CN117201197A - Personal communication network encryption method - Google Patents

Personal communication network encryption method Download PDF

Info

Publication number
CN117201197A
CN117201197A CN202311464529.4A CN202311464529A CN117201197A CN 117201197 A CN117201197 A CN 117201197A CN 202311464529 A CN202311464529 A CN 202311464529A CN 117201197 A CN117201197 A CN 117201197A
Authority
CN
China
Prior art keywords
network
key
network user
identity information
cloud database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311464529.4A
Other languages
Chinese (zh)
Other versions
CN117201197B (en
Inventor
何乔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Tongli Digital Technology Co ltd
Original Assignee
Guizhou Tongli Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Tongli Digital Technology Co ltd filed Critical Guizhou Tongli Digital Technology Co ltd
Priority to CN202311464529.4A priority Critical patent/CN117201197B/en
Publication of CN117201197A publication Critical patent/CN117201197A/en
Application granted granted Critical
Publication of CN117201197B publication Critical patent/CN117201197B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of electric communication, in particular to a personal communication network encryption method, which comprises the following steps: step 1: establishing a cloud database, and uploading network user identity information to the cloud database for storage; step 2: traversing and reading network user identity information stored in a cloud database, extracting characteristic data in the network user identity information, and constructing a key library to store the characteristic data in the network user identity information; step 3: the invention can carry out continuous encryption on the network user, effectively ensure the network user to use the security of the network, and generate the encryption key in a random dynamic key mode, so that the application of the encryption key has certain randomness, further the complexity of network encryption is improved, and safer maintenance effect is brought to the network user.

Description

Personal communication network encryption method
Technical Field
The invention relates to the technical field of electric communication, in particular to a personal communication network encryption method.
Background
Communication is the communication and transfer of information from person to person through some medium. The network is a data link formed by physically linking individual workstations or hosts together. The communication network refers to the physical connection of each isolated device, so as to realize the links for information exchange between people, people and computers and between computers, thereby achieving the purposes of resource sharing and communication.
However, in the current communication network, when the communication network is used by a communication user, single security encryption and real-time network security detection are often relied on to provide guarantee for the communication process, and the security of the mode is poor, so that the encryption protection effect for the communication user is weakened with the passage of time.
Disclosure of Invention
In view of the above drawbacks of the prior art, the present invention provides a personal communication network encryption method, which solves the technical problems set forth in the background art.
In order to achieve the above purpose, the invention is realized by the following technical scheme:
a personal communications network encryption method comprising the steps of:
step 1: establishing a cloud database, and uploading network user identity information to the cloud database for storage;
step 2: traversing and reading network user identity information stored in a cloud database, extracting characteristic data in the network user identity information, and constructing a key library to store the characteristic data in the network user identity information;
step 3: receiving a network access request of a network user, monitoring a network security situation in real time, and judging the operability of the network access request based on a network security situation monitoring result;
step 4: in the step 3, the network security situation monitoring result is safe, namely, the network access request operability judging result is that the characteristic data stored in the key library is applied to generate a key, a network user receives and reads the key, and the network user further accesses the network through the key authentication identity; in the step 3, the network security situation monitoring result is unsafe, namely, the network access request operability judging result is no, the step 4 is ended, the refreshing and skipping step 3 is finished, and the network access request receiving stage of the network user is restored again;
step 5: after the network user accesses the network through the key verification identity, the network user synchronously sets the key effective time, and after the key effective time is finished, the network access authority of the network user is invalid;
step 6: and acquiring operation data executed after the network user accesses the network, recording the operation data, generating a message, and feeding back the message to the network user in real time after the network user exits the network.
Further, the network user identity information uploaded in the step 1 includes: the method comprises the steps that a key base constructed in the step 2 is placed in a cloud database, and the cloud database is encrypted by randomly generating a dynamic key;
and when the network user identity information is uploaded, the cloud database feeds back declaration disclaimer terms to the user for the user to confirm so as to acquire the uploading authority of the network user identity information.
Still further, the random dynamic key generation logic of the cloud database application is expressed as:
wherein:is a random dynamic key; />Characteristic vectors of characters in an ith random dynamic key string symbol library;is weight(s)>The larger the feature vector of the character in the random dynamic key string library is, the smaller the weight value is, and the sum of the weights is equal to 1; />Representing a random dynamic key generation timestamp;
the random dynamic key string symbol library is manually set through a user side, key generation is performed by applying a random dynamic key generation logic to generate a key synchronous application random dynamic key by using characteristic data stored in the key library in step 4, the key library placed in the cloud database is encrypted by applying the random dynamic key generation logic to synchronize, a random dynamic key exchange period is manually set by the user side, the cloud database and the key library finish refreshing of an applied random dynamic key according to the random dynamic key exchange period, and the random dynamic key applied by the cloud database is the random dynamic key applied by the random dynamic key exchange period on the key library in the same random dynamic key exchange period.
Further, the feature data extraction operation of the network user identity information includes the following steps:
i: identifying text data in the network user identity information;
II: traversing the character data identified in the I, and checking the character data;
III: deleting repeated text data;
IV: the text data remained after III is used as the characteristic data in the network user identity information;
the operation of identifying the Chinese data in the network user identity information in the I comprises the identification of punctuation marks in the text data.
Furthermore, the duplicate checking target of the text data in the II is the text or punctuation mark in the identity information of each identified network user;
wherein, the duplicate checking logic for the text data in the II is expressed as follows:
wherein:the similarity between the text data x and the text data y; />Semantic feature vectors for the text data x; />Semantic feature vectors for the text data y;
wherein,and more than or equal to 99 percent, the character data x and the character data y are repeated.
Further, the network security situation monitoring result in the step 3 is expressed as follows:
wherein:the network security situation security value is obtained; />Opening the number of web pages for network users in the current network; />Opening the number of risk webpages for network users in the current network; />A risk value for the kth open web page; />And (5) opening the risk value of the webpage for the j-th webpage.
Still further, the method further comprises the steps of,repeating calculation, and continuously obtaining two or more groups of ++>Value, continuously determined +.>If the value is continuously increased or decreased, the network is judged to be unsafe, otherwise, the network is judged to be safe.
Furthermore, the cloud database and the key library are manually managed by the user side by taking the computer as a terminal carrier, the computer controls the cloud database and the key library to be switched to an offline state in the key generation stage in the step 4, and after the key is generated, the computer controls the cloud database and the key library to be restored to a network connection state, and the key is further distributed to network users through a network;
before receiving the key, the key distribution target network user synchronously monitors the security situation of a computer connection network to which the key is applied by the target network user, judges network security, and executes key receiving operation when the judgment result is yes.
Further, when the network user verifies the identity access network through the verification key, and further goes offline in the network, the network user synchronously decides whether the access network application key is continuously used or not, if yes, the access network application key is continuously used when the network user accesses the network next time, otherwise, the key is discarded and is not used any more;
and each group of keys only executes decision operation of whether to be used or not, and the decision result is judged as no when the network user does not respond in the key decision whether to be used or not.
Further, the message representation generated in step 6 based on the operation data executed after the network user accesses the network includes: the start time, end time and history of access to the web site by the network user.
Compared with the known public technology, the technical scheme provided by the invention has the following beneficial effects:
1. the invention provides a personal communication network encryption method, which can continuously encrypt network users in the execution process of the steps, effectively ensures the network user to use the security of the network, and generates the encryption key in a random dynamic key mode, so that the application of the encryption key has certain randomness, further improves the complexity of network encryption and brings safer maintenance effect for the network users.
2. In the method, in the step execution process, in the random dynamic key generation stage, characteristic data can be extracted from the identity information of the network user to generate a key library for key generation, so that key generation source data used by each network user are effectively distinguished, the randomness of key generation is further improved, and the situation that the key used by the network user is broken and stolen in a large area is avoided to a greater extent.
3. In the final stage of executing the steps, the method synchronously generates the message according to the operation record of the network user in the network and feeds back the message to the network user so as to provide the security self-checking condition in the process that the network user uses the network, and the key of the network user for accessing the network application can be used by the user decision, thereby bringing convenience to the key verification behavior executed by the network user when accessing the network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
Fig. 1 is a flow chart of a personal communication network encryption method.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is further described below with reference to examples.
Example 1: the encryption method for the personal communication network of the embodiment, as shown in fig. 1, comprises the following steps:
step 1: establishing a cloud database, and uploading network user identity information to the cloud database for storage;
step 2: traversing and reading network user identity information stored in a cloud database, extracting characteristic data in the network user identity information, and constructing a key library to store the characteristic data in the network user identity information;
step 3: receiving a network access request of a network user, monitoring a network security situation in real time, and judging the operability of the network access request based on a network security situation monitoring result;
step 4: in the step 3, the network security situation monitoring result is safe, namely, the network access request operability judging result is that the characteristic data stored in the key library is applied to generate a key, a network user receives and reads the key, and the network user further accesses the network through the key authentication identity; in the step 3, the network security situation monitoring result is unsafe, namely, the network access request operability judging result is no, the step 4 is ended, the refreshing and skipping step 3 is finished, and the network access request receiving stage of the network user is restored again;
step 5: after the network user accesses the network through the key verification identity, the network user synchronously sets the key effective time, and after the key effective time is finished, the network access authority of the network user is invalid;
step 6: acquiring operation data executed after a network user accesses a network, recording the operation data, generating a message, and feeding back the message to the network user in real time after the network user exits the network;
the random dynamic key generation logic of the cloud database application is expressed as:
wherein:is a random dynamic key; />For the ith random dynamicsFeature vectors of characters in the key string symbol library;is weight(s)>The larger the feature vector of the character in the random dynamic key string library is, the smaller the weight value is, and the sum of the weights is equal to 1; />Representing a random dynamic key generation timestamp;
the random dynamic key string library is manually set by the user side, the key synchronous application random dynamic key generation logic generated by applying the characteristic data stored in the key library in step 4 is used for generating the key, the key library placed in the cloud database is used for encrypting by synchronously applying the random dynamic key generation logic, the user side is manually set with a random dynamic key exchange period, the cloud database and the key library finish refreshing of the applied random dynamic key according to the random dynamic key exchange period, and the random dynamic key applied by the cloud database is the random dynamic key applied by the random dynamic key exchange period on the key library in the same random dynamic key exchange period.
In the embodiment, through the execution of the steps 1 to 6, continuous encryption processing is brought to the network access operation process of the network user, and the safety of the network user is ensured;
and the random dynamic key generation logic of the limited cloud database application further ensures the stable generation of the random dynamic key.
Example 2: in a specific implementation aspect, on the basis of embodiment 1, this embodiment further specifically describes a personal communication network encryption method in embodiment 1 with reference to fig. 1:
the network user identity information uploaded in the step 1 comprises the following steps: the name, the mobile phone number, the secret questions and answers are placed in a cloud database by the key library constructed in the step 2, and the cloud database is encrypted by randomly generating dynamic keys;
and when the network user identity information is uploaded, the cloud database feeds back declaration disclaimer terms to the user for the user to confirm so as to acquire the uploading authority of the network user identity information.
Through the arrangement, the content of the network user identity information can be further limited.
As shown in fig. 1, the feature data extraction operation of the network user identity information includes the following steps:
i: identifying text data in the network user identity information;
II: traversing the character data identified in the I, and checking the character data;
III: deleting repeated text data;
IV: the text data remained after III is used as the characteristic data in the network user identity information;
the operation of identifying the Chinese data in the network user identity information in the I comprises the identification of punctuation marks in the text data.
Through the arrangement, the characteristic data extraction operation of the network user identity information is further limited, and the characteristic data extraction operation of the network user identity information is ensured to be stably executed.
As shown in fig. 1, the duplicate checking target for the text data in II is text or punctuation marks in each identification network user identity information;
the check logic for text data in II is expressed as:
wherein:the similarity between the text data x and the text data y; />Semantic feature vectors for the text data x; />Semantic feature vectors for the text data y;
wherein,99% or more, it means that the text data x and the text data y are repeated items.
Through the formula calculation, the text data in the user identity information is provided with the duplicate checking processing condition, and then the extraction operation of the preferential total data in the network user identity information is realized.
As shown in fig. 1, in step 3, the network security situation monitoring result is expressed as follows:
wherein:the network security situation security value is obtained; />Opening the number of web pages for network users in the current network; />Opening the number of risk webpages for network users in the current network; />A risk value for the kth open web page; />The risk value of the j-th open webpage;
repeating calculation, and continuously obtaining two or more groups of ++>Value, continuously determined +.>If the value is continuously increased or decreased, the network is judged to be unsafe, otherwise, the network is judged to be safe.
Through the calculation of the formula, accurate judgment is provided for the security of the network, and then the execution of the steps of the method is ensured, so that the encryption process of the network user accessing the network is safer.
Example 3: in a specific implementation aspect, on the basis of embodiment 1, this embodiment further specifically describes a personal communication network encryption method in embodiment 1 with reference to fig. 1:
the cloud database and the key library are manually managed by a user side by taking a computer as a terminal carrier, in the step 4, the cloud database and the key library are controlled by the computer to be switched to an offline state, after the key is generated, the cloud database and the key library are controlled by the computer to be restored to a network connection state, and the key is further distributed to network users through a network;
before receiving the key, the key distribution target network user synchronously monitors the security situation of a computer connection network to which the key is applied by the target network user, judges network security, and executes key receiving operation when the judgment result is yes.
Through the arrangement, the safety of the key generation process is further maintained, and the key generation is ensured to be in a safe and stable state in real time at the application stage.
As shown in fig. 1, when a network user verifies an identity access network through a verification key, and further goes offline in the network, the network user synchronously decides whether the application key of the access network is continuously used or not, if yes, the key used by the access network is continuously used when the network user accesses the network next time, otherwise, the key is discarded and is not used any more;
and each group of keys only executes decision operation of whether to be used or not, and the decision result is judged as no when the network user does not respond in the key decision whether to be used or not.
Through the above arrangement, logic is further provided for re-use of the key, thereby facilitating key verification operations for network users.
As shown in fig. 1, the message expression form generated in step 6 based on the operation data executed after the network user accesses the network includes: the start time, end time and history of access to the web site by the network user.
Through the setting, the message content generated in the step 6 is limited.
In summary, the method in the above embodiment can continuously encrypt the network user, effectively ensure the security of the network user in using the network, and generate the encryption key in a random dynamic key manner, so that the application of the encryption key has a certain randomness, thereby further improving the complexity of network encryption and bringing safer maintenance effect to the network user; in addition, in the process of executing the steps, in the random dynamic key generation stage, characteristic data can be extracted from the identity information of the network user to generate a key library for key generation, so that key generation source data used by each network user are effectively distinguished, the randomness of the generated keys is further improved, and the situation that the key used by the network user is broken and stolen in a large area is avoided to a greater extent; meanwhile, in the final stage of executing the steps, the method synchronously generates a message according to the operation record of the network user in the network and feeds back the message to the network user so as to provide the security self-checking condition in the process that the network user uses the network, and the key of the network user for accessing the network application can be used by the user to decide whether to be left or not, thereby bringing convenience to the key verification behavior executed by the network user when accessing the network.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A personal communication network encryption method, comprising the steps of:
step 1: establishing a cloud database, and uploading network user identity information to the cloud database for storage;
step 2: traversing and reading network user identity information stored in a cloud database, extracting characteristic data in the network user identity information, and constructing a key library to store the characteristic data in the network user identity information;
step 3: receiving a network access request of a network user, monitoring a network security situation in real time, and judging the operability of the network access request based on a network security situation monitoring result;
step 4: in the step 3, the network security situation monitoring result is safe, namely, the network access request operability judging result is that the characteristic data stored in the key library is applied to generate a key, a network user receives and reads the key, and the network user further accesses the network through the key authentication identity; in the step 3, the network security situation monitoring result is unsafe, namely, the network access request operability judging result is no, the step 4 is ended, the refreshing and skipping step 3 is finished, and the network access request receiving stage of the network user is restored again;
step 5: after the network user accesses the network through the key verification identity, the network user synchronously sets the key effective time, and after the key effective time is finished, the network access authority of the network user is invalid;
step 6: and acquiring operation data executed after the network user accesses the network, recording the operation data, generating a message, and feeding back the message to the network user in real time after the network user exits the network.
2. The personal communication network encryption method according to claim 1, wherein the network user identity information uploaded in step 1 includes: the method comprises the steps that a key base constructed in the step 2 is placed in a cloud database, and the cloud database is encrypted by randomly generating a dynamic key;
and when the network user identity information is uploaded, the cloud database feeds back declaration disclaimer terms to the user for the user to confirm so as to acquire the uploading authority of the network user identity information.
3. The personal communication network encryption method of claim 2, wherein the random dynamic key generation logic of the cloud database application is expressed as:
wherein:is a random dynamic key; />Characteristic vectors of characters in an ith random dynamic key string symbol library; />Is weight(s)>The larger the feature vector of the character in the random dynamic key string library is, the smaller the weight value is, and the sum of the weights is equal to 1; />Representing a random dynamic key generation timestamp;
the random dynamic key string symbol library is manually set through a user side, key generation is performed by applying a random dynamic key generation logic to generate a key synchronous application random dynamic key by using characteristic data stored in the key library in step 4, the key library placed in the cloud database is encrypted by applying the random dynamic key generation logic to synchronize, a random dynamic key exchange period is manually set by the user side, the cloud database and the key library finish refreshing of an applied random dynamic key according to the random dynamic key exchange period, and the random dynamic key applied by the cloud database is the random dynamic key applied by the random dynamic key exchange period on the key library in the same random dynamic key exchange period.
4. A personal communication network encryption method according to claim 1, wherein the characteristic data extraction operation of the network user identity information comprises the steps of:
i: identifying text data in the network user identity information;
II: traversing the character data identified in the I, and checking the character data;
III: deleting repeated text data;
IV: the text data remained after III is used as the characteristic data in the network user identity information;
the operation of identifying the Chinese data in the network user identity information in the I comprises the identification of punctuation marks in the text data.
5. The method according to claim 4, wherein the duplicate checking objective for text data in II is text or punctuation marks in each piece of identification network user identity information;
wherein, the duplicate checking logic for the text data in the II is expressed as follows:
wherein:the similarity between the text data x and the text data y; />Semantic feature vectors for the text data x;semantic feature vectors for the text data y;
wherein,99% or more, it means that the text data x and the text data y are repeated items.
6. The personal communication network encryption method according to claim 1, wherein the network security situation monitoring result in the step 3 is expressed in the form of:
wherein:the network security situation security value is obtained; />Opening the number of web pages for network users in the current network; />Opening the number of risk webpages for network users in the current network; />A risk value for the kth open web page; />And (5) opening the risk value of the webpage for the j-th webpage.
7. A personal communication network encryption method according to claim 6, characterized in that,repeating calculation, and continuously obtaining two or more groups of ++>Value, continuously determined +.>If the value is continuously increased or decreased, the network is judged to be unsafe, otherwise, the network is judged to be safe.
8. The personal communication network encryption method according to claim 1, wherein the cloud database and the key library are manually managed by the user side by using the computer as a terminal carrier, in the step 4, the computer controls the cloud database and the key library to switch to an offline state, and after the key is generated, the computer controls the cloud database and the key library to recover to a network connection state, and further distributes the key to network users through a network;
before receiving the key, the key distribution target network user synchronously monitors the security situation of a computer connection network to which the key is applied by the target network user, judges network security, and executes key receiving operation when the judgment result is yes.
9. The personal communication network encryption method according to claim 1, wherein the network user synchronously decides whether the access network application key is used continuously when the network user verifies the identity access network by verifying the key, and further when the network user goes offline, if yes, the access network application key is used continuously when the network user accesses the network next time, otherwise, the key is discarded and is not used any more;
and each group of keys only executes decision operation of whether to be used or not, and the decision result is judged as no when the network user does not respond in the key decision whether to be used or not.
10. The personal communication network encryption method according to claim 1, wherein the step 6 includes generating a packet representation packet based on operation data performed by a network user after accessing the network: the start time, end time and history of access to the web site by the network user.
CN202311464529.4A 2023-11-07 2023-11-07 Personal communication network encryption method Active CN117201197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311464529.4A CN117201197B (en) 2023-11-07 2023-11-07 Personal communication network encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311464529.4A CN117201197B (en) 2023-11-07 2023-11-07 Personal communication network encryption method

Publications (2)

Publication Number Publication Date
CN117201197A true CN117201197A (en) 2023-12-08
CN117201197B CN117201197B (en) 2023-12-29

Family

ID=88990957

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311464529.4A Active CN117201197B (en) 2023-11-07 2023-11-07 Personal communication network encryption method

Country Status (1)

Country Link
CN (1) CN117201197B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
CN112738125A (en) * 2021-01-07 2021-04-30 中国重型机械研究院股份公司 Network security collaborative defense system
CN113273146A (en) * 2018-07-10 2021-08-17 力士塔有限公司 Decentralized network security privacy network for cloud communication, computing and global e-commerce
CN114172649A (en) * 2022-02-11 2022-03-11 厚普智慧物联科技有限公司 Cloud key management method and system based on intelligent IC card security authentication
US20220377060A1 (en) * 2021-05-19 2022-11-24 Microsoft Technology Licensing, Llc Maintaining and recovering secure cloud connections
CN115426141A (en) * 2022-08-19 2022-12-02 国网河南省电力公司电力科学研究院 Cloud master station service dynamic access control method and system based on zero trust network
CN116684875A (en) * 2023-06-16 2023-09-01 中国南方电网有限责任公司 Communication security authentication method for electric power 5G network slice
CN116743344A (en) * 2023-07-07 2023-09-12 鹤壁密码先进技术研究院 Identity verification encryption method based on blockchain node user
US20230328047A1 (en) * 2021-09-13 2023-10-12 Hopr Corporation Platform and Method for Automated Moving Target Defense

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
CN113273146A (en) * 2018-07-10 2021-08-17 力士塔有限公司 Decentralized network security privacy network for cloud communication, computing and global e-commerce
CN112738125A (en) * 2021-01-07 2021-04-30 中国重型机械研究院股份公司 Network security collaborative defense system
US20220377060A1 (en) * 2021-05-19 2022-11-24 Microsoft Technology Licensing, Llc Maintaining and recovering secure cloud connections
US20230328047A1 (en) * 2021-09-13 2023-10-12 Hopr Corporation Platform and Method for Automated Moving Target Defense
CN114172649A (en) * 2022-02-11 2022-03-11 厚普智慧物联科技有限公司 Cloud key management method and system based on intelligent IC card security authentication
CN115426141A (en) * 2022-08-19 2022-12-02 国网河南省电力公司电力科学研究院 Cloud master station service dynamic access control method and system based on zero trust network
CN116684875A (en) * 2023-06-16 2023-09-01 中国南方电网有限责任公司 Communication security authentication method for electric power 5G network slice
CN116743344A (en) * 2023-07-07 2023-09-12 鹤壁密码先进技术研究院 Identity verification encryption method based on blockchain node user

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JIN B W ET AL.: "A Study of Key management Protocol for Secure Communication in Personal Cloud Environment", 《INTERNATIONAL JOURNAL OF SECURITY & ITS APPLICATIONS》 *
ZHENG ZHIBIN ET AL.: "Dynamic authentication protocol for personal communication system (PCS)", 《ICCT\'98. 1998 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY. PROCEEDINGS (IEEE CAT. NO.98EX243)》 *
王雄 等: "云密码服务中密钥保护体系设计", 《 北京电子科技学院学报》 *

Also Published As

Publication number Publication date
CN117201197B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN106776904B (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
Dechand et al. An Empirical Study of Textual {Key-Fingerprint} Representations
CN104333580B (en) A kind of account management system and its method based on cloud service
CN109450959A (en) A kind of multiple-factor identity identifying method based on threat level
Pantic et al. Covert botnet command and control using twitter
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN101894232B (en) Safe input method applied to identity authentication
CN104899499A (en) Internet image search based Web verification code generation method
CN113378148A (en) Internet of things equipment identity authentication system and method based on block chain
CN111177763A (en) Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
CN105430017A (en) Data secure communication method
CN107622208A (en) Note encryption and decryption method and related product
Wu et al. Attacks and countermeasures on privacy-preserving biometric authentication schemes
CN104734856A (en) Password authentication method for preventing server-side information from being leaked
CN117201197B (en) Personal communication network encryption method
Zhu et al. An efficient biometric authenticated protocol for arbitrary-domain-server with blockchain technology
CN101335623A (en) Network identity authentication method adopting password transforming
CN114205131B (en) Safety authentication method for transformer substation measurement and control and PMU equipment
CN104009851A (en) One-time pad bidirectional authentication safe logging technology for internet bank
Nasiri et al. Using Combined One-Time Password for Prevention of Phishing Attacks.
CN114637985A (en) Android application login counterfeiting identification method based on multi-environment parameters
CN111382455A (en) File protection method and device
Hernández-Álvarez et al. KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism
Le et al. A new pre-authentication protocol in Kerberos 5: Biometric authentication
CN113556226B (en) Mobile terminal secret key safe storage method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant