CN101741823B - Cross-validation safety communication method and system - Google Patents

Cross-validation safety communication method and system Download PDF

Info

Publication number
CN101741823B
CN101741823B CN 200810226281 CN200810226281A CN101741823B CN 101741823 B CN101741823 B CN 101741823B CN 200810226281 CN200810226281 CN 200810226281 CN 200810226281 A CN200810226281 A CN 200810226281A CN 101741823 B CN101741823 B CN 101741823B
Authority
CN
China
Prior art keywords
communication
bag
identifying code
data
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN 200810226281
Other languages
Chinese (zh)
Other versions
CN101741823A (en
Inventor
李平立
龚健
王保华
高超霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Founder International Beijing Co Ltd
Original Assignee
Peking University
Founder International Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University, Founder International Beijing Co Ltd filed Critical Peking University
Priority to CN 200810226281 priority Critical patent/CN101741823B/en
Publication of CN101741823A publication Critical patent/CN101741823A/en
Application granted granted Critical
Publication of CN101741823B publication Critical patent/CN101741823B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a cross-validation safety communication method and a cross-validation safety communication system. The method is characterized in that in the communication of two communicating parties in communication connection, one communicating party puts the generated and stored verification codes and the data to be send at the packet data segment, and puts the latest received verification codes at the packet identify segment, or encrypts the packet and uses the latest received codes as the key of an encrypted packet, and sends the packet to the other communicating party. After receiving the packet, the other communicating party verifies the received packet by using the latest received codes, if the received packet is correct, accepts the packet and sends a communication packet to the one communicating party by the method used by the one communicating party for sending the packet, and if the received packet is wrong, refuses the packet. The two communicating parties repeat the interactive process until the communication is over. The invention takes the integrity of the communication session into consideration, generates the verification codes with random character, and stringing the dialogues of the two communicating parties through cross validation so as to ensure that the communication between the two parties forms a closed dialogue chain, thereby realizing safe, simple and convenient data communication.

Description

A kind of safe communication method of cross validation and system
Technical field
The invention belongs to information security field, be specifically related to a kind of safe communication method and system of cross validation.
Background technology
Communication security is a widely used technology, mostly adopts at present dual mode.A kind of mode is the mode of secure tunnel encrypted transmission data.The method is because the raising of data encryption complexity will cause the sharp increase of enciphered data amount, so cipher mode is subject to certain limitation, in case and encryption key be decrypted, the effractor is easy to forge reply data, thereby brings security breaches to communication.Another kind of mode is exactly the safety that connects to guarantee the communication two party exchanges data by setting up reliable communication, wherein the patent No. is US7,424,736 United States Patent (USP) " Method for establishing directed circuits between parties with limited mutual trust " is exactly to make in this way.Second method can not find in time that communication two party third party between communication period trespasses, intercepts and captures communication information, communication data is changed this phenomenon, thereby also just is difficult to guarantee the communication security of communication two party between communication period.
Summary of the invention
The object of the invention is to provide safe communication method and the system thereof of the not only safe but also easy cross validation of a kind of data communication, to overcome the deficiencies in the prior art.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is, a kind of safe communication method of cross validation, and the method comprises following steps:
(1) set up communication between communication two party and connect, communication one side sends to communication the opposing party after generating an identifying code and communication offer and the two being kept at this locality;
(2) communication the opposing party is according to the call format of its communication offer that receives, generate a new identifying code and preservation, new identifying code and the data that need to send are placed on the data segment of communication bag, the other side's that the last time is received identifying code is placed on the identification section of communication bag or to communication packet encryption and the other side's that the last time is the received identifying code key as the communication bag after encrypting, more whole communication bag is sent to the other side;
(3) communication two party repeats following operation until communication finishes:
After receiving the communication bag that the other side sends, go to verify received communication bag with the own the last identifying code of preserving, if verify incorrect, end process then; Otherwise according to the method for communication side in the step (2), generate a new identifying code and preservation, then form the communication bag and send it to the other side.
Further, described identifying code is the character code of random character, its concrete form is a kind of in all combinations that form of object identity code, random string, serial number and timestamp, but it comprises random string or timestamp at least, wherein said object identity code is the character string of communication two party sign self, random string is according to the random CHAR that generates of regulation in the communication offer, serial number is the continuous number that records in the communication process, and timestamp is the character string that the current time is converted to prescribed form according to the communication offer.
Further, all generate different identifying codes during the each communication of described communication two party.
Further, but the form of described identifying code this locality identifying processing only is need not communication two party consistent.
Further, described communication offer comprises the composition call format of identifying code and the call format of whole communication bag, specifically comprises beginning label, data length, data verification method and the data ciphering method of data segment.
Further, to sending to again the other side after the encryption method encryption of communication bag by the communication two party agreement that comprises identification section, after receiving, the other side needs be decrypted the communication bag.
Further, if in the communication bag that receives identification section is arranged, the checking described in the step (3) refers to judge whether the identifying code that identifying code and the authentication the last time in the received communication bag identification section preserve is consistent; Otherwise the checking described in the step (3) refers to that can authentication to received communication bag deciphering with the last identifying code of preserving.
Further, in the step (3), communication one square tube is crossed data buffering equipment, and the non-ordered data bag that receives is processed according to the identifying code ordering.
The present invention also provides a kind of safety communication system of cross validation, and this system comprises such as lower device:
Communication connects apparatus for establishing: be used for setting up communication and connect between communication two party;
Communication offer generating apparatus: be used for generating and preserving the communication offer;
Identifying code generating apparatus: be used for generating and preserving identifying code, trigger communication bag generating apparatus;
Communication bag generating apparatus: be used for the new identifying code that the identifying code generating apparatus is generated according to the call format of the communication offer that receives and identifying code that the data that need to send are placed on communication bag data segment and the other side that the last time is received is placed on that communication bag identification section forms the communication bag that comprises identification section or new identifying code that the identifying code generating apparatus is generated according to the call format of the communication offer that receives and needing sends data are placed on communication bag data segment and form the communication bag that only has data segment, and trigger the communication sending and receiving device;
Communication reception and dispensing device: be used for communication two party and receive and send the communication bag, trigger demo plant after receiving the communication bag;
Demo plant: be used for communication one side after receiving the communication bag that the other side sends, go to verify received communication bag with the own the last identifying code of preserving, if verify incorrect, end process then; Otherwise trigger the identifying code generating apparatus;
Communication finishes judgment means: be used for judging whether communication finishes, if so, end process then, otherwise the communication between the continuation communication two party;
Encryption device: be used for the communication bag is encrypted, the other side's that the last time is received identifying code sends to the other side with whole communication bag again as the key of the communication bag after encrypting.
Further, described system also comprises a data buffer device, and the non-ordered data bag that this equipment is used for receiving is processed according to the identifying code ordering.
Effect of the present invention is: because the technical program is considered from the integrality aspect of communication dialogue, according to generating the identifying code with random character, pass through cross validation, conversation chaining with communication two party, to guarantee that both sides' communication forms closed dialogue chain, thereby guarantee that data communication is not only safe but also easy, to realize the object of the invention.
Description of drawings
Fig. 1 is the flow chart of the safe communication method of a kind of cross validation of the present invention;
Fig. 2 is a kind of communication pack arrangement schematic diagram in the embodiment of the invention;
Fig. 3 is another kind of communication pack arrangement schematic diagram in the embodiment of the invention.
Embodiment
The invention will be further described below in conjunction with specification drawings and specific embodiments.
A kind of safety communication system of cross validation, this system comprise such as lower device:
(1) communication connects apparatus for establishing: be used for setting up communication and connect between communication two party;
(2) communication offer generating apparatus: be used for generating and preserving the communication offer;
(3) identifying code generating apparatus: be used for generating and preserving identifying code, trigger communication bag generating apparatus;
(4) communication bag generating apparatus: be used for new identifying code and identifying code that the data that need to send are placed on communication bag data segment and the other side that the last time is received is placed on that communication bag identification section forms the communication bag that comprises identification section or with new identifying code and the data that need to send be placed on communication bag data segment and form the communication bag that only has data segment, and trigger the communication sending and receiving device;
(5) communication reception and dispensing device: be used for communication two party and receive and send the communication bag, trigger demo plant after receiving the communication bag;
(6) demo plant: be used for communication one side after receiving the other side and sending the communication bag, go to verify received communication bag with the own the last identifying code of preserving, if verify incorrect, end process then; Otherwise trigger the identifying code generating apparatus;
(7) communication finishes judgment means: be used for judging whether communication finishes, if so, end process then, otherwise the communication between the continuation communication two party;
If the communication bag does not have identification section, said system also comprises encryption device, and this device is used for the communication bag is encrypted.Said system also can comprise a data buffer device simultaneously, and the non-ordered data bag that this equipment is used for receiving is processed according to the identifying code ordering.
As shown in Figure 1, a kind of safe communication method of cross validation comprises the steps:
Step S11: between communication two party, set up communication and connect.
Setting up communication according to Data Transport Protocols such as FTP, HTTP, POP3 between communication two party in this step connects.
Step S12: logical.Interrogate a side and generate identifying code and communication offer, after the preservation they are sent.
The communication between the communication two party connect establish after, communication one side generates an identifying code and communication offer, the identifying code that generates and communication offer is preserved and the two is sent to the other side.In the present embodiment, communication two party is respectively recipient and transmit leg, and the recipient generates first an identifying code and communication offer, the identifying code that generates and communication offer is preserved and the two is sent to transmit leg.The recipient can only have one, also can be a plurality ofly, and the recipient only has one in the present embodiment.The identifying code here is the character code of random character, its concrete form is a kind of in all combinations that form of object identity code, random string, serial number and timestamp, but it comprises random string or timestamp at least, wherein the object identity code is the character string of communication two party sign self, random string is according to the random CHAR that generates of regulation in the communication offer, serial number is the continuous number that records in the communication process, and timestamp is the character string that the current time is converted to prescribed form according to the communication offer.Described communication offer mainly comprises the composition call format of identifying code, and the call format of whole communication bag, comprises beginning label, data length, the data verification method of data segment, and data ciphering method.The communication offer that the recipient generates in this enforcement is as follows:
Above-mentioned offer shows that recipient's identification code is 7973AE9B81E74632B38F677A8DFB6C83, the communication bag only has data segment, should adopt the last received the other side's identifying code to the communication packet encryption, identifying code is comprised of GUID identification code, random string, timestamp three parts.The identifying code that this step recipient generates is D167FB39F53849f7ADB1522339D73E4DAUmo82390810221625231, wherein D167FB39F53849f7ADB1522339D73E4D is the GUID identification code, shows that the other side with its communication is D167FB39F53849f7ADB1522339D73E4D; AUmo8239 is random string; 0810221625231 is timestamp.
Step S13: communication the opposing party generates identifying code and communication bag, and sends the communication bag.
This step is that communication the opposing party is according to the call format of its communication offer that receives, generate a new identifying code and preservation, new identifying code and the data that need to send are placed on communication bag data segment, the other side's that the last time is received identifying code is placed on communication bag identification section or to communication packet encryption and the other side's that the last time is the received identifying code key as the communication bag after encrypting, and whole communication bag is sent to the other side.The communication here is surrounded by two kinds of forms, and a kind of communication bag is comprised of identification section and data segment, and wherein data segment is comprised of identifying code and data again, and its concrete structure as shown in Figure 2; Another kind of communication bag does not have identification section, only has data segment, and its data segment is comprised of identifying code and data, and its concrete structure as shown in Figure 3.Bag only has data segment because the communication offer in the present embodiment requires communication, should adopt the last received the other side's identifying code to the communication packet encryption, thus the present embodiment we adopt communication bag shown in Figure 3.In the present embodiment, communication the opposing party of this step is transmit leg, and namely this step can be expressed as: transmit leg generates identifying code and communication bag, and sends the communication bag.Be that transmit leg needs the new identifying code (7973AE9B81E74632B38F677A8DFB6C83BUmo02120810221628221) that the call format of the communication offer that sends according to the recipient generates and preserves, with the data of new identifying code and required transmission " king * *; your first task has been finished? " be placed on the data segment of communication bag, to communication packet encryption and the other side's that the last time is received identifying code (D167FB39F53849f7ADB1522339D73E4DAUmo82390810221625231) key as the communication bag after encrypting, and whole communication bag sent to the other side, the deciphering of the communication bag after namely encrypting in this step is D167FB39F53849f7ADB1522339D73E4DAUmo82390810221625231.
Step S14: verify.
This step is with the own the last identifying code of preserving its received communication bag to be verified after the side in the communication two party receives the other side's communication bag, if checking is correct, and execution in step S15 then, otherwise finish communication.Side's checking in the communication two party here is different and different according to the requirement of communication offer, if namely the communication offer need not encrypted, carry out when the received communication of authentication is surrounded by identification section whether be verified as the identifying code that identifying code and authentication the last time are preserved in the identification section of judging received communication bag consistent; If the communication offer need be encrypted, the received communication bag of authentication carries out when not having identification section be verified as the identifying code that authentication the last time preserves can be to received communication bag deciphering.In this example, this step can be expressed as the recipient its received communication bag is verified.Because the communication offer need be encrypted in the present embodiment, the received communication bag of authentication does not have identification section, thereby this step recipient uses the own the last identifying code 167FB39F53849f7ADB1522339D73E4DAUmo82390810221625231 that preserves received communication bag is decrypted, if can decipher, then execution in step S15; Otherwise, illustrating that the content in the communication bag that receives was illegally changed by the third party, recipient's refusal is processed the communication bag, and communication finishes.The communication bag received of this step was not illegally changed by the third party in this embodiment, thereby can decipher, so after carrying out this step, execution in step S15.
Step S15: judge whether communication finishes
In this step, if communication need finish, then the whole communication of communication two party finishes; Otherwise then execution in step 17.In the present embodiment, be that the recipient carries out the operation of this step at this moment, the data of receiving because of the recipient for " king * *, your first task has been finished? " the recipient tackles this and gives a response, so this step executes rear execution in step S16.
Step S16: generate identifying code and communication bag after handling data, send the communication bag.
The performed operation of communication one side is identical among the operation that a side in this step in the communication two party need carry out after the data in its received communication bag are processed and the step S13.Change step S14 over to after executing this step, communication two party as the case may be repeated execution of steps S14 to step S16, until communication finishes.In the present embodiment, the performed operation in step S13 of the operation that the recipient need carry out after the data in the received communication bag are processed and transmit leg is identical, the recipient generates a new identifying code and preservation according to the call format of communication offer, the identifying code of its generation is D167FB39F53849f7ADB1522339D73E4DAUmo82400840681629082, need are sent data " I have finished first task; what next step should do? " be placed in the communication bag with new identifying code and send it to transmit leg according to the encryption method in the communication offer after to the communication packet encryption, the deciphering of the communication bag that this step sends is received identifying code---7973AE9B81E74632B38F677A8DFB6C83BUmo02120810221628221.In this enforcement, after the recipient carries out this step, enter step S14, namely need transmit leg execution in step S14.
During transmit leg execution in step S14, transmit leg first with own the last preserve at identifying code---7973AE9B81E74632B38F677A8DFB6C83BUmo02120810221628221 is decrypted received communication bag.In this enforcement, suppose that the data that transmit leg receives were not in this step illegally changed by the third party, so send the identifying code that can preserve with its last time to received communication bag deciphering, need execution in step S15.
Transmit leg is when execution in step S15, because its this time received data are that " I have finished first task, what next step should do? " so need this is made a response, so transmit leg need to be followed execution in step S16.
During transmit leg execution in step S16, call format according to the communication offer generates and preserves new identifying code 7973AE9B81E74632B38F677A8DFB6C83BUmo02130246521623628, new identifying code and the data that need to send " are please then carried out second task, the thing that I do not have." be placed in the communication bag and send to the recipient by the requirement of communication offer after to the communication packet encryption, the deciphering of the communication bag that this time sends is the received identifying code of transmit leg: D167FB39F53849f7ADB1522339D73E4DAUmo82400840681629082.Behind the transmit leg execution of step S16, the recipient needs again execution in step S14.
During recipient's execution in step S14, the recipient is decrypted checking with the own the last identifying code D167FB39F53849f7ADB1522339D73E4DAUmo82400840681629082 that preserves to the communication bag that it receives, suppose that the communication bag that the step transmit leg receives illegally do not changed by the third party, thereby receive and to decipher, checking is correct, needs execution in step S15.
During recipient's execution in step S15, because the data that receive are that " please then carry out second task, I have had nothing else thing.So " do not need this is given a response, communication finishes, i.e. whole end of conversation.
Method of the present invention is not limited to the embodiment described in the embodiment, and those skilled in the art's technical scheme according to the present invention draws other execution mode, belongs to equally technological innovation scope of the present invention.

Claims (10)

1. the safe communication method of a cross validation, the method comprises following steps:
(1) set up communication between communication two party and connect, communication one side sends to communication the opposing party after generating an identifying code and communication offer and the two being kept at this locality;
(2) communication the opposing party is according to the call format of its communication offer that receives, generate a new identifying code and preservation, new identifying code and the data that need to send are placed on the data segment of communication bag, the other side's that the last time is received identifying code is placed on the identification section of communication bag or to communication packet encryption and the other side's that the last time is the received identifying code key as the communication bag after encrypting, more whole communication bag is sent to the other side;
(3) communication two party repeats following operation until communication finishes:
After receiving the communication bag that the other side sends, go to verify received communication bag with the own the last identifying code of preserving, if verify incorrect, end process then; Otherwise according to the method for communication side in the step (2), generate a new identifying code and preservation, then form the communication bag and send it to the other side.
2. the safe communication method of a kind of cross validation as claimed in claim 1, it is characterized in that: described identifying code is the character code of random character, its concrete form is the object identity code, random string, a kind of in all combinations that serial number and timestamp form, but it comprises random string or timestamp at least, wherein said object identity code is the character string of communication two party sign self, random string is according to the random CHAR that generates of regulation in the communication offer, serial number is the continuous number that records in the communication process, and timestamp is the character string that the current time is converted to prescribed form according to the communication offer.
3. the safe communication method of a kind of cross validation as claimed in claim 1 is characterized in that: all generate different identifying codes during the each communication of described communication two party.
4. the safe communication method of a kind of cross validation as claimed in claim 1 is characterized in that: but the form of described identifying code this locality identifying processing only is need not communication two party consistent.
5. the safe communication method of a kind of cross validation as claimed in claim 1, it is characterized in that: described communication offer comprises the composition call format of identifying code and the call format of whole communication bag, specifically comprises beginning label, data length, data verification method and the data ciphering method of data segment.
6. the safe communication method of a kind of cross validation as claimed in claim 1 is characterized in that: send to the other side after the communication bag that comprises identification section is encrypted by the encryption method of communication two party agreement again, need after the other side receives the communication bag is decrypted.
7. such as the safe communication method of the described a kind of cross validation of one of claim 1 to 6, it is characterized in that: if in the communication bag that receives identification section is arranged, the checking described in the step (3) refers to judge whether the identifying code that identifying code and the authentication the last time in the received communication bag identification section preserve is consistent; Otherwise the checking described in the step (3) refers to that can authentication to received communication bag deciphering with the last identifying code of preserving.
8. the safe communication method of a kind of cross validation as claimed in claim 7, it is characterized in that: in the step (3), communication one square tube is crossed data buffering equipment, and the non-ordered data bag that receives is processed according to the identifying code ordering.
9. the safety communication system of a cross validation, this system comprises such as lower device:
Communication connects apparatus for establishing: be used for setting up communication and connect between communication two party;
Communication offer generating apparatus: be used for generating and preserving the communication offer;
Identifying code generating apparatus: be used for generating and preserving identifying code, trigger communication bag generating apparatus;
Communication bag generating apparatus: be used for the new identifying code that the identifying code generating apparatus is generated according to the call format of the communication offer that receives and identifying code that the data that need to send are placed on communication bag data segment and the other side that the last time is received is placed on that communication bag identification section forms the communication bag that comprises identification section or new identifying code that the identifying code generating apparatus is generated according to the call format of the communication offer that receives and needing sends data are placed on communication bag data segment and form the communication bag that only has data segment, and trigger the communication sending and receiving device;
Communication reception and dispensing device: be used for communication two party and receive and send the communication bag, trigger demo plant after receiving the communication bag;
Demo plant: be used for communication one side after receiving the communication bag that the other side sends, go to verify received communication bag with the own the last identifying code of preserving, if verify incorrect, end process then; Otherwise trigger the identifying code generating apparatus;
Communication finishes judgment means: be used for judging whether communication finishes, if so, end process then, otherwise the communication between the continuation communication two party;
Encryption device: be used for the communication bag is encrypted, the other side's that the last time is received identifying code sends to the other side with whole communication bag again as the key of the communication bag after encrypting.
10. the safety communication system of a kind of cross validation as claimed in claim 9, it is characterized in that: described system also comprises a data buffer device, the non-ordered data bag that this equipment is used for receiving is processed according to the identifying code ordering.
CN 200810226281 2008-11-12 2008-11-12 Cross-validation safety communication method and system Expired - Fee Related CN101741823B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200810226281 CN101741823B (en) 2008-11-12 2008-11-12 Cross-validation safety communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810226281 CN101741823B (en) 2008-11-12 2008-11-12 Cross-validation safety communication method and system

Publications (2)

Publication Number Publication Date
CN101741823A CN101741823A (en) 2010-06-16
CN101741823B true CN101741823B (en) 2013-01-16

Family

ID=42464715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810226281 Expired - Fee Related CN101741823B (en) 2008-11-12 2008-11-12 Cross-validation safety communication method and system

Country Status (1)

Country Link
CN (1) CN101741823B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333562B (en) * 2014-11-27 2017-11-03 沈文策 Data pack transmission method and device
CN106815734B (en) * 2015-11-27 2022-02-08 方正国际软件(北京)有限公司 Information transmission method and device
CN106502505B (en) * 2016-10-31 2020-07-17 维沃移动通信有限公司 Information notification display method and mobile terminal
CN106713328A (en) * 2016-12-29 2017-05-24 北京奇虎科技有限公司 Information processing method and apparatus based on long connection
CN106936594B (en) * 2017-05-17 2020-03-17 浪潮天元通信信息系统有限公司 Chain type self-authentication security interaction method
CN109033801B (en) * 2018-07-25 2022-07-08 河北千和电子商务有限公司 Method for verifying user identity by application program, mobile terminal and storage medium
CN109359937B (en) * 2018-09-14 2022-02-08 厦门天锐科技股份有限公司 Offline approval method
CN109639719B (en) * 2019-01-07 2020-01-24 武汉稀云科技有限公司 Identity verification method and device based on temporary identifier
CN109763719A (en) * 2019-01-28 2019-05-17 赵晶磊 Electronic lock and electronic packaging device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455341A (en) * 2002-04-30 2003-11-12 微软公司 Method for long-distance changing of communication cipher code
CN101141278A (en) * 2007-10-17 2008-03-12 北大方正集团有限公司 Data transmission system, data transmission method, data processing method and corresponding device
US7424736B2 (en) * 2004-03-10 2008-09-09 Combrio, Inc. Method for establishing directed circuits between parties with limited mutual trust

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1455341A (en) * 2002-04-30 2003-11-12 微软公司 Method for long-distance changing of communication cipher code
US7424736B2 (en) * 2004-03-10 2008-09-09 Combrio, Inc. Method for establishing directed circuits between parties with limited mutual trust
CN101141278A (en) * 2007-10-17 2008-03-12 北大方正集团有限公司 Data transmission system, data transmission method, data processing method and corresponding device

Also Published As

Publication number Publication date
CN101741823A (en) 2010-06-16

Similar Documents

Publication Publication Date Title
CN101741823B (en) Cross-validation safety communication method and system
CN105184931B (en) A kind of method for unlocking based on bluetooth, system, handheld terminal and electronic lock
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN105162599B (en) A kind of data transmission system and its transmission method
CN104917766B (en) A kind of two-dimension code safe authentication method
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN106412862A (en) Short message reinforcement method, apparatus and system
CN101631305B (en) Encryption method and system
CN102315937A (en) The affaris safety trade system of data and method between radio communication device and the server
CN107516196A (en) A kind of mobile-payment system and its method of mobile payment
CN104243494B (en) A kind of data processing method
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN101789068B (en) Card reader safety certification device and method
CN106411926A (en) Data encryption communication method and system
CN106817346A (en) Data transmission method and device and electronic equipment
CN105791258A (en) Data transmission method, terminal and open platform
CN105991559B (en) A kind of user security login method based on image encryption technology
CN107181770A (en) Method of data synchronization and system
CN105634742A (en) Session key negotiation method and intelligent secret key device
CN104735094A (en) Information separation based data security transmission system and method
CN105282239A (en) Encryption method and system based on Web Service
CN104883260A (en) Certificate information processing and verification methods, processing terminal, and verification server
CN115278620A (en) Radio frequency identification data security authentication method and system based on random rearrangement block matrix encryption
CN103634113B (en) Encryption and decryption method and device with user/equipment identity authentication
CN114003970A (en) Hash chain-based low-overhead message integrity protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130116

Termination date: 20141112

EXPY Termination of patent right or utility model