CN102404329A - Method for validating and encrypting interaction between user terminal and virtual community platform - Google Patents

Method for validating and encrypting interaction between user terminal and virtual community platform Download PDF

Info

Publication number
CN102404329A
CN102404329A CN2011103844319A CN201110384431A CN102404329A CN 102404329 A CN102404329 A CN 102404329A CN 2011103844319 A CN2011103844319 A CN 2011103844319A CN 201110384431 A CN201110384431 A CN 201110384431A CN 102404329 A CN102404329 A CN 102404329A
Authority
CN
China
Prior art keywords
data
user terminal
key
virtual community
community platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103844319A
Other languages
Chinese (zh)
Inventor
王春光
梁晓雯
邹一心
张屹
费智超
王国琪
王震生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU YINGFU MAISHENG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SUZHOU YINGFU MAISHENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU YINGFU MAISHENG INFORMATION TECHNOLOGY Co Ltd filed Critical SUZHOU YINGFU MAISHENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011103844319A priority Critical patent/CN102404329A/en
Publication of CN102404329A publication Critical patent/CN102404329A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for validating and encrypting interaction between a user terminal and a virtual community platform. Uplink and downlink identities between the virtual community platform and the user terminal are firstly validated while the user terminal and the virtual community platform access, and the virtual community platform and the user terminal respectively determine the opposite legal identities and determine that the user terminal interacts after activating the services of the virtual community platform. The method comprises the following steps: when the uplink and downlink identities between the virtual community platform and the user terminal are validated and/or the virtual community platform interacts with the user terminal, obtaining the encrypted data by the data transmitter after encrypting the transmitted data through a key dispersion algorithm, and obtaining the decrypted data by the data receiver after decrypting the encrypted data through the key dispersion algorithm; validating the uplink and downlink identities between the virtual community platform and the user terminal through comparing the decrypted data with the transmitted data; and interacting the virtual community platform with the user terminal through the transmitted data which is obtained through the decrypted data. The method adopts the process key method, authorization with little calculation quantity, and encryption and decryption calculation to improve the safety of the system, so the method is suitable for the virtual community which requests high safety and privacy requirements.

Description

Mutual authentication encryption method between user terminal and virtual community platform
Technical field
The invention belongs to the data security technical field, be specifically related to mutual authentication encryption method between a kind of user terminal and virtual community platform.
Background technology
In recent years, the virtual community class that develops into of technology of Internet of things, mechanics of communication and Internet technology is used like application such as facebook, the twitter condition that provides the foundation.In virtual community was used, information gathering equipment need be shared with the mobile virtual community platform after collecting user data, and platform information is pushed to client terminals.
In the data interaction shared procedure that virtual community is used, need carry out safe handling to some data or information.Therefore, the data message of virtual community application has following characteristics:
(1) privacy: virtual community comprises business such as information service, corporations' service, friend-making, ecommerce; Relate to sensitive datas such as personal information, positional information, trading password; So information private property is particularly important, the information that prevents of should taking measures is illegally stolen.
(2) integrality of data: the integrality of Transaction Information also is the importance of virtual community traffic security requirement, prevent losing and repeating of information in the data transfer procedure, also will prevent arbitrarily distorting Transaction Information simultaneously.
(3) user is carried out authentication: the client that the virtual community system reply inserts is discerned authentication, confirms whether client is legal users, whether has opened this business.
For ensureing the Information Security in the reciprocal process, need effective security mechanism to guarantee privacy, integrality and the legitimacy of interactive information between user and the platform.The present invention therefore.
Summary of the invention
The object of the invention is to provide mutual authentication encryption method between a kind of user terminal and virtual community platform, has solved the information security issue in the user terminal and virtual community platform reciprocal process in the prior art.
In order to solve these problems of the prior art, technical scheme provided by the invention is:
Mutual authentication encryption method between a kind of user terminal and virtual community platform; Said user terminal and virtual community platform carry out the up-downgoing authentication between virtual community platform and user terminal earlier when inserting, said virtual community platform and user terminal are confirmed the other side's legal identity respectively and confirm to carry out alternately after user terminal has been opened the business of said virtual community platform; It is characterized in that said method comprise when between virtual community platform and user terminal during the up-downgoing authentication and/or virtual community platform and user terminal carry out the data after transmission side data when mutual obtains encryption to the data of transmission through the encryption of key decentralized algorithm, the data after the data of data receiver after to encryption obtain deciphering through key decentralized algorithm decryption processing; The up-downgoing authentication is relatively carried out authentication through the data after deciphering and the data of transmission between said virtual community platform and user terminal; Said virtual community platform and user terminal carry out obtaining the data of transmission through the data after the deciphering alternately.
Preferably; In the said method between virtual community platform and user terminal during the up-downgoing authentication transmission side data submit to the requesting party of authentication to adopt the identity cipher-text information after the encryption of key decentralized algorithm obtains encrypting to transmit for submitting the requesting party of authentication to user terminal identity information; The data receiver is the reciever that carries out authorization identifying, and the reciever that carries out authorization identifying carries out the identity data after decryption processing obtains deciphering through the key decentralized algorithm to the identity cipher-text information after encrypting; When the identity data after the deciphering was consistent with user terminal identity information, then authentication was passed through; Otherwise authentication is not passed through.
Preferably, virtual community platform and user terminal carry out when mutual transmission side data and adopt the encryption of key decentralized algorithm to obtain the data encrypted message to the data message to transmit in the said method; The data receiver carries out the data message after decryption processing obtains deciphering through the key decentralized algorithm to the data encrypted message after the data message is carried out the message completeness check.
Preferably, virtual community platform and user terminal are provided with master key in the said method, pass through the communication of process key between virtual community platform and user terminal.
Preferably, the process key produces through the key decentralized algorithm in the said method, and its formula is:
SESKey=DIV(DK,Data);
Wherein SESKey is the process key; Data is the logic OR computing of the process key generation factor and random number, and the process key generates the certain number that the factor is interim generation; DIV () computing is meant and carries out the key decentralized algorithm in the formula, is meant the master key MK of two length, and separate data is handled, and derives the key DK of two length; Wherein the DK left-half be earlier with the rightest 8 bytes of separate data as the input data,, obtain as encryption key with MK through the input data being carried out the 3DES computing with MK; Wherein the DK right half part is earlier the rightest 8 bytes of separate data to be negated the back as the input data; , obtain as encryption key with MK through the input data being carried out the 3DES computing with MK.
Preferably, the process key generation factor is that length is the numeral of 6 bytes in the said method.
Preferably, the message completeness check of data message may further comprise the steps in the said method:
The data message packet that 1) will send in order is divided into several data blocks, and the length of each data block is 8 bytes
2) when the length of last data block is 8 bytes, in last data block opening 16 systems numeral ' 8000000000000000 '; When curtailment 8 bytes of last data block, after last data block from the left side successively cover 16 systems numeral ' 8000000000000000 ' reach 8 bytes until the length of last data block;
4) adopt XOR to carry out encryption according to the DEA encryption mode successively to data block and obtain result of calculation with use MAC key; The MAC of 4 byte lengths of obtaining from the result of calculation left side.
To the Information Security problem in the virtual community application, guarantee the safety of customer position information, personal information, the information content etc., ensure the Information Security in the reciprocal process; Simultaneously; Under the premise that security is guaranteed; Consider the safety assurance method feasibility and with the efficient of transfer of data; Business demand to virtual community need be worked out suitable authentication, encryption method, and the requirement that satisfied business is carried out the invention provides a kind of authentication encryption method of using towards virtual community.
The present invention relates to user terminal and the mutual authentication encryption method of virtual community platform; Purview certification and information encryption are carried out in communication between virtual community platform and user terminal; Guarantee transport process safety of data and data transmission efficiency, make that system safety mechanism is more perfect.Nover practical of the present invention, the mode of employing process key through the less authentication of amount of calculation, encryption and decryption computing, improves the fail safe of system, is applicable to the virtual community application that higher safety and privacy require.
With respect to scheme of the prior art, advantage of the present invention is:
1) designed the key decentralized algorithm, through master key, mutual time and random number generative process key, the key that is adopted in each so mutual process is all different, and the security performance of system is provided greatly.
2) adopt bidirectional authentication mechanism between client and the platform, guaranteed both sides' legal access, guaranteed the fail safe that inserts.
3) use key all in MAC verification, the encryption is removed the safety issue that unique use master key brings from.
4) employing 3DES AES is realized easy and security performance is high.
5) security mechanism of design reduces the encryption of system, the amount of calculation of MAC verification under the premise that security is guaranteed, guarantees efficiency of transmission.
Description of drawings
Below in conjunction with accompanying drawing and embodiment the present invention is further described:
Fig. 1 is the security mechanism block diagram during virtual community is used;
Fig. 2 is the descending identifying procedure of describing between client and the platform;
Fig. 3 is the up identifying procedure of describing between client and the platform;
Fig. 4 is encryption and decryption and the MAC checking process of describing between client and the platform;
Fig. 5 is computational methods of describing the MAC verification.
Embodiment
Below in conjunction with specific embodiment such scheme is further specified.Should be understood that these embodiment are used to the present invention is described and are not limited to limit scope of the present invention.The implementation condition that adopts among the embodiment can be done further adjustment according to the condition of concrete producer, and not marked implementation condition is generally the condition in the routine techniques.
Embodiment
Be illustrated in figure 1 as the system architecture diagram in the virtual community application among the present invention; Wherein user terminal is on the client 101 operation smart mobile phones, is linked in the virtual community platform 102 through mobile communications network 103, carries out the mutual of information.Client 101 all realizes up-downgoing authentication, MAC verification and encryption mechanism with the virtual community platform.110 circuits are depicted as descending verification process, the authentication of 102 pairs of clients 101 of implementation platform; 111 circuits are depicted as up verification process, realize the authentication of 101 pairs of platforms 102 of client; Shown in 112 circuits MAC checking procedure, the message integrity verification between implementation platform 102 and the client 101; Be ciphering process shown in 113 circuits, message encryption and decrypting process between implementation platform 102 and the client 101.
Below to the specific descriptions of 110~113 each steps:
Be illustrated in figure 2 as the descending identifying procedure that employing process key carries out.Descending identifying procedure is: client reads client identification CustomerID, and generates random number R nd; Utilize random number R nd, temporary key generation factor K ey_factor inner authenticate key to be done key disperse to obtain process cipher key T emp_Key1; With process cipher key T emp_Key1 CustomerID is 3DES and encrypts, obtain ciphertext En_Customer ID; With uploading behind packet (En_CustomerID+CustomerID+Key_factor+Rnd) the group bag; After platform receives that receiving packet resolves, utilize random number R nd, process key generation factor K ey_factor the internal authentication master key to be done key disperse to obtain process cipher key T emp_Key1; Of process cipher key T emp_Key1 EN_Customer ID is made and En_Cardnum to be done 3DE S deciphering obtain expressly data; Relatively whether data consistent with CustomerID, if unanimity then descending authentication pass through, if inconsistent then descending authentification failure.
Be illustrated in figure 3 as the up identifying procedure that employing process key carries out.Up identifying procedure is similar with descending identifying procedure, and its difference is that up identifying procedure is to send authentication data packet to client by platform, is judged the legitimacy of platform by client.And descending identifying procedure is to send authentication data packet to platform by client, is judged the legitimacy of client by platform.
Be illustrated in figure 4 as encryption and decryption and MAC checking process between client and the platform.Client is carried out key to the encryption key of working out and is disperseed to obtain interim encryption key Temp_Key1; Temp_Key1 encrypts message with the process encryption key, obtains ciphertext EN_Data; The MAC key is carried out key disperse to obtain interim MAC cipher key T emp_Key2; Client will be organized packet (En_Data+MAC) and upload; After platform receives packet and parsing, the MAC key of appointment is done key disperse to obtain process MAC cipher key T emp_Key2; With Temp_Key2 En_Data is calculated MAC1; Whether checking MAC1 equals MAC, like unequal then MAC verification failure, points out to client error; The encryption key of appointment is done key disperse to obtain process cipher key T emp_Key1 if MAC1 equals MAC; Temp_Key1 deciphers EN_Data with the process encryption key, obtains expressly accomplishing decrypting process.
All adopt the process key to guarantee the fail safe of system in authentication between the subscription client of virtual community system and the platform in the present embodiment, MAC verification, the encryption.Client and platform utilize the key decentralized algorithm, generate the factor according to key and guarantee that with random number each process key is different, guarantee the fail safe of master key.The process key disappears after client-side program breaks link automatically, does not allow to read the validity that other instructions can the influence process key.The decentralized algorithm of process key is:
SESKey:=DIV(DK,Data);
Wherein Data:=process key generates the factor || random number, and the process key generates the factor 6 bytes (this factor is used for the generation of participation process key, can be real-time time YYMMDDHHMMSS)
DIV (DK, Data) or DIV or DIV () be meant and carry out key decentralized algorithm (Diversify), be meant the master key MK of two length, separate data is handled, derive the key DK of two length.
The method of the DK left-half of wherein deriving is:
1) with the rightest 16 numerals of separate data as importing data;
2) with MK as encryption key;
3) make MK the input data are carried out the 3DES computing.
The method of DK right half part of wherein deriving is:
1) the rightest 16 numerals of separate data is negated, as the input data;
2) with MK as encryption key;
3) with MK the input data are carried out the 3DES computing.
Be illustrated in figure 5 as the MAC checking algorithm.The flow process of MAC checking algorithm is:
The packet that 1) will send in order forms data block:
2) this data block is divided into the data block that 8 bytes are unit, label is D1, D2, D3, D4 etc.Last data block might be a 1-8 byte.
3), then add to forward the 4th in 16 systems numeral ' 8000000000000000 ' thereafter if last data block length is 8 bytes) step.
If last data block length less than 8 bytes then add thereafter if reach 8 byte lengths, then to change the 4th in 16 systems numeral ' 80 ') step; Otherwise reach 8 bytes up to length adding 16 systems numeral ' 0 ' thereafter.
4) use the MAC key to encrypt to these data blocks.
5) finally obtaining is the MAC of 4 byte lengths obtained from result of calculation left side.
Authentication realizes the authentication on cell-phone customer terminal and virtual community backstage in the present embodiment, comprises descending authentication and up authentication.Descending authentication is the legal identity that platform is confirmed client, and up authentication is the legal identity that client is confirmed platform.Through the up-downgoing authentication, platform and client are confirmed the other side's legal identity respectively, guarantee the legitimacy of both sides' information interaction, and guarantee that client opened this business; MAC (message integrality) verification prevents losing of information in the reciprocal process of client and virtual community platform and repeats, also prevents arbitrarily distorting information simultaneously.Present embodiment is involved key use key all in authentication, MAC verification, encryption.Client and platform adopt the 3DES AES, with two length (16 byte) keys 8 byte block of plaintext data are encrypted to ciphertext block data, have good fail safe and realizability.
Above-mentioned instance only is explanation technical conceive of the present invention and characteristics, and its purpose is to let the people who is familiar with this technology can understand content of the present invention and enforcement according to this, can not limit protection scope of the present invention with this.All equivalent transformations that spirit is done according to the present invention or modification all should be encompassed within protection scope of the present invention.

Claims (7)

1. mutual authentication encryption method between user terminal and virtual community platform; Said user terminal and virtual community platform carry out the up-downgoing authentication between virtual community platform and user terminal earlier when inserting, said virtual community platform and user terminal are confirmed the other side's legal identity respectively and confirm to carry out alternately after user terminal has been opened the business of said virtual community platform; It is characterized in that said method comprise when between virtual community platform and user terminal during the up-downgoing authentication and/or virtual community platform and user terminal carry out the data after transmission side data when mutual obtains encryption to the data of transmission through the encryption of key decentralized algorithm, the data after the data of data receiver after to encryption obtain deciphering through key decentralized algorithm decryption processing; The up-downgoing authentication is relatively carried out authentication through the data after deciphering and the data of transmission between said virtual community platform and user terminal; Said virtual community platform and user terminal carry out obtaining the data of transmission through the data after the deciphering alternately.
2. method according to claim 1; Transmission side data submits to the requesting party of authentication to adopt the identity cipher-text information after the encryption of key decentralized algorithm obtains encrypting to transmit to user terminal identity information for submitting the requesting party of authentication to when it is characterized in that in the said method between virtual community platform and user terminal the up-downgoing authentication; The data receiver is the reciever that carries out authorization identifying, and the reciever that carries out authorization identifying carries out the identity data after decryption processing obtains deciphering through the key decentralized algorithm to the identity cipher-text information after encrypting; When the identity data after the deciphering was consistent with user terminal identity information, then authentication was passed through; Otherwise authentication is not passed through.
3. method according to claim 1 is characterized in that in the said method that virtual community platform and user terminal carry out when mutual transmission side data and adopt the encryption of key decentralized algorithm to obtain the data encrypted message to the data message to transmit; The data receiver carries out the data message after decryption processing obtains deciphering through the key decentralized algorithm to the data encrypted message after the data message is carried out the message completeness check.
4. according to claim 2 or 3 described methods, it is characterized in that virtual community platform and user terminal are provided with master key in the said method, between virtual community platform and user terminal through the communication of process key.
5. method according to claim 4 is characterized in that the process key produces through the key decentralized algorithm in the said method, and its formula is:
SESKey?=?DIV(DK,Data);
Wherein SESKey is the process key; Data is the logic OR computing of the process key generation factor and random number, and the process key generates the certain number that the factor is interim generation; DIV () computing is meant and carries out the key decentralized algorithm in the formula, is meant the master key MK of two length, and separate data is handled, and derives the key DK of two length; Wherein the DK left-half be earlier with the rightest 8 bytes of separate data as the input data,, obtain as encryption key with MK through the input data being carried out the 3DES computing with MK; Wherein the DK right half part is earlier the rightest 8 bytes of separate data to be negated the back as the input data; , obtain as encryption key with MK through the input data being carried out the 3DES computing with MK.
6. method according to claim 5 is characterized in that the process key generation factor is that length is the numeral of 6 bytes in the said method.
7. method according to claim 3 is characterized in that the message completeness check of data message in the said method may further comprise the steps:
The data message packet that 1) will send in order is divided into several data blocks, and the length of each data block is 8 bytes
2) when the length of last data block is 8 bytes, in last data block opening 16 systems numeral ' 80 00 00 00 00 00 00 00 '; When curtailment 8 bytes of last data block, after last data block from the left side successively cover 16 systems numeral ' 80 00 00 00 00 00 00 00 ' reach 8 bytes until the length of last data block;
4) adopt XOR to carry out encryption according to the DEA encryption mode successively to data block and obtain result of calculation with use MAC key; The MAC of 4 byte lengths of obtaining from the result of calculation left side.
CN2011103844319A 2011-11-28 2011-11-28 Method for validating and encrypting interaction between user terminal and virtual community platform Pending CN102404329A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103844319A CN102404329A (en) 2011-11-28 2011-11-28 Method for validating and encrypting interaction between user terminal and virtual community platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103844319A CN102404329A (en) 2011-11-28 2011-11-28 Method for validating and encrypting interaction between user terminal and virtual community platform

Publications (1)

Publication Number Publication Date
CN102404329A true CN102404329A (en) 2012-04-04

Family

ID=45886115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103844319A Pending CN102404329A (en) 2011-11-28 2011-11-28 Method for validating and encrypting interaction between user terminal and virtual community platform

Country Status (1)

Country Link
CN (1) CN102404329A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903129A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Remitting system and remitting method realized based on text message mode
CN107067277A (en) * 2017-03-06 2017-08-18 深圳市钱爸爸电子商务有限公司 A kind of handset Wechat client extension system and its application method
CN108809888A (en) * 2017-04-26 2018-11-13 北京握奇智能科技有限公司 A kind of secure network construction method and system based on security module
CN109523254A (en) * 2018-11-29 2019-03-26 湖北云雷文化传播有限公司 It is a kind of that a variety of methods of payment of double offline barcode scannings are passed through based on cell phone application
CN109756451A (en) * 2017-11-03 2019-05-14 华为技术有限公司 A kind of information interacting method and device
CN110943832A (en) * 2019-11-19 2020-03-31 江苏恒宝智能系统技术有限公司 Data encryption transmission method
CN112235100A (en) * 2019-12-20 2021-01-15 青岛鼎信通讯股份有限公司 Electric energy meter soft encryption authentication method and remote authentication system thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588850A (en) * 2004-06-30 2005-03-02 大唐微电子技术有限公司 Network identifying method and system
CN101162535A (en) * 2006-10-13 2008-04-16 中国银联股份有限公司 Method and system for realizing magnetic stripe card trading by IC card
US20080104417A1 (en) * 2006-10-25 2008-05-01 Nachtigall Ernest H System and method for file encryption and decryption
CN101236673A (en) * 2008-03-07 2008-08-06 北京握奇数据系统有限公司 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier
CN101360276A (en) * 2008-09-26 2009-02-04 腾讯科技(深圳)有限公司 Community login method, community identity system and identity interconnecting server
CN101938353A (en) * 2010-08-03 2011-01-05 北京海泰方圆科技有限公司 Method for remotely resetting personal identification number (PIN) of key device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588850A (en) * 2004-06-30 2005-03-02 大唐微电子技术有限公司 Network identifying method and system
CN101162535A (en) * 2006-10-13 2008-04-16 中国银联股份有限公司 Method and system for realizing magnetic stripe card trading by IC card
US20080104417A1 (en) * 2006-10-25 2008-05-01 Nachtigall Ernest H System and method for file encryption and decryption
CN101236673A (en) * 2008-03-07 2008-08-06 北京握奇数据系统有限公司 Method for accomplishing electronic purse off-line charging, complex function card and authorization carrier
CN101360276A (en) * 2008-09-26 2009-02-04 腾讯科技(深圳)有限公司 Community login method, community identity system and identity interconnecting server
CN101938353A (en) * 2010-08-03 2011-01-05 北京海泰方圆科技有限公司 Method for remotely resetting personal identification number (PIN) of key device

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903129A (en) * 2012-12-28 2014-07-02 北京握奇数据系统有限公司 Remitting system and remitting method realized based on text message mode
CN103903129B (en) * 2012-12-28 2017-11-24 北京握奇数据系统有限公司 A kind of funds transfer system realized based on short message mode and method
CN107067277A (en) * 2017-03-06 2017-08-18 深圳市钱爸爸电子商务有限公司 A kind of handset Wechat client extension system and its application method
CN108809888A (en) * 2017-04-26 2018-11-13 北京握奇智能科技有限公司 A kind of secure network construction method and system based on security module
CN108809888B (en) * 2017-04-26 2022-01-21 北京握奇智能科技有限公司 Safety network construction method and system based on safety module
CN109756451A (en) * 2017-11-03 2019-05-14 华为技术有限公司 A kind of information interacting method and device
CN109756451B (en) * 2017-11-03 2022-04-22 华为技术有限公司 Information interaction method and device
US11647390B2 (en) 2017-11-03 2023-05-09 Huawei Technologies Co., Ltd. Information exchange method and apparatus
CN109523254A (en) * 2018-11-29 2019-03-26 湖北云雷文化传播有限公司 It is a kind of that a variety of methods of payment of double offline barcode scannings are passed through based on cell phone application
CN110943832A (en) * 2019-11-19 2020-03-31 江苏恒宝智能系统技术有限公司 Data encryption transmission method
CN110943832B (en) * 2019-11-19 2023-06-06 江苏恒宝智能系统技术有限公司 Data encryption transmission method
CN112235100A (en) * 2019-12-20 2021-01-15 青岛鼎信通讯股份有限公司 Electric energy meter soft encryption authentication method and remote authentication system thereof

Similar Documents

Publication Publication Date Title
CN103095696B (en) A kind of authentication and cryptographic key negotiation method being applicable to power information acquisition system
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
CN100566460C (en) Utilize authentication and cryptographic key negotiation method between the mobile entity that short message realizes
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
CN109559122A (en) Block chain data transmission method and block chain data transmission system
CN107105060A (en) A kind of method for realizing electric automobile information security
CN109495490B (en) Block chain-based unified identity authentication method
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
CN102404329A (en) Method for validating and encrypting interaction between user terminal and virtual community platform
CN103354498A (en) Identity-based file encryption transmission method
CN101742508A (en) System and method for transmitting files between WAPI terminal and application server
CN102609841A (en) Remote mobile payment system based on digital certificate and payment method
CN102315937A (en) The affaris safety trade system of data and method between radio communication device and the server
CN104754581A (en) Public key password system based LTE wireless network security certification system
CN104243494B (en) A kind of data processing method
CN108880995B (en) Block chain-based unfamiliar social network user information and message pushing encryption method
CN108809636B (en) Communication system for realizing message authentication between members based on group type quantum key card
CN108809637A (en) The car-ground communication Non-Access Stratum authentication key agreement methods of LTE-R based on mixed cipher
CN102594842A (en) Device-fingerprint-based network management message authentication and encryption scheme
CN103179514B (en) A kind of mobile phone safety group's distribution method and device of sensitive information
CN103905384A (en) Embedded inter-terminal session handshake realization method based on security digital certificate
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN1316405C (en) Method for obtaining digital siguature and realizing data safety
CN101997835B (en) Network security communication method, data security processing device and system for finance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120404