CN101964786A - Set-top box-based secure information transmission system and method - Google Patents

Set-top box-based secure information transmission system and method Download PDF

Info

Publication number
CN101964786A
CN101964786A CN2010102870082A CN201010287008A CN101964786A CN 101964786 A CN101964786 A CN 101964786A CN 2010102870082 A CN2010102870082 A CN 2010102870082A CN 201010287008 A CN201010287008 A CN 201010287008A CN 101964786 A CN101964786 A CN 101964786A
Authority
CN
China
Prior art keywords
recipient
key
identity
encryption
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102870082A
Other languages
Chinese (zh)
Inventor
罗笑南
韩冠亚
曹庭毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN2010102870082A priority Critical patent/CN101964786A/en
Publication of CN101964786A publication Critical patent/CN101964786A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a set-top box-based secure information transmission system and a set-top box-based secure information transmission method. The secure information transmission system comprises a secure algorithms library, a key management component, an authentication component, an encryption/decryption component and a verification component; the secure algorithms library is used for providing transmission encryption and decryption algorithm supports; the key management component is used for managing a public key and a private key of a user and generating a dynamic key; the authentication component is used for determining the identities of double data transmission parties; the encryption/decryption component is used for implementing encryption and decryption of data; and the verification component is used for verifying validity and integrity of the received decrypted data. According to the technical scheme, the transmission of the sensitive data on a set-top box is safer and more efficient by combining a symmetric encryption algorithm and an asymmetric encryption algorithm.

Description

A kind of information security transmission system and method based on set-top box
Technical field
The present invention relates to digital home technical field, be specifically related to a kind of information security transmission system and method based on set-top box.
Background technology
Along with digital home's continuous advancement in technology, the function that realizes on the set-top box is also more and more.The set-top box of using has realized playing games, check functions such as stock market, bank service at present, has made things convenient for people's life greatly.
And the diversity of the service that provides along with set-top box, the fail safe of content service is important further.For example the account number cipher information of bank or the account information of recreation all are the sensitive informations that need be protected, so the message transmission on the set-top box need obtain safety guarantee.
In the existing technical scheme, generally be sending behind the message encryption that sends.Cryptographic algorithm is divided into symmetric encipherment algorithm and rivest, shamir, adelman, and symmetric encipherment algorithm realizes that speed is fast, but key management distribution difficulty, the rivest, shamir, adelman private key is maintained secrecy, and PKI is disclosed, and key management is convenient, but encrypting and decrypting efficient is low.
Present method is behind the application encipher decipherment algorithm of application program the inside, and the fail safe of information obtains certain guarantee, but each application program the inside all needs to do encrypting and decrypting program separately, makes that developer's workload is big, and efficient is also lower.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of information security transmission system and method based on set-top box, can allow the sensitive data transmission on the set-top box safer, efficient.
In order to solve the problems of the technologies described above, embodiments of the invention provide following technical scheme to realize:
The invention provides a kind of information security transmission system based on set-top box:
Comprise security algorithm storehouse, key management assembly, certified component, encrypting and decrypting assembly, checking assembly;
Described security algorithm storehouse is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly is used to realize the encryption and decryption of data;
Described checking assembly is used for the data decryption of receiving is carried out validity and integrity verification.
Stored various different security password algorithms in the described security algorithm storehouse, algorithms of different is selected according to safety requirements by described system, and described system employing Hybrid Encryption mode, comprises symmetric encipherment algorithm and rivest, shamir, adelman are used with.
Described certified component produces random number and use encrypted private key, allow the other side with the PKI deciphering after, again by beaming back behind the public key encryption, whether be this random number same random number with private key deciphering and checking, verify the other side's identity by the mutual photos and sending messages of both sides.
Described checking assembly obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out;
Verify the validity of message according to identity information, time stab information;
Integrality according to eap-message digest checking message.
The invention provides a kind of information secure transmission method, comprising based on set-top box:
The sending direction recipient sends communication request;
Transmit leg and recipient key management component interaction session key separately;
Transmit leg and recipient's certified component is verified the other side's identity respectively;
After knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
Exchange of public keys and authentication process itself that described method comprises are as follows:
Transmit leg produces random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to the recipient;
After the recipient receives SKA (r1), PKI PKA deciphering SKA (r1) with transmit leg becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with transmit leg produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives transmit leg;
Transmit leg is deciphered PKA (r1) with private key SKA, PKI deciphering SKB (r2) with the recipient becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if correct recipient's the public key encryption r2 that just uses becomes PKB (r2), and send PKB (r2) to the recipient, otherwise illustrate that the recipient makes mistakes or recipient's object mistake, report an error and disconnect connection;
The recipient deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of transmit leg is correct, and connect and set up engineering, otherwise, disconnect connection.
The ciphering process that comprises in the described method comprises:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with the recipient encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to the recipient.
Deciphering that comprises in the described method and Information Authentication process comprise:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed;
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
Technique scheme as can be seen, the present invention has following beneficial effect:
In an embodiment of the present invention, data receiver is the data encryption that sends, and the recipient deciphers enciphered data, the method that adopts the symmetric cryptography decipherment algorithm to combine with the asymmetric encryption decipherment algorithm in the process, both guarantee safety of data transmission, also guaranteed the efficient that algorithm is carried out.And information security transmission system of the present invention provides with the form of set-top box middleware, can provide service for the application program on upper strata, also improves software reuse.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a system configuration schematic diagram of the present invention;
Fig. 2 is the embodiment of the invention one an information security transmission system communication process schematic diagram;
Fig. 3 is the embodiment of the invention two exchange of public keys and authentication flow chart;
Fig. 4 is the embodiment of the invention three encryption flow figure;
Fig. 5 is the embodiment of the invention four deciphering and Information Authentication flow charts.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making all other embodiment that obtained under the creative work prerequisite.
The invention provides a kind of information security transmission system and method, can improve the Information Security in the set-top box service more easily based on set-top box.
Below in conjunction with accompanying drawing embodiment of the invention technical scheme is elaborated.
As shown in Figure 1, be system configuration schematic diagram of the present invention.
A kind of information security transmission system based on set-top box comprises:
Security algorithm storehouse 101, key management assembly 102, certified component 103, encrypting and decrypting assembly 104, checking assembly 105.
Described security algorithm storehouse 101 is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly 102 is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component 103 is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly 104 is used to realize the encryption and decryption of data;
Described checking assembly 105 is used for the data decryption of receiving is carried out validity and integrity verification.
This system is that the form with middleware provides, and can provide service for the data of set top box transmission.
Concrete:
Various different security password algorithms have been stored in security algorithm storehouse 101, and suitable algorithm can be selected according to safety requirements by system.It is the safety function main provider of this information security transmission system.Because symmetry algorithm efficient is not high, generally as digital signature, mass data then adopts symmetric encipherment algorithm to encrypt.Native system adopts the Hybrid Encryption scheme, and promptly symmetric encipherment algorithm and rivest, shamir, adelman are used with.
Key management assembly 102 can produce nonrecoverable dynamic key, and this dynamic key is used for symmetric encipherment algorithm; The key management assembly is the PKI and the private key of leading subscriber also, and public, private key is used for rivest, shamir, adelman; The key management assembly of transmit leg also with communication party's key management assembly exchange session key.
Certified component 103, produce random number and use encrypted private key, after allowing the other side with the PKI deciphering, next by beaming back behind the public key encryption again this random number, whether with private key deciphering and checking is same random number, by the mutual photos and sending messages checking of both sides the other side's identity, thereby signer and he can be claimed that the identity and the PKI that have are mapped, finish the discriminating of two puberty parts.
Encrypting and decrypting assembly 104 has following characteristics:
The transmit leg ciphering process is encrypted the message and the signing messages that will send with dynamic key;
The transmit leg ciphering process is with own encrypted private key dynamic key;
The reciever decrypting process obtains dynamic key with the deciphering of the other side's PKI;
The reciever decrypting process obtains message content and signing messages with the dynamic key deciphering.
Checking assembly 105 obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out; Verify the validity of message according to identity information, time stab information; Integrality according to eap-message digest checking message.
Embodiment one,
With reference to figure 2, be the embodiment of the invention one information security transmission system communication process schematic diagram.In the present embodiment, information security transmission system of the present invention provides with the form of middleware, for upper level applications provides service.
As shown in Figure 2, specifically may further comprise the steps:
A1, sending direction recipient send communication request;
A2, transmit leg and recipient key management component interaction session key separately, i.e. PKI separately;
A3, transmit leg and recipient's certified component is verified the other side's identity respectively;
A4, after knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
Embodiment two, exchange of public keys and authentication:
Fig. 3 is the embodiment of the invention two exchange of public keys and authentication flow chart.
With reference to figure 3, may further comprise the steps:
B1, communication side A send communication request to communication side B;
B2, communication two party send to the other side to PKI separately, promptly exchange session key;
B3, communication side A produce random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to communication side B;
After B4, communication side B receive SKA (r1), PKI PKA deciphering SKA (r1) with communication side A becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with communication side A produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives communication side A;
B5, communication side A decipher PKA (r1) with private key SKA, PKI deciphering SKB (r2) with communication side B becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if it is correct just with the public key encryption r2 one-tenth PKB (r2) of communication side B, and send PKB (r2) to communication side B, otherwise illustrate that communication side B makes mistakes or be not the communication side B that communication side A really thinks communication with it, report an error and disconnect connection; Communication side B deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of communication side A is correct, and connect and set up engineering, otherwise, disconnect connection.
Embodiment three, encryption flow.
Fig. 4 is the embodiment of the invention three encryption flow figure.
With reference to figure 4, may further comprise the steps:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with recipient B encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to recipient B.
Embodiment four, deciphering and Information Authentication.
Fig. 5 is the embodiment of the invention four deciphering and Information Authentication flow charts.
With reference to figure 5, may further comprise the steps:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed.
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
In sum, in an embodiment of the present invention, data receiver is the data encryption that sends, the recipient deciphers enciphered data, the method that adopts the symmetric cryptography decipherment algorithm to combine in the process with the asymmetric encryption decipherment algorithm, both guarantee safety of data transmission, also guaranteed the efficient that algorithm is carried out.And information security transmission system of the present invention provides with the form of set-top box middleware, can provide service for the application program on upper strata, also improves software reuse.
One of ordinary skill in the art will appreciate that all or part of step in the whole bag of tricks of the foregoing description is to instruct relevant hardware to finish by program, this program can be stored in the computer-readable recording medium, storage medium can comprise: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc.
More than to a kind of information security transmission system and method that the embodiment of the invention provided based on set-top box, be described in detail, used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.

Claims (8)

1. information security transmission system based on set-top box is characterized in that:
Comprise security algorithm storehouse, key management assembly, certified component, encrypting and decrypting assembly, checking assembly;
Described security algorithm storehouse is used to provide transmission encryption, decipherment algorithm support;
Described key management assembly is used for the PKI and the private key of leading subscriber, and produces dynamic key;
Described certified component is used to confirm to transmit data both sides' identity;
Described encrypting and decrypting assembly is used to realize the encryption and decryption of data;
Described checking assembly is used for the data decryption of receiving is carried out validity and integrity verification.
2. system according to claim 1 is characterized in that:
Stored various different security password algorithms in the described security algorithm storehouse, algorithms of different is selected according to safety requirements by described system, and described system employing Hybrid Encryption mode, comprises symmetric encipherment algorithm and rivest, shamir, adelman are used with.
3. system according to claim 1 and 2 is characterized in that:
Described certified component produces random number and use encrypted private key, allow the other side with the PKI deciphering after, again by beaming back behind the public key encryption, whether be this random number same random number with private key deciphering and checking, verify the other side's identity by the mutual photos and sending messages of both sides.
4. system according to claim 1 and 2 is characterized in that:
Described checking assembly obtains identity information, time stab information and eap-message digest from the signing messages that deciphering is come out; Verify the validity of message according to identity information, time stab information; Integrality according to eap-message digest checking message.
5. the information secure transmission method based on set-top box is characterized in that, comprising:
The sending direction recipient sends communication request;
Transmit leg and recipient key management component interaction session key separately;
Transmit leg and recipient's certified component is verified the other side's identity respectively;
After knowing the other side's PKI and confirming the other side's identity, the mode that transmit leg and recipient adopt symmetry algorithm and asymmetric arithmetic to mix is transmitted data safely.
6. the information secure transmission method based on set-top box according to claim 5 is characterized in that:
Exchange of public keys and authentication process itself that described method comprises comprise:
Transmit leg produces random number r1, and the private key SKA of usefulness oneself encrypts r1 and obtains SKA (r1), and sends to the recipient;
After the recipient receives SKA (r1), PKI PKA deciphering SKA (r1) with transmit leg becomes r1, and the PKI PKA encryption r1 one-tenth PKA (r1) with transmit leg produces random number r2 again, private key SKB with oneself encrypts r2 one-tenth SKB (r2), sends PKA (r1) and SKB (r2) and gives transmit leg;
Transmit leg is deciphered PKA (r1) with private key SKA, PKI deciphering SKB (r2) with the recipient becomes r2, whether the numerical value behind the detection deciphering PKA (r1) is r1, if correct recipient's the public key encryption r2 that just uses becomes PKB (r2), and send PKB (r2) to the recipient, otherwise illustrate that the recipient makes mistakes or recipient's object mistake, report an error and disconnect connection;
The recipient deciphers PKB (r2), and whether the numerical value that detects after the deciphering is r2, and is correct then illustrate that the identity of transmit leg is correct, and connect and set up engineering, otherwise, disconnect connection.
7. the information secure transmission method based on set-top box according to claim 5 is characterized in that:
The ciphering process that comprises in the described method comprises:
Transmit leg utilizes the DSA algorithm computation to go out the summary A of message M to be sent, oneself identity and time stab information T is used for preventing Replay Attack adding thereafter;
Private key SKA with oneself signs to summary A and time stab information T encryption, forms signing messages S=ESKA (A+T);
Produce dynamic session K, M of message own and signing messages are encrypted formation ciphertext C=EK (M+S) with K;
PKI PKB with the recipient encrypts session key K, obtains CK=EPKB (K);
Ciphertext C and encrypted session key CK be packaged together, form a number and it is believed that envelope, this data envelope is transferred to the recipient.
8. the information secure transmission method based on set-top box according to claim 7 is characterized in that:
Deciphering that comprises in the described method and Information Authentication process comprise:
After the recipient received the data envelope, deciphering obtained session key K to the private key SKB of usefulness oneself to encrypted session key CK;
With the session key K that restores recipient's ciphertext C is decrypted and obtains message M+ signing messages S;
Deciphering obtains eap-message digest A+ identity time stab information T to signing messages S with the PKI PKA of transmit leg;
Whether the eap-message digest A1 of the data text M that receives from new calculating with the DSA algorithm equates according to eap-message digest A and A1 whether the integrality of judging is destroyed, if equate, expression does not have destroyed, if unequal, represents destroyed;
Utilize identity time stab information T identification the other side's identity and prevent Replay Attack.
CN2010102870082A 2010-09-17 2010-09-17 Set-top box-based secure information transmission system and method Pending CN101964786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102870082A CN101964786A (en) 2010-09-17 2010-09-17 Set-top box-based secure information transmission system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102870082A CN101964786A (en) 2010-09-17 2010-09-17 Set-top box-based secure information transmission system and method

Publications (1)

Publication Number Publication Date
CN101964786A true CN101964786A (en) 2011-02-02

Family

ID=43517519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102870082A Pending CN101964786A (en) 2010-09-17 2010-09-17 Set-top box-based secure information transmission system and method

Country Status (1)

Country Link
CN (1) CN101964786A (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255725A (en) * 2011-07-16 2011-11-23 山东省数字证书认证管理有限公司 Random hybrid key encryption/decryption method
CN102291396A (en) * 2011-08-01 2011-12-21 杭州信雅达数码科技有限公司 Anonymous authentication algorithm for remote authentication between credible platforms
CN102394749A (en) * 2011-09-26 2012-03-28 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN103036880A (en) * 2012-12-12 2013-04-10 华为技术有限公司 Network information transmission method, transmission equipment and transmission system
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television
CN104243171A (en) * 2014-10-15 2014-12-24 北京奇虎科技有限公司 Method and device for full-text protection and verification of feedback data
CN104320329A (en) * 2014-10-29 2015-01-28 武汉轻工大学 Method and system for safe instant messaging under open and untrusted internet environment
CN105162593A (en) * 2015-07-27 2015-12-16 哈尔滨工业大学 Module authentication method applied to water treatment monitoring
CN105897426A (en) * 2016-03-31 2016-08-24 成都银事达信息技术有限公司 Student IC card information access method based on Internet
CN106161017A (en) * 2015-03-20 2016-11-23 北京虎符科技有限公司 ID authentication safety management system
CN106973325A (en) * 2017-03-29 2017-07-21 成都三零凯天通信实业有限公司 Terrestrial digital television set box receives the safety recognizing method of signal
CN107135219A (en) * 2017-05-05 2017-09-05 四川长虹电器股份有限公司 A kind of Internet of Things information secure transmission method
CN108390757A (en) * 2018-03-27 2018-08-10 深圳市图灵奇点智能科技有限公司 Processing method of communication data, device, electronic equipment, program and medium
CN109284618A (en) * 2018-09-28 2019-01-29 真相网络科技(北京)有限公司 The verification method and system of data source data
CN109347867A (en) * 2018-11-27 2019-02-15 桂林长海发展有限责任公司 A kind of safety certifying method and system based on http protocol
CN109788353A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of set-top box encryption copy prevention method
CN110650113A (en) * 2018-04-24 2020-01-03 物联智慧股份有限公司 Data encryption and decryption method and system, networking device and data encryption and decryption method thereof
CN111371796A (en) * 2020-03-11 2020-07-03 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium, and electronic device
CN113093701A (en) * 2021-03-31 2021-07-09 重庆长安汽车股份有限公司 Vehicle remote control method and system
CN113330712A (en) * 2018-11-13 2021-08-31 蓝捕快股份公司 Encryption system and method using permutation group-based encryption technology
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium
CN114244633A (en) * 2022-02-24 2022-03-25 深圳市向光半导体有限公司 Microprocessor and method capable of carrying out double encryption processing on information
CN115278312A (en) * 2022-07-21 2022-11-01 中山亿联智能科技有限公司 Set top box information secure transmission encryption method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145913A (en) * 2007-10-25 2008-03-19 东软集团有限公司 A method and system for network security communication
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145913A (en) * 2007-10-25 2008-03-19 东软集团有限公司 A method and system for network security communication
CN101442409A (en) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 Encipher method and system for B2B data exchange

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255725A (en) * 2011-07-16 2011-11-23 山东省数字证书认证管理有限公司 Random hybrid key encryption/decryption method
CN102291396A (en) * 2011-08-01 2011-12-21 杭州信雅达数码科技有限公司 Anonymous authentication algorithm for remote authentication between credible platforms
CN102291396B (en) * 2011-08-01 2014-01-29 杭州信雅达数码科技有限公司 Anonymous authentication algorithm for remote authentication between credible platforms
CN102394749A (en) * 2011-09-26 2012-03-28 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN102394749B (en) * 2011-09-26 2014-03-05 深圳市文鼎创数据科技有限公司 Line protection method, system, information safety equipment and application equipment for data transmission
CN103036880A (en) * 2012-12-12 2013-04-10 华为技术有限公司 Network information transmission method, transmission equipment and transmission system
CN103763631A (en) * 2014-01-07 2014-04-30 青岛海信信芯科技有限公司 Authentication method, server and television
CN104243171A (en) * 2014-10-15 2014-12-24 北京奇虎科技有限公司 Method and device for full-text protection and verification of feedback data
CN104320329B (en) * 2014-10-29 2017-09-26 武汉轻工大学 Security instant communication method and system under open, insincere internet environment
CN104320329A (en) * 2014-10-29 2015-01-28 武汉轻工大学 Method and system for safe instant messaging under open and untrusted internet environment
CN106161017A (en) * 2015-03-20 2016-11-23 北京虎符科技有限公司 ID authentication safety management system
CN105162593A (en) * 2015-07-27 2015-12-16 哈尔滨工业大学 Module authentication method applied to water treatment monitoring
CN105897426A (en) * 2016-03-31 2016-08-24 成都银事达信息技术有限公司 Student IC card information access method based on Internet
CN106973325A (en) * 2017-03-29 2017-07-21 成都三零凯天通信实业有限公司 Terrestrial digital television set box receives the safety recognizing method of signal
CN107135219A (en) * 2017-05-05 2017-09-05 四川长虹电器股份有限公司 A kind of Internet of Things information secure transmission method
CN107135219B (en) * 2017-05-05 2020-04-28 四川长虹电器股份有限公司 Internet of things information secure transmission method
CN108390757A (en) * 2018-03-27 2018-08-10 深圳市图灵奇点智能科技有限公司 Processing method of communication data, device, electronic equipment, program and medium
CN110650113A (en) * 2018-04-24 2020-01-03 物联智慧股份有限公司 Data encryption and decryption method and system, networking device and data encryption and decryption method thereof
CN109284618A (en) * 2018-09-28 2019-01-29 真相网络科技(北京)有限公司 The verification method and system of data source data
CN109284618B (en) * 2018-09-28 2020-07-28 真相网络科技(北京)有限公司 Data source data verification method and system
CN113330712A (en) * 2018-11-13 2021-08-31 蓝捕快股份公司 Encryption system and method using permutation group-based encryption technology
CN109347867A (en) * 2018-11-27 2019-02-15 桂林长海发展有限责任公司 A kind of safety certifying method and system based on http protocol
CN109788353A (en) * 2018-12-05 2019-05-21 安徽站乾科技有限公司 A kind of set-top box encryption copy prevention method
CN111371796A (en) * 2020-03-11 2020-07-03 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium, and electronic device
CN111371796B (en) * 2020-03-11 2023-05-26 腾讯科技(深圳)有限公司 Data transmission system, data transmission method, medium and electronic device
CN113093701A (en) * 2021-03-31 2021-07-09 重庆长安汽车股份有限公司 Vehicle remote control method and system
CN113630772A (en) * 2021-08-17 2021-11-09 深圳市智莱科技股份有限公司 Bluetooth data transmission method and device, Bluetooth equipment and storage medium
CN114244633A (en) * 2022-02-24 2022-03-25 深圳市向光半导体有限公司 Microprocessor and method capable of carrying out double encryption processing on information
CN114244633B (en) * 2022-02-24 2022-04-26 深圳市向光半导体有限公司 Microprocessor and method capable of carrying out double encryption processing on information
CN115278312A (en) * 2022-07-21 2022-11-01 中山亿联智能科技有限公司 Set top box information secure transmission encryption method
CN115278312B (en) * 2022-07-21 2023-11-14 中山亿联智能科技有限公司 Encryption method for safe transmission of set top box information

Similar Documents

Publication Publication Date Title
CN101964786A (en) Set-top box-based secure information transmission system and method
CN101867898B (en) Short message encrypting communication system, method and secret key center
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
US20110194698A1 (en) Key Sharing System
CN105376213A (en) Identity-based broadcast encryption scheme
CN102740239B (en) The method and system of secure transmission of media information
US9712519B2 (en) Efficient encryption, escrow and digital signatures
CN102547688A (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN101783800A (en) Embedded system safety communication method, device and system
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN112020038A (en) Domestic encryption terminal suitable for rail transit mobile application
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
CN110519226B (en) Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate
Lee et al. Security flaw of authentication scheme with anonymity for wireless communications
CN104243494A (en) Data processing method
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN114553441B (en) Electronic contract signing method and system
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CA2819211A1 (en) Data encryption
WO2020115266A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
KR20130046241A (en) Broadcast encryption method for securing recipient privacy
CN101964039B (en) Encryption protection method and system of copyright object
CN114760026A (en) Identity authentication method and device
CN104868963A (en) Broadcast encryption scheme based on multi-linear mapping
CN116455661A (en) Multi-factor dynamic identity authentication method based on cryptographic algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110202