CN101964786A - Set-top box-based secure information transmission system and method - Google Patents
Set-top box-based secure information transmission system and method Download PDFInfo
- Publication number
- CN101964786A CN101964786A CN2010102870082A CN201010287008A CN101964786A CN 101964786 A CN101964786 A CN 101964786A CN 2010102870082 A CN2010102870082 A CN 2010102870082A CN 201010287008 A CN201010287008 A CN 201010287008A CN 101964786 A CN101964786 A CN 101964786A
- Authority
- CN
- China
- Prior art keywords
- recipient
- key
- identity
- encryption
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000005540 biological transmission Effects 0.000 title claims abstract description 34
- 238000012795 verification Methods 0.000 claims abstract description 5
- 230000006854 communication Effects 0.000 claims description 26
- 238000004891 communication Methods 0.000 claims description 24
- 230000015572 biosynthetic process Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000003993 interaction Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a set-top box-based secure information transmission system and a set-top box-based secure information transmission method. The secure information transmission system comprises a secure algorithms library, a key management component, an authentication component, an encryption/decryption component and a verification component; the secure algorithms library is used for providing transmission encryption and decryption algorithm supports; the key management component is used for managing a public key and a private key of a user and generating a dynamic key; the authentication component is used for determining the identities of double data transmission parties; the encryption/decryption component is used for implementing encryption and decryption of data; and the verification component is used for verifying validity and integrity of the received decrypted data. According to the technical scheme, the transmission of the sensitive data on a set-top box is safer and more efficient by combining a symmetric encryption algorithm and an asymmetric encryption algorithm.
Description
Technical field
The present invention relates to digital home technical field, be specifically related to a kind of information security transmission system and method based on set-top box.
Background technology
Along with digital home's continuous advancement in technology, the function that realizes on the set-top box is also more and more.The set-top box of using has realized playing games, check functions such as stock market, bank service at present, has made things convenient for people's life greatly.
And the diversity of the service that provides along with set-top box, the fail safe of content service is important further.For example the account number cipher information of bank or the account information of recreation all are the sensitive informations that need be protected, so the message transmission on the set-top box need obtain safety guarantee.
In the existing technical scheme, generally be sending behind the message encryption that sends.Cryptographic algorithm is divided into symmetric encipherment algorithm and rivest, shamir, adelman, and symmetric encipherment algorithm realizes that speed is fast, but key management distribution difficulty, the rivest, shamir, adelman private key is maintained secrecy, and PKI is disclosed, and key management is convenient, but encrypting and decrypting efficient is low.
Present method is behind the application encipher decipherment algorithm of application program the inside, and the fail safe of information obtains certain guarantee, but each application program the inside all needs to do encrypting and decrypting program separately, makes that developer's workload is big, and efficient is also lower.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of information security transmission system and method based on set-top box, can allow the sensitive data transmission on the set-top box safer, efficient.
In order to solve the problems of the technologies described above, embodiments of the invention provide following technical scheme to realize:
The invention provides a kind of information security transmission system based on set-top box:
Comprise security algorithm storehouse, key management assembly, certified component, encrypting and decrypting assembly, checking assembly;
Described security algorithm storehouse is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly is used to realize the encryption and decryption of data;
Described checking assembly is used for the data decryption of receiving is carried out validity and integrity verification.
Stored various different security password algorithms in the described security algorithm storehouse, algorithms of different is selected according to safety requirements by described system, and described system employing Hybrid Encryption mode, comprises symmetric encipherment algorithm and rivest, shamir, adelman are used with.
Described certified component produces random number and use encrypted private key, allow the other side with the PKI deciphering after, again by beaming back behind the public key encryption, whether be this random number same random number with private key deciphering and checking, verify the other side's identity by the mutual photos and sending messages of both sides.
Described checking assembly obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out;
Verify the validity of message according to identity information, time stab information;
Integrality according to eap-message digest checking message.
The invention provides a kind of information secure transmission method, comprising based on set-top box:
The sending direction recipient sends communication request;
Transmit leg and recipient key management component interaction session key separately;
Transmit leg and recipient's certified component is verified the other side's identity respectively;
After knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
Exchange of public keys and authentication process itself that described method comprises are as follows:
Transmit leg produces random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to the recipient;
After the recipient receives SKA (r1), PKI PKA deciphering SKA (r1) with transmit leg becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with transmit leg produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives transmit leg;
Transmit leg is deciphered PKA (r1) with private key SKA, PKI deciphering SKB (r2) with the recipient becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if correct recipient's the public key encryption r2 that just uses becomes PKB (r2), and send PKB (r2) to the recipient, otherwise illustrate that the recipient makes mistakes or recipient's object mistake, report an error and disconnect connection;
The recipient deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of transmit leg is correct, and connect and set up engineering, otherwise, disconnect connection.
The ciphering process that comprises in the described method comprises:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with the recipient encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to the recipient.
Deciphering that comprises in the described method and Information Authentication process comprise:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed;
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
Technique scheme as can be seen, the present invention has following beneficial effect:
In an embodiment of the present invention, data receiver is the data encryption that sends, and the recipient deciphers enciphered data, the method that adopts the symmetric cryptography decipherment algorithm to combine with the asymmetric encryption decipherment algorithm in the process, both guarantee safety of data transmission, also guaranteed the efficient that algorithm is carried out.And information security transmission system of the present invention provides with the form of set-top box middleware, can provide service for the application program on upper strata, also improves software reuse.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a system configuration schematic diagram of the present invention;
Fig. 2 is the embodiment of the invention one an information security transmission system communication process schematic diagram;
Fig. 3 is the embodiment of the invention two exchange of public keys and authentication flow chart;
Fig. 4 is the embodiment of the invention three encryption flow figure;
Fig. 5 is the embodiment of the invention four deciphering and Information Authentication flow charts.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making all other embodiment that obtained under the creative work prerequisite.
The invention provides a kind of information security transmission system and method, can improve the Information Security in the set-top box service more easily based on set-top box.
Below in conjunction with accompanying drawing embodiment of the invention technical scheme is elaborated.
As shown in Figure 1, be system configuration schematic diagram of the present invention.
A kind of information security transmission system based on set-top box comprises:
Described security algorithm storehouse 101 is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly 102 is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component 103 is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly 104 is used to realize the encryption and decryption of data;
Described checking assembly 105 is used for the data decryption of receiving is carried out validity and integrity verification.
This system is that the form with middleware provides, and can provide service for the data of set top box transmission.
Concrete:
Various different security password algorithms have been stored in security algorithm storehouse 101, and suitable algorithm can be selected according to safety requirements by system.It is the safety function main provider of this information security transmission system.Because symmetry algorithm efficient is not high, generally as digital signature, mass data then adopts symmetric encipherment algorithm to encrypt.Native system adopts the Hybrid Encryption scheme, and promptly symmetric encipherment algorithm and rivest, shamir, adelman are used with.
Encrypting and decrypting assembly 104 has following characteristics:
The transmit leg ciphering process is encrypted the message and the signing messages that will send with dynamic key;
The transmit leg ciphering process is with own encrypted private key dynamic key;
The reciever decrypting process obtains dynamic key with the deciphering of the other side's PKI;
The reciever decrypting process obtains message content and signing messages with the dynamic key deciphering.
Checking assembly 105 obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out; Verify the validity of message according to identity information, time stab information; Integrality according to eap-message digest checking message.
Embodiment one,
With reference to figure 2, be the embodiment of the invention one information security transmission system communication process schematic diagram.In the present embodiment, information security transmission system of the present invention provides with the form of middleware, for upper level applications provides service.
As shown in Figure 2, specifically may further comprise the steps:
A1, sending direction recipient send communication request;
A2, transmit leg and recipient key management component interaction session key separately, i.e. PKI separately;
A3, transmit leg and recipient's certified component is verified the other side's identity respectively;
A4, after knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
Embodiment two, exchange of public keys and authentication:
Fig. 3 is the embodiment of the invention two exchange of public keys and authentication flow chart.
With reference to figure 3, may further comprise the steps:
B1, communication side A send communication request to communication side B;
B2, communication two party send to the other side to PKI separately, promptly exchange session key;
B3, communication side A produce random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to communication side B;
After B4, communication side B receive SKA (r1), PKI PKA deciphering SKA (r1) with communication side A becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with communication side A produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives communication side A;
B5, communication side A decipher PKA (r1) with private key SKA, PKI deciphering SKB (r2) with communication side B becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if it is correct just with the public key encryption r2 one-tenth PKB (r2) of communication side B, and send PKB (r2) to communication side B, otherwise illustrate that communication side B makes mistakes or be not the communication side B that communication side A really thinks communication with it, report an error and disconnect connection; Communication side B deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of communication side A is correct, and connect and set up engineering, otherwise, disconnect connection.
Embodiment three, encryption flow.
Fig. 4 is the embodiment of the invention three encryption flow figure.
With reference to figure 4, may further comprise the steps:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with recipient B encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to recipient B.
Embodiment four, deciphering and Information Authentication.
Fig. 5 is the embodiment of the invention four deciphering and Information Authentication flow charts.
With reference to figure 5, may further comprise the steps:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed.
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
In sum, in an embodiment of the present invention, data receiver is the data encryption that sends, the recipient deciphers enciphered data, the method that adopts the symmetric cryptography decipherment algorithm to combine in the process with the asymmetric encryption decipherment algorithm, both guarantee safety of data transmission, also guaranteed the efficient that algorithm is carried out.And information security transmission system of the present invention provides with the form of set-top box middleware, can provide service for the application program on upper strata, also improves software reuse.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to finish by program, this program can be stored in the computer-readable recording medium, storage medium can comprise: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc.
More than to a kind of information security transmission system and method that the embodiment of the invention provided based on set-top box, be described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.
Claims (8)
1. information security transmission system based on set-top box is characterized in that:
Comprise security algorithm storehouse, key management assembly, certified component, encrypting and decrypting assembly, checking assembly;
Described security algorithm storehouse is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly is used to realize the encryption and decryption of data;
Described checking assembly is used for the data decryption of receiving is carried out validity and integrity verification.
2. system according to claim 1 is characterized in that:
Stored various different security password algorithms in the described security algorithm storehouse, algorithms of different is selected according to safety requirements by described system, and described system employing Hybrid Encryption mode, comprises symmetric encipherment algorithm and rivest, shamir, adelman are used with.
3. system according to claim 1 and 2 is characterized in that:
Described certified component produces random number and use encrypted private key, allow the other side with the PKI deciphering after, again by beaming back behind the public key encryption, whether be this random number same random number with private key deciphering and checking, verify the other side's identity by the mutual photos and sending messages of both sides.
4. system according to claim 1 and 2 is characterized in that:
Described checking assembly obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out; Verify the validity of message according to identity information, time stab information; Integrality according to eap-message digest checking message.
5. the information secure transmission method based on set-top box is characterized in that, comprising:
The sending direction recipient sends communication request;
Transmit leg and recipient key management component interaction session key separately;
Transmit leg and recipient's certified component is verified the other side's identity respectively;
After knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
6. the information secure transmission method based on set-top box according to claim 5 is characterized in that:
Exchange of public keys and authentication process itself that described method comprises comprise:
Transmit leg produces random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to the recipient;
After the recipient receives SKA (r1), PKI PKA deciphering SKA (r1) with transmit leg becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with transmit leg produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives transmit leg;
Transmit leg is deciphered PKA (r1) with private key SKA, PKI deciphering SKB (r2) with the recipient becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if correct recipient's the public key encryption r2 that just uses becomes PKB (r2), and send PKB (r2) to the recipient, otherwise illustrate that the recipient makes mistakes or recipient's object mistake, report an error and disconnect connection;
The recipient deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of transmit leg is correct, and connect and set up engineering, otherwise, disconnect connection.
7. the information secure transmission method based on set-top box according to claim 5 is characterized in that:
The ciphering process that comprises in the described method comprises:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with the recipient encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to the recipient.
8. the information secure transmission method based on set-top box according to claim 7 is characterized in that:
Deciphering that comprises in the described method and Information Authentication process comprise:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed;
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102870082A CN101964786A (en) | 2010-09-17 | 2010-09-17 | Set-top box-based secure information transmission system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102870082A CN101964786A (en) | 2010-09-17 | 2010-09-17 | Set-top box-based secure information transmission system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101964786A true CN101964786A (en) | 2011-02-02 |
Family
ID=43517519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102870082A Pending CN101964786A (en) | 2010-09-17 | 2010-09-17 | Set-top box-based secure information transmission system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101964786A (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102255725A (en) * | 2011-07-16 | 2011-11-23 | 山东省数字证书认证管理有限公司 | Random hybrid key encryption/decryption method |
CN102291396A (en) * | 2011-08-01 | 2011-12-21 | 杭州信雅达数码科技有限公司 | Anonymous authentication algorithm for remote authentication between credible platforms |
CN102394749A (en) * | 2011-09-26 | 2012-03-28 | 深圳市文鼎创数据科技有限公司 | Line protection method, system, information safety equipment and application equipment for data transmission |
CN103036880A (en) * | 2012-12-12 | 2013-04-10 | 华为技术有限公司 | Network information transmission method, transmission equipment and transmission system |
CN103763631A (en) * | 2014-01-07 | 2014-04-30 | 青岛海信信芯科技有限公司 | Authentication method, server and television |
CN104243171A (en) * | 2014-10-15 | 2014-12-24 | 北京奇虎科技有限公司 | Method and device for full-text protection and verification of feedback data |
CN104320329A (en) * | 2014-10-29 | 2015-01-28 | 武汉轻工大学 | Method and system for safe instant messaging under open and untrusted internet environment |
CN105162593A (en) * | 2015-07-27 | 2015-12-16 | 哈尔滨工业大学 | Module authentication method applied to water treatment monitoring |
CN105897426A (en) * | 2016-03-31 | 2016-08-24 | 成都银事达信息技术有限公司 | Student IC card information access method based on Internet |
CN106161017A (en) * | 2015-03-20 | 2016-11-23 | 北京虎符科技有限公司 | ID authentication safety management system |
CN106973325A (en) * | 2017-03-29 | 2017-07-21 | 成都三零凯天通信实业有限公司 | Terrestrial digital television set box receives the safety recognizing method of signal |
CN107135219A (en) * | 2017-05-05 | 2017-09-05 | 四川长虹电器股份有限公司 | A kind of Internet of Things information secure transmission method |
CN108390757A (en) * | 2018-03-27 | 2018-08-10 | 深圳市图灵奇点智能科技有限公司 | Processing method of communication data, device, electronic equipment, program and medium |
CN109284618A (en) * | 2018-09-28 | 2019-01-29 | 真相网络科技(北京)有限公司 | The verification method and system of data source data |
CN109347867A (en) * | 2018-11-27 | 2019-02-15 | 桂林长海发展有限责任公司 | A kind of safety certifying method and system based on http protocol |
CN109788353A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of set-top box encryption copy prevention method |
CN110650113A (en) * | 2018-04-24 | 2020-01-03 | 物联智慧股份有限公司 | Data encryption and decryption method and system, networking device and data encryption and decryption method thereof |
CN111371796A (en) * | 2020-03-11 | 2020-07-03 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium, and electronic device |
CN113093701A (en) * | 2021-03-31 | 2021-07-09 | 重庆长安汽车股份有限公司 | Vehicle remote control method and system |
CN113330712A (en) * | 2018-11-13 | 2021-08-31 | 蓝捕快股份公司 | Encryption system and method using permutation group-based encryption technology |
CN113630772A (en) * | 2021-08-17 | 2021-11-09 | 深圳市智莱科技股份有限公司 | Bluetooth data transmission method and device, Bluetooth equipment and storage medium |
CN114244633A (en) * | 2022-02-24 | 2022-03-25 | 深圳市向光半导体有限公司 | Microprocessor and method capable of carrying out double encryption processing on information |
CN115278312A (en) * | 2022-07-21 | 2022-11-01 | 中山亿联智能科技有限公司 | Set top box information secure transmission encryption method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145913A (en) * | 2007-10-25 | 2008-03-19 | 东软集团有限公司 | A method and system for network security communication |
CN101442409A (en) * | 2007-11-23 | 2009-05-27 | 东方钢铁电子商务有限公司 | Encipher method and system for B2B data exchange |
-
2010
- 2010-09-17 CN CN2010102870082A patent/CN101964786A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145913A (en) * | 2007-10-25 | 2008-03-19 | 东软集团有限公司 | A method and system for network security communication |
CN101442409A (en) * | 2007-11-23 | 2009-05-27 | 东方钢铁电子商务有限公司 | Encipher method and system for B2B data exchange |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102255725A (en) * | 2011-07-16 | 2011-11-23 | 山东省数字证书认证管理有限公司 | Random hybrid key encryption/decryption method |
CN102291396A (en) * | 2011-08-01 | 2011-12-21 | 杭州信雅达数码科技有限公司 | Anonymous authentication algorithm for remote authentication between credible platforms |
CN102291396B (en) * | 2011-08-01 | 2014-01-29 | 杭州信雅达数码科技有限公司 | Anonymous authentication algorithm for remote authentication between credible platforms |
CN102394749A (en) * | 2011-09-26 | 2012-03-28 | 深圳市文鼎创数据科技有限公司 | Line protection method, system, information safety equipment and application equipment for data transmission |
CN102394749B (en) * | 2011-09-26 | 2014-03-05 | 深圳市文鼎创数据科技有限公司 | Line protection method, system, information safety equipment and application equipment for data transmission |
CN103036880A (en) * | 2012-12-12 | 2013-04-10 | 华为技术有限公司 | Network information transmission method, transmission equipment and transmission system |
CN103763631A (en) * | 2014-01-07 | 2014-04-30 | 青岛海信信芯科技有限公司 | Authentication method, server and television |
CN104243171A (en) * | 2014-10-15 | 2014-12-24 | 北京奇虎科技有限公司 | Method and device for full-text protection and verification of feedback data |
CN104320329B (en) * | 2014-10-29 | 2017-09-26 | 武汉轻工大学 | Security instant communication method and system under open, insincere internet environment |
CN104320329A (en) * | 2014-10-29 | 2015-01-28 | 武汉轻工大学 | Method and system for safe instant messaging under open and untrusted internet environment |
CN106161017A (en) * | 2015-03-20 | 2016-11-23 | 北京虎符科技有限公司 | ID authentication safety management system |
CN105162593A (en) * | 2015-07-27 | 2015-12-16 | 哈尔滨工业大学 | Module authentication method applied to water treatment monitoring |
CN105897426A (en) * | 2016-03-31 | 2016-08-24 | 成都银事达信息技术有限公司 | Student IC card information access method based on Internet |
CN106973325A (en) * | 2017-03-29 | 2017-07-21 | 成都三零凯天通信实业有限公司 | Terrestrial digital television set box receives the safety recognizing method of signal |
CN107135219A (en) * | 2017-05-05 | 2017-09-05 | 四川长虹电器股份有限公司 | A kind of Internet of Things information secure transmission method |
CN107135219B (en) * | 2017-05-05 | 2020-04-28 | 四川长虹电器股份有限公司 | Internet of things information secure transmission method |
CN108390757A (en) * | 2018-03-27 | 2018-08-10 | 深圳市图灵奇点智能科技有限公司 | Processing method of communication data, device, electronic equipment, program and medium |
CN110650113A (en) * | 2018-04-24 | 2020-01-03 | 物联智慧股份有限公司 | Data encryption and decryption method and system, networking device and data encryption and decryption method thereof |
CN109284618A (en) * | 2018-09-28 | 2019-01-29 | 真相网络科技(北京)有限公司 | The verification method and system of data source data |
CN109284618B (en) * | 2018-09-28 | 2020-07-28 | 真相网络科技(北京)有限公司 | Data source data verification method and system |
CN113330712A (en) * | 2018-11-13 | 2021-08-31 | 蓝捕快股份公司 | Encryption system and method using permutation group-based encryption technology |
CN109347867A (en) * | 2018-11-27 | 2019-02-15 | 桂林长海发展有限责任公司 | A kind of safety certifying method and system based on http protocol |
CN109788353A (en) * | 2018-12-05 | 2019-05-21 | 安徽站乾科技有限公司 | A kind of set-top box encryption copy prevention method |
CN111371796A (en) * | 2020-03-11 | 2020-07-03 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium, and electronic device |
CN111371796B (en) * | 2020-03-11 | 2023-05-26 | 腾讯科技(深圳)有限公司 | Data transmission system, data transmission method, medium and electronic device |
CN113093701A (en) * | 2021-03-31 | 2021-07-09 | 重庆长安汽车股份有限公司 | Vehicle remote control method and system |
CN113630772A (en) * | 2021-08-17 | 2021-11-09 | 深圳市智莱科技股份有限公司 | Bluetooth data transmission method and device, Bluetooth equipment and storage medium |
CN114244633A (en) * | 2022-02-24 | 2022-03-25 | 深圳市向光半导体有限公司 | Microprocessor and method capable of carrying out double encryption processing on information |
CN114244633B (en) * | 2022-02-24 | 2022-04-26 | 深圳市向光半导体有限公司 | Microprocessor and method capable of carrying out double encryption processing on information |
CN115278312A (en) * | 2022-07-21 | 2022-11-01 | 中山亿联智能科技有限公司 | Set top box information secure transmission encryption method |
CN115278312B (en) * | 2022-07-21 | 2023-11-14 | 中山亿联智能科技有限公司 | Encryption method for safe transmission of set top box information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101964786A (en) | Set-top box-based secure information transmission system and method | |
CN101867898B (en) | Short message encrypting communication system, method and secret key center | |
CN105323070B (en) | A kind of safety E-mail implementation method based on digital envelope | |
US20110194698A1 (en) | Key Sharing System | |
CN105376213A (en) | Identity-based broadcast encryption scheme | |
CN102740239B (en) | The method and system of secure transmission of media information | |
US9712519B2 (en) | Efficient encryption, escrow and digital signatures | |
CN102547688A (en) | Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel | |
CN101783800A (en) | Embedded system safety communication method, device and system | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN112020038A (en) | Domestic encryption terminal suitable for rail transit mobile application | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
CN110519226B (en) | Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate | |
Lee et al. | Security flaw of authentication scheme with anonymity for wireless communications | |
CN104243494A (en) | Data processing method | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
CN114553441B (en) | Electronic contract signing method and system | |
CN111049738B (en) | E-mail data security protection method based on hybrid encryption | |
CA2819211A1 (en) | Data encryption | |
WO2020115266A1 (en) | Methods and devices for secured identity-based encryption systems with two trusted centers | |
KR20130046241A (en) | Broadcast encryption method for securing recipient privacy | |
CN101964039B (en) | Encryption protection method and system of copyright object | |
CN114760026A (en) | Identity authentication method and device | |
CN104868963A (en) | Broadcast encryption scheme based on multi-linear mapping | |
CN116455661A (en) | Multi-factor dynamic identity authentication method based on cryptographic algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20110202 |