CN1988441A - Data safety transmission method - Google Patents

Data safety transmission method Download PDF

Info

Publication number
CN1988441A
CN1988441A CN 200510111963 CN200510111963A CN1988441A CN 1988441 A CN1988441 A CN 1988441A CN 200510111963 CN200510111963 CN 200510111963 CN 200510111963 A CN200510111963 A CN 200510111963A CN 1988441 A CN1988441 A CN 1988441A
Authority
CN
China
Prior art keywords
data
emphatically
encrypted
character
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200510111963
Other languages
Chinese (zh)
Inventor
戚跃民
胡文斌
吴金坛
徐静雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN 200510111963 priority Critical patent/CN1988441A/en
Priority to PCT/CN2006/002417 priority patent/WO2007071140A1/en
Publication of CN1988441A publication Critical patent/CN1988441A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This invention relates to a method for transmitting data safely including: 1, a transmission end codes the original data necessary to be encrypted uniformly, 2, the transmission end ciphers the contained code data then transmits them, 3, the receiving end de-ciphers the received data then decodes said code data in terms of step 1 to get the encrypted original data, which are coded as follows: converting the necessary ciphered original data to ASCII code, then converts every character in the ASCII code to a corresponding hexadecimal system to form an emphasized ciphered data block of fixed format, or first of all converts the necessary emphasized encrypted data to the hexadecimal to form the data block with fixed format.

Description

The method of data security transmission
Technical field
The present invention relates to security fields, relate in particular to the method for data security transmission.
Background technology
Network security solution can be divided into two big classes: a class is to be the passive defence type scheme of representative with the firewall technology, and another kind of is to be the opening scheme of active of core with data encryption, subscriber authorisation authentication.The passive-type security solution can only be protected intranet safety passively, and topology of networks is had specific (special) requirements.Based on the opening scheme of the active of data encryption and authentification of user network configuration is not done any requirement, just can directly carry out the active protection, realize safety end to end source data.In opening scheme initiatively, have only the user of appointment or the network equipment can the decipher enciphered data, undoubtedly, encryption technology is the core of this class solution.Encryption technology is the technology of information being carried out Code And Decode, and coding is an original readable information (claim expressly not only) codification form (but also claiming ciphertext), its inverse process decode exactly (deciphering).
Obtain data in order to reduce the lawless person as far as possible in data transmission procedure, when receiving terminal sends data, utilize various cryptographic algorithm to encrypt data earlier at transmitting terminal usually, receiving terminal adopts corresponding decipherment algorithm to be decrypted.But, except existing at data transmission procedure the possibility of divulging a secret, in transmitting terminal and the same possibility of divulging a secret that exists of receiving terminal.Such as, after individual channel of disbursement was expanded, the mode of the transaction of paying was on the internet accepted by masses gradually.If the user uses common computer to carry out online payment, then be easy on common computer, stay record, as card number, personal identification number.Even the user sets up the corresponding relation of individual number of the account, network payment password and card number, personal identification number foundation in advance, then the user can utilize personal account number and network payment password to carry out online payment, but might stay individual number of the account and network payment password on common computer in the same old way.Obviously, after those information are obtained by the lawless person, can bring economically loss to the client.
Equally, when in bank's local area network (LAN), transmitting the various kinds significant data, regularly transmit the VIP file that comprises VIP (very important person) number of the account as each tame card sending mechanism to Unionpay, though the VIP file is to be connected with the special line of Unionpay by card sending mechanism, and for ease of the correct resolution file content of recipient, all fields in the VIP file all are to show with character visible, if the VIP number of the account directly is placed in the VIP file as character visible, improve the possibility of divulging a secret.Card sending mechanism, Unionpay inside comparatively complicated local area network (LAN) normally particularly, directly as the character visible transmission, coefficient of safety is low with the VIP number of the account.Therefore, except strengthening inner encryption handling, also need to reduce the possibility of divulging a secret of significant data (as the VIP number of the account) from technological layer.
That is to say that prior art being stolen, also need be strengthened the safety of data of transmitting terminal and receiving terminal in data transmission procedure in preventing data transmission procedure.
Summary of the invention
The object of the present invention is to provide a kind of method of data security transmission, to solve the technical problem that needs the Information Security of raising transmitting terminal and receiving terminal in the prior art.
Correspondingly, the invention discloses a kind of method of data security transmission, comprise: (1) transmitting terminal will need to focus on ciphered data and convert ASCII character earlier to, again each character conversion in the ASCII character be become corresponding hexadecimal, form the encrypted data chunk emphatically of set form; (2) transmitting terminal will comprise emphatically the data of encrypted data chunk and encrypt the back and send; (3) receiving terminal is deciphered the data that receive earlier, then, according to the described encrypted data chunk emphatically of the corresponding step deciphering of step (1), obtains ciphered data emphatically.
Adopt the cryptographic algorithm of double-length or single-length to encrypt the described data that need transmission in the step (2).Comprise in the described encrypted data chunk of step (1) that described needs focus on the length of enciphered data.The described ciphered data that needs is the internet payment password, and, adopt the encryption key of PIN to encrypt in the step (2), adopt corresponding decruption key to be decrypted in the step (3).
The invention discloses the method for another kind of data security transmission, comprising: (1) transmitting terminal will need to focus on ciphered data and convert 16 systems earlier to, form the encrypted data chunk emphatically of set form; (2) transmitting terminal will comprise emphatically the data of encrypted data chunk and encrypt the back and send; (3) receiving terminal is deciphered the data that receive earlier, then, according to the described encrypted data chunk emphatically of the corresponding step deciphering of step (1), obtains ciphered data emphatically.
Adopt the cryptographic algorithm of double-length or single-length to encrypt the described data that need transmission in the step (2).Step (2) also comprises: the binary number of each byte is converted to two hexadecimals in the invisible character that obtains after the double-length cryptographic algorithm is encrypted, again two hexadecimal numbers are converted to visible ASCII character, perhaps, binary number is converted to two hexadecimals in each byte of all data that obtain after the double-length cryptographic algorithm encrypted, again two hexadecimal numbers is converted to visible ASCII character.Step (2) also comprises: adopt the key generating mode of file verification sign indicating number to generate encryption key, and, transmitting terminal with the encryption key transmitting terminal to receiving terminal.
The method of data security transmission disclosed by the invention, comprising: (1) transmitting terminal will need the initial data of re-encryption to be converted to Unified coding; (2) the transmitting terminal data that will comprise Unified coding are encrypted the back and are sent; (3) receiving terminal is deciphered the data that receive earlier, then, deciphers described Unified coding data according to the step that step (1) is corresponding, needing to obtain the initial data of re-encryption.
Initial data is converted to Unified coding and is specially: will need the initial data of re-encryption to convert ASCII character earlier to, and again each character conversion in the ASCII character become corresponding hexadecimal, and form the encrypted data chunk emphatically of set form; Perhaps will need to focus on ciphered data and convert 16 systems earlier to, form the encrypted data chunk emphatically of set form.
If transmitting terminal and receiving terminal are a local area network (LAN), then transmitting terminal and receiving terminal internal transmission be Unified coding after encryption, but not needing the initial data of re-encryption.
Compared with prior art, the present invention has the following advantages: after transmitting terminal is encrypted to other character visible earlier with significant data, the data that will comprise the needs transmission of this character visible are again encrypted the back transmission, equally, the data that receiving terminal deciphering earlier receives, utilize corresponding manner of decryption to convert those character visible to significant data again, can reduce the chance that transmitting terminal and receiving terminal are divulged a secret, improve safety of data.In addition, if transmitting terminal and receiving terminal are local area network (LAN), transmitting terminal and receiving terminal internal transmission be character visible after encryption, but not needing the initial data of re-encryption, guarantee the reliability of data.
Description of drawings
Fig. 1 is the flow chart of the method for a kind of data security transmission disclosed by the invention;
Fig. 2 is the flow chart of data security transmission embodiment of the present invention;
Fig. 3 is the flow chart that transmits another embodiment for data security of the present invention.
Embodiment
Below in conjunction with accompanying drawing, specify the present invention.
Consider the correct data that receive of resolving of recipient, a lot of occasions need all must show all fields in the file with character visible, even encrypted content also must show with character visible.Therefore, core of the present invention is, transmitting terminal carries out significant data earlier after Unified coding is other character visible, the data that will comprise the needs transmission of this character visible are again encrypted the back transmission, equally, the data that receiving terminal deciphering earlier receives utilize corresponding manner of decryption to convert those character visible to significant data again.When transmitting terminal is under the situation of a local area network (LAN), and Unified coding becomes other character visible to show immediately when obtaining original significant data, is encoded character visible but not original significant data in the data of local area network (LAN) internal transmission.When receiving terminal is under the situation of a local area network (LAN), and what obtain after deciphering receives data is character visible behind the coding, but not original significant data.Equally, the data of in local area network (LAN), transmitting be the coding after character visible but not original significant data.By above-mentioned processing, can guarantee reliability of data transmission, particularly reduce the chance that transmitting terminal and receiving terminal are directly divulged a secret, improve safety of data transmission.
See also Fig. 1, it is the flow chart of the method for a kind of data security transmission disclosed by the invention.It comprises:
S110: transmitting terminal will need the initial data Unified coding of re-encryption;
S120: the data that transmitting terminal will comprise after the Unified coding are encrypted the back transmission;
S130: the data that receiving terminal deciphering earlier receives, then, decipher described Unified coding data according to the step of step S110 correspondence, needing to obtain the initial data of re-encryption.
Transmitting terminal will need the initial data Unified coding of re-encryption to show for after other character visible among the step S110.Such as, user terminal is imported significant data on public's computer, as individual number of the account and network payment password or card number and personal identification number, but what show on public's computer is other character visible after encoded, even arround the lawless person peep, can not directly obtain those initial data, improve fail safe.In addition, when if transmitting terminal is local area network (LAN), the receiving terminal that receives original significant data can directly be encoded to original significant data and be other character visible, be sent to encryption equipment after again other character visible being joined the data that need to send, encrypt the back by encryption equipment and send, improve the safety of transmission between receiving terminal and the encryption equipment.In addition, encryption equipment also can be integrated on the receiving terminal, like this, receiving terminal receives original significant data, again it is directly changed into character visible after the Unified coding, then character visible is joined in the data that need to send, send after will comprising the data encryption that the needs of character visible send at last, equally also improved safety of data transmission.
Initial data is converted to character visible a lot of modes, such as:
To need the initial data of re-encryption to convert ASCII character earlier to, again each character conversion in the ASCII character is being become corresponding hexadecimal, forming the encrypted data chunk emphatically of set form, described encrypted data chunk emphatically be character visible; Perhaps
To need to focus on ciphered data and convert 16 systems earlier to, and form the encrypted data chunk emphatically of set form, described encrypted data chunk emphatically is character visible.
Above-mentioned disclosed only for the present invention is converted to several embodiment of character visible with initial data, just not limited thereto.
The data that will comprise character visible are encrypted, and the cryptographic algorithm of employing is very many, and such as DES algorithm etc., the cryptographic algorithm of Cai Yonging is a known technology thus, does not repeat them here.
In addition, receiving terminal is deciphered the data that receive according to the decipherment algorithm of correspondence earlier, and the conversion regime according to correspondence is changed to the initial data that is needing re-encryption with described character visible reverse again.If receiving terminal is a local area network (LAN), then the receiving terminal internal transmission be encoded processing after character visible, but not needing the initial data of re-encryption.
Below with two specific embodiments one invention is described.
See also Fig. 2, it is the flow chart of data security transmission embodiment of the present invention, comprising:
S210: transmitting terminal will need to focus on ciphered data and convert ASCII character earlier to, again each character conversion in the ASCII character be become corresponding hexadecimal, form the encrypted data chunk emphatically of set form;
S220: transmitting terminal will comprise the data of focusing on encrypted data chunk and encrypt the back transmission;
S230: the data that receiving terminal deciphering earlier receives then, according to the described encrypted data chunk emphatically of the step deciphering of step S210 correspondence, need to obtain ciphered data emphatically.
Comprise in the described encrypted data chunk that described needs focus on the length of enciphered data.Encrypted data chunk joins in the data that the needs of transmitting terminal and receiving terminal appointed position send, so that receiving terminal carries out correct deciphering.
Payment cipher with Web bank is an example, and above-mentioned flow process is described.
After individual's channel of disbursement was expanded, the mode of the transaction of paying on the internet was by increasing popular acceptance.Because the function and the personal identification code of internet payment password are extremely similar, change for reducing mechanism, algorithm design must should be approached personal identification code as far as possible.When intermediary services such as card sending mechanism or Unionpay provide the website popup web page at mechanism place, when needing the user to import payment cipher, it is other character visible that Unified coding can be carried out in such a way with the payment cipher that receives in described website.
A1, payment cipher is converted to ASCII character
Because payment cipher can be made of numeral, character or other symbol, just because of character password can be made of the symbol of multiword so, therefore must seek a coding rule that can comprehensively identify them could be with its unified conversion, be converted to the discernible coding form of encryption equipment, otherwise conversion regime can be very complicated, is unfavorable for the machine realization.And the simple coding rule that is suitable for is exactly ASCII.Therefore, payment cipher can be converted to ASCII character.
Table 1
N N P P P P P P P / F P / F P / F P / F P / F P / F P / F P / F P / F P / F P / F P / F P / F P / F F F
Annotate 1:P and represent Password, F represents Filler
Annotating 2:N is the length (8-bit) of payment cipher
Annotating 3:P is the character of 8-bit binary system internet payment password
Annotate 4:P/F and be the character of 8-bit binary system internet payment password/fill character
Annotating 5:F is filling character of 8-bit binary system internet payment password
The ASCII character that each payment cipher converts to has the set form of table 2
Table 2
The position Length Explanation
1 2BYTE (byte) The length of internet payment password
2 22BYTE The character of 6~20 internet payment passwords (each character accounts for 1 Byte, the right short covering of insufficient section wrongly written or mispronounced character symbol, i.e. 0xFF)
Its character set is a listed character in the standard A SCII conversion table.
A2: again each character conversion in the ASCII character is become corresponding hexadecimal number, form encrypted data chunk emphatically.
Example is as follows:
123
Because payment cipher all is that character expressly shows, so need it at first is converted to ASCII character, be converted into hexadecimal number more here, as shown in table 3.
Table 3
The internet payment password expressly H e l L O 1 2 3
The ASCII of each character correspondence 72 101 108 108 111 33 49 50 51
The hexadecimal of each character correspondence 0x48 0x65 0x6C 0x6C 0x6F 0x21 0x31 0x32 0x33
According to above-described additional principle, the length position of two characters is mended in the front, and this password is totally 9 characters, therefore mends 09 two characters, and being converted to ASCII is 48 and 57, and being converted to hexadecimal is 0x30 and 0x39.The back need replenish 13 blank character, and being converted to hexadecimal is 0xFF, and therefore the internet payment cryptographic block that finally obtains is as follows:
0x30 0x39 0x48 0x65 0x6C 0x6C 0x6F 0x21 0x31 0x32 0x33 0xFF 0xFF0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF 0xFF
With payment cipher piece composing document or packet, more described file or packet are encrypted.Its encryption key adopts the encryption key of PIN, and cryptographic algorithm is that double-length or single-length are selected double-length cryptographic algorithm or single-length cryptographic algorithm for use according to key.
Its inverse process for the transmitting terminal deciphering of the deciphering of receiving terminal has just omitted at this.
See also Fig. 3, it is the flow chart of another kind of data security transmission disclosed by the invention.It comprises:
S310: transmitting terminal will need to focus on ciphered data and convert 16 systems earlier to, form the encrypted data chunk emphatically of set form;
S320: transmitting terminal will comprise the data of focusing on encrypted data chunk and encrypt the back transmission;
S330: the data that receiving terminal deciphering earlier receives then, according to the described encrypted data chunk emphatically of the step deciphering of step S310 correspondence, need to obtain ciphered data emphatically.
Wherein, adopt the cryptographic algorithm of double-length to encrypt the described data that need transmission among the step S320.And comprise: the binary number of each byte is converted to two hexadecimals in the invisible character that obtains after the double-length cryptographic algorithm is encrypted, and again two hexadecimal numbers is converted to visible ASCII character.
Below be example with the VIP primary account number in the VIP file, specify above-mentioned flow process.
The VIP file is meant the data file that each tame bank formulates its Very Important Person (holder that price is promptly arranged very much) relevant information.The card number that has comprised VIP client in the VIP file, and the important information of each holder in the corresponding card number is set below corresponding each card number.The VIP file needs regular update, for the ease of Unionpay or other trade company that has qualification to guarantee VIP is served, and each tame bank can regularly be sent to the VIP file Unionpay or other trade company that has qualification to guarantee.In order to guarantee of the fail safe of VIP file in transmission over networks, not only the VIP file is maintained secrecy, also need the card number of each the VIP client in the VIP file is encrypted, therefore the important information in the VIP file is exactly VIP client's a card number, as long as this content is encrypted, also be nonsensical even the VIP file is stolen.Therefore, be stolen, need number encrypt the vip card in this transmission course in order to prevent VIP client's card number.
The cryptographic algorithm of design VIP file primary account number is as follows:
Primary account number all is made of numeral, just because card number all directly is made of numeral, therefore can directly be converted to binary system, need not want the middle transition of an ASCII, and this is the place different with the internet payment password.Therefore, its formation with encrypted data chunk is designed to be similar to the form of online PIN, but primary account number length is far longer than online PIN, so remain different on specific implementation, form is as follows:
Table 4
N N P P P P P P P P P P P P / F P / F P / F P / F P / F P / F P / F P / F F F F F F F F F F F F
Annotating 1:N is the length (4-bit) of VIPPAN
Annotating 2:P is the number of 4-bit binary system VIPPAN
Annotating 3:P/F is number/FILLER of 4-bit binary system VIPPAN
Notes 4:F is 4-bit%B1111 (FILLER)
Summarize for its form and be:
Table 5
The position Length Explanation
1 1BYTE The length of VIPPAN
2 15BYTE 11-19 position VIPPAN (each character accounts for 4 BIT, the right F that mends of insufficient section)
Its character set is:
Table 6
(brief note is VIP primary account number character: VIPPAN) Binary representation
0 0000
1 0001
2 0010
3 0011
4 0100
5 0101
6 0110
7 0111
8 1000
9 1001
Example is as follows:
Plaintext VIPPAN:1234567890123456789
Then VIPPAN BLOCK is:
0x19 0x12 0x34 0x56 0x78 0x90 0x12 0x34 0x56 0x78 0x9F 0xFF 0xFF0xFF 0xFF 0xFF
What the generation of its encryption key was adopted is the key generating mode that is similar to the file verification sign indicating number, (generation of key is different with the Internet also all to generate simultaneously this encryption key during each spanned file at random, here all generate at random, this is to consider the maintenance mode of file to key at every turn.And the key of the Internet is to deposit in advance, can not change over a period to come), and deposit in the particular segment of VIP file.The recipient at first takes out this key after receiving the VIP file, with this key VIP primary account number ciphertext is decrypted then.For guaranteeing the safety of these data, used key is the double-length key, and used computational algorithm is the double-length cryptographic algorithm.
In fact have only 16 bytes by the VIP primary account number ciphertext that the double-length cryptographic algorithm is calculated, and mostly be invisible character, for making it become character visible, also need to carry out the conversion that binary representation is represented to ASCII character, be that each is scaled two hexadecimal numbers with binary number earlier, then the hexadecimal number character be converted to ASCII character.
Example is as follows:
If a byte of calculating is 11110001, it can be exchanged into two hexadecimal number F1 so, again these two hexadecimal numbers is converted into ascii character " F " and " 1 ".At last, a sightless byte number 11110001 conversions are for two character visible F1.
More than disclosed only for the several specific embodiments of the present invention, but the present invention is not limited thereto, any those skilled in the art can think variation all should drop in protection scope of the present invention.

Claims (11)

1, a kind of method of data security transmission is characterized in that, comprising:
(1) transmitting terminal will need emphatically that ciphered data converts ASCII character earlier to, again each character conversion in the ASCII character be become corresponding hexadecimal, form the encrypted data chunk emphatically of set form;
(2) transmitting terminal will comprise emphatically the data of encrypted data chunk and encrypt the back and send;
(3) receiving terminal is deciphered the data that receive earlier, then, according to the described encrypted data chunk emphatically of the corresponding step deciphering of step (1), obtains ciphered data emphatically.
2, the method for data security transmission as claimed in claim 1 is characterized in that, adopts the cryptographic algorithm of double-length or single-length to encrypt the described data that need send in the step (2).
3, the method for data security as claimed in claim 1 transmission is characterized in that, comprises in the described encrypted data chunk of step (1) that described needs focus on the length of enciphered data.
4, as the method for claim 1 or the transmission of 3 described data securities, it is characterized in that the described ciphered data that needs is the internet payment password, and, adopt the encryption key of PIN to encrypt in the step (2), adopt corresponding decruption key to be decrypted in the step (3).
5, a kind of method of data security transmission is characterized in that, comprising:
(1) transmitting terminal will need emphatically that ciphered data converts 16 systems earlier to, form the encrypted data chunk emphatically of set form;
(2) transmitting terminal will comprise emphatically the data of encrypted data chunk and encrypt the back and send;
(3) receiving terminal is deciphered the data that receive earlier, then, according to the described encrypted data chunk emphatically of the corresponding step deciphering of step (1), obtains ciphered data emphatically.
6, the method for data security transmission as claimed in claim 5 is characterized in that, adopts the cryptographic algorithm of double-length or single-length to encrypt the described data that need send in the step (2).
7, the method for data security transmission as claimed in claim 6, it is characterized in that, step (2) also comprises: the binary number of each byte is converted to two hexadecimals in the invisible character that obtains after the double-length cryptographic algorithm is encrypted, again two hexadecimal numbers are converted to visible ASCII character, perhaps
Binary number is converted to two hexadecimals in each byte of all data that obtain after the double-length cryptographic algorithm encrypted, again two hexadecimal numbers is converted to visible ASCII character.
8, the method for data security as claimed in claim 6 transmission is characterized in that step (2) also comprises: adopt the key generating mode of file verification sign indicating number to generate encryption key, and, transmitting terminal with the encryption key transmitting terminal to receiving terminal.
9, a kind of method of data security transmission is characterized in that, comprising:
(1) transmitting terminal will need the initial data of re-encryption to be converted to Unified coding;
(2) the transmitting terminal data that will comprise Unified coding are encrypted the back and are sent;
(3) receiving terminal is deciphered the data that receive earlier, then, deciphers described Unified coding data according to the step that step (1) is corresponding, needing to obtain the initial data of re-encryption.
10, the method for data security transmission as claimed in claim 9 is characterized in that initial data is converted to Unified coding and is specially:
To need the initial data of re-encryption to convert ASCII character earlier to, again each character conversion in the ASCII character is being become corresponding hexadecimal, forming the encrypted data chunk emphatically of set form; Perhaps
To need to focus on ciphered data and convert 16 systems earlier to, form the encrypted data chunk emphatically of set form.
11, the method for data security as claimed in claim 9 transmission is characterized in that, if transmitting terminal and receiving terminal are a local area network (LAN), then transmitting terminal and receiving terminal internal transmission be Unified coding after encryption, but not needing the initial data of re-encryption.
CN 200510111963 2005-12-21 2005-12-21 Data safety transmission method Pending CN1988441A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 200510111963 CN1988441A (en) 2005-12-21 2005-12-21 Data safety transmission method
PCT/CN2006/002417 WO2007071140A1 (en) 2005-12-21 2006-09-15 A method for transmitting data securely

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200510111963 CN1988441A (en) 2005-12-21 2005-12-21 Data safety transmission method

Publications (1)

Publication Number Publication Date
CN1988441A true CN1988441A (en) 2007-06-27

Family

ID=38185085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200510111963 Pending CN1988441A (en) 2005-12-21 2005-12-21 Data safety transmission method

Country Status (2)

Country Link
CN (1) CN1988441A (en)
WO (1) WO2007071140A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102256246A (en) * 2011-07-05 2011-11-23 上海市安全生产科学研究所 Data transfer encryption method for mobile communication
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication
CN103973633A (en) * 2013-01-25 2014-08-06 苏州精易会信息技术有限公司 Method for improving safety of extranet data applications
CN104363232A (en) * 2014-11-03 2015-02-18 叶春林 Anti-disclosure structure mode in daily communication
CN104410619A (en) * 2014-11-21 2015-03-11 中国联合网络通信集团有限公司 Instant messaging method and instant messaging system
CN104461884A (en) * 2014-12-05 2015-03-25 北京奇虎科技有限公司 Method and device for generating input data of test tools
CN104618367A (en) * 2015-01-27 2015-05-13 杨勇 Transfer privacy device and data transmission method
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN105471829A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Signal transmission method and system
CN105556880A (en) * 2013-03-14 2016-05-04 麻省理工学院 Method and apparatus for secure communication
CN107786331A (en) * 2017-09-28 2018-03-09 平安普惠企业管理有限公司 Data processing method, device, system and computer-readable recording medium
CN110768785A (en) * 2019-10-22 2020-02-07 宜人恒业科技发展(北京)有限公司 Encoding and decoding methods, related devices and computer equipment
CN111523905A (en) * 2020-04-26 2020-08-11 北京中关村银行股份有限公司 Security authentication method and device for verification code, storage medium and electronic equipment
CN112532388A (en) * 2020-12-04 2021-03-19 广州羊城通有限公司 Encryption method and device for air-issued data of air-issued card

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5680460A (en) * 1994-09-07 1997-10-21 Mytec Technologies, Inc. Biometric controlled key generation
CN1158631C (en) * 1999-09-07 2004-07-21 李东声 Method of realizing key data specificity in safe IC card business
CN1622510A (en) * 2003-11-28 2005-06-01 神达电脑股份有限公司 Data security method of WLAN and architecture thereof

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102256246A (en) * 2011-07-05 2011-11-23 上海市安全生产科学研究所 Data transfer encryption method for mobile communication
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication
CN103684760B (en) * 2012-09-24 2018-12-07 腾讯科技(深圳)有限公司 The encryption of communication and the method, apparatus of decryption and system
CN103067162A (en) * 2012-11-15 2013-04-24 新浪技术(中国)有限公司 Method and device of data transmission
CN103067162B (en) * 2012-11-15 2016-08-03 新浪技术(中国)有限公司 A kind of method and device of data transmission
CN103973633A (en) * 2013-01-25 2014-08-06 苏州精易会信息技术有限公司 Method for improving safety of extranet data applications
CN105556880A (en) * 2013-03-14 2016-05-04 麻省理工学院 Method and apparatus for secure communication
CN105471829A (en) * 2014-09-05 2016-04-06 深圳市同盛绿色科技有限公司 Signal transmission method and system
CN104363232A (en) * 2014-11-03 2015-02-18 叶春林 Anti-disclosure structure mode in daily communication
CN104363232B (en) * 2014-11-03 2017-12-01 叶春林 Anti-disclosure system in periodic traffic
CN104410619A (en) * 2014-11-21 2015-03-11 中国联合网络通信集团有限公司 Instant messaging method and instant messaging system
CN104410619B (en) * 2014-11-21 2017-12-19 中国联合网络通信集团有限公司 Instant communicating method and system
CN104461884B (en) * 2014-12-05 2018-03-13 北京奇虎科技有限公司 A kind of method and apparatus for the input data for generating testing tool
CN104461884A (en) * 2014-12-05 2015-03-25 北京奇虎科技有限公司 Method and device for generating input data of test tools
CN104618367A (en) * 2015-01-27 2015-05-13 杨勇 Transfer privacy device and data transmission method
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system
CN107786331A (en) * 2017-09-28 2018-03-09 平安普惠企业管理有限公司 Data processing method, device, system and computer-readable recording medium
CN107786331B (en) * 2017-09-28 2020-03-17 平安普惠企业管理有限公司 Data processing method, device, system and computer readable storage medium
CN110768785A (en) * 2019-10-22 2020-02-07 宜人恒业科技发展(北京)有限公司 Encoding and decoding methods, related devices and computer equipment
CN111523905A (en) * 2020-04-26 2020-08-11 北京中关村银行股份有限公司 Security authentication method and device for verification code, storage medium and electronic equipment
CN112532388A (en) * 2020-12-04 2021-03-19 广州羊城通有限公司 Encryption method and device for air-issued data of air-issued card
CN112532388B (en) * 2020-12-04 2023-10-13 广州羊城通有限公司 Encryption method and device for air issuing data of air issuing card

Also Published As

Publication number Publication date
WO2007071140A1 (en) 2007-06-28

Similar Documents

Publication Publication Date Title
CN1988441A (en) Data safety transmission method
CN102317904B (en) System and methods for encryption with authentication integrity
JP6301471B2 (en) ID authentication system, apparatus, method, and ID authentication request apparatus
US6266413B1 (en) System and method for synchronizing one time pad encryption keys for secure communication and access control
CN103401679B (en) Method for encrypting and decoding two-dimensional codes
AU2008327506B2 (en) Method and system for encryption of data
CN102752115B (en) Challenge code generating method and device, dynamic password authentication method and system
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN102833244B (en) Communication method for authentication by fingerprint information
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN107294964B (en) Information transmission method
CN110661746B (en) Train CAN bus communication security encryption method and decryption method
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN101677269A (en) Method and system for transmitting keys
CN111769836A (en) Encryption transmission algorithm based on BASE64
JP2015213288A (en) Optical code, information transmission method, and authentication method
CN110210270A (en) Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system
CA2819211A1 (en) Data encryption
JPH0244389A (en) Ic card apparatus
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
KR100432611B1 (en) System for providing service to transmit and receive document based on e-mail system and method thereof
EP1166491A2 (en) System, device and method for secure communication and access control
JP2022517381A (en) Devices in a multicast group
KR100828558B1 (en) The financial system and the method which create a variable height arrangement
CN103746793A (en) Number form text encryption and decryption methods

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20070627