CN102006303A - Method and terminal for increasing data transmission safety by using multi-encryption method - Google Patents

Method and terminal for increasing data transmission safety by using multi-encryption method Download PDF

Info

Publication number
CN102006303A
CN102006303A CN2010105750364A CN201010575036A CN102006303A CN 102006303 A CN102006303 A CN 102006303A CN 2010105750364 A CN2010105750364 A CN 2010105750364A CN 201010575036 A CN201010575036 A CN 201010575036A CN 102006303 A CN102006303 A CN 102006303A
Authority
CN
China
Prior art keywords
rsa
key
recipient
information
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105750364A
Other languages
Chinese (zh)
Other versions
CN102006303B (en
Inventor
刘子源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHU filed Critical Hohai University HHU
Priority to CN 201010575036 priority Critical patent/CN102006303B/en
Publication of CN102006303A publication Critical patent/CN102006303A/en
Application granted granted Critical
Publication of CN102006303B publication Critical patent/CN102006303B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method and a terminal for increasing data transmission safety by using a multi-encryption method. The data to be transmitted is encrypted; the identity authentication is carried out and the data transmission error is checked; the data is processed by using the terminal before being sent; when the data is received, the data is analyzed by using the terminal and then sent to a receiver. The method provides a multidimensional key concept, a key structure needed by encryption is more complicated, and the breaking difficulty is higher. The data processing method and the terminal not only further strengthen data safety, but also use an XML (Extensible Markup Language) organization to transmit data, have distinct levels and are convenient to analyze. A terminal module provides a user interface, is convenient for a user to use an autocode function module and has the advantages of secondary development performance, expansibility and high practicability.

Description

With adding method and the terminal that decryption method improves data transmission security
Technical field
The present invention relates to information security field, specifically relate to the method that the multiple encryption method of a kind of usefulness improves data transmission security, and with terminal encrypt, send, reception and data decryption.
Background technology
Because it is savage further that present network is stolen, information security is on the hazard, and network security becomes the network problem that people pay close attention to.The present timely communication software of domestic popular Tencent QQ, its message encryption mode but relatively easily cracks, and QQ does not support fairly large rich text information (text that contains information such as picture, form) point-to-point transmission.So, need other data packet transmission agreement of a kind of higher security level of exploitation, promptly support multiple cipher mode, support fairly large rich text message transmission again, simultaneously also need to add the proof of identity function, even make transmission information be stolen, also can't in the lifetime of raw information, decode out original text substantially.Most important, be to guarantee to detect issuable mistake in the data transmission procedure.More than these are problems that this patent can solve.
In addition, in existing similar technology, normally adopt highly integrated bitcom, and built-in probably back door script, thereby important information etc. stolen.
Summary of the invention
The objective of the invention is at deficiency of the prior art, a kind of multiple encryption method supported is provided, subsidiary secure identity verifying function, but the detected transmission mistake, support the data processing method of fairly large rich text transmission, and with multiple encryption method encrypt, send, the terminal of reception and data decryption.
Technical scheme of the present invention is:
A kind of usefulness is added the method that decryption method improves data transmission security, may further comprise the steps:
(a), at first, add the recipient information at transmitting terminal; The recipient information of this transmitting terminal comprises: recipient's name Name, sender's name Signature, RSA test label information RSA-Info, selected encryption method En-algorithm, key obtains vectorial Vector, can obtain the function pointer Delegate that encrypts required key and encrypt original text by Vector;
(b), the recipient information to this transmitting terminal encrypts: the sender will ownly carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself, select an encryption method then, and use key to obtain vector sum and can obtain the function pointer of encrypting required key by Vector and obtain the needed key of encryption method, encrypt encrypting original text at last, after encryption was finished, this recipient information then generated the XML packet;
(c), the XML packet that generates converted to generate the character visible coding, and transfer to receiving terminal by network;
(d), deciphering: receiving terminal goes back to the XML packet with the data that receive, the input recipient information, the recipient information of this receiving terminal comprises: the signing messages of recipient's name, sender and oneself agreement, RSA PKI group Public Key and can obtain the function pointer Delegate that encrypts required key by Vector, verify this information;
If recipient's name exists, illustrate that having comprised a certain sender in this group packet issues the information of oneself, then further carry out authentication, otherwise, point out no accessible information;
The recipient uses some PKIs and the signing messages corresponding and sender's agreement in the RSA PKI group to carry out the RSA digital signature, when information behind the signature and testing of sending over are signed information matches, illustrate that this sender is legal, then ciphertext is carried out the MD5 verification, otherwise, prompting RSA authentication failed;
If the MD5 verification succeeds then decrypts sender's raw information, otherwise can point out error of transmission.
Character visible in the step of the present invention (c) is encoded to the BASE64 coding.
RSA private key of the present invention is five, and RSA PKI group is one, and five RSA private keys wherein are all right with the assembly of RSA PKI, are used for the RSA authentication.
It is three-dimensional key vector Vector that key of the present invention obtains vectorial Vector, by input three-dimensional point coordinate, can obtain to encrypt and decipher required key by it.
A kind of usefulness is added the terminal that decryption method improves data transmission security, and it comprises the key acquisition module, encrypting module, authentication module, data check module, data transmission module and processor, and described each module all links to each other with the respective signal end of processor;
The key acquisition module is used to obtain the key vector;
Encrypting module is used for the recipient information of transmitting terminal input is encrypted;
Authentication module is used for the RSA digital signature:
For the sender, be to carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself with own, generate the label information of testing;
For the recipient, be that the PKI in signing messages that own and sender are arranged and the corresponding PKI group carries out the RSA digital signature, and verify with the label information of testing that sends over;
The data check module is used to carry out the MD5 verification:
For the sender, be that the ciphertext that generates after the source language message is encrypted is carried out verification, generate check code, be convenient to error detection;
For the recipient, be that the ciphertext that will send over is carried out verification, and compare with check code.
Key acquisition module of the present invention, encrypting module and authentication module all have user interface, are used to provide user's autonomous Design.
Beneficial effect of the present invention:
The present invention effectively utilizes the advantage of XML, generate the ciphertext of tree structure, digital signature is combined with encryption, and integrated multiple existing encryption method, make that the robustness of system's data flow when process information is stronger, ciphertext obviously increases for the resistivity of heavy attack; On the other hand, the use of novelty of the present invention multidimensional key obtain vector, not only improved the flexibility of key, also make the difficulty that cracks of key increase greatly.
The present invention has also realized the function that application value is stronger accordingly when guaranteeing safety of data---the user is if distrust the functional module (as encryption method) that carries, the present invention also provides user interface in these functional modules, be user-friendly to the encryption method of oneself etc., needn't worry that the back door script that may exist steals information.
The present invention encrypts the data of transmission, and adds authentication and data transfer error checking; Before data send, send again after with terminal it being handled.When receiving data, with terminal it is resolved, be sent to the recipient again.This method has proposed the multidimensional key notion simultaneously, makes the required key structure of encryption more complicated, and it is bigger to crack difficulty.This data processing method and terminal, not only greatly degree has been strengthened safety of data, and transmits data with the XML tissue, and the level distinctness is convenient to resolve; Terminal module provides user interface, and user-friendly self-editing functional module has secondary development, autgmentability and practical advantage.
 
Description of drawings
Fig. 1 is the theory diagram of terminal of the present invention.
Fig. 2 is the flow chart of the inventive method.
Fig. 3 is the structural representation of the XML file that generates of the present invention.
Fig. 4 is an encrypting step flow chart of the present invention.
Fig. 5 is a decryption step flow chart of the present invention.
 
Embodiment
The present invention is further illustrated below in conjunction with drawings and Examples.
Shown in Fig. 1-5, a kind of usefulness is added the method that decryption method improves data transmission security, may further comprise the steps:
(a), at first, add the recipient information at transmitting terminal; The recipient information of this transmitting terminal comprises: recipient's name Name, sender's name Signature, RSA test label information RSA-Info, selected encryption method En-algorithm, key obtains vectorial Vector, can obtain the function pointer Delegate that encrypts required key and encrypt original text by Vector;
(b), the recipient information to this transmitting terminal encrypts: the sender will ownly carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself, select an encryption method then, and use key to obtain vector sum and can obtain the function pointer of encrypting required key by Vector and obtain the needed key of encryption method, encrypt encrypting original text at last, after encryption was finished, this recipient information then generated the XML packet;
(c), the XML packet that generates converted to generate the character visible coding, and transfer to receiving terminal by network;
(d), deciphering: receiving terminal goes back to the XML packet with the data that receive, the input recipient information, the recipient information of this receiving terminal comprises: the signing messages of recipient's name, sender and oneself agreement, RSA PKI group Public Key and can obtain the function pointer Delegate that encrypts required key by Vector, verify this information;
If recipient's name exists, illustrate that having comprised a certain sender in this group packet issues the information of oneself, then further carry out authentication, otherwise, point out no accessible information;
The recipient uses some PKIs and the signing messages corresponding and sender's agreement in the RSA PKI group to carry out the RSA digital signature, when information behind the signature and testing of sending over are signed information matches, illustrate that this sender is legal, then ciphertext is carried out the MD5 verification, otherwise, prompting RSA authentication failed;
If the MD5 verification succeeds then decrypts sender's raw information, otherwise can point out error of transmission.
Character visible in the step of the present invention (c) is encoded to the BASE64 coding.
RSA private key of the present invention is five, and RSA PKI group is one, and five RSA private keys wherein are all right with the assembly of RSA PKI, are used for the RSA authentication.
It is three-dimensional key vector Vector that key of the present invention obtains vectorial Vector, by input three-dimensional point coordinate, can obtain to encrypt and decipher required key by it.
A kind of usefulness is added the terminal that decryption method improves data transmission security, and it comprises the key acquisition module, encrypting module, authentication module, data check module, data transmission module and processor, and described each module all links to each other with the respective signal end of processor;
The key acquisition module is used to obtain the key vector;
Encrypting module is used for the recipient information of transmitting terminal input is encrypted;
Authentication module is used for the RSA digital signature:
For the sender, be to carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself with own, generate the label information of testing;
For the recipient, be that the PKI in signing messages that own and sender are arranged and the corresponding PKI group carries out the RSA digital signature, and verify with the label information of testing that sends over;
The data check module is used to carry out the MD5 verification:
For the sender, be that the ciphertext that generates after the source language message is encrypted is carried out verification, generate check code, be convenient to error detection;
For the recipient, be that the ciphertext that will send over is carried out verification, and compare with check code.
Key acquisition module of the present invention, encrypting module and authentication module all have user interface, are used to provide user's autonomous Design.
During concrete enforcement:
As shown in Figure 1, improve the terminal of data transmission security by the key acquisition module with adding decryption method, encrypting module, authentication module, data check module and five modules of data transmission module constitute, key acquisition module wherein, encrypting module, three modules of authentication module are except carrying algorithm, all provide interface, distrusted the fail safe that carries algorithm, thereby made things convenient for the user to provide the algorithm of autonomous Design to satisfy the demands to prevent the user to the user.
Shown in Figure 2, when program begins, do circularly and add recipient information, enciphered message, add up to 4-and finish, be packaged into the XML packet then, transfer the BASE64 coding to, generate the data mode that network can transmit, and transmit by network.Receive the BASE64 coding by receiving terminal again, and convert the XML packet to, the data that receive are gone back to the data mode of being convenient to analyze, import the recipient information again.
When recipient's name has respective items in the XML packet, illustrate to have the information that this recipient need receive in the packet.At this moment, sender and recipient's label information of testing are separately carried out RSA test label, check sender's identity and legitimacy thereof.After identity is upchecked, utilize cipher-text information and check code again, whether detect data has error of transmission.When detection is errorless, can decrypts raw information, otherwise can point out corresponding error.
As shown in Figure 4, be encrypting module flow chart of the present invention.
When adding the recipient information, need 7 contents: the signing messages Signature of recipient's name Name, sender and recipient's agreement, sender's RSA private key Private Key, selected encryption method En-algorithm, key obtain vectorial Vector, can obtain the function pointer Delegate that encrypts required key and encrypt original text by Vector.Our hypothesis has only can mutual transmission information between 5 people (A, B, C, D, E).This 5 people so, everyone can hold the PKI group file that an only one's own private key file and one and these 5 people's private key all matches.When A will pass to the B data, in order not allow other people crack these information, A can be with the name of B as recipient's name Name, and use the RSA private key Private Key of oneself and carry out the RSA digital signature with signing messages that B appoints, label information is tested in generation, select an encryption method as selected encryption method En-algorithm then, and utilize key to obtain vectorial Vector and can obtain the function pointer Delegate that encrypts required key to obtain the needed key of encryption method, will encrypt original text at last and encrypt by Vector.Data processing algorithm can be with these information integrated one-tenth XML.Afterwards, A just can send to B with XML.
As shown in Figure 5, be deciphering module flow chart of the present invention
Input needs 4 contents during the recipient information: signing messages Signature, the RSA PKI group Public Key of recipient's name, sender and recipient's agreement and can obtain the function pointer Delegate of the required key of encryption by Vector.After B receives XML, just carry out data parsing.At first, in XML, search the name of oneself.If have, illustrate and contain the information that oneself should receive among the XML.At this moment, B can use public-key group in the file some PKIs and the signing messages of corresponding agreement carry out the RSA digital signature, for example, judge whether the information of sending for A, the PKI of A in the group that then uses public-key, with with the signing messages of A agreement, carry out the RSA digital signature, generate the label information of testing, testing when signing information conforms in testing label information and XML, determine that then A issues the information of B, the sender is legal, just can be decrypted.Comprised among the XML and encrypted used algorithm, and key obtains vectorial VECTOR.By VECTOR, B just can decipher information that A sends.
The part that the present invention does not relate to prior art that maybe can adopt all same as the prior art is realized.

Claims (6)

1. one kind with adding the method that decryption method improves data transmission security, it is characterized in that it may further comprise the steps:
(a), at first, add the recipient information at transmitting terminal; The recipient information of this transmitting terminal comprises: recipient's name Name, sender's name Signature, RSA test label information RSA-Info, selected encryption method En-algorithm, key obtains vectorial Vector, can obtain the function pointer Delegate that encrypts required key and encrypt original text by Vector;
(b), the recipient information to this transmitting terminal encrypts: the sender will ownly carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself, select an encryption method then, and use key to obtain vector sum and can obtain the function pointer of encrypting required key by Vector and obtain the needed key of encryption method, encrypt encrypting original text at last, after encryption was finished, this recipient information then generated the XML packet;
(c), the XML packet that generates converted to generate the character visible coding, and transfer to receiving terminal by network;
(d), deciphering: receiving terminal goes back to the XML packet with the data that receive, the input recipient information, the recipient information of this receiving terminal comprises: the signing messages of recipient's name, sender and oneself agreement, RSA PKI group Public Key and can obtain the function pointer Delegate that encrypts required key by Vector, verify this information;
If recipient's name exists, illustrate that having comprised a certain sender in this group packet issues the information of oneself, then further carry out authentication, otherwise, point out no accessible information;
The recipient uses some PKIs and the signing messages corresponding and sender's agreement in the RSA PKI group to carry out the RSA digital signature, when information behind the signature and testing of sending over are signed information matches, illustrate that this sender is legal, then ciphertext is carried out the MD5 verification, otherwise, prompting RSA authentication failed;
If the MD5 verification succeeds then decrypts sender's raw information, otherwise can point out error of transmission.
2. usefulness according to claim 1 is added the method that decryption method improves data transmission security, it is characterized in that the character visible in the step (c) is encoded to the BASE64 coding.
3. usefulness according to claim 1 is added the method that decryption method improves data transmission security, it is characterized in that described RSA private key is five, and RSA PKI group is one, and five RSA private keys wherein are all right with the assembly of RSA PKI, are used for the RSA authentication.
4. usefulness according to claim 1 is added the method that decryption method improves data transmission security, it is characterized in that it is three-dimensional key vector Vector that described key obtains vectorial Vector, by input three-dimensional point coordinate, can obtain to encrypt and decipher required key by it.
5. one kind with adding the terminal that decryption method improves data transmission security, it is characterized in that it comprises the key acquisition module, encrypting module, authentication module, data check module, data transmission module and processor, described each module all link to each other with the respective signal end of processor;
The key acquisition module is used to obtain the key vector;
Encrypting module is used for the recipient information of transmitting terminal input is encrypted;
Authentication module is used for the RSA digital signature:
For the sender, be to carry out the RSA digital signature with the signing messages of recipient's agreement and the RSA private key of oneself with own, generate the label information of testing;
For the recipient, be that the PKI in signing messages that own and sender are arranged and the corresponding PKI group carries out the RSA digital signature, and verify with the label information of testing that sends over;
The data check module is used to carry out the MD5 verification:
For the sender, be that the ciphertext that generates after the source language message is encrypted is carried out verification, generate check code, be convenient to error detection;
For the recipient, be that the ciphertext that will send over is carried out verification, and compare with check code.
6. usefulness according to claim 1 is added the terminal that decryption method improves data transmission security, it is characterized in that described key acquisition module, and encrypting module and authentication module all have user interface, are used to provide user's autonomous Design.
CN 201010575036 2010-12-06 2010-12-06 Method and terminal for increasing data transmission safety by using multi-encryption method Expired - Fee Related CN102006303B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010575036 CN102006303B (en) 2010-12-06 2010-12-06 Method and terminal for increasing data transmission safety by using multi-encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010575036 CN102006303B (en) 2010-12-06 2010-12-06 Method and terminal for increasing data transmission safety by using multi-encryption method

Publications (2)

Publication Number Publication Date
CN102006303A true CN102006303A (en) 2011-04-06
CN102006303B CN102006303B (en) 2013-06-05

Family

ID=43813374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010575036 Expired - Fee Related CN102006303B (en) 2010-12-06 2010-12-06 Method and terminal for increasing data transmission safety by using multi-encryption method

Country Status (1)

Country Link
CN (1) CN102006303B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN104486756A (en) * 2014-12-05 2015-04-01 深圳职业技术学院 Encryption and decryption method and system for secret letter short message
CN105162253A (en) * 2015-09-02 2015-12-16 许继集团有限公司 Wireless communication system for intellectualization of primary equipment
CN105306233A (en) * 2014-06-19 2016-02-03 中兴通讯股份有限公司 Terminal management method, terminal management system, server and terminal
CN106021202A (en) * 2016-05-24 2016-10-12 珠海市魅族科技有限公司 Data transmission method and receiving device
CN106911704A (en) * 2017-03-13 2017-06-30 北京轻信科技有限公司 A kind of encrypting and decrypting method based on block chain
CN108848094A (en) * 2018-06-22 2018-11-20 平安科技(深圳)有限公司 Data security validation method, device, system, computer equipment and storage medium
CN109981667A (en) * 2019-04-01 2019-07-05 北京纬百科技有限公司 A kind of user data transmission method and device
CN110266733A (en) * 2019-07-25 2019-09-20 群淂数码科技(上海)有限公司 Data ciphering method and its system
CN111935175A (en) * 2020-09-14 2020-11-13 华芯生物科技(武汉)有限公司 Data encryption transmission method of detection equipment
CN114120498A (en) * 2022-01-27 2022-03-01 云丁网络技术(北京)有限公司 Method and related device for migrating data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040168064A1 (en) * 2003-02-25 2004-08-26 Shougo Shimizu System of generating procedure for digital signature and encryption to XML
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040168064A1 (en) * 2003-02-25 2004-08-26 Shougo Shimizu System of generating procedure for digital signature and encryption to XML
CN101436141A (en) * 2008-11-21 2009-05-20 深圳创维数字技术股份有限公司 Firmware upgrading and encapsulating method and device based on digital signing

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
田挺: "基于.Net的XML安全性的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑 2009年》, no. 11, 15 November 2009 (2009-11-15) *
许国庆: "信息交换中的信息安全问题研究", 《中国优秀硕士学位论文全文数据库 信息科技辑 2010年》, no. 4, 15 April 2010 (2010-04-15) *
顾韵华等: "XML安全技术分析与应用", 《计算机科学 2009年》, no. 5, 15 May 2009 (2009-05-15) *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10404665B2 (en) 2014-06-19 2019-09-03 Zte Corporation Terminal management method and system, server and terminal
CN105306233A (en) * 2014-06-19 2016-02-03 中兴通讯股份有限公司 Terminal management method, terminal management system, server and terminal
CN104244237A (en) * 2014-09-12 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Data transmitting and receiving method, receiving and transmitting terminal and data transmitter-receiver set
CN104486756A (en) * 2014-12-05 2015-04-01 深圳职业技术学院 Encryption and decryption method and system for secret letter short message
CN104486756B (en) * 2014-12-05 2018-11-16 深圳职业技术学院 A kind of encryption and decryption method and system of close writing paper short message
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN105162253A (en) * 2015-09-02 2015-12-16 许继集团有限公司 Wireless communication system for intellectualization of primary equipment
CN106021202A (en) * 2016-05-24 2016-10-12 珠海市魅族科技有限公司 Data transmission method and receiving device
CN106911704B (en) * 2017-03-13 2020-10-09 北京轻信科技有限公司 Encryption and decryption method based on block chain
CN106911704A (en) * 2017-03-13 2017-06-30 北京轻信科技有限公司 A kind of encrypting and decrypting method based on block chain
CN108848094A (en) * 2018-06-22 2018-11-20 平安科技(深圳)有限公司 Data security validation method, device, system, computer equipment and storage medium
CN108848094B (en) * 2018-06-22 2021-04-16 平安科技(深圳)有限公司 Data security verification method, device, system, computer equipment and storage medium
CN109981667A (en) * 2019-04-01 2019-07-05 北京纬百科技有限公司 A kind of user data transmission method and device
CN110266733A (en) * 2019-07-25 2019-09-20 群淂数码科技(上海)有限公司 Data ciphering method and its system
CN111935175A (en) * 2020-09-14 2020-11-13 华芯生物科技(武汉)有限公司 Data encryption transmission method of detection equipment
CN114120498A (en) * 2022-01-27 2022-03-01 云丁网络技术(北京)有限公司 Method and related device for migrating data

Also Published As

Publication number Publication date
CN102006303B (en) 2013-06-05

Similar Documents

Publication Publication Date Title
CN102006303B (en) Method and terminal for increasing data transmission safety by using multi-encryption method
CN110493197B (en) Login processing method and related equipment
CN102317904B (en) System and methods for encryption with authentication integrity
US20070189517A1 (en) Pseudo public key encryption
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN102333093A (en) Data encryption transmission method and system
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN104660605A (en) Multi-factor identity authentication method and system
CN101399666A (en) Safety control method and system for digital certificate of file
CN106209606A (en) A kind of use the method for WEB mail, terminal and system safely
CN105162599A (en) Data transmission system and data transmission method
CN113346995B (en) Method and system for preventing falsification in mail transmission process based on quantum security key
CN105071935A (en) Data processing method, heterogeneous system and integrated system
CN103888938A (en) PKI private key protection method of dynamically generated key based on parameters
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104424446A (en) Safety verification and transmission method and system
CN112491550B (en) Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN105141635A (en) Method and system for safe communication of group sending messages
CN109104271A (en) A kind of methods, devices and systems of digital signature
CN110611670A (en) API request encryption method and device
CN101924635B (en) Method and device for user identity authentication
CN102271333A (en) Safe receiving and dispatching method for 3G (3rd Generation) message on basis of trusted chain transmission
CN101895847A (en) Short message service authenticated encryption system and method based on digital certificate

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130605

Termination date: 20131206