(2)After storing computer acquisition electronic certificate by certificate, cryptographic operation is carried out in encryption and decryption controlling terminal, is applied open-minded Encryption application function is needed by data verification computer, including:Authentication module, certificate verification module and biometric authentication mould Block;Authentication module mainly verifies ID card information, and certificate verification module mainly verifies enterprise's license etc., Biometric authentication is using the verifying of the life assemblages such as recognition of face, finger print information, iris information and voiceprint;It is verified by multicenter Afterwards, into ciphering computer;
(3)Encryption and decryption controlling terminal connects data by network or wireless communication technique and stores computer, and data store computer The multicenter of the multicenter storage and verification result of realizing verifying record is presented;The multicenter presentation of verification result will be according to angle The permission of color and specific application scenarios show different verification results;
(4)Into encryption and decryption controlling terminal, file or file to be encrypted are uploaded, to file or folder in transmission process Automatic transparent encryption;
(5)Data folder in electronic certificate information and transmission process of the backstage of encryption and decryption controlling terminal by ownership people or File is bound, and by Encryption Algorithm, encryption generates unique identification code;
(6)Into encryption and decryption controlling terminal, encrypted file or file can be downloaded.
As shown in figure 5, a kind of decryption method of the encrypting and deciphering system of certificate chain technology follows these steps to implement:
(1)Encryption and decryption controlling terminal is by network or wirelessly communicates to certificate storage computer sending request, obtains personal electric Identity card or business-electronic license;
(2)After storing computer acquisition electronic certificate by certificate, application uses decryption application function;Decryption application is opened in application It needs to issue in encryption and decryption controlling terminal to data verification computer and request, realize certificate verification, biometric information verification and identity Verifying;
(3)If multicenter is verified, enter decryption computer;Encryption and decryption controlling terminal passes through network or wireless communication and number Checking request is connected and issues according to storage computer, the multicenter of the multicenter storage and verification result of realizing verifying record is in It is existing;
(4)File or file to be decrypted are uploaded into encryption and decryption controlling terminal;
(5)Encryption and decryption controlling terminal decrypts file or file by decipherment algorithm, the electronic certificate information that decryption is obtained It is matched with the certificate information of certificate storage computer;
(6)If matching is consistent, successful decryption, can be downloaded into encryption and decryption controlling terminal according to the operating right to file, It checks, online reading file.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, those skilled in the art should understand that:Its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (3)

1. the encrypting and deciphering system based on certificate chain technology, it is characterised in that:Including the central controller being arranged in controlling terminal (1), the central controller(1)Signal input part and data acquisition module(2)It is connected, the central controller(1)Electricity Source input terminal and power module(3)It is connected;
The central controller(1)Pass through conducting wire and wireless communication module(4)It is connected, the wireless communication module(4)Pass through nothing Gauze network respectively with ciphering computer(5), decryption computer(6)It is wirelessly connected;
The ciphering computer(5)With decryption computer(6)Communication port pass through on-scene communication bus and server computer It is connected, the server computer includes certificate storage computer(7), data verification computer(8), data store computer (9).
2. the application method of the encrypting and deciphering system based on certificate chain technology, it is characterised in that:Including cryptographic operation and decryption oprerations;
Steps are as follows for the cryptographic operation of the encrypting and deciphering system of the certificate chain technology:
Step 1:User or business entity open encryption application function using encryption and decryption controlling terminal application;
Step 2:Computer is stored from certificate by network using encryption and decryption controlling terminal(7)Request personal electric identity Card or business-electronic license;The personal electric identity card is combined by ID card information and biological information using Encryption Algorithm random Number combination generates;The business-electronic license by certificate information, legal person's electronic ID card information, representative authority administrator Electronic ID card information is generated using Encryption Algorithm and random number combination;
Step 3:Computer is stored by certificate(7)After obtaining electronic certificate, user or business entity are in encryption and decryption controlling terminal Cryptographic operation is carried out, is needed using encryption application function by data verification computer(8)Verifying, including authentication, certificate Verifying and biometric authentication;ID card information is verified in the authentication, the certificate verification to enterprise's certificate information into Row verifying, the biometric authentication are tested using the combination of the biological informations such as recognition of face, finger print information, iris information and voiceprint Card;Enterprise needs to verify enterprise's certificate information, and ordinary user needs to verify ID card information;Pass through data verification computer(8) After verifying, data will be uploaded to ciphering computer(5);
Step 4:Computer is stored by network connection data using encryption and decryption controlling terminal(9), the data storage computer (9)The multicenter of the multicenter storage and verification result of realizing verifying record is presented, and the multicenter of verification result is presented basis The permission of user and specific application scenarios show different verification results;
Step 5:User or business entity upload file or file to be encrypted using encryption and decryption controlling terminal, are being transmitted across File or folder automatic transparent is encrypted in journey;
Step 6:Using encryption and decryption controlling terminal by the electronic certificate information and transmission process of ownership people data folder or File is bound, and by high-intensitive Encryption Algorithm, encryption generates unique identification code;
Step 7:User or business entity can download encrypted file or file by using encryption and decryption controlling terminal.
3. the application method of the encrypting and deciphering system according to claim 2 based on certificate chain technology, it is characterised in that:It is described Steps are as follows for the decryption oprerations of the encrypting and deciphering system of certificate chain technology:
Step 1:User or business entity open decryption application function using encryption and decryption controlling terminal application;
Step 2:Computer is stored to certificate by network using encryption and decryption controlling terminal(7)Request is issued, personal electric is obtained Identity card or business-electronic license;
Step 3:Computer is stored by certificate(7)After obtaining electronic certificate, application is opened decryption application and is needed using encryption and decryption Controlling terminal is to data verification computer(8)Request is issued, realizes that the biological informations such as certificate verification, face, fingerprint and iris are tested Card and authentication;
Step 4:If data verification computer(8)It is verified, then permits user or business entity and decryption computer is established and connected It connects;Computer is stored by network and data using encryption and decryption controlling terminal(5)It establishes connection and issues checking request, realization is tested The multicenter storage of card record and the multicenter of verification result are presented;
Step 5:User or business entity upload file or file to be decrypted using encryption and decryption controlling terminal;
Step 6:File or file are decrypted by decipherment algorithm using encryption and decryption controlling terminal, the electronics that decryption is obtained Certificate information and certificate store computer(7)Interior certificate information is matched;
Step 7:If matching is consistent, successful decryption, user or business entity use encryption and decryption controlling terminal according to file Operating right is downloaded, checks, online reading.
CN201811039039.9A 2018-09-06 2018-09-06 Encryption and decryption system based on certificate chain technology and application method thereof Active CN108875398B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811039039.9A CN108875398B (en) 2018-09-06 2018-09-06 Encryption and decryption system based on certificate chain technology and application method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811039039.9A CN108875398B (en) 2018-09-06 2018-09-06 Encryption and decryption system based on certificate chain technology and application method thereof

Publications (2)

Publication Number Publication Date
CN108875398A true CN108875398A (en) 2018-11-23
CN108875398B CN108875398B (en) 2023-06-09

Family

ID=64323236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811039039.9A Active CN108875398B (en) 2018-09-06 2018-09-06 Encryption and decryption system based on certificate chain technology and application method thereof

Country Status (1)

Country Link
CN (1) CN108875398B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210414A (en) * 2019-06-05 2019-09-06 北京京投信安科技发展有限公司 The quick intersection identification technology of magnanimity face database

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1365474A (en) * 2000-02-02 2002-08-21 索尼公司 Authentication system
CN1939061A (en) * 2004-03-31 2007-03-28 松下电器产业株式会社 Reception device, transmission device, security module, and digital right management system
CN101075316A (en) * 2007-06-25 2007-11-21 陆航程 Method for managing electronic ticket trade certification its carrier structure, system and terminal
CN101521665A (en) * 2008-02-28 2009-09-02 株式会社日立制作所 Authentication device, biological information management apparatus, authentication system and authentication method
CN102034099A (en) * 2010-12-09 2011-04-27 山东神思电子技术有限公司 Client certificate and field information authentication, comparison and retention system and working method thereof
CN102306305A (en) * 2011-07-06 2012-01-04 北京航空航天大学 Method for authenticating safety identity based on organic characteristic watermark
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
US20150341370A1 (en) * 2014-02-25 2015-11-26 Sal Khan Systems and methods relating to the authenticity and verification of photographic identity documents
US20160012445A1 (en) * 2011-11-10 2016-01-14 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions
CN106209766A (en) * 2016-06-16 2016-12-07 山西特信环宇信息技术有限公司 The bidirectional applications platform of a kind of mobile phone and method
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107066893A (en) * 2017-02-28 2017-08-18 腾讯科技(深圳)有限公司 The treating method and apparatus of accounts information in block chain
US20170250972A1 (en) * 2016-02-29 2017-08-31 Troy Jacob Ronda Systems and methods for distributed identity verification
CN107704912A (en) * 2017-09-28 2018-02-16 山西特信环宇信息技术有限公司 A kind of electronic certificate system and operating method based on biological identification technology
CN107730251A (en) * 2017-09-28 2018-02-23 山西特信环宇信息技术有限公司 Cash in banks electronics based on biological identification technology draws system and operating method

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1365474A (en) * 2000-02-02 2002-08-21 索尼公司 Authentication system
CN1939061A (en) * 2004-03-31 2007-03-28 松下电器产业株式会社 Reception device, transmission device, security module, and digital right management system
CN101075316A (en) * 2007-06-25 2007-11-21 陆航程 Method for managing electronic ticket trade certification its carrier structure, system and terminal
CN101521665A (en) * 2008-02-28 2009-09-02 株式会社日立制作所 Authentication device, biological information management apparatus, authentication system and authentication method
CN102034099A (en) * 2010-12-09 2011-04-27 山东神思电子技术有限公司 Client certificate and field information authentication, comparison and retention system and working method thereof
CN102306305A (en) * 2011-07-06 2012-01-04 北京航空航天大学 Method for authenticating safety identity based on organic characteristic watermark
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
US20160012445A1 (en) * 2011-11-10 2016-01-14 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), methods and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without nfc component and system, with cellular/satellite phone/internet/multi-media functions
US20150341370A1 (en) * 2014-02-25 2015-11-26 Sal Khan Systems and methods relating to the authenticity and verification of photographic identity documents
US20170250972A1 (en) * 2016-02-29 2017-08-31 Troy Jacob Ronda Systems and methods for distributed identity verification
CN106209766A (en) * 2016-06-16 2016-12-07 山西特信环宇信息技术有限公司 The bidirectional applications platform of a kind of mobile phone and method
CN107066893A (en) * 2017-02-28 2017-08-18 腾讯科技(深圳)有限公司 The treating method and apparatus of accounts information in block chain
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN107704912A (en) * 2017-09-28 2018-02-16 山西特信环宇信息技术有限公司 A kind of electronic certificate system and operating method based on biological identification technology
CN107730251A (en) * 2017-09-28 2018-02-23 山西特信环宇信息技术有限公司 Cash in banks electronics based on biological identification technology draws system and operating method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
文炜,温斌: "SCDMA无线数字集群系统安全与信息保护", no. 07, pages 26 - 30 *
胡卫;吴邱涵;刘胜利;付伟;: "基于国密算法和区块链的移动端安全eID及认证协议设计", no. 07, pages 13 - 21 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210414A (en) * 2019-06-05 2019-09-06 北京京投信安科技发展有限公司 The quick intersection identification technology of magnanimity face database

Also Published As

Publication number Publication date
CN108875398B (en) 2023-06-09

Similar Documents

Publication Publication Date Title
US9054873B2 (en) Compact security device with transaction risk level approval capability
CN107800725B (en) Remote online management device and method for digital certificates
WO2017177435A1 (en) Identity authentication method, terminal and server
US20140093144A1 (en) More-Secure Hardware Token
JP2018532301A (en) User authentication method and apparatus
CN109583219A (en) A kind of data signature, encryption and preservation method, apparatus and equipment
CN105164689A (en) User authentication
CN109150535A (en) A kind of identity identifying method, equipment, computer readable storage medium and device
CN109067766A (en) A kind of identity identifying method, server end and client
WO2007067349A1 (en) Single one-time password token with single pin for access to multiple providers
CN103001773A (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
CN102685093A (en) Mobile-terminal-based identity authentication system and method
WO2017032179A1 (en) Fingerprint security element (se) module and payment verification method
KR20110140122A (en) Methods for producing products which contain certificates and keys
CN105207776A (en) Fingerprint authentication method and system
CN104935441A (en) Authentication method and relevant devices and systems
CN107517217A (en) A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN105205944A (en) Self-service deposit and withdrawal system based on intelligent terminal
CN112507300A (en) Electronic signature system based on eID and electronic signature verification method
CN108989038A (en) It is a kind of for the identification equipment of geographic position authentication, system and method
CN107104792B (en) Portable mobile password management system and management method thereof
CN108875398A (en) Encrypting and deciphering system and its application method based on certificate chain technology
CN203104483U (en) Fingerprint authentication platform and NFC application terminal
KR20220075723A (en) Personal authentication method and system using decentralized identifiers
CN107888376A (en) NFC Verification Systems based on quantum communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant