CN101729256B - Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark - Google Patents

Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark Download PDF

Info

Publication number
CN101729256B
CN101729256B CN2008102167827A CN200810216782A CN101729256B CN 101729256 B CN101729256 B CN 101729256B CN 2008102167827 A CN2008102167827 A CN 2008102167827A CN 200810216782 A CN200810216782 A CN 200810216782A CN 101729256 B CN101729256 B CN 101729256B
Authority
CN
China
Prior art keywords
fingerprint
information
watermark
digital
fingerprint image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008102167827A
Other languages
Chinese (zh)
Other versions
CN101729256A (en
Inventor
刘连生
刘海生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen POKA Electronic Equipment Co., Ltd.
Shenzhen Rongxin Software Technology Co., Ltd.
Original Assignee
SHENZHEN POKA SOFTWARE TECHNOLOGY Co Ltd
SHENZHEN POKA ELECTRONIC EQUIPMENT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN POKA SOFTWARE TECHNOLOGY Co Ltd, SHENZHEN POKA ELECTRONIC EQUIPMENT CO Ltd filed Critical SHENZHEN POKA SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2008102167827A priority Critical patent/CN101729256B/en
Publication of CN101729256A publication Critical patent/CN101729256A/en
Application granted granted Critical
Publication of CN101729256B publication Critical patent/CN101729256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a security certificate method based on fingerprint, cryptographic technology and fragile digital watermark, comprising the following steps: a sender collects a fingerprint image, calculates summary information of the fingerprint image and inserts the summary information, a secret key and digital information which is digitally signed and encrypted into the fingerprint image as a watermark; the fingerprint of the sender is collected, the fingerprint image inserted with the watermark is sent to a receiver after the fingerprint of the sender is qualified; after receiving information, the receiver firstly detects and verifies whether the fingerprint image is inserted with the digital watermark and whether the digital watermark is right or not so as to indentify identity authenticity; digital watermark information is extracted from the received image; the summary information of the fingerprint image from which the watermark is extracted is calculated; and the summary information is compared with the summary information of the fingerprint image recorded in the watermark information to approve information authenticity. The invention can effectively overcome the defects that the existing digital signature security certificate can not approve the legal KEY holder and the fingerprint in the fingerprint certificate is easy to clone and embezzle.

Description

Safety certifying method based on fingerprint, cryptographic technique, fragile digital watermark
Technical field
The present invention relates to computer technology, information security technology, Information Hiding Techniques, specifically is a kind ofly to distinguish the safety certifying method of identity and information truth and non repudiation based on what fingerprint, cryptographic technique, fragile digital watermark combined to solve network condition.
Background technology
Usually people mainly are the safety that guarantees its identity and information and communication through cryptographic technique with the mode of encryption at the computer information safe system aspects to the encryption of identity and information; But guarantee the safety in identity and information and the transmission in cybertimes, the fail safe of the technical guarantee that only accesses to your password system is normally not enough.No matter the encrypting and deciphering system that contemporary cryptology develops is symmetric-key systems (like DES); Or the higher open key system (RSA) of fail safe; Handle the ciphertext that is generated through AES and have randomness, not readable; Clearly pointed out the existence of security information on the contrary, thereby be easy to cause supervisor's attention, and carried out on this basis to the decoding of ciphertext or to sender and recipient's attack.Another the potential deficiency that adopts encryption technology is along with the developing rapidly of computer hardware, and what have computing capability cracks the increasingly mature of technology, only reaches through increasing key length that to strengthen fail safe no longer be unique feasible method.The possibility that password is cracked is increasing; Its content of back is just fully transparent in case enciphered data is cracked; Even illicit interception person can't decode after intercepting and capturing ciphertext; But redispatch after can it being destroyed, make the message that receives to be translated into expressly the deficiency that this also is to use password to exist in fail safe.
2008 the 4th phases " computer and information technology " disclose one piece and have been named as the paper of " based on the eCheck means of payment security study of digital watermarking and digital signature ", author Li You.This article has been discussed the implementation procedure of existing eCheck system in detail, has analyzed the digital signature correlated process that wherein relates to, and then has pointed out: be to require below the payment system that ensures satisfies basically with the digital signature: the 1. non repudiation of transmission; 2. the non-repudiation that receives; 3. receive information content integrality.But because digital signature itself need be attached to sending on the eCheck, so it has by the danger of disabled user's deletion; Simultaneously,, the intercepting by the hacker is arranged then, thereby the danger of revealing business secret is arranged if eCheck sends with clear-text way.For the latter; General solution is to send after adopting conventional encryption technique to encrypt; But along with the development of computer hardware technique, the possibility that password is decrypted is increasing, even illicit interception person can't decode after intercepting and capturing ciphertext; But redispatch after can it being destroyed, make the message that receives to be translated into expressly.This paper proposes a kind of eCheck payment system that has combined digital watermarking and digital signature at last, its cardinal principle be with through the check information after digital signature and the encryption and digital envelope together as watermark, be embedded in the carrier picture with the embedding algorithm as password with the other side's PKI; Transmit then; Thereby realize secret, safe, invisible and full communication, at the watermark extracting end, after receiving the watermark picture; Key with oneself extracts watermark through the watermark extracting algorithm; After confirming the watermark integrality, extract eCheck again, handle.This system has added digital watermark on the basis of original payment system based on digital signature, the characteristic that hides Info of the integrity protection of half breakable watermark and watermark makes the payment process of eCheck have higher fail safe.But still there is certain defective in this system aspect safety certification; Show: it is a kind of safety certification based on PKI (Public Key Infrastructure); CA (Certification Authority) can only confirm the legitimacy of KEY, and can't confirm the legal holder of KEY.
All there are certain defective in the cryptographic technique and the fingerprint identification technology of extensive use at present aspect safety certification, like the safety certification based on PKI, CA can only confirm the legitimacy of KEY, and can't confirm the legal holder of KEY; Because the physiological property of fingerprint is constant throughout one's life, can distinguish definite its identity through biological characteristic, but there is the risk of illegally being usurped by the clone simultaneously in fingerprint.
Application number is 02111629.6, denomination of invention is a kind of for the Chinese invention patent based on the lossless image digital watermark method of integer wavelet, the artificial Xuan Guorong of application discloses embeds data with computer software in digital picture; And can can't harm the processing method of recovery; It has specified embed digital watermark and the method for extracting digital watermarking; Wherein, The method of embed digital watermark comprises: grey level histogram adjustment for the first time, small echo direct transform, data embedding, inverse wavelet transform, grey level histogram adjustment for the second time, formation adds watermark image.The method of extracting digital watermarking comprises: grey level histogram adjustment for the third time, small echo direct transform, data extract, inverse wavelet transform, the 4th grey level histogram adjustment, recover initial image.This method can make digital watermarking and all ability 100% recoveries of original picture of information such as comprising the literal relevant with image, image, voice.
Summary of the invention
The purpose of this invention is to provide a kind of safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark; When realizing safety certification to solve existing employing digital watermarking and digital signature; Can only confirm the legitimacy of KEY; And can't confirm the legal holder of KEY, and the technical problem that existing computer fingerprint authentication exists fingerprint illegally to be usurped by the clone easily reaches the target to the true and unique non repudiation authentication of identity.
The present invention is based on integer wavelet algorithm damage-free digital watermarking; Utilize fingerprint image as carrier,, secret information or out of Memory are embedded in the fingerprint image simultaneously also with digital identity and biological identity binding; Through fingerprint image being embedded the extraction and the checking of secret information or out of Memory; Effectively differentiate the authenticity of fingerprint, thereby reach affirmation that effectively having solved can be by clone's defective through the computer system fingerprint to the identity authenticity; Effectively prevent the risk that fingerprint is stolen, thereby reach the true and unique non repudiation authentication goals of identity.
Technical scheme of the present invention is following: a kind of safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark may further comprise the steps:
Transmit leg is gathered fingerprint image, and said fingerprint image is calculated summary info, and said summary info is embedded in the said fingerprint image as watermark with key and through the digital information after digital signature and the encryption;
Through the fingerprint USBKEY of transmitting terminal, to gather sender's fingerprint and carry out finger print identifying, the fingerprint image with embed watermark after authentication is legal sends to the recipient;
The recipient is after receiving information; At first to the authenticity verification of identity; Comprise: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct; The authenticity of sender's identity is identified if digital watermarking is correct, is not identified if detect the authenticity identification of then sender's incorrect less than digital watermarking or watermark identity; Behind the authenticity verification of identity, carry out the authenticity verification of information, comprising: from the image that receives, extract digital watermark information; Fingerprint image after using the algorithm identical with transmit leg to the extraction watermark recomputates summary info; And with watermark information in the fingerprint image summary info put down in writing relatively, if identical, then qualified information is genuine and believable; Otherwise its information is not genuine and believable information, is the information of distorting.
Wherein, adopt the summary info of SHA256 algorithm computation fingerprint image.But transmit leg and the identical algorithm of the essential employing of recipient; Such as: the summary info that adopts SHA256 algorithm computation fingerprint image before the transmit leg embed watermark; The recipient also must adopt the SHA256 algorithm during summary info of the fingerprint image after calculating recovers after extracting watermark so.
Said fingerprint USBKEY comprises safety chip, and external fingerprint sensor of safety chip and USB interface are integrated with watermark and embed program, watermark extracting program, fingerprint comparison program and basic cryptographic algorithm in the safety chip.Wherein, can adopt the lossless image digital watermark based on integer wavelet to embed or extract damage-free digital watermarking to carrier image, said damage-free digital watermarking is meant that the information of embedding is harmless when extracting, and carrier image is also harmless after information extraction.
The present invention organically combines digital watermark technology, digital signature and fingerprint recognition, and it does carrier with fingerprint image, with the summary info of fingerprint image and through encrypt and digital signature after digital information embed in the said fingerprint image as watermark together; Then fingerprint image is transferred to the recipient, has realized the hidden transmission of information, in message transmitting procedure; If third party's monitoring or intercepting; Being seen just fingerprint picture if this image is carried out any processing, all will cause digital watermarking to damage; Therefore increased the sensitiveness of transmission information to attacking or distorting, this is that cryptographic technique can't be accomplished.
Owing to adopted finger print identifying, information transmitter at first will have digital certificate, and through biological identification (being fingerprint recognition), just can send information.And since with the summary info of fingerprint image also as watermark; So the summary info that the recipient can be through calculate recovering the back fingerprint image and with watermark in the summary info put down in writing compare; Differentiate the authenticity of fingerprint; Realization can't be carried out authentication to legal holder's authentication of KEY to the legal holder of KEY thereby can overcome effectively in the existing digital signature safety certification, and fingerprint is prone to cloned the technological deficiency of usurping in the existing finger print identifying.
Description of drawings
Fig. 1 is the theory diagram of fingerprint USBKEY among the present invention;
Fig. 2 is a basic application architecture of the present invention;
Fig. 3 is a security model block diagram of the present invention;
Fig. 4 is message transmitting procedure sketch map among the present invention.
Embodiment
The present invention is based on integer wavelet algorithm damage-free digital watermarking; Utilize fingerprint image as carrier,, secret information or out of Memory are embedded in the fingerprint image simultaneously also with digital identity and biological identity binding; Through fingerprint image being embedded the extraction and the checking of secret information or out of Memory; Effectively differentiate the authenticity of fingerprint, thereby reach affirmation that effectively having solved can be by clone's defective through the computer system fingerprint to the identity authenticity; Effectively prevent the risk that fingerprint is stolen, thereby reach the true and unique non repudiation authentication goals of identity.
With reference to Fig. 1; Fingerprint USBKEY among the present invention adopts homemade encryption chip; Watermark embedding, watermark extracting, fingerprint comparison, basic cryptographic algorithm etc. are integrated in the same chip, and the outside connects fingerprint sensor, is used to gather fingerprint image; All calculating process is all accomplished in chip, has high fail safe.The method that the present invention proposes can make up all kinds of application systems that need safety certification, and the basic structure of using is as shown in Figure 2, and security model of the present invention is as shown in Figure 3, and message transmitting procedure is as shown in Figure 4.Below explanation respectively.
Authentication method of the present invention is based on the basic cryptographic service of PKI system, through digital watermark technology biological identity and digital identity is bound, and realizes the authenticity verification of networking.
Information transmitter at first will have the legal identity (digital certificate) in the system, and through biological identity (fingerprint) identification, just can send information.This process realizes in fingerprint USBKEY.The information that the sender will send is embedded into these information in the fingerprint image through digital watermark technology after handling (like encryption, signature etc.), then fingerprint image is sent to the other side through network.
In message transmitting procedure, if third party's monitoring or intercepting, being seen just fingerprint picture; If this image is carried out any processing; All will cause digital watermarking to damage, and therefore increase the sensitiveness of transmission information to attacking or distorting, this is that cryptographic technique can't be accomplished.
The information receiver at first detects the integrality of watermark after receiving information, if the watermark destroyed maybe can't be discerned, explain that then this information is insincere, is attacked or distorts.If watermark detection is legal, then extract the information in the image, handle (as deciphering, test label) accordingly.
Application flow of the present invention:
One, identity authenticity verification flow process
The collection image (256 grades of gray scales) that takes the fingerprint; Image is calculated summary info with SHA256; With related abstract information; Key, signature digital information are embedded in the fingerprint image of being gathered, and then fingerprint is carried out authentication, have only the legal identity through authentication just can the unique non repudiation fingerprint image of the information of embedding be sent to the recipient.
The recipient is after receiving information; At first to the authenticity verification of identity; The flow process of authentication is: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct; Only under the two simultaneously correct situation, just confirm true unique non repudiation of its authentication people identity, otherwise the authenticity identification of its identity just can not get confirming.
Two, the authenticity verification flow process of information
The recipient is after receiving information; Whether embed digital watermark related abstract information, key, signature digital information are at first arranged in the detected image information; If have digital watermark information then it is extracted, the fingerprint image after recovering (is just extracted the image after the watermark with SHA256.Owing to adopted based on integer wavelet algorithm damage-free digital watermarking technology; So all ability 100% recoveries of digital watermarking and original fingerprint image) recomputate summary info; And with image in the value (being the value of the summary info of the original fingerprint image that extracts of transmit leg) of the SHA256 that extracts compare authentication; If identical, then qualified information is genuine and believable, otherwise its information is not genuine and believable information; Be the information of distorting, thereby reach judgement and identification true unique non repudiation of information.
Among the present invention, the safety certification of the authenticity of identity and information can realize remote authentication through network, also can local authentication, comprise the authentication of biological identity, the authentication of digital identity and the unique corresponding relation of the two.

Claims (2)

1. safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark; It is characterized in that: the fingerprint image with the sender is a carrier; The summary info of fingerprint image and the digital information through digital signature are embedded in this fingerprint image; Realize the binding of digital identity and biological identity, guarantee that the recipient can assert that this authentication method specifically may further comprise the steps to authenticity and unique non repudiation of identity of the sender:
Gather sender's fingerprint image, said fingerprint image is calculated summary info, said summary info is embedded in the said fingerprint image as watermark with key and through the digital information after digital signature and the encryption;
Through the fingerprint USBKEY of transmitting terminal, to gather sender's fingerprint and carry out finger print identifying, the fingerprint image with embed watermark after authentication is legal sends to the recipient;
The recipient is after receiving information; At first to the authenticity verification of identity; Comprise: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct; The authenticity of sender's identity is identified if digital watermarking is correct, is not identified if detect the authenticity identification of then sender's incorrect less than digital watermarking or watermark identity; Behind the authenticity verification of identity, carry out the authenticity verification of information, comprising: from the image that receives, extract digital watermark information; Fingerprint image after using the algorithm identical with transmit leg to the extraction watermark recomputates summary info; And with watermark information in the fingerprint image summary info put down in writing relatively, if identical, then qualified information is genuine and believable; Otherwise its information is not genuine and believable information, is the information of distorting;
Said fingerprint USBKEY comprises safety chip, and external fingerprint sensor of safety chip and USB interface are integrated with watermark and embed program, watermark extracting program, fingerprint comparison program and basic cryptographic algorithm in the safety chip;
Wherein, adopt the lossless image digital watermark based on integer wavelet to embed or extract damage-free digital watermarking to carrier image, said damage-free digital watermarking is meant that the information of embedding is harmless when extracting, and carrier image is also harmless after information extraction.
2. safety certifying method according to claim 1 is characterized in that: the summary info that adopts SHA256 algorithm computation fingerprint image.
CN2008102167827A 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark Active CN101729256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102167827A CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102167827A CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Publications (2)

Publication Number Publication Date
CN101729256A CN101729256A (en) 2010-06-09
CN101729256B true CN101729256B (en) 2012-08-08

Family

ID=42449536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102167827A Active CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Country Status (1)

Country Link
CN (1) CN101729256B (en)

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970307B (en) * 2012-12-21 2016-01-13 网秦无限(北京)科技有限公司 Cipher safety system and password safety method
CN103198558B (en) * 2013-02-06 2014-12-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN104112201B (en) * 2013-04-22 2018-05-18 中国银联股份有限公司 The method of sending and receiving and equipment of electronic bill data
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103634328A (en) * 2013-12-19 2014-03-12 青岛海尔软件有限公司 Authentication method, device and system for network platform authentication server
CN104980278B (en) 2014-04-14 2018-11-16 阿里巴巴集团控股有限公司 The method and apparatus for verifying the availability of biometric image
CN103984935A (en) * 2014-05-28 2014-08-13 深圳市中兴移动通信有限公司 Mobile terminal and fingerprint usage method and device thereof
CN104393998A (en) * 2014-12-10 2015-03-04 郑鹏 Intelligent encryption method for computer information transmission
CN104935783B (en) * 2015-06-15 2017-10-03 北京邮电大学 A kind of safe active distorted image detection method and device
CN106096335A (en) * 2016-06-08 2016-11-09 北京小米移动软件有限公司 Copyright information detection method, copyright information detection device and electronic equipment
US10296998B2 (en) 2016-11-10 2019-05-21 Mcafee, Llc Optical feedback for visual recognition authentication
CN107194267B (en) * 2017-05-22 2021-08-27 京东方科技集团股份有限公司 Data processing method, data processing apparatus, and computer-readable storage medium
CN107395361A (en) * 2017-07-25 2017-11-24 成都国科微电子有限公司 The conversion of information source data and authentication method and system
CN109587518B (en) 2017-09-28 2022-06-07 三星电子株式会社 Image transmission apparatus, method of operating the same, and system on chip
CN107818264B (en) * 2017-10-16 2020-04-14 深圳市英尔科技有限公司 Environment-friendly public welfare activity monitoring method and device and computer readable storage medium
CN108615216A (en) * 2018-03-22 2018-10-02 北京印刷学院 A kind of holographic watermark authentication method of notarial
CN108564367B (en) * 2018-04-11 2022-08-16 宋伟杰 Payment encryption algorithm
CN108900298B (en) * 2018-07-11 2020-09-18 长春大学 Quantum cipher watermark-based private block chain honest node authentication access method
CN109145563B (en) * 2018-08-13 2022-04-22 创新先进技术有限公司 Identity verification method and device
CN109274644B (en) * 2018-08-21 2020-12-25 华为技术有限公司 Data processing method, terminal and watermark server
CN110535649B (en) * 2019-04-15 2020-11-03 清华大学 Data circulation method and system, service platform and first terminal device
CN111970114B (en) * 2020-08-31 2023-08-18 中移(杭州)信息技术有限公司 File encryption method, system, server and storage medium
CN113032756A (en) * 2021-03-19 2021-06-25 厦门熵基科技有限公司 Data access authorization authentication system and method
CN113286055B (en) * 2021-05-25 2022-03-15 郑州信大捷安信息技术股份有限公司 Safe vehicle driving method and system based on safe traffic signs
CN113701832A (en) * 2021-08-28 2021-11-26 上海光华仪表有限公司 Control method and system of high-voltage union electromagnetic flowmeter
CN117556393A (en) * 2022-08-05 2024-02-13 华为技术有限公司 Digital content processing, right confirming and tracing method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672173A (en) * 2002-07-26 2005-09-21 皇家飞利浦电子股份有限公司 Identification of digital data sequences
CN1991901A (en) * 2005-12-31 2007-07-04 北京华旗数码影像技术研究院有限责任公司 Method and device for embedding finger water-print information
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672173A (en) * 2002-07-26 2005-09-21 皇家飞利浦电子股份有限公司 Identification of digital data sequences
CN1991901A (en) * 2005-12-31 2007-07-04 北京华旗数码影像技术研究院有限责任公司 Method and device for embedding finger water-print information
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses

Also Published As

Publication number Publication date
CN101729256A (en) 2010-06-09

Similar Documents

Publication Publication Date Title
CN101729256B (en) Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN103440444B (en) The signing method of electronic contract
WO2014154109A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
Hämmerle-Uhl et al. Watermarking as a means to enhance biometric systems: A critical survey
JP2013512486A (en) Authenticated data transmission
CN103985036A (en) Two-dimension code payment method with biological characteristics
WO2006072047A2 (en) Electronic signature security system
JPH103257A (en) Method and device for adding electronic signature, and method for verifying electronic signature
JP2007013433A (en) Method for transmitting/receiving encrypted data and information processing system
CN103678960B (en) Method and device for adding digital copyright information to data file
CN107508685B (en) Method for implementing application electronic signature service system in cloud computing environment
JP5676592B2 (en) Robust biometric feature extraction with and without reference points
CN101789067A (en) Electronic document signature protecting method and system
TW201539233A (en) Method and apparatus of verifying usability of biological characteristic image
CN105631248A (en) Signing method, forging judgment method and tampering judgment method of electronic contract
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
Zhang et al. The Improvement of digital signature algorithm based on elliptic curve cryptography
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN107426172A (en) The matching method for pushing and device of a kind of identity information
CN108401494B (en) Method and system for transmitting data
Bogari et al. An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
CN101727561A (en) File security management system and file security management method
CN103368736B (en) Business information encryption, decryption method and device
CN101594354B (en) Method and system for improving account transfer safety

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHENZHEN BAOJIA SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20120418

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518057 SHENZHEN, GUANGDONG PROVINCE TO: 518053 SHENZHEN, GUANGDONG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20120418

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Applicant after: Shenzhen POKA Electronic Equipment Co., Ltd.

Co-applicant after: Shenzhen POKA Software Technology Co., Ltd.

Address before: The South high tech Zone of Shenzhen City, Guangdong province 518057 a SKYWORTH building A805

Applicant before: Shenzhen POKA Electronic Equipment Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee after: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee after: Shenzhen Rongxin Software Technology Co., Ltd.

Address before: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee before: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee before: Shenzhen POKA Software Technology Co., Ltd.