CN112564893B - Key transmission method combining circuit domain and IP domain - Google Patents

Key transmission method combining circuit domain and IP domain Download PDF

Info

Publication number
CN112564893B
CN112564893B CN202011140588.2A CN202011140588A CN112564893B CN 112564893 B CN112564893 B CN 112564893B CN 202011140588 A CN202011140588 A CN 202011140588A CN 112564893 B CN112564893 B CN 112564893B
Authority
CN
China
Prior art keywords
key
public key
key server
hash value
equipment end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011140588.2A
Other languages
Chinese (zh)
Other versions
CN112564893A (en
Inventor
姚明月
叶达
刘浩
庞潼川
杨成功
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Core Shield Group Co ltd
Original Assignee
Beijing Core Shield Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Core Shield Group Co ltd filed Critical Beijing Core Shield Group Co ltd
Priority to CN202011140588.2A priority Critical patent/CN112564893B/en
Publication of CN112564893A publication Critical patent/CN112564893A/en
Application granted granted Critical
Publication of CN112564893B publication Critical patent/CN112564893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention discloses a key transmission method combining a circuit domain and an IP domain, which is characterized by comprising the following steps: firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server; step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished; and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission fails at the time, and the receiving end acquires the first public key from the key server again. The invention can effectively increase the difficulty of interception and ensure the safety of the public key by verifying the first public key in the uploading process and verifying the first public key at the end of the receiving equipment which is downloaded.

Description

Key transmission method combining circuit domain and IP domain
Technical Field
The present invention relates to the field of key transmission. More particularly, the present invention relates to a key transmission method combining a circuit domain and an IP domain.
Background
The two communication parties use an asymmetric encryption algorithm to carry out encryption communication, and need to exchange public keys first and then carry out data encryption and decryption in a public key encryption and private key decryption mode. At present, public key exchange generally directly transmits plaintext of a public key or performs simple encryption, and the mode is extremely easy to crack or attack by a man-in-the-middle to cause information leakage.
Disclosure of Invention
An object of the present invention is to solve at least the above problems and to provide at least the advantages described later.
Another object of the present invention is to provide a key transmission method combining a circuit domain and an IP domain, which can effectively increase the difficulty of interception and ensure the security of the public key by verifying the first public key during the uploading process and verifying the first public key at the receiving device end during the downloading process.
To achieve these objects and other advantages in accordance with the present invention, there is provided a key transmission method combining a circuit domain and an IP domain, comprising the steps of:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment end acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at this time is finished;
and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission at the time fails, and the receiving end acquires the first public key from the key server again.
Preferably, the first public key is uploaded to the key server in the step one, and specifically:
a1, a sending equipment end sends a telephone number of the sending equipment end to a key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment end;
a2, the key server sends a first voice call request to the sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server, if not, the voice call is ended and the transmission of the first public key at the current time is ended, if yes, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server, and the voice call is ended.
Preferably, the sending device side in step A1 further sends its ID to the key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call in the step A2 is finished, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to a sending equipment end, and the sending equipment end receives the second PCM voice data and ends voice communication;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server;
and B5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, and if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored.
Preferably, in the second step, the receiving device side obtains the first public key from the key server, and the obtaining method is as follows:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server, if not, the voice call is ended and the acquisition of the first public key is ended, if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data and sends the first PCM voice data to the receiving equipment end, and the voice call is ended.
Preferably, in the third step, the receiving device side verifies the acquired first public key, and the verification method includes:
d1, the key server performs hash operation on the first public key corresponding to the ID of the sending equipment end to obtain a fourth hash value, and uploads the fourth hash value to the receiving equipment end;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
d3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end obtains the first public key again from the key server until the fourth hash value is consistent with the fifth hash value, if yes, the verification is correct, and the key transmission is successful.
The key transmission system combining the circuit domain and the IP domain comprises a sending equipment end, a receiving equipment end and a key server, and is characterized in that the key server comprises:
the server end is respectively connected with the sending equipment end and the receiving equipment end;
and the multimedia switch is connected with the server side, the sending equipment side and the receiving equipment side respectively, and is used for acquiring the PCM data transmitted by the sending equipment side and the receiving equipment side, analyzing the PCM data and transmitting the analyzed PCM data to the server side.
The invention at least comprises the following beneficial effects:
firstly, the invention can effectively increase the difficulty of interception and ensure the safety of the public key by verifying the first public key in the uploading process and verifying the first public key by downloading to the receiving equipment.
Secondly, the invention transmits the public key information by adopting the way of modulating and demodulating the circuit domain voice call, thereby fundamentally avoiding the problem that the IP domain is easy to be attacked by a man-in-the-middle and ensuring the credibility of the public key information.
Thirdly, the invention transmits and verifies the public key through the circuit domain and the IP domain, transmits the public key information by using the circuit domain, and transmits the verification information by using the IP domain, thereby increasing the difficulty of interception and ensuring the safety of the public key.
Fourth, the invention transmits the telephone number of the key server through the IP domain, and the sending equipment end and the receiving equipment end compare the incoming telephone number with the telephone number of the key server, if the incoming telephone number is inconsistent with the key server, the public key transmission is terminated, and the method can effectively avoid the telephone number being falsely used.
Fifth, the first step is to provide a liquid crystal display device.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention.
Drawings
Fig. 1 is a flowchart illustrating uploading of a first public key to a key server according to an embodiment of the present invention;
FIG. 2 is a flowchart of a key server verifying a first public key according to an embodiment of the present invention;
fig. 3 is a flowchart of acquiring a first public key by a receiving device according to one embodiment of the present invention.
Fig. 4 is a flowchart of verifying a first public key by a receiving device according to one embodiment of the present invention.
Fig. 5 is an architecture diagram of a key transmission system according to one embodiment of the present invention.
Detailed Description
The present invention is further described in detail below with reference to examples so that those skilled in the art can practice the invention with reference to the description.
As shown in fig. 1-5, a key transmission method combining a circuit domain and an IP domain includes the following steps:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished;
and step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission fails at the time, and the receiving end acquires the first public key from the key server again.
In the technical scheme, a sending equipment end generates an SM2 public-private key pair comprising a first public key, the private key is stored locally, the sending equipment and a key server jointly verify the first public key obtained by the key server, in a second step, if verification fails, uploading of the first public key is finished, and the sending equipment end regenerates the first public key until verification is correct. By adopting the technical scheme, the first public key is verified in the uploading process and the first public key is verified at the end of the downloading to the receiving equipment, so that the difficulty of interception can be effectively increased, and the safety of the public key is ensured.
In another technical solution, the first public key is uploaded to a key server in step one, and the uploading method specifically includes:
a1, a sending equipment end sends a telephone number of the sending equipment end to a key server through an http interface (IP domain) on the key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment end;
a2, the key server sends a first voice call request to a sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server or not, if not, the voice call is ended and the transmission of the first public key at the time is ended (at the moment, the sending equipment end can generate the first public key again until the first public key is the telephone number of the key server), if so, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server (circuit domain), and the key server receives the first PCM voice data and ends the voice call. By adopting the technical scheme, the invention transmits the public key information by adopting the way of modulating and demodulating the circuit domain voice call, thereby fundamentally avoiding the problem that the IP domain is easy to be attacked by a man-in-the-middle and ensuring the credibility of the public key information.
In another technical solution, in step A1, the sending device side also sends its ID (sending device side ID) to the key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call is finished in the step A2, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to a sending equipment end (circuit domain), and the sending equipment end receives the second PCM voice data and ends the voice call;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server through an http interface on the key server;
and B5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, and if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored. By adopting the technical scheme, the public key transmission and verification are carried out through the circuit domain and the IP domain, the public key information is transmitted by using the circuit domain, and the verification information is transmitted through the IP domain, so that the difficulty of interception is multiplied, and the safety of the public key is ensured.
In another technical solution, in step two, the receiving device side obtains the first public key from the key server, and the obtaining method is:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to a key server through an http interface on the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server or not, if not, the voice call is ended and the acquisition of the first public key is ended (the key server sends the second voice call request to the receiving equipment end again until the second voice call request is the telephone number of the key server), if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data to be sent (circuit domain) to the receiving equipment end, and ends the voice call. By adopting the technical scheme, the telephone number of the key server is transmitted through the IP domain, the sending equipment end and the receiving equipment end both compare the incoming telephone number with the telephone number of the key server, and the public key transmission is stopped if the incoming telephone number is inconsistent with the key server.
In another technical solution, in step three, the receiving device side verifies the acquired first public key, and the verification method includes:
d1, carrying out hash operation on the first public key corresponding to the ID of the sending equipment end by the key server to obtain a fourth hash value, and uploading the fourth hash value to the receiving equipment end through an http interface on the key server;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
and D3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end acquires the first public key from the key server again until the fourth hash value is consistent with the fifth hash value, if so, the verification is correct, and the key transmission is successful. By adopting the technical scheme, the first public key acquired by the receiving equipment is verified, and the accuracy of downloading the public key is improved.
A key transmission system combining a circuit domain and an IP domain comprises a sending device end, a receiving device end and a key server, and is characterized in that the key server comprises:
the server end is respectively connected with the sending equipment end and the receiving equipment end;
and the multimedia switch is connected with the server side, the sending equipment side and the receiving equipment side respectively, and is used for acquiring the PCM data transmitted by the sending equipment side and the receiving equipment side, analyzing the PCM data and transmitting the analyzed PCM data to the server side.
While embodiments of the invention have been described above, it is not intended to be limited to the details shown, described and illustrated herein, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed, and to such extent that such modifications are readily available to those skilled in the art, and it is not intended to be limited to the details shown and described herein without departing from the general concept as defined by the appended claims and their equivalents.

Claims (2)

1. The key transmission method combining the circuit domain and the IP domain is characterized by comprising the following steps:
firstly, a public and private key pair including a first public key is generated at a sending equipment end, and the first public key is uploaded to a key server;
step two, the key server verifies the acquired first public key, if the verification is correct, the receiving equipment side acquires the first public key from the key server, and if the verification fails, the uploading of the first public key at the current time is finished;
step three, the receiving equipment side verifies the acquired first public key, if the verification is correct, the key transmission is successful, if the verification fails, the key transmission at the time fails, and the receiving end acquires the first public key again from the key server;
in the first step, the first public key is uploaded to a key server, which specifically includes:
a1, a sending equipment terminal sends a telephone number of the sending equipment terminal to a key server, and the key server receives and sends the telephone number of the key server to the sending equipment so as to establish voice call connection between the key server and the sending equipment terminal;
a2, the key server sends a first voice call request to a sending equipment end, the sending equipment end receives the first voice call request and judges whether the first voice call request is the telephone number of the key server or not, if not, the voice call is ended and the transmission of the first public key at the current time is ended, if yes, the sending equipment end modulates the first public key into first PCM voice data and sends the first PCM voice data to the key server, and the voice call is ended;
in the step A1, the sending equipment end also sends the ID to a key server;
in the second step, the key server verifies the acquired first public key, and the verification method is as follows:
b1, before the voice call in the step A2 is finished, the key server demodulates the received first PCM voice data into a second public key, then carries out hash operation on the second public key to obtain a second hash value, and then modulates the second hash value into second PCM voice data;
b2, the key server sends the second PCM voice data to the sending equipment end, and the sending equipment end receives the second PCM voice data and ends voice communication;
b3, the sending equipment terminal demodulates the second PCM voice data received by the sending equipment terminal to obtain a third hash value, and meanwhile, the sending equipment terminal performs hash operation on the first public key to obtain a first hash value;
b4, the sending equipment end judges whether the first hash value is consistent with the third hash value, if not, the verification fails, and if so, the sending equipment end uploads the first hash value to the key server;
b5, the key server receives the first hash value and judges whether the first hash value is consistent with the second hash value or not, if not, the verification fails, if so, the verification is correct and the ID, the telephone number and the first public key of the sending equipment end are stored;
in the third step, the receiving device side verifies the acquired first public key, and the verification method is as follows:
d1, the key server performs hash operation on the first public key corresponding to the ID of the sending equipment end to obtain a fourth hash value, and uploads the fourth hash value to the receiving equipment end;
d2, the receiving equipment end receives the fourth hash value, and simultaneously demodulates the first PCM voice data received by the receiving equipment end to obtain a fifth hash value;
and D3, the receiving equipment end judges whether the fourth hash value is consistent with the fifth hash value, if not, the verification fails, the receiving end acquires the first public key from the key server again until the fourth hash value is consistent with the fifth hash value, if so, the verification is correct, and the key transmission is successful.
2. The method for transmitting a key combining a circuit domain and an IP domain according to claim 1, wherein in step two, the receiving device side obtains the first public key from the key server, and the obtaining method is:
c1, the receiving equipment terminal uploads the telephone number of the receiving equipment terminal and the ID of the sending equipment terminal to the key server, and the key server returns the telephone number of the key server to the receiving equipment terminal to establish voice call connection between the key server and the receiving equipment terminal;
and C2, the key server sends a second voice call request to the receiving equipment end, the receiving equipment end receives the second voice call request and judges whether the second voice call request is the telephone number of the key server, if not, the voice call is ended and the acquisition of the first public key is ended, if so, the key server acquires the first public key corresponding to the ID of the sending equipment end based on the ID of the sending equipment end received in the C1, modulates the first public key into first PCM voice data and sends the first PCM voice data to the receiving equipment end, and the voice call is ended.
CN202011140588.2A 2020-10-22 2020-10-22 Key transmission method combining circuit domain and IP domain Active CN112564893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011140588.2A CN112564893B (en) 2020-10-22 2020-10-22 Key transmission method combining circuit domain and IP domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011140588.2A CN112564893B (en) 2020-10-22 2020-10-22 Key transmission method combining circuit domain and IP domain

Publications (2)

Publication Number Publication Date
CN112564893A CN112564893A (en) 2021-03-26
CN112564893B true CN112564893B (en) 2023-02-03

Family

ID=75042835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011140588.2A Active CN112564893B (en) 2020-10-22 2020-10-22 Key transmission method combining circuit domain and IP domain

Country Status (1)

Country Link
CN (1) CN112564893B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764871A (en) * 2009-12-23 2010-06-30 成都三零瑞通移动通信有限公司 Method for encrypting voice to transmit in PSTN network
CN108370318A (en) * 2015-12-21 2018-08-03 万事达卡国际股份有限公司 Method and system for the block chain modification for using digital signature
WO2019110574A1 (en) * 2017-12-04 2019-06-13 Wellness Technology and Media Group Ltd Methods of secure communication
GB201907940D0 (en) * 2019-06-04 2019-07-17 Wellness Tech And Media Group Ltd An encryption process

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019093478A1 (en) * 2017-11-10 2019-05-16 日本電信電話株式会社 Key exchange device, key exchange system, key exchange method, and key exchange program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101764871A (en) * 2009-12-23 2010-06-30 成都三零瑞通移动通信有限公司 Method for encrypting voice to transmit in PSTN network
CN108370318A (en) * 2015-12-21 2018-08-03 万事达卡国际股份有限公司 Method and system for the block chain modification for using digital signature
WO2019110574A1 (en) * 2017-12-04 2019-06-13 Wellness Technology and Media Group Ltd Methods of secure communication
GB201907940D0 (en) * 2019-06-04 2019-07-17 Wellness Tech And Media Group Ltd An encryption process

Also Published As

Publication number Publication date
CN112564893A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US8046583B2 (en) Wireless terminal
CN108650227B (en) Handshaking method and system based on datagram secure transmission protocol
CN110602703B (en) Bluetooth communication data encryption method, terminal and system for BLE
JP5192077B2 (en) Secret communication method using VPN, system thereof, program thereof, and recording medium of program
EP2005638A2 (en) Bio-metric encryption key generator
CN107733635B (en) Data security transmission method based on gateway
CN109068321A (en) Method, system, mobile terminal and the smart home device of consult session key
CN112565302A (en) Communication method, system and equipment based on security gateway
CN106714151B (en) Information transmission method
CN113472792B (en) Communication encryption method and system for long-connection network
CN105407102A (en) Http request data reliability verification method
CN112398798A (en) Network telephone processing method, device and terminal
CN114553957A (en) Service system and method compatible with national password and international HTTPS transmission
CN107181739B (en) Data security interaction method and device
CN112564893B (en) Key transmission method combining circuit domain and IP domain
CN111835688B (en) Traffic fast forwarding method and system based on SSL/TLS protocol
CN112512064A (en) Wireless network distribution method, wireless gateway and equipment to be accessed
US8699675B2 (en) Method and apparatus for exchanging information in a voice communication system
US8914861B2 (en) Authentication method and authentication system based on forking, and forking authentication device
CN115766899A (en) Protocol intercommunication method and device and video monitoring system
CN114928503A (en) Method for realizing secure channel and data transmission method
CA2708898C (en) Methods and apparatus for maintaining secure connections in a wireless communication network
CN113055971A (en) Method and device for accessing intelligent terminal to network based on special SSID
CN109905345B (en) Communication method, communication device and communication equipment
CN113099443B (en) Equipment authentication method, device, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant