CN100465979C - CPK based digital copyright authentication protection system and method - Google Patents
CPK based digital copyright authentication protection system and method Download PDFInfo
- Publication number
- CN100465979C CN100465979C CNB2006100837948A CN200610083794A CN100465979C CN 100465979 C CN100465979 C CN 100465979C CN B2006100837948 A CNB2006100837948 A CN B2006100837948A CN 200610083794 A CN200610083794 A CN 200610083794A CN 100465979 C CN100465979 C CN 100465979C
- Authority
- CN
- China
- Prior art keywords
- digital
- customer
- operator
- cpk
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
Said system includes copyright certificate unit, CPK signature, copyright protection unit for according to operation side private key and identification, and client side private key and identification, through CPK algorithm ciphering signature authenticating, to obtain protection to copyright side copyright protection data in uses process. The present invention also provides CPK based on digit copyright authenticating protection method.
Description
Technical field
The present invention relates to digital communication safety certification field, particularly relate to a kind of digital copyright authentication protection system and method based on Conbined public or double key algorithm (CPK).
Background technology
Along with the development of IPTV, more and more relate to the protection problem of digital publishing rights proof and copyright in the broadcast of digital audio-video goods, the ownership proof of digital publishing rights is easy to accomplish, but crucial problem will provide easy verification method.Present in question various schemes, verification method are quite complicated, have almost lost feasibility.
For example, with the copyright proof system that PKI realizes, do not accomplish direct proof to sign; and can only therefore generally not pay attention in the digital copyright protecting field and use PKI by the responsible property of digital text being come indirect proof; such as digital watermark technology, be difficult to the verification method that provides generally acknowledged again.
In addition, the application of digital publishing rights does not at present also form under the ultra-large situation, seems a variety of technological means can both solve digital copyright protecting, but does not generally have the adaptive faculty to ultra-large copyright protection.Because it fails to solve scale management and ID authentication, the protection that only solves copyright that existing technology has and do not solve the proof of copyright, what have then only solves the proof of copyright and the protection of failing to solve copyright.
Summary of the invention
A kind of digital copyright authentication protection system and the method that the objective of the invention is to overcome above-mentioned defective and provide based on CPK.It had both solved the scale management, utilized ID authentication to verify again, can authenticate protection to digital publishing rights easily.
Be a kind of digital copyright authentication protection system of realizing that the object of the invention provides; comprise the rights certificate unit, the digital text that provides in copyright side is provided, identify according to copyright side; utilize registration side private key, the CPK that copyright data identifies with the digital text data is signed by the CPK algorithm.
Described rights certificate unit pack explanatory note in brackets volume side private key, sign, CPK algorithm unit, protocol element and PKI matrix unit.
Digital copyright authentication protection system of the present invention; also comprise the copyright protection unit, be used for private key and sign according to operator, and customer's private key and sign; by CPK algorithm for encryption signature authentication, the copyright protection data of copyright side are protected in use.
Described copyright protection unit comprises operator copyright protection unit and customer's copyright protection unit.
Operator copyright protection unit; be used for private key,, utilize the CPK private key signature of operator by the CPK algorithm according to customer's request mark and operator; and utilize the customer to identify to calculate customer's PKI, and with being transferred to customer's copyright protection unit behind the public key encryption signed data.
Customer's copyright protection unit; be used to utilize the customer to identify and propose the request for utilization of digital publishing rights text to operator; and receive the ciphering signature data that operator copyright unit sends; then by the CPK algorithm; utilize customer's private key; with this data decryption, utilize operator sign to calculate the operator PKI at last, and with the public key verifications operator true and false of signing.
Described operator copyright protection unit comprises the authentication unit of digital signature, CPK authentication ' unit such as key change unit; Described customer's copyright protection unit comprises private key, sign and key change unit.
Described digital copyright authentication system is the PnP device that is embedded in U rod or the IC-card.
For realizing that purpose of the present invention also provides a kind of digital copyright authentication guard method, comprises the following steps:
Steps A 1) registration side utilizes the CPK private key that the digital version token is known, and utilizes asymmetric arithmetic, as elliptic curve encryption algorithm, carries out security signature;
Steps A 2) utilize hash function to calculate the integrity code of digital publishing rights;
Steps A 3) registration side utilizes the CPK private key to the digital publishing rights integrity code, utilizes asymmetric arithmetic, carries out security signature;
Steps A 4) note is had the rights certificate of digital signature and digital text give property right side, the entitlement to digital version is claimed with the authenticity of rights certificate and digital text proof copyright by property right side;
Steps A 5) to this rights certificate and digital text, any third party can go checking with the PKI of registration side, uses rights certificate, by the registration square mark, utilize copyright proof unit, promptly can calculate registration side's PKI, utilize this PKI just can verify the true and false of rights certificate.
Digital copyright authentication guard method of the present invention, steps A 5) also can comprise the following steps: afterwards
Step B) customer will utilize the private key of oneself according to the digital copyright protecting certificate, and the sign of the digital text that desire is used is signed, and proposes the use request of digital text then to operator;
Step C) after operator receives request, utilize the customer to identify, calculate client's PKI by the PKI matrix unit in the digital copyright protecting unit, utilize customer's PKI inspection client's application, then with sign this digital text and send to the customer of operator private key and customer's mark encryption thereafter;
Step D) customer deciphers and obtains symmetric key with the private key of oneself; Use symmetric key then, obtain digital text by corresponding symmetry algorithm deciphering.
Described step C) can comprise the following steps:
Step C1) operator copyright protection unit generates random number;
Step C2) utilize described random number to calculate symmetric key;
Step C3) utilizes symmetric key, by symmetry algorithm (as aes algorithm), to digital text encryption;
Step C4) utilize the customer to identify, calculate client's PKI, utilize PKI then by the PKI matrix unit in the operator digital copyright protecting unit, by rivest, shamir, adelman to symmetric key encryption;
Step C5) operator sends to the client with the ciphering signature data.
Described step D) can comprise the following steps:
Step D1) customer is with the private key of oneself, and by corresponding asymmetric arithmetic, deciphering obtains symmetric key;
Step D2) customer uses symmetric key, by corresponding symmetry algorithm, and the decryption restoration digital text;
Step D3) customer's copyright protection unit by using operator sign calculates the operator PKI, utilizes the public key verifications signature digital text true and false, confirms that signature back customer normally uses digital text.
The invention has the beneficial effects as follows: digital copyright authentication protection system and method based on CPK of the present invention; because the CPK technology is the key management technology of scale; be based on the key distribution technology (being the proof of identity system) of sign again; therefore; can realize the paid utilization of copyright in the ultra-large charge using system easily and in dispute over copyright the proof of copyright ownership, its verification method is simple and direct, easy.
Description of drawings
Fig. 1 is the digital copyright authentication protection system synoptic diagram that the present invention is based on CPK;
Fig. 2 is the digital copyright authentication guard method process flow diagram that the present invention is based on CPK.
Embodiment
Below in conjunction with the accompanying drawings a kind of digital copyright authentication protection system and method based on CPK of the present invention being described in further detail.
The present invention is based on Conbined public or double key (CPK) algorithm, and for digital publishing rights provides the stamped signature of protecting based on the authentication of sign and tests Zhang Gongneng, it solves proof and the protection system and the method for digital publishing rights simultaneously with a kind of CPK key technique.
(Combined Pubic Key CPK) is based on the public key algorithm of sign to the Conbined public or double key algorithm, and its KMC generates private key calculating parameter (private key calculates base) and the PKI calculating parameter (PKI calculates basic) that corresponds to each other; According to the sign that first user provides, utilize described private key calculating parameter to calculate first user's private key, and the private key that is produced is offered first user; And announce described PKI calculating parameter, so that second user can utilize described PKI calculating parameter according to first user's sign after the sign that obtains first user, calculate first user's PKI.
On the basis that has proposed the CPK algorithm, a kind of CPK chip also is provided, the CPK chip has CPK algorithm function unit, indentification protocol unit, applicant's Chinese invention patent application 2005100021564 based on the key generation apparatus of sign and method in embodiment described, quote in full in the present invention.The algorithm function unit of CPK and indentification protocol unit provide required all parameters of authentication and agreement, utilize the PKI matrix then just can calculate the PKI of any entity.
The appearance of CPK algorithm and CPK chip is for realizing scale and providing technical foundation to the direct checking that identifies.
The digital copyright authentication protection generally is made up of copyright side, registration side, operator, customer.Between copyright side and registration side, form the proof relation; Between operator and customer, form protection (charge) relation.
Digital copyright authentication protection system of the present invention; comprise the rights certificate unit; comprise registration side's private key, sign, CPK algorithm unit; protocol element and PKI (times point) matrix unit; be used for digital text, in the digital text that copyright side provides, identify according to copyright side by copyright side; utilize registration side private key, the CPK that copyright data identifies with the digital text data is signed by the CPK algorithm.
Digital copyright authentication protection system of the present invention also comprises the copyright protection unit; be used for private key and sign according to operator; and customer's private key and sign, by CPK algorithm for encryption signature authentication, the copyright protection data of copyright side are protected in use.
Described copyright protection unit comprises operator copyright protection unit and customer's copyright protection unit.
Operator copyright protection unit; authentication unit with digital signature; CPK authentication ' unit such as key change unit; be used for private key according to customer's request mark and operator; by the CPK algorithm; utilize the CPK private key signature of operator, and utilize the customer to identify to calculate customer's PKI, and with being transferred to customer's copyright protection unit behind the public key encryption signed data.
Customer's copyright protection unit; comprise private key, sign and key change unit; be used to utilize the customer to identify and propose the request for utilization of digital publishing rights text to operator; and receive the ciphering signature data that operator copyright unit sends; by the CPK algorithm, utilize customer's private key, then with this data decryption; utilize operator sign to calculate the operator PKI at last, and with the public key verifications operator true and false of signing.
Digital copyright authentication of the present invention system can be the CPK chip, the CPK chip
This CPK chip can be the U rod, PnP devices such as IC-card.
Preferably, the CPK chip of this system can be to be embedded in plug and play U rod, the IC-card, comprises private key and sign, supports CPK computing and signature agreement, Internet Key Exchange Protocol, and relevant rights and interests.
The registration root is declared according to property right side, makes the granting rights certificate by authenticating the back.Rights certificate comprises the rights certificate unit, to the proof of digital version sign with to the proof of digital version integrality.Rights certificate of the present invention, different with other specialized equipments to the checking of rights certificate, it can all can carry out in any equipment with authentication function, and the universalization of Authentication devices has increased the feasibility of this proof and verification system greatly.
The protection of digital publishing rights is providing with compensation of forming between operator and customer, the contractual relation of licensing, and just the customer obtains the corresponding right to use after operator is paid dues, and is also referred to as and licenses.What of expense are relevant with the right to use, and are specifically definite in the mode of both sides' contract.The mandate of operator realizes with the copyright protection certificate form.The customer comprises client CPK private key in the copyright protection certificate, so that can carry out CPK signature operation and cipher key exchange operations.Client's CPK signature carries out when the digital copyright protecting certificate request, is used for the authority that operator is chargeed.
The basic skills of digital copyright protecting is to encrypt to transmit, and guarantees that with this customer who only is authorized to could understand, and unauthorized client side then can't understand.In the digital copyright protecting certificate, also stipulate relevant mandate and rights and interests.
In digital version protection process, produce the protection requirement between operator and the customer, promptly in the scope that operator allows, use digital publishing rights and digital text.
Sign digital version use contract customer and operator; then the customer according to contract after operator is delivered for use expense; operator is provided the digital copyright protecting certificate to the customer; this certificate comprises the digital copyright protecting unit, is used to utilize the CPK algorithm that the copyright protection data are identified CPK signature with digital rights data.
Below in conjunction with digital copyright authentication protection system digital copyright authentication guard method of the present invention is described in further detail:
Steps A) copyright side is proved the ownership of copyright and is utilized the integrity code of CPK private key in registration side to knowledge of digital version token and digital publishing rights by registration side to registration side's registration digital publishing rights, utilizes CPK algorithm signature proof.
Certificate can be that paper is situated between, and also can be electronics.If electronics, certificate can be attached to the digital version back.Promptly
Steps A 1) registration side utilizes the CPK private key that the digital version token is known, and utilizes asymmetric arithmetic, as elliptic curve encryption algorithm, carries out security signature.That is:
SIG
The side's of registration private key(digital version sign)=sign1; Sign1 is the registration department signature of the private key of oneself to the sign of digital version.
Steps A 2) utilize hash function to calculate the integrity code of digital publishing rights, i.e. HASH (digital publishing rights)=mac; Mac is the integrity code with the digital version of hash function HASH calculating.
Steps A 3) registration side utilizes the CPK private key to the digital publishing rights integrity code, utilizes asymmetric arithmetic, carries out security signature.Be SIG
The side's of registration private key(MAC)=sign2; Sign2 is the registration department signature of the private key of oneself to the digital version integrity code.
Steps A 4) note is had the rights certificate of digital signature sign1 and sign2 and digital text give property right side, the entitlement to digital version is claimed with the authenticity of rights certificate and digital text proof copyright by property right side.
Sign1 provides the proof of digital version sign, and sign2 provides the proof of digital version integrality.
Steps A 5) to this rights certificate and digital text, any third party can go checking with the PKI of registration side, uses rights certificate, by the registration square mark, utilize copyright proof unit, promptly can calculate registration side's PKI, utilize this PKI just can verify the true and false of rights certificate.
Can should have signature function with the functional module in the CPK copyright proof unit of configuration in each registration, also have authentication function signature.So that provide certificate separately, also can also can verify the certificate that other registration sides provide, the judgement of digital publishing rights ownership is provided.Except the side of registration, other have the authenticating device of the CPK signature algorithm of authentication function, all can carry out the judgement of copyright ownership, and this brings great convenience for the dispute of property ownership and proof.
Step B) customer will utilize the private key of oneself according to the digital copyright protecting certificate, and the sign of the digital text that desire is used is signed, and proposes the use request of digital text then to operator.The way of submission of request is:
SIG
Customer's private key(digital version sign)=sign;
The customer provides digital publishing rights sign and the signature of oneself to operator, provides non-repudiation to prove to operator.
Step C) after operator receives request; utilize the customer to identify; calculate client's PKI by the PKI matrix unit in the digital copyright protecting unit; utilize customer's PKI inspection client's application thereafter; and place on record; the authority that do to charge is then with sign this digital text and send to the customer of operator private key and customer's mark encryption.Its send mode is as follows:
Step C1) operator copyright protection unit generates random number r;
Step C2) utilizes described random number to calculate symmetric key, calculate rG=key; G is a basic point, and key is a key;
Step C3) utilizes symmetric key, by symmetry algorithm (as aes algorithm), to digital text encryption: E
Key(digital version)=coded-text;
Step C4) utilize the customer to identify, calculate client's PKI by the PKI matrix unit in the digital copyright protecting unit, utilize PKI then, to symmetric key encryption, promptly calculate keyB=trans-key by rivest, shamir, adelman (as elliptic curve encryption algorithm); B is client's a PKI;
Step C5) operator sends to the client with ciphering signature data trans-key and coded-text.
Step D) customer is with the private key of oneself, and by corresponding asymmetric arithmetic, deciphering obtains symmetric key; Use symmetric key then, obtain digital text by corresponding symmetry algorithm deciphering.
Step D1) customer is with the private key b of oneself, and by corresponding asymmetric arithmetic, deciphering obtains symmetric key key, that is:
b
-1(trans-key)=b
-1rB=rG=key;
Step D2) customer uses symmetric key key, by corresponding symmetry algorithm, and decryption restoration signature digital text:
D
Key(coded-text)=digital version;
Step D3) customer's copyright protection unit by using operator sign calculates the operator PKI, utilizes the public key verifications signature digital text true and false, if confirm signature, then the customer normally uses digital text; Otherwise the customer can refuse to use.
From customer's needs, customer's rights certificate comprises that private key and signature agreement (when submitting request for utilization to) and Internet Key Exchange Protocol (when digital publishing rights is downloaded) just can.
Preferably, in order to prevent illegal diffusion, when each picture deciphering is play, in picture, add the visual sign of this player automatically, so easy tracking diffuse source.
Present embodiment is in order to understand the detailed description that the present invention carries out better; it is not the qualification of scope that the present invention is protected; therefore, those of ordinary skills do not break away from purport of the present invention without creative work to this bright change of making in protection scope of the present invention.
Claims (9)
1. the digital copyright authentication protection system based on CPK is characterized in that, comprises the rights certificate unit, the digital text that provides in copyright side is provided, according to copyright side sign, utilize registration side private key, by the CPK algorithm CPK that copyright data identifies with the digital text data is signed;
Described rights certificate unit pack explanatory note in brackets volume side private key, sign, CPK algorithm unit, protocol element and PKI matrix unit;
Described CPK is the Conbined public or double key algorithm.
2. digital copyright authentication protection system according to claim 1; it is characterized in that; also comprise the copyright protection unit; be used for private key and sign according to operator; and customer's private key and sign; by CPK algorithm for encryption signature authentication, the copyright protection data of copyright side are protected in use.
3. digital copyright authentication protection system according to claim 2 is characterized in that, described copyright protection unit comprises operator copyright protection unit and customer's copyright protection unit;
Operator copyright protection unit, be used for private key,, utilize the CPK private key signature of operator by the CPK algorithm according to customer's request mark and operator, and utilize the customer to identify to calculate customer's PKI, and with being transferred to customer's copyright protection unit behind the public key encryption signed data;
Customer's copyright protection unit; be used to utilize the customer to identify and propose the request for utilization of digital publishing rights text to operator; and receive the ciphering signature data that operator copyright unit sends; then by the CPK algorithm; utilize customer's private key; with this data decryption, utilize operator sign to calculate the operator PKI at last, and with the public key verifications operator true and false of signing.
4. the digital copyright authentication protection system of stating according to claim 3 is characterized in that, described operator copyright protection unit comprises the authentication unit of digital signature, key change unit; Described customer's copyright protection unit comprises private key, sign and key change unit.
5. according to each described digital copyright authentication protection system of claim 1 to 4, it is characterized in that described digital copyright authentication system is the PnP device that is embedded in U rod or the IC-card.
6. the digital copyright authentication guard method based on CPK is characterized in that, comprises the following steps:
Steps A 1) registration side utilizes the CPK private key that the digital version token is known, and utilizes asymmetric arithmetic, carries out security signature;
Steps A 2) utilize hash function to calculate the integrity code of digital publishing rights;
Steps A 3) registration side utilizes the CPK private key to the digital publishing rights integrity code, utilizes asymmetric arithmetic, carries out security signature;
Steps A 4) note is had the rights certificate of digital signature and digital text give property right side, the entitlement to digital version is claimed with the authenticity of rights certificate and digital text proof copyright by property right side;
Steps A 5) to this rights certificate and digital text, any third party can go checking with the PKI of registration side, uses rights certificate, by the registration square mark, utilize copyright proof unit, promptly can calculate registration side's PKI, utilize this PKI just can verify the true and false of rights certificate.
7. digital copyright authentication guard method according to claim 6 is characterized in that, steps A 5) also comprise the following steps: afterwards
Step B) customer will utilize the private key of oneself according to the digital copyright protecting certificate, and the sign of the digital text that desire is used is signed, and proposes the use request of digital text then to operator;
Step C) after operator receives request, utilize the customer to identify, calculate client's PKI by the PKI matrix unit in the digital copyright protecting unit, utilize customer's PKI inspection client's application, then with sign this digital text and send to the customer of operator private key and customer's mark encryption thereafter;
Step D) customer deciphers and obtains symmetric key with the private key of oneself; Use symmetric key then, obtain digital text by corresponding symmetry algorithm deciphering.
8. according to the described digital copyright authentication guard method of claim 7, it is characterized in that described step C) comprise the following steps:
Step C1) operator copyright protection unit generates random number;
Step C2) utilize described random number to calculate symmetric key;
Step C3) utilizes symmetric key, by symmetry algorithm, to digital text encryption;
Step C4) utilize the customer to identify, calculate client's PKI, utilize PKI then by the PKI matrix unit in the operator digital copyright protecting unit, by rivest, shamir, adelman to symmetric key encryption;
Step C5) operator sends to the client with the ciphering signature data.
9. digital copyright authentication method according to claim 8 is characterized in that, described step D) comprise the following steps:
Step D1) customer is with the private key of oneself, and by corresponding asymmetric arithmetic, deciphering obtains symmetric key;
Step D2) customer uses symmetric key, by corresponding symmetry algorithm, and the decryption restoration digital text;
Step D3) customer's copyright protection unit by using operator sign calculates the operator PKI, utilizes the public key verifications signature digital text true and false, confirms that signature back customer normally uses digital text.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100837948A CN100465979C (en) | 2006-06-06 | 2006-06-06 | CPK based digital copyright authentication protection system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2006100837948A CN100465979C (en) | 2006-06-06 | 2006-06-06 | CPK based digital copyright authentication protection system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1851726A CN1851726A (en) | 2006-10-25 |
CN100465979C true CN100465979C (en) | 2009-03-04 |
Family
ID=37133205
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2006100837948A Expired - Fee Related CN100465979C (en) | 2006-06-06 | 2006-06-06 | CPK based digital copyright authentication protection system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100465979C (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102567658A (en) * | 2010-12-21 | 2012-07-11 | 新奥特(北京)视频技术有限公司 | DRM (digital rights management) application method in transaction platform |
CN104753671A (en) * | 2013-12-27 | 2015-07-01 | 东方斯泰克信息技术研究院(北京)有限公司 | Method of interconnection among network entities, device, CYBERnet construction method and device |
CN104901940A (en) * | 2015-01-13 | 2015-09-09 | 易兴旺 | 802.1X network access method based on combined public key cryptosystem (CPK) identity authentication |
CN109429106A (en) * | 2017-08-31 | 2019-03-05 | 北京海威汇达计算机技术有限责任公司 | Program request movie theatre pro digital cinematographic projector broadcast control system |
CN110516415A (en) * | 2019-08-28 | 2019-11-29 | 蒋勇 | A kind of method and its application of the digital content distribution based on chain |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020095579A1 (en) * | 1997-06-05 | 2002-07-18 | Hiroshi Yoshiura | Digital data authentication method |
US20030023564A1 (en) * | 2001-05-31 | 2003-01-30 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
-
2006
- 2006-06-06 CN CNB2006100837948A patent/CN100465979C/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020095579A1 (en) * | 1997-06-05 | 2002-07-18 | Hiroshi Yoshiura | Digital data authentication method |
US20030023564A1 (en) * | 2001-05-31 | 2003-01-30 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
Non-Patent Citations (4)
Title |
---|
CPK 认证体制的技术特点及应用. 汪宇光.电子科学技术评论,第2005年第2期. 2005 |
CPK 认证体制的技术特点及应用. 汪宇光.电子科学技术评论,第2005年第2期. 2005 * |
基于标识的组合公钥体制的原理. 陈华平.计算机安全,第2006年第2期. 2006 |
基于标识的组合公钥体制的原理. 陈华平.计算机安全,第2006年第2期. 2006 * |
Also Published As
Publication number | Publication date |
---|---|
CN1851726A (en) | 2006-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106327184B (en) | A kind of mobile intelligent terminal payment system and method based on secure hardware isolation | |
CN103490901B (en) | Key based on combination key system generates and distribution method | |
CN102413132B (en) | Two-way-security-authentication-based data downloading method and system | |
CN102271130B (en) | Method for safely delivering and distributing software | |
CN107196966A (en) | The identity identifying method and system of multi-party trust based on block chain | |
CN109257328B (en) | Safe interaction method and device for field operation and maintenance data | |
JP2006260538A5 (en) | ||
CN1831865B (en) | Electronic bank safety authorization system and method based on CPK | |
CN104580250A (en) | System and method for authenticating credible identities on basis of safety chips | |
AU2007286004B2 (en) | Compliance assessment reporting service | |
JPH09205424A (en) | Signature device and method | |
RU2008122778A (en) | KEY DISTRIBUTION FOR PROTECTED MESSAGE EXCHANGE | |
JP2009526322A5 (en) | ||
US20070074027A1 (en) | Methods of verifying, signing, encrypting, and decrypting data and file | |
CN104821883B (en) | A kind of protection privacy reference method based on asymmetric cryptographic algorithm | |
KR101879758B1 (en) | Method for Generating User Digital Certificate for Individual User Terminal and for Authenticating Using the Same Digital Certificate | |
CN104393993A (en) | A security chip for electricity selling terminal and the realizing method | |
CN104322003A (en) | Cryptographic authentication and identification method using real-time encryption | |
CN100465979C (en) | CPK based digital copyright authentication protection system and method | |
EP2827529B1 (en) | Method, device, and system for identity authentication | |
CN106656499A (en) | Terminal equipment dependable authentication method and system in digital copyright protection system | |
CN105191332B (en) | For the method and apparatus of the embedded watermark in unpressed video data | |
CN100377525C (en) | Method for realizing stream medium business service | |
CN101447873A (en) | Safe authentication and encrypted communication method | |
CN106027254A (en) | Secret key use method for identity card reading terminal in identity card authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20090304 Termination date: 20200606 |