CN111368308A - Image acquisition device, server, control method of encryption system, and control device - Google Patents

Image acquisition device, server, control method of encryption system, and control device Download PDF

Info

Publication number
CN111368308A
CN111368308A CN201811591821.1A CN201811591821A CN111368308A CN 111368308 A CN111368308 A CN 111368308A CN 201811591821 A CN201811591821 A CN 201811591821A CN 111368308 A CN111368308 A CN 111368308A
Authority
CN
China
Prior art keywords
key
server
encrypted
image data
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811591821.1A
Other languages
Chinese (zh)
Inventor
马铮
周晔
张耀强
谌章义
吕国斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sgsg Science & Technology Co ltd Zhuhai
Original Assignee
Sgsg Science & Technology Co ltd Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sgsg Science & Technology Co ltd Zhuhai filed Critical Sgsg Science & Technology Co ltd Zhuhai
Priority to CN201811591821.1A priority Critical patent/CN111368308A/en
Publication of CN111368308A publication Critical patent/CN111368308A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention discloses a control method and a control device of an image acquisition device, a control method and a control device of a server, a control method and a control device of a security encryption system. The image acquisition device is used for acquiring image data, and the control method comprises the following steps: acquiring a first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key; encrypting the image data using the first key. The control method and the control device of the image acquisition device, the control method and the control device of the server, the control method and the control device of the security encryption system, and the control method and the control device of the security encryption system encrypt the image data by using the first key, so that the encrypted image data can be transmitted in a ciphertext form, the possibility of intercepting or replacing the image data is reduced, and the security of the image acquisition device is improved.

Description

Image acquisition device, server, control method of encryption system, and control device
Technical Field
The present invention relates to information security technologies, and in particular, to a method and an apparatus for controlling an image capturing apparatus, a method and an apparatus for controlling a server, and a method and an apparatus for controlling a security encryption system.
Background
At present, cameras are widely used in daily life of people. However, since the image data collected by the camera is transmitted in the form of plaintext, there is a possibility that the image data is intercepted or replaced, which presents a great security risk.
Disclosure of Invention
The embodiment of the invention provides a control method and a control device of an image acquisition device, a control method and a control device of a server, a control method and a control device of a security encryption system and a control device of the security encryption system.
The control method of an embodiment of the present invention may be applied to an image acquisition apparatus for acquiring image data, the control method including: acquiring a first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key; encrypting the image data using the first key.
The control device of the embodiment of the invention can be used for an image acquisition device for acquiring image data, and comprises a first acquisition module and a first processing module. The first obtaining module is used for obtaining a first secret key, the first secret key is stored in an encrypted mode through a second secret key, and the second secret key is stored in an encrypted mode through a third secret key. The first processing module is configured to encrypt the image data using the first key.
The control method of an embodiment of the present invention may be applied to a server that communicates with an image acquisition apparatus for acquiring image data and encrypting the image data with a first key, the control method including: acquiring the first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key; and receiving the encrypted image data and decrypting the encrypted image data by using the first key to obtain the image data.
The control device of the embodiment of the present invention may be used for a server that communicates with an image acquisition device for acquiring image data and encrypting the image data with a first key, and the control device includes a second acquisition module and a second processing module. The second obtaining module is used for obtaining the first secret key, the first secret key is stored in an encrypted mode through a second secret key, and the second secret key is stored in an encrypted mode through a third secret key. The second processing module is used for receiving the encrypted image data and decrypting the encrypted image data by using the first key to obtain the image data.
The control method of an embodiment of the present invention may be applied to a secure encryption system including an image acquisition apparatus and a server, the server communicating with the image acquisition apparatus, the image acquisition apparatus being configured to acquire image data, the control method including: controlling the image acquisition device to acquire a first key, wherein the first key is stored in the image acquisition device in an encrypted manner by a second key, and the second key is stored in the image acquisition device in an encrypted manner by a third key; controlling the image acquisition device to encrypt the image data by using the first key; controlling the server to acquire the first key, wherein the first key is stored in the server in an encrypted manner through the second key, and the second key is stored in the server in an encrypted manner through the third key; and controlling the server to receive the encrypted image data and decrypt the image data by using the first key to obtain the image data.
The control device according to the embodiment of the present invention may be used in a secure encryption system including an image acquisition device and a server, the server communicating with the image acquisition device, the image acquisition device being configured to acquire image data, the control device including a first acquisition module, a first processing module, a second acquisition module, and a second processing module. The first obtaining module is used for controlling the image obtaining device to obtain a first key, the first key is stored in the image obtaining device in an encrypted mode through a second key, and the second key is stored in the image obtaining device in an encrypted mode through a third key. The first processing module is used for controlling the image acquisition device to encrypt the image data by using the first key. The second obtaining module is configured to control the server to obtain the first key, where the first key is stored in the server in an encrypted manner by the second key, and the second key is stored in the server in an encrypted manner by the third key. The second processing module is used for controlling the server to receive the encrypted image data and decrypt the encrypted image data by using the first key to obtain the image data.
The control method and the control device of the image acquisition device, the control method and the control device of the server, the control method and the control device of the security encryption system of the embodiment of the invention encrypt the image data by using the first key, so that the encrypted image data can be transmitted in a ciphertext form, the possibility of intercepting or replacing the image data is reduced, and the security of the image acquisition device is improved. In addition, the first key is stored in an encrypted manner by the second key, and the second key is stored in an encrypted manner by the third key, so that the first key is difficult to crack, and the security of the transmission of the image data can be further ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flow diagram illustrating a method for controlling a secure encryption system in accordance with some embodiments of the present invention.
Fig. 2 is a schematic diagram of a secure encryption system in accordance with certain embodiments of the present invention.
Fig. 3 is a schematic diagram of a control device of a secure encryption system in accordance with certain embodiments of the present invention.
Fig. 4 is a flow chart illustrating a method of controlling a secure encryption system according to some embodiments of the present invention.
Fig. 5 is a schematic diagram of a control device of a secure encryption system in accordance with certain embodiments of the present invention.
Fig. 6 is a schematic diagram of multi-layer key protection in some embodiments of the invention.
Fig. 7 is a flow chart illustrating a method of controlling a secure encryption system according to some embodiments of the present invention.
Fig. 8 is a schematic diagram of a control device of a secure encryption system in accordance with certain embodiments of the present invention.
Fig. 9 is a flow chart illustrating a method for controlling a secure encryption system according to some embodiments of the present invention.
Fig. 10 is a schematic diagram of a control device of a secure encryption system in accordance with certain embodiments of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
Referring to fig. 1 and fig. 2, the control method according to the embodiment of the present invention may be used in the secure encryption system 100. The secure encryption system 100 includes an image acquisition apparatus 10 and a server 20, the server 20 communicating with the image acquisition apparatus 10, the image acquisition apparatus 10 being used for acquiring image data. The control method comprises the following steps:
012: controlling the image acquisition device 10 to acquire a first key, wherein the first key is stored in the image acquisition device 10 in an encrypted manner by a second key, and the second key is stored in the image acquisition device 10 in an encrypted manner by a third key;
014: controlling the image acquisition apparatus 10 to encrypt the image data with the first key;
016: the control server 20 acquires a first key, the first key is stored in the server 20 by being encrypted by a second key, and the second key is stored in the server 20 by being encrypted by a third key;
018: the control server 20 receives the encrypted image data and decrypts it with the first key to obtain the image data.
Referring to fig. 2 and 3, the control device 30 according to the embodiment of the present invention may be used in the secure encryption system 100. The secure encryption system 100 includes an image acquisition apparatus 10 and a server 20, the server 20 communicating with the image acquisition apparatus 10, the image acquisition apparatus 10 being used for acquiring image data. The control device 30 includes a first acquisition module 302, a first processing module 304, a second acquisition module 306, and a second processing module 308. The first obtaining module 302 is configured to control the image obtaining apparatus 10 to obtain a first key, where the first key is stored in the image obtaining apparatus 10 encrypted by a second key, and the second key is stored in the image obtaining apparatus 10 encrypted by a third key. The first processing module 304 is used to control the image acquisition apparatus 10 to encrypt image data with a first key. The second obtaining module 306 is configured to control the server 20 to obtain the first key, where the first key is stored in the server 20 by being encrypted by the second key, and the second key is stored in the server 20 by being encrypted by the third key. The second processing module 308 is configured to control the server 20 to receive the encrypted image data and decrypt the encrypted image data with the first key to obtain the image data.
That is, the control method according to the embodiment of the present invention may be implemented by the control device 30 according to the embodiment of the present invention, wherein step 012 may be implemented by the first acquiring module 302, step 014 may be implemented by the first processing module 304, step 016 may be implemented by the second acquiring module 306, and step 018 may be implemented by the second processing module 308.
The control method of the secure encryption system 100 and the control device 30 thereof according to the embodiment of the present invention encrypt the image data using the first key, so that the encrypted image data can be transmitted in a form of a ciphertext, and the possibility of capturing or replacing the image data is reduced, thereby improving the security of the image capturing apparatus 10. In addition, the first key is stored in an encrypted manner by the second key, and the second key is stored in an encrypted manner by the third key, so that the first key is difficult to crack, and the security of the transmission of the image data can be further ensured.
The image capturing device 10 according to the embodiment of the present invention may be a camera, a mobile phone, a computer, etc., and is not particularly limited herein.
In some embodiments, the first key is protected by two layers of keys to improve the security of the key: the first key is protected by a second key and the second key is protected by a third key.
In some embodiments, the first key is protected by a three-layer key to improve the security of the key: the first key is protected by a second key, the third key comprises the second key, and the third key is protected by a fourth key.
Specifically, referring to fig. 4, in some embodiments, the control method further includes:
022: the control server 20 generates a fourth key, a third key, a second key and a first key;
024: the control server 20 encrypts a fourth key with a fifth key, encrypts a third key with the fourth key, encrypts a second key with the third key, and encrypts the first key with the second key, wherein the fifth key is stored in advance in the server 20 and the image acquisition apparatus 10;
0262: controlling the image acquisition device 10 to receive the encrypted fourth key and decrypt the fourth key by using the fifth key, and storing the fourth key to replace the fifth key after the decryption is passed;
0264: controlling the image acquisition device 10 to receive the encrypted third key, decrypt the third key by using a fourth key, and encrypt and store the third key by using the fourth key after the decryption is passed;
0266: controlling the image acquisition device 10 to receive the encrypted second key, decrypt the second key by using a third key, and encrypt and store the second key by using the third key after the decryption is passed;
0268: controlling the image acquisition device 10 to receive the encrypted first key and decrypt the first key by using the second key, and storing the first key by using the second key after the decryption is passed;
028: after the image capturing apparatus 10 stores the fourth key, the third key, the second key, and the first key, the control server 20 stores the fourth key in place of the fifth key, stores the third key encrypted with the fourth key, stores the second key encrypted with the third key, and stores the first key encrypted with the second key.
Referring to fig. 5, in some embodiments, the control device 30 further includes a generating module 312, a third processing module 314, a fourth processing module 316, and a fifth processing module 318. The generating module 312 is used for controlling the server 20 to generate the fourth key, the third key, the second key and the first key. The third processing module 314 is configured to control the server 20 to encrypt a fourth key with a fifth key, encrypt a third key with the fourth key, encrypt a second key with the third key, and encrypt the first key with the second key, where the fifth key is stored in advance in the server 20 and the image capturing apparatus 10. The fourth processing module 316 is configured to control the image obtaining apparatus 10 to receive the encrypted fourth key and perform decryption by using the fifth key, and store the fourth key to replace the fifth key after the decryption is passed. The fourth processing module 316 is further configured to control the image obtaining apparatus 10 to receive the encrypted third key, perform decryption by using the fourth key, and store the third key after the decryption is passed by using the fourth key. The fourth processing module 316 is further configured to control the image obtaining apparatus 10 to receive the encrypted second key, perform decryption by using the third key, and store the second key after the decryption is passed by using the third key. The fourth processing module 316 is further configured to control the image obtaining apparatus 10 to receive the encrypted first key, perform decryption using the second key, and store the first key after the decryption is passed and the encryption using the second key. The fifth processing module 318 is configured to, after the image capturing apparatus 10 stores the fourth key, the third key, the second key and the first key, control the server 20 to store the fourth key in place of the fifth key, to store the third key by encrypting with the fourth key, to store the second key by encrypting with the third key, and to store the first key by encrypting with the second key.
That is, step 022 may be implemented by the generating module 312, step 024 may be implemented by the third processing module 314, steps 0262, 0264, steps 0266 and 0268 may be implemented by the fourth processing module 316, and step 028 may be implemented by the fifth processing module 318.
Referring to fig. 6, in particular, the first key may be referred to as a data encryption key, the second key may be referred to as a protection key, the third key may be referred to as a master key, the fourth key may be referred to as a new initial key, and the fifth key may be referred to as an initial key. The image capturing apparatus 10 is shipped from a factory with an initial key fixedly burned in a storage element thereof, and the server 20 also stores the initial key in advance. The server may generate a new initial key (e.g., randomly generate a string of data as the new initial key), encrypt the new initial key with the initial key and send the encrypted new initial key to the image capturing apparatus 10, where the encryption may be performed by using any encryption and decryption algorithm when encrypting the new initial key. In addition, in order to ensure the integrity of data transmission, data verification may be performed after encrypting the new initial key. After receiving the encrypted new initial key, the image capturing device 10 uses the initial key and performs decryption with a corresponding encryption/decryption algorithm to obtain the new initial key, and if the decryption is successful and the verification passes, the image capturing device 10 may store the new initial key to replace the initial key, and at this time, the new initial key generated by the server 20 is valid, so the server 20 may also store the new initial key to replace the initial key. Because the initial key is a common agreed key generally, the problem of information insecurity caused by the leakage of the initial key can be effectively avoided by replacing the initial key with a new initial key. Of course, in some embodiments, the new initial key may not be used to replace the initial key, and is not limited in this regard.
The server 20 may generate a master key (e.g., randomly generate a string of data as the master key), and then encrypt the master key with the new initial key and send the encrypted master key to the image capturing device 10, where the encryption of the master key may be performed using any encryption/decryption algorithm. In addition, in order to ensure the integrity of data transmission, data verification can be performed after the master key is encrypted. After receiving the encrypted master key, the image capturing apparatus 10 decrypts the master key by using the new initial key and using the corresponding encryption/decryption algorithm to obtain the master key, and if the decryption is successful and the verification passes, the image capturing apparatus 10 may encrypt and store the master key by using the new initial key, where the master key generated by the server 20 is valid, and therefore, the server 20 may also encrypt and store the master key by using the new initial key.
The server 20 may generate a protection key (e.g., randomly generate a string of data as the protection key), and then encrypt the protection key with the master key and transmit the encrypted protection key to the image capturing apparatus 10, where the encryption of the protection key may be performed by using any encryption/decryption algorithm. In addition, in order to ensure the integrity of data transmission, data verification can be performed after the protection key is encrypted. After receiving the encrypted protection key, the image capturing apparatus 10 decrypts the protection key by using the master key and using the corresponding encryption/decryption algorithm to obtain the protection key, and if the decryption is successful and the verification passes, the image capturing apparatus 10 may encrypt and store the protection key by using the master key, where the protection key generated by the server 20 is valid, and therefore, the server 20 may also encrypt and store the protection key by using the master key. In addition, the server 20 may also generate a command security key, and the encryption, transmission, and storage manners of the command security key are the same as those of the protection key, which will not be described herein again. The command security key may be used to encrypt the code in the image capture device 10 to ensure the security of the code.
The server 20 may generate a data encryption key (e.g., randomly generate a string of data as the data encryption key), and then encrypt the data encryption key using a protection key and transmit the encrypted data encryption key to the image capturing apparatus 10, wherein the data encryption key may be encrypted using any encryption/decryption algorithm. In addition, in order to ensure the integrity of data transmission, data verification can be performed after the data encryption key is encrypted. After receiving the encrypted data encryption key, the image capturing device 10 decrypts the encrypted data encryption key by using the protection key and using the corresponding encryption/decryption algorithm to obtain the data encryption key, and if the decryption succeeds and the verification passes, the image capturing device 10 may encrypt the stored data encryption key by using the protection key, where the data encryption key generated by the server 20 is valid, and therefore, the server 20 may also encrypt the stored data encryption key by using the protection key. In addition, the server 20 may also generate an authentication key, and the encryption, transmission, and storage of the authentication key are the same as the data encryption key, which is not described herein again. The authentication key may be used for authentication between the image acquisition apparatus 10 and the server 20.
In some embodiments, the new initial key, the master key, the protection key, and the data encryption key are transmitted in a time-sharing manner in the order of the new initial key, the master key, the protection key, and the data encryption key.
In some embodiments, the new initial key, master key, protection key, and data encryption key are updated on a periodic basis, such as once every week, once every month, etc., to further reduce the likelihood of key cracking.
Step 022, step 024, step 0262, step 0264, step 0266, step 0268, and step 028 may be performed prior to step 012.
In some embodiments, the first key may also be protected by more than three layers of keys to improve the security of the key, and the specific method may be obtained by analogy with the above method, and is not described herein again.
The embodiment of the invention ensures the security of the key storage through multi-layer (two or more layers) key protection, and avoids the key from being easily cracked and read when the plaintext is stored.
Referring to fig. 7, in some embodiments, the control method further includes:
032: the control server 20 encrypts handshake information data by using a fifth key to obtain ciphertext handshake information data, wherein the handshake information data comprises product information, and the server 20 and the image acquisition device 10 both store the fifth key in advance;
034: the control server 20 sends the ciphertext handshake information data to the image acquisition device 10;
036: controlling the image obtaining device 10 to receive the ciphertext handshake information data and decrypt the ciphertext handshake information data by using the fifth key to obtain the handshake information data;
038: controlling the image obtaining apparatus 10 to determine whether the handshake information data is legitimate;
042: controlling the image obtaining apparatus 10 to encrypt the product information using the fifth key and transmit the encrypted product information to the server 20 when the handshake information data is legitimate;
044: the control server 20 decrypts the product information to determine whether the product information is legal, and if the product information is legal, it is confirmed that the mutual authentication between the server 20 and the image acquisition apparatus 10 is passed.
Referring to fig. 8, in some embodiments, the control device 30 further includes a sixth processing module 322, a first sending module 324, a seventh processing module 326, a first determining module 328, an eighth processing module 332, and a second determining module 334. The sixth processing module 322 is configured to control the server 20 to encrypt handshake information data by using the fifth key to obtain ciphertext handshake information data, where the handshake information data includes product information, and the server 20 and the image acquisition apparatus 10 both store the fifth key in advance. The first sending module 324 is configured to control the server 20 to send the ciphertext handshake information data to the image obtaining apparatus 10. The seventh processing module 326 is configured to control the image obtaining apparatus 10 to receive the ciphertext handshake information data and decrypt the ciphertext handshake information data with the fifth key to obtain the handshake information data. The first determining module 328 is used for controlling the image acquiring apparatus 10 to determine whether the handshake information data is legal. The eighth processing module 332 is configured to control the image acquisition apparatus 10 to encrypt the product information by using the fifth key when the handshake information data is legal and send the encrypted product information to the server 20. The second determining module 334 is configured to control the server 20 to decrypt the product information and determine whether the product information is legal, and when the product information is legal, confirm that the mutual authentication between the server 20 and the image capturing apparatus 10 is passed.
That is, step 032 may be implemented by the sixth processing module 322, step 034 may be implemented by the first sending module 324, step 036 may be implemented by the seventh processing module 326, step 038 may be implemented by the first determining module 328, step 042 may be implemented by the eighth processing module 332, and step 044 may be implemented by the second determining module 334.
Specifically, the handshake information data includes, for example, a time factor, which refers to time information of the server 20, generation data, which may be generated by the server 20 according to a preset algorithm, and product information, which may be product information of the image acquisition apparatus 10 to be authenticated, such as a product Serial Number (SN) number of the image acquisition apparatus 10. After the server 20 encrypts the handshake information data using the fifth key to obtain ciphertext handshake information data, the ciphertext handshake information data is transmitted to the image acquisition apparatus 10 to initiate authentication. When the handshake information data is encrypted, any encryption and decryption algorithm can be adopted for encryption.
After receiving the ciphertext handshake information data, the image acquisition apparatus 10 may utilize the fifth key and perform decryption with a corresponding encryption/decryption algorithm to obtain the handshake information data. Judging whether the handshake information data is legal or not, including: whether the difference between the time information of the server 20 and the time information of the image acquisition apparatus 10 is smaller than a time threshold value or not is judged, whether the data generated by the image acquisition apparatus 10 according to a preset algorithm is consistent with the generated data or not is judged, and whether the product information of the image acquisition apparatus 10 is consistent with the product information of the image acquisition apparatus 10 to be authenticated by the server or not is judged. When the difference between the time of the server 20 and the time of the image acquisition apparatus 10 is smaller than the time threshold, it indicates that the handshake information data is data transmitted in real time and is usually not tampered, so that the time factor can be considered to be legal; when the time difference is greater than the time threshold, it indicates that the handshake information data is sent at a longer time interval than the receiving time interval, and the handshake information data may have been tampered, so that the time factor may be considered to be illegal. When the preset algorithm of the image capturing apparatus 10 is identical to the preset algorithm of the server 20, the generated data is identical, and therefore, it can be considered that the generated data is legal, and if the generated data is not identical, the generated data is illegal. When the product information of the image capturing apparatus 10 is identical to the product information of the image capturing apparatus 10 to be authenticated by the server, the product information is legal, and when the product information is not identical, the product information is illegal. In the case where there is an illegal handshake information data (e.g., a time factor is illegal, and/or generation data is illegal, and/or product information is illegal), the authentication between the server 20 and the image acquisition apparatus 10 is considered to be failed.
In the case where all the handshake information data is valid, the image acquisition apparatus 10 may consider the server 20 to be valid, and at this time, the image acquisition apparatus 10 may encrypt its own product information (which may be encrypted using an arbitrary encryption/decryption algorithm) using the fifth key and transmit the encrypted product information to the server 20. The server 20 receives the encrypted product information, decrypts the product information by using a corresponding encryption and decryption algorithm by using a fifth key, determines whether the product information is consistent with the product information in the handshake information data sent before, and if so, indicates that the image acquisition apparatus 10 is the image acquisition apparatus 10 to be authenticated by the server 20, so that the server 20 may consider that the image acquisition apparatus 10 is legal, that is, mutual authentication between the server 20 and the image acquisition apparatus 10 is passed. If not, authentication between the server 20 and the image acquisition apparatus 10 is considered to have failed.
The authentication mode of the embodiment of the invention is initiated by the server 20, so that the authentication can be carried out according to the load of the server 20, and the problem of overlarge load of the server 20 caused by that too many image acquisition devices 10 actively initiate the authentication at the same time is solved. Of course, in other embodiments, the authentication method may be initiated by the image capturing apparatus 10, and is not specifically limited herein.
The authentication between the image capturing apparatus 10 and the server 20 according to the embodiment of the present invention may be performed after the network connection is established between the image capturing apparatus 10 and the server 20. After the image acquisition device 10 and the server 20 are initially connected to each other via a network, authentication is required between the image acquisition device 10 and the server 20, and at this time, the first key, the second key, the third key, and the fourth key are not transmitted and stored, and the key used for authentication is the fifth key (initial key). In the subsequent use process, when the authentication is performed between the image acquisition apparatus 10 and the server 20, the key used is the authentication key, and the manner of performing the authentication by using the authentication key is the same as the manner of performing the authentication by using the fifth key, which is not described herein again.
Referring again to fig. 2, in some embodiments, the secure encryption system 100 includes an operator terminal 40. The image capturing apparatus 10 is connected to an operation terminal 40, and the operation terminal 40 communicates with the server 20. Specifically, the image capturing device 10 may be a camera, and the operation terminal 40 may be a mobile phone, a computer, an Automatic Teller Machine (ATM), and the like. In the prior art, authentication is not performed between the camera and the server 20, so after the operation terminal 40 establishes communication with the server 20, if the camera is replaced at this time, the replaced camera can directly operate, and since the replaced camera may send the acquired image data to an unreliable user terminal or no encryption is performed when sending the image data, the information of the user is unsafe. The camera and the server 20 of the embodiment of the invention can perform mutual authentication, and if the authentication is passed, the camera is legal, so that the image data acquired by the camera is credible, and the image data is transmitted in a key encryption mode, so that the image data is not easy to intercept and crack in the transmission process.
In one embodiment, the image capture device 10 is a camera and the operator terminal 40 is an ATM. In the prior art, the identity of a user can be verified in a face recognition mode, after the identity verification of the user passes, the user can perform operations such as money taking through a bank card and an account number, wherein when the camera is applied to an ATM, face data collected by the camera is generally transmitted to the ATM, then the ATM communicates with a server to verify the identity of the user, if the camera is replaced at the moment, the camera cannot be authenticated in the prior art, so that the conditions that the camera illegally collects and stores the face data of the user exist, and therefore a thief can perform illegal operations on the bank card of the user through the face data illegally collected through the identity verification. The server 20 of the embodiment of the present invention authenticates the camera, and if the authentication is passed, it indicates that the camera is legal, so that it is ensured that the image data collected by the camera is legal, and the image data collected by the camera can be prevented from being illegally used; if the authentication fails, it indicates that the camera is illegal, so the server 20 can notify the ATM that use of the camera is prohibited, or issue an alarm, etc.
Referring to fig. 9, in some embodiments, step 014 includes:
0142: controlling the image acquisition apparatus 10 to sign the image data with the first key, and/or controlling the image acquisition apparatus 10 to encrypt the image data with the first key;
the control method further comprises the following steps:
046: controlling the image acquisition apparatus 10 to transmit the encrypted image data to the server 20;
step 018 includes:
0182: the control server 20 checks and/or decrypts the encrypted image data using the first key to obtain the image data and stores the image data.
Referring to fig. 10, in some embodiments, the first processing module 304 is configured to control the image capturing device 10 to sign the image data with the first key, and/or control the image capturing device 10 to encrypt the image data with the first key. The control device 30 further includes a second sending module 336, and the second sending module 336 is configured to control the image capturing device 10 to send the encrypted image data to the server 20. The second processing module 308 is configured to control the server 20 to check and/or decrypt the encrypted image data with the first key to obtain the image data, and store the image data.
That is, step 0142 may be implemented by the first processing module 304, step 046 may be implemented by the second sending module 336, and step 0182 may be implemented by the second processing module 308.
Specifically, when the image data is signed and verified by using the first key, any encryption and decryption algorithm may be adopted. When the image data is signed with the first key, the product information of the image capturing apparatus 10 may be added to the image data and signed. When the first key is used to encrypt and decrypt the image data, any encryption/decryption algorithm may be used. When the image data is encrypted using the first key, the entire image data may be encrypted. After the image data is signed and/or encrypted by the first key, data verification can be performed to ensure the integrity of data transmission.
In some embodiments, the image acquisition device 10 may sign the image data with the first key and also encrypt the image data. After receiving the encrypted image data, the server 20 checks the encrypted image data with the first key, and if the check passes, for example, the product information of the image acquisition apparatus 10 obtained after the check is a trusted source, the image data is considered to be legal data, and at this time, the image data may be decrypted with the first key and stored; if the signature is not passed, for example, the source of the product information of the image capturing apparatus 10 obtained after the signature verification is unknown, the image data is considered to be illegal data, and the server 20 may refuse to store the image data.
The control method and the control device 30 of the above embodiments may be used to control the image capturing device 10, or may be used to control the server 20. Specifically, part of the steps of the control method of the above embodiment may be performed for controlling the image capturing apparatus 10, and part of the steps may be performed for controlling the server 20; the control device 30 of the above embodiment may be divided into two parts, one part being located in the image capturing device 10 (or in the operation terminal 40 connected to the image capturing device 10), and the other part being located in the server 20. For example, the control device 30 is a processor including two processors, one of which is used in the image capturing device 10 for controlling the image capturing device 10, and the other of which is used in the server 20 for controlling the server 20. The following embodiments expand on the control method and control device 30 of the image capturing apparatus 10, and the control method and control device 30 of the server 20, respectively. It is understood that a person skilled in the art can make simple modifications to the control method and the control device 30 of the above embodiment for independently controlling the image capturing device 10 and the server 20, respectively.
In some embodiments, the control method is used for controlling the image capturing device 10, the image capturing device 10 is used for capturing image data, and the control method includes:
012: acquiring a first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key;
014: the image data is encrypted using a first key.
In some embodiments, the control device 30 is configured to control the image capturing device 10, the image capturing device 10 is configured to capture image data, and the control device 30 includes a first capture module 302 and a first processing module 304. The first obtaining module 302 is configured to obtain a first key, where the first key is stored in an encrypted manner by a second key, and the second key is stored in an encrypted manner by a third key. The first processing module 304 is configured to encrypt the image data using a first key.
In some embodiments, the control method is used for controlling the image capturing apparatus 10, the image capturing apparatus 10 is in communication with the server 20, the server 20 is used for generating a fourth key, a third key, a second key and a first key, the server 20 is further used for encrypting the fourth key with a fifth key, encrypting the third key with the fourth key, encrypting the second key with the third key and encrypting the first key with the second key, wherein the server 20 and the image capturing apparatus 10 each store the fifth key in advance, and the control method further comprises:
0262: receiving the encrypted fourth key, decrypting by using the fifth key, and storing the fourth key to replace the fifth key after the decryption is passed;
0264: receiving the encrypted third key, decrypting by using a fourth key, and encrypting and storing the third key by using the fourth key after the decryption is passed;
0266: receiving the encrypted second key, decrypting by using a third key, and encrypting and storing the second key by using the third key after the decryption is passed;
0268: and receiving the encrypted first key, decrypting by using the second key, and encrypting and storing the first key by using the second key after the decryption is passed.
In some embodiments, the control device 30 is configured to control the image capturing device 10, the image capturing device 10 is in communication with the server 20, the server 20 is configured to generate a fourth key, a third key, a second key, and a first key, the server 20 is further configured to encrypt the fourth key with a fifth key, encrypt the third key with the fourth key, encrypt the second key with the third key, and encrypt the first key with the second key, where the fifth key is stored in advance in each of the server 20 and the image capturing device 10, and the control device 30 further includes a fourth processing module 316. The fourth processing module 316 is configured to receive the encrypted fourth key, decrypt the fourth key with the fifth key, and store the fourth key to replace the fifth key after the decryption is passed. The fourth processing module 316 is further configured to receive the encrypted third key, decrypt the third key with the fourth key, and store the third key after decryption is passed and encrypted with the fourth key. The fourth processing module 316 is further configured to receive the encrypted second key, decrypt the second key with the third key, and store the second key after decryption is passed and encrypted with the third key. The fourth processing module 316 is further configured to receive the encrypted first key, decrypt the encrypted first key with the second key, and store the encrypted first key after decryption is performed with the second key.
In some embodiments, the control method is used to control the image acquiring apparatus 10, the image acquiring apparatus 10 communicates with the server 20, the server 20 and the image acquiring apparatus 10 both store a fifth key in advance, the server 20 is used to encrypt handshake information data by using the fifth key to obtain ciphertext handshake information data, the handshake information data includes product information, and the control method further includes:
036: receiving the ciphertext handshake information data and decrypting by using a fifth key to obtain the handshake information data;
038: judging whether the handshake information data is legal or not;
042: when the handshake information data is legal, the fifth key is used for encrypting the product information and sending the encrypted product information to the server 20, and the server 20 is used for decrypting to obtain the product information and judging whether the product information is legal or not.
In some embodiments, the control device 30 is configured to control the image obtaining device 10, the image obtaining device 10 is in communication with the server 20, the server 20 and the image obtaining device 10 both store a fifth key in advance, the server 20 is configured to encrypt handshake information data by using the fifth key to obtain ciphertext handshake information data, the handshake information data includes product information, and the control device further includes a seventh processing module 326, a first determining module 328, and an eighth processing module 332. The seventh processing module 326 is configured to receive the ciphertext handshake information data and decrypt the ciphertext handshake information data with the fifth key to obtain the handshake information data. The first determining module 328 is used for determining whether the handshake information data is legal. The eighth processing module 332 is configured to encrypt the product information by using the fifth key when the handshake information data is legal, and send the encrypted product information to the server 20, where the server 20 is configured to decrypt the product information to obtain the product information and determine whether the product information is legal.
In some embodiments, the control method is used for controlling the image capturing apparatus 10, the image capturing apparatus 10 communicates with the server 20, and step 014 includes:
0142: signing the image data with the first key and/or encrypting the image data with the first key;
the control method further comprises the following steps:
046: the encrypted image data is sent to the server 20, and the server 20 is configured to perform signature verification and/or decryption on the encrypted image data by using the first key to obtain the image data and store the image data.
In some embodiments, the control device 30 is configured to control the image capturing device 10, the image capturing device 10 is in communication with the server 20, and the first processing module 304 is configured to sign the image data with a first key and/or encrypt the image data with the first key. The control device 30 further comprises a second sending module 336. The second sending module 336 is configured to send the encrypted image data to the server 20, and the server 20 is configured to perform signature verification and/or decryption on the encrypted image data by using the first key to obtain the image data and store the image data.
In some embodiments, the control method is for controlling the server 20, the server 20 is in communication with the image acquisition apparatus 10, the image acquisition apparatus 10 is for acquiring image data and encrypting the image data with a first key, the control method includes:
016: acquiring a first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key;
018: the encrypted image data is received and decrypted using the first key to obtain the image data.
In some embodiments, the control device 30 is configured to control the server 20, the server 20 is in communication with the image capturing device 10, the image capturing device 10 is configured to capture image data and encrypt the image data with a first key, and the control device 30 includes a second capture module 306 and a second processing module 308. The second obtaining module 306 is configured to obtain a first key, where the first key is stored in an encrypted manner by a second key, and the second key is stored in an encrypted manner by a third key. The second processing module 308 is configured to receive the encrypted image data and decrypt the encrypted image data with the first key to obtain the image data.
In some embodiments, the control method is used for controlling the server 20, and the control method further includes:
022: generating a fourth key, a third key, a second key and a first key;
024: encrypting a fourth key by using a fifth key, encrypting a third key by using the fourth key, encrypting a second key by using the third key, and encrypting the first key by using the second key, wherein the fifth key is stored in advance in the server 20 and the image capturing apparatus 10;
025: sending the encrypted fourth key, the encrypted third key, the encrypted second key and the encrypted first key to the image acquisition device 10, wherein the image acquisition device 10 is configured to decrypt and obtain and store the fourth key, the third key, the second key and the first key;
028: after the image capturing apparatus 10 stores the fourth key, the third key, the second key, and the first key, the control server 20 stores the fourth key in place of the fifth key, stores the third key encrypted with the fourth key, stores the second key encrypted with the third key, and stores the first key encrypted with the second key.
In some embodiments, the control device 30 is used for controlling the server 20, and the control device 30 further includes a generating module 312, a third processing module 314, a third sending module (not shown), and a fifth processing module 318. The generating module 312 is used for generating a fourth key, a third key, a second key and a first key. The third processing module 314 is configured to encrypt a fourth key with a fifth key, encrypt a third key with the fourth key, encrypt a second key with the third key, and encrypt a first key with the second key, where the fifth key is stored in advance in the server 20 and the image capturing apparatus 10. The third sending module is configured to send the encrypted fourth key, the encrypted third key, the encrypted second key, and the encrypted first key to the image obtaining device 10, where the image obtaining device 10 is configured to decrypt and obtain and store the fourth key, the third key, the second key, and the first key. The fifth processing module 318 is configured to, after the image capturing apparatus 10 stores the fourth key, the third key, the second key and the first key, control the server 20 to store the fourth key in place of the fifth key, to store the third key by encrypting with the fourth key, to store the second key by encrypting with the third key, and to store the first key by encrypting with the second key.
In some embodiments, the control method is used for controlling the server 20, and the control method further includes:
032: encrypting the handshake information data by using a fifth key to obtain ciphertext handshake information data, wherein the handshake information data comprises product information, and the fifth key is stored in advance in the server 20 and the image acquisition device 10;
034: sending the ciphertext handshake information data to the image acquisition device 10, where the image acquisition device 10 is configured to receive the ciphertext handshake information data and decrypt the ciphertext handshake information data by using a fifth key to determine whether the handshake information data is legal, encrypt product information by using the fifth key when the handshake information data is legal, and send the encrypted product information to the server 20;
044: the control server 20 decrypts the product information to determine whether the product information is legal, and if the product information is legal, it is confirmed that the mutual authentication between the server 20 and the image acquisition apparatus 10 is passed.
In some embodiments, the control device 30 is used for controlling the server 20, and the control device 30 further includes a sixth processing module 322, a first sending module 324, and a second determining module 334. The sixth processing module 322 is configured to encrypt handshake information data with a fifth key to obtain ciphertext handshake information data, where the handshake information data includes product information, and the server 20 and the image acquisition apparatus 10 both store the fifth key in advance. The first sending module 324 is configured to send the ciphertext handshake information data to the image acquisition device 10, where the image acquisition device 10 is configured to receive the ciphertext handshake information data, decrypt the ciphertext handshake information data with the fifth key to determine whether the handshake information data is legal, encrypt the product information with the fifth key when the handshake information data is legal, and send the encrypted product information to the server 20. The second determining module 334 is configured to control the server 20 to decrypt the product information and determine whether the product information is legal, and when the product information is legal, confirm that the mutual authentication between the server 20 and the image capturing apparatus 10 is passed.
In certain embodiments, the control method is for controlling the server 20, the image acquisition apparatus 10 is for signing and/or encrypting image data with a first key, step 018 comprises:
0182: and verifying and/or decrypting the encrypted image data by using the first key to obtain the image data and storing the image data.
In some embodiments, the control device 30 is configured to control the server 20, the image capturing device 10 is configured to sign and/or encrypt the image data by using the first key, and the second processing module 308 is configured to check and/or decrypt the encrypted image data by using the first key to obtain the image data and store the image data.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A control method of an image acquisition apparatus for acquiring image data, the control method comprising:
acquiring a first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key;
encrypting the image data using the first key.
2. The control method according to claim 1, wherein the image acquisition apparatus communicates with a server, the server is configured to generate a fourth key, the third key, the second key, and the first key, the server is further configured to encrypt the fourth key with a fifth key, encrypt the third key with the fourth key, encrypt the second key with the third key, and encrypt the first key with the second key, wherein the server and the image acquisition apparatus each have the fifth key stored therein in advance, and the control method further comprises:
receiving the encrypted fourth key, decrypting by using the fifth key, and storing the fourth key to replace the fifth key after the decryption is passed;
receiving the encrypted third key, decrypting by using the fourth key, and encrypting and storing the third key by using the fourth key after the decryption is passed;
receiving the encrypted second key, decrypting by using the third key, and encrypting and storing the second key by using the third key after the decryption is passed;
and receiving the encrypted first key, decrypting by using the second key, and encrypting and storing the first key by using the second key after the decryption is passed.
3. The control method according to claim 1, wherein the image acquisition apparatus communicates with a server, the server and the image acquisition apparatus both having the fifth key stored therein in advance, the server being configured to encrypt handshake information data using the fifth key to obtain ciphertext handshake information data, the handshake information data including product information, the control method further comprising:
receiving the ciphertext handshake information data and decrypting by using the fifth key to obtain the handshake information data;
judging whether the handshake information data is legal or not;
and when the handshake information data is legal, encrypting the product information by using the fifth secret key and sending the encrypted product information to a server, wherein the server is used for decrypting to obtain the product information and judging whether the product information is legal or not.
4. The control method according to claim 3, wherein the image acquisition device is connected to an operation terminal, and the operation terminal communicates with the server.
5. The method according to claim 1, wherein the image acquisition apparatus communicating with a server, the encrypting the image data using the first key, comprises:
signing the image data with the first key and/or encrypting the image data with the first key;
the control method further comprises the following steps:
and sending the encrypted image data to the server, wherein the server is used for verifying and/or decrypting the encrypted image data by using the first key to obtain the image data and storing the image data.
6. A control apparatus of an image acquisition apparatus for acquiring image data, the control apparatus comprising:
the first obtaining module is used for obtaining a first secret key, the first secret key is stored in an encrypted mode through a second secret key, and the second secret key is stored in an encrypted mode through a third secret key;
a first processing module to encrypt the image data with the first key.
7. A control method of a server that communicates with an image acquisition apparatus for acquiring image data and encrypting the image data with a first key, the control method comprising:
acquiring the first secret key, wherein the first secret key is stored in an encrypted manner by a second secret key, and the second secret key is stored in an encrypted manner by a third secret key;
and receiving the encrypted image data and decrypting the encrypted image data by using the first key to obtain the image data.
8. A control apparatus of a server that communicates with an image acquisition apparatus for acquiring image data and encrypting the image data with a first key, the control apparatus comprising:
the second obtaining module is used for obtaining the first secret key, the first secret key is stored in an encrypted mode through a second secret key, and the second secret key is stored in an encrypted mode through a third secret key;
and the second processing module is used for receiving the encrypted image data and decrypting the encrypted image data by using the first key to obtain the image data.
9. A control method of a secure encryption system, the secure encryption system including an image acquisition apparatus and a server, the server communicating with the image acquisition apparatus, the image acquisition apparatus being configured to acquire image data, the control method comprising:
controlling the image acquisition device to acquire a first key, wherein the first key is stored in the image acquisition device in an encrypted manner by a second key, and the second key is stored in the image acquisition device in an encrypted manner by a third key;
controlling the image acquisition device to encrypt the image data by using the first key;
controlling the server to acquire the first key, wherein the first key is stored in the server in an encrypted manner through the second key, and the second key is stored in the server in an encrypted manner through the third key;
and controlling the server to receive the encrypted image data and decrypt the image data by using the first key to obtain the image data.
10. A control apparatus of a secure encryption system, the secure encryption system including an image acquisition apparatus and a server, the server communicating with the image acquisition apparatus, the image acquisition apparatus being configured to acquire image data, the control apparatus comprising:
a first obtaining module, configured to control the image obtaining apparatus to obtain a first key, where the first key is stored in the image obtaining apparatus in an encrypted manner by a second key, and the second key is stored in the image obtaining apparatus in an encrypted manner by a third key;
a first processing module for controlling the image acquisition apparatus to encrypt the image data using the first key;
a second obtaining module, configured to control the server to obtain the first key, where the first key is stored in the server in an encrypted manner by the second key, and the second key is stored in the server in an encrypted manner by the third key;
and the second processing module is used for controlling the server to receive the encrypted image data and decrypt the encrypted image data by using the first key to obtain the image data.
CN201811591821.1A 2018-12-25 2018-12-25 Image acquisition device, server, control method of encryption system, and control device Pending CN111368308A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811591821.1A CN111368308A (en) 2018-12-25 2018-12-25 Image acquisition device, server, control method of encryption system, and control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811591821.1A CN111368308A (en) 2018-12-25 2018-12-25 Image acquisition device, server, control method of encryption system, and control device

Publications (1)

Publication Number Publication Date
CN111368308A true CN111368308A (en) 2020-07-03

Family

ID=71209849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811591821.1A Pending CN111368308A (en) 2018-12-25 2018-12-25 Image acquisition device, server, control method of encryption system, and control device

Country Status (1)

Country Link
CN (1) CN111368308A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200387A (en) * 2013-02-16 2013-07-10 北京视博数字电视科技有限公司 Protection method and protection system of surveillance video content
CN107248972A (en) * 2017-03-17 2017-10-13 武汉虹识技术有限公司 Data encryption, decryption method, device and electronic equipment
CN108600196A (en) * 2018-04-04 2018-09-28 广东中星电子有限公司 The encryption method and device and decryption method and device of image

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200387A (en) * 2013-02-16 2013-07-10 北京视博数字电视科技有限公司 Protection method and protection system of surveillance video content
CN107248972A (en) * 2017-03-17 2017-10-13 武汉虹识技术有限公司 Data encryption, decryption method, device and electronic equipment
CN108600196A (en) * 2018-04-04 2018-09-28 广东中星电子有限公司 The encryption method and device and decryption method and device of image

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张建华: "《WEB安全与容侵》", 30 September 2009 *

Similar Documents

Publication Publication Date Title
US20220191012A1 (en) Methods For Splitting and Recovering Key, Program Product, Storage Medium, and System
US8930700B2 (en) Remote device secure data file storage system and method
CN106612180B (en) Method and device for realizing session identification synchronization
CN111756533B (en) System, method and storage medium for secure password generation
EP3324572B1 (en) Information transmission method and mobile device
KR102177848B1 (en) Method and system for verifying an access request
US8171527B2 (en) Method and apparatus for securing unlock password generation and distribution
CN110798315B (en) Data processing method and device based on block chain and terminal
CN110990827A (en) Identity information verification method, server and storage medium
CN113472793B (en) Personal data protection system based on hardware password equipment
KR20140126787A (en) Puf-based hardware device for providing one time password, and method for 2-factor authenticating using thereof
CN117077103A (en) Method for unlocking one device by using the other device
KR102514429B1 (en) Update of biometric data template
US10263782B2 (en) Soft-token authentication system
EP2628133B1 (en) Authenticate a fingerprint image
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN108401494B (en) Method and system for transmitting data
CN110838919B (en) Communication method, storage method, operation method and device
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
JP2022117456A (en) Message transmission system with hardware security module
US11431514B1 (en) Systems for determining authenticated transmissions of encrypted payloads
CN110445774B (en) Security protection method, device and equipment for IoT (Internet of things) equipment
US8261088B2 (en) Secret authentication system
US8355508B2 (en) Information processing apparatus, information processing method, and computer readable recording medium
JP5489913B2 (en) Portable information device and encrypted communication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200703

RJ01 Rejection of invention patent application after publication