CN103117851A - Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) - Google Patents
Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) Download PDFInfo
- Publication number
- CN103117851A CN103117851A CN2011103662467A CN201110366246A CN103117851A CN 103117851 A CN103117851 A CN 103117851A CN 2011103662467 A CN2011103662467 A CN 2011103662467A CN 201110366246 A CN201110366246 A CN 201110366246A CN 103117851 A CN103117851 A CN 103117851A
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- cryptographic calculation
- repudiation
- control method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides an encryption control method and a device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI). The encryption control method and the device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI are used for enabling data being transmitted to be encrypted by a sending end, wherein the data being transmitted includes initial encryption data and clear data. The encryption control method capable of achieving tamper-proofing and repudiation-proofing by means of the PKI comprises the following steps: (1) conducting a first encryption algorithm on the clear data, and enabling an algorithm result to be a first median; (2) conducting a second encryption algorithm on the initial encryption data and the first median, and enabling an algorithm result to be an encrypted value, and the encrypted value is sent to a corresponding receiving end by the sending end. The invention further provides an encryption control device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI and a corresponding financial transaction processing system. According to the encryption control method and the device capable of achieving tamper-proofing and repudiation-proofing by means of the PKI, encryption processing is conducted on clear data and encryption data (initial encryption data) in a message to achieve encryption for a transaction message. Therefore, encryption scheme which is simple and easy to carry out can be utilized to achieve the purpose of tamper-proofing and repudiation-proofing for transaction data.
Description
Technical field
The present invention relates to the information transmission processing process, especially information encryption, decryption processing process particularly, relate to encryption control method and the corresponding control device of realizing anti-tamper anti-repudiation with public-key mechanism.
Background technology
Information is as a kind of resource, and its generality, sharing, appreciation, handlability and multi-purpose make it have the meaning of particular importance for the mankind.The essence of information security is exactly to want the information resources in protection information system or information network to avoid various types of threats, interference and destruction, i.e. the fail safe of guarantee information.And along with the development of information age, people also day by day pay attention to information security, various password, and the interference that authentication techniques begin to help people to solve to be received in message transmitting procedure is as eavesdropping, information leakage, information dropout etc.
In the situation that the active computer network is highly developed, computer system application is extensively universal, the application of transfer of data and based on data transmission is more and more, and has contained all industries.Reach AEROSPACE APPLICATION, little of shopping at network, the centre has related to numerous computer processing systems, and the processing procedure of these computer processing systems all be unable to do without transfer of data.For example, transmitting terminal sends a packet or message to receiving terminal usually, and correspondingly receiving terminal can be processed after receiving this message accordingly, then sends a feedback information to described transmitting terminal.Preferably, such transmitting procedure is completed by network, and for example preferably described transmitting terminal and described receiving terminal all adopt ICP/IP protocol or similar agreement.
In based on network data transmission procedure, because Internet Transmission carries out based on public network usually, so in the process of public network transmission, the message that is transmitted may be blocked, distort.The computer installation at transmitting terminal place also may be by virus infections, thereby described message may be to be subjected to described virus control and the message with swindle character of initiating.This brings potential safety hazard all for transaction Network Based, the based on data transmission, especially may bring loss to both parties in the financial transaction process.
But about the transmission of data distort and the denial aspect again as if not outstanding perfect technology prevent the generation of both of these case.In the situation that guarantee that transmission information is not ravesdropping, become highest priority of the present invention how doing better aspect anti-tamper and anti-repudiation.
Summary of the invention
For using complicated encryption device to guarantee the defective of transaction security in prior art, the purpose of this invention is to provide a kind of encryption control method and corresponding enciphered control device of realizing anti-tamper anti-repudiation with public-key mechanism.
According to an aspect of the present invention, a kind of encryption control method that realizes anti-tamper anti-repudiation with public-key mechanism is provided, it is used for being encrypted being transmitted data at transmitting terminal, the described data that are transmitted comprise initial encryption data and clear data, it is characterized in that, comprise the steps: that a. carries out the first cryptographic calculation to described clear data, and with operation result as the first median; B. described initial encryption data and described the first median are carried out the second cryptographic calculation, and with operation result as secret value, described secret value is sent to corresponding receiving terminal by described transmitting terminal.
Preferably, obtain as follows described clear data at described receiving terminal, wherein, described plaintext is used to further processing: i. and by the operation method corresponding with described the second cryptographic calculation, described secret value is carried out computing, to obtain described the first median; Ii. by the operation method corresponding with described the first cryptographic calculation, described the first median is carried out computing, to obtain described clear data.
According to another aspect of the present invention, a kind of enciphered control device of realizing anti-tamper anti-repudiation with public-key mechanism also, it is used for being encrypted being transmitted data at transmitting terminal, the described data that are transmitted comprise initial encryption data and clear data, it is characterized in that, comprise: the first encryption device, it is used for described clear data is carried out the first cryptographic calculation, and with operation result as the first median; And second encryption device, it is used for described initial encryption data and described the first median are carried out the second cryptographic calculation, and with operation result as secret value, described secret value is sent to corresponding receiving terminal by described transmitting terminal.
Preferably, described enciphered control device also further comprises: the 4th cryptographic calculation device, and it is used for by the operation method corresponding with described the second cryptographic calculation, described secret value being carried out computing, to obtain described the first median; And the 3rd cryptographic calculation device, it is used for by the operation method corresponding with described the first cryptographic calculation, described the first median being carried out computing, to obtain described clear data.
Preferably, described the first cryptographic calculation is any one in following algorithm: MD5; SHA0; MD4; MD2; DES; 3DES; AES or SHA1.
Preferably, described the second cryptographic calculation is any one in following algorithm: MD5; SHA0; MD4; MD2; DES; 3DES; AES or SHA1.
According to another aspect of the present invention, also provide a kind of financial transaction treatment system, it is used for generating Transaction Information, sends described Transaction Information and receive the feedback information corresponding with described Transaction Information, it is characterized in that, it comprises above-mentioned enciphered control device.
The present invention processes by the clear data in message and ciphertext (initial encryption data) are encrypted the encryption that realizes transaction message, thereby can adopt cipher mode simple, easy to implement to realize the anti-repudiation to transaction data, anti-tamper purpose.Effect of the present invention can also be summarized as: the encryption mechanism that uses public-key is separately realized transaction anti-repudiation and the encryption control method of distorting, be used for carrying out safe transmission at transmitting terminal to being transmitted data, prevent from being transmitted that data are tampered and denied, reach and use public, private key to being encrypted the same effect of transmission.
Description of drawings
By reading the detailed description of non-limiting example being done with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 illustrates according to the first embodiment of the present invention, and public-key mechanism is realized the network topology schematic diagram of the encryption control method of anti-tamper anti-repudiation;
Fig. 2 illustrates according to the first embodiment of the present invention, uses the schematic diagram data of the encryption control method the transmission of data of described public-key mechanism at described first terminal shown in Figure 1;
Fig. 3 illustrates according to the first embodiment of the present invention, uses the schematic diagram data of the encryption control method receive data of described public-key mechanism in described the second terminal shown in Figure 1;
Fig. 4 illustrates according to the first embodiment of the present invention, uses described public-key mechanism to realize the flow chart of the encryption control method the transmission of data of anti-tamper anti-repudiation at described first terminal shown in Figure 1; And
Fig. 5 illustrates according to the first embodiment of the present invention, uses described public-key mechanism to realize the flow chart of the encryption control method receive data of anti-tamper anti-repudiation in described the second terminal shown in Figure 1.
Embodiment
By reading the detailed description of non-limiting example being done with reference to the following drawings, it is more obvious that other features, objects and advantages of the present invention will become:
Fig. 1 illustrates according to the first embodiment of the present invention, and public-key mechanism is realized the network topology schematic diagram of the encryption control method of anti-tamper anti-repudiation.Particularly, in the present embodiment, comprise first terminal 11 and the second terminal 12, described first terminal 11 and the second terminal 12 are carried out communication and the transmission of data by network.Before the transmission of data, first terminal 11 realizes that by public-key mechanism provided by the invention the primary data that described second terminal 12 of encryption control method subtend of anti-tamper anti-repudiation sends is encrypted, and obtains secret value.And the second terminal 12 realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation is decrypted the described secret value that receives, and finally obtains the described primary data that described first terminal 11 sends to the second terminal 12.Particularly, it will be appreciated by those skilled in the art that described public-key mechanism realizes that the user terminal of encryption control method of anti-tamper anti-repudiation such as first terminal 11 and the second terminal 12 can be computers, set-top box, mobile device etc.And described public-key mechanism realizes that the encryption control method of anti-tamper anti-repudiation is like encoder and the decoder of the channel that is used for transfer of data.At first the data of transmission encode through channel encoder, then transmit by channel, then obtain the transmission of data by channel decoder.The encoder of channel and decoder are intended to obtain in the process of the transmission of data best communication efficiency, described optimal communication effect refers to that namely the transmission of data can reach safety and integrity in the transmission process, namely realize the anti-effect of stealing anti-tamper anti-repudiation, do not repeat them here.
Fig. 2 illustrates according to the first embodiment of the present invention, uses the schematic diagram data of the encryption control method the transmission of data of described public-key mechanism at described first terminal shown in Figure 1.particularly, in conjunction with above-mentioned embodiment illustrated in fig. 1, those skilled in the art understand, when described first terminal need to be to described the second terminal transmission data 21, use described public-key mechanism to realize that the encryption control method of anti-tamper anti-repudiation is encrypted described the transmission of data 21, and the encryption control method that realizes anti-tamper anti-repudiation by public-key mechanism is carried out at described first terminal the cryptographic operation of the transmission of data 21, what be transferred to described the second terminal in channel is to realize through described public-key mechanism the transmission of data that the encryption control method of anti-tamper anti-repudiation is encrypted, it is secret value 23.At this moment, described public-key mechanism realizes that the encryption control method of anti-tamper anti-repudiation namely is used for first terminal to the channel encoder of the second terminal transmission data.Particularly, described the transmission of data 21 comprises clear data 211 and initial encryption data 212.At first the encryption control method that described public-key mechanism is realized anti-tamper anti-repudiation carries out for the first time cryptographic calculation and obtains the first median 22 described clear data.The first median 22 is carried out for the second time with initial encryption data 212 again, and cryptographic calculation obtains described secret value 23.Particularly, it will be appreciated by those skilled in the art that described secret value 23 should comprise that described the first median 22 carries out for the second time resulting data after cryptographic calculation, and described initial encryption data 212 are carried out for the second time resulting data after cryptographic calculation.
Further, it will be appreciated by those skilled in the art that described initial encryption data 212 are that described first terminal is the initial encryption that the initial encryption algorithm carries out described clear data 211 by a certain public key encryption algorithm before the transmission of data.This public key encryption algorithm can be the RSA public key encryption algorithm, RSA Algorithm is true based on a foolproof number theory: two large prime numbers are multiplied each other very easy, but it is extremely difficult to want that its product is carried out factorization, therefore can product is open as encryption key, the RSA public key encryption algorithm has been existing utilization encryption technology comparatively widely, does not repeat them here particularly.
Fig. 3 illustrates according to the first embodiment of the present invention, uses the schematic diagram data of the encryption control method receive data of described public-key mechanism in described the second terminal shown in Figure 1.Particularly, in conjunction with above-mentioned embodiment illustrated in fig. 1, what it will be appreciated by those skilled in the art that data that the second terminal receives by transmission is to realize through described public-key mechanism the transmission of data 33 that the encryption control method of anti-tamper anti-repudiation is encrypted, and namely secret value 31.When described the second terminal receives described secret value 31, use described public-key mechanism to realize that the encryption control method of anti-tamper anti-repudiation is decrypted the described secret value 31 that receives, and the encryption control method that realizes anti-tamper anti-repudiation by public-key mechanism is carried out in the second terminal to the cryptographic operation of secret value 31.At this moment, described public-key mechanism realizes that the encryption control method of anti-tamper anti-repudiation namely is used for first terminal to the channel decoder of the second terminal transmission data.Particularly, the encryption control method that described secret value 31 is realized anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm of cryptographic calculation for the second time is decrypted, and obtains the first median 32 and initial encryption value 332.The corresponding algorithm of described cryptographic calculation for the second time is the private key by described cryptographic calculation for the second time.The encryption control method that the first median 32 realizes anti-tamper anti-repudiation by the described public-key mechanism more corresponding algorithm of cryptographic calculation for the first time is decrypted, and obtains described clear data 331.The corresponding algorithm of described cryptographic calculation for the first time is the private key by described cryptographic calculation for the first time.Described clear data 331 and described initial encryption value 332 are that described first terminal is by the transmission of data 33 of channel to described the second terminal transmission.
Further, in conjunction with above-mentioned embodiment illustrated in fig. 2, those skilled in the art understand, described the transmission of data 21 is the process from described first terminal to described the second terminal transmission, any data do not occur disturb and distort, the secret value 31 that so described the second terminal receives is in Fig. 2 first terminal and realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation is encrypted the secret value 23 of acquisition to the transmission of data 21; The encryption control method that described the second terminal realizes anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm team secret value 31 of cryptographic calculation the first median 32 of being decrypted acquisition for the first time is first terminal in Fig. 2 and by the encryption control method using described public-key mechanism and realize anti-tamper anti-repudiation, described clear data 211 is carried out described the first median 22 that cryptographic calculation for the second time obtains; The encryption control method that described the second terminal realizes anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm of cryptographic calculation initial encryption value 332 that secret value 31 is decrypted acquisition for the second time is the initial encryption data 212 of first terminal described in Fig. 2 in the transmission of data 21 of described the second terminal transmission; The encryption control method that described the second terminal realizes anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm of cryptographic calculation clear data 331 that the first median 21 is decrypted acquisition for the first time is the clear data 211 of first terminal described in Fig. 2 in the transmission of data 21 of described the second terminal transmission.
More specifically, it will be appreciated by those skilled in the art that described the second terminal can be used for differentiating whether the transmission of data 33 is tampered in transmitting procedure with described initial encryption value 332.after described the second terminal realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation is decoded the described clear data 331 of acquisition to described secret value 31, pass through again the corresponding algorithm of initial encryption algorithm, the private key that is a certain PKI is decoded described initial encryption value 332, the corresponding algorithm of cryptographic calculation is identical to the clear data 331 that the first median 21 is decrypted acquisition for the first time to decode encryption control method that resulting value should realize anti-tamper anti-repudiation by described public-key mechanism with described the second terminal, as find difference, can judge that described the second terminal realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation is tampered in transmitting procedure to the transmission of data 33 that described decoding obtains.Namely extend to the situation of a plurality of terminals, still can realize anti-tamper to the data of transmitting by the encryption control method of described public-key mechanism.
Fig. 4 illustrates according to the first embodiment of the present invention, uses described public-key mechanism to realize the flow chart of the encryption control method the transmission of data of anti-tamper anti-repudiation at described first terminal shown in Figure 1.Particularly, the described first terminal of this flow chart description realizes by described public-key mechanism the whole process that the transmission of data of described second terminal of encryption control method subtend of anti-tamper anti-repudiation is encrypted.This flow chart has 6 steps, when described first terminal to the second terminal transmission data the time be in step S101, described the transmission of data comprises clear data and initial encryption data; When being in S102, whether the transmission of data that the first terminal judgement sends is clear data; Judgment result is that it is to enter step S103, first terminal realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation carries out cryptographic calculation for the first time to described clear data; The data of i.e. transmission that the determination result is NO are the initial encryption data, jump into step S105; Described clear data is through after cryptographic calculation for the first time, and described first terminal obtains described the first median, and this moment is in step S104; Described first terminal realizes that by described public-key mechanism the encryption control method of anti-tamper anti-repudiation carries out cryptographic calculation for the second time with described the first median and described initial encryption data, is in step S105 this moment; After computing is completed, be in step S106, namely obtain described secret value.Described secret value will be by data transmission channel from first terminal to the second terminal transmission.
Fig. 5 illustrates according to the first embodiment of the present invention, uses described public-key mechanism to realize the flow chart of the encryption control method receive data of anti-tamper anti-repudiation in described the second terminal shown in Figure 1.Particularly, described the second terminal of this flow chart description realizes the whole process that the encryption control method of anti-tamper anti-repudiation is decrypted the described secret value through transmission from described first terminal by described public-key mechanism.This flow chart has 8 steps, and when being in step S111, described the second terminal receives the secret value that transmits by data transmission channel from described first terminal; After described secret value finishes receiving, be in S112, the encryption control method that described the second terminal realizes anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm of cryptographic calculation for the second time is decrypted described secret value; Deciphering enters step S113 after completing, deciphering acquisition described first median and the described initial encryption data of the corresponding algorithm of described the second terminal by described cryptographic calculation for the second time to affiliated secret value; The encryption control method that described the second terminal realizes anti-tamper anti-repudiation by the described public-key mechanism corresponding algorithm of cryptographic calculation for the first time is decrypted described the first median, is in step S114 this moment; After deciphering is completed, be in step S115, namely the corresponding algorithm of described the second terminal by cryptographic calculation for the first time obtains described clear data to the deciphering of described the first median; Whether described the second terminal is tampered for the clear data that receives of judgement, so the corresponding algorithm of described the second terminal by the initial encryption computing is decrypted the initial encryption value, this moment is in step S116; After deciphering is completed, be in step S117, whether the corresponding algorithm of described the second terminal judges by cryptographic calculation for the first time obtains described clear data to the deciphering of described the first median and with the corresponding algorithm of described the second terminal by the initial encryption computing, the result data that the initial encryption value is decrypted is matched, if result of determination for coincideing, illustrate described first terminal use encryption control method that described public-key mechanism realizes anti-tamper anti-repudiation to the data of described the second terminal transmission without distorting; If result of determination is for misfitting, be in step S118, the transmission of data from described first terminal that described the second terminal judges receives is tampered in the process of data channel transmission, sends receipt to described first terminal simultaneously and represents that the data that receive are tampered.
Particularly, in described step S113, described the second terminal how to distinguish the secret value that receives realize through described public-key mechanism after the corresponding algorithm deciphering of cryptographic calculation for the second time of encryption control method of anti-tamper anti-repudiation data which be partly described the first median, which is partly described initial encryption data.It will be appreciated by those skilled in the art that described first terminal can arrange with described the second terminal, described the first median and initial encryption data array, for example front 128 is the first median, rear 128 is the initial encryption data.Described the second terminal can realize the part of described the first median after the corresponding algorithm of cryptographic calculation for the second time of the encryption control method of anti-tamper anti-repudiation is deciphered and the part of described initial encryption data according to the secret value that this agreement judgement receives through described public-key mechanism.
More specifically, it will be appreciated by those skilled in the art that described public-key mechanism realize anti-tamper anti-repudiation the encryption control method cryptographic calculation for the first time and for the second time cryptographic calculation can be at random be MD5, SHA0, MD4, MD2, DES, 3DES, AES or SHA1.These eight kinds of cryptographic algorithm are all widely used cryptographic algorithm and are difficult to crack, and random use has more increased and cracks difficulty, does not repeat them here.Further, those skilled in the art can also realize above-mentioned cryptographic calculation for the first time and cryptographic calculation for the second time by other cryptographic algorithm, and this does not affect flesh and blood of the present invention, does not repeat them here.
Further, those skilled in the art understand, when extending to three terminals, third terminal sends identical data to the second terminal simultaneously with first terminal, and all use described public-key mechanism to realize that the encryption control method of anti-tamper anti-repudiation is encrypted described the transmission of data, the first median that the produces probability identical with secret value is close to zero.Because described public-key mechanism is realized the cryptographic algorithm that the encryption control method of anti-tamper anti-repudiation adopts, very huge key space is arranged, the possibility that namely key is identical is almost nil, and the same data of different secret key encryptions certainly lead to different values.Described public-key mechanism realizes that the encryption control method of anti-tamper anti-repudiation carries out twice encryption to the clear data that will transmit especially, that is to say that the probability that clear data the first median that two terminal transmission are identical and secret value equate simultaneously is almost nil.Therefore, described the second terminal can be carried out the authentication of identity according to the secret value that receives with through the first median of once deciphering to transmit leg, and the encryption control method that said public-key mechanism is realized has realized the anti-repudiation effect of a plurality of terminal data transmission.
Further, with reference to above-mentioned Fig. 1 to Fig. 5, it will be appreciated by those skilled in the art that to the invention provides encryption control method and the corresponding control device of realizing anti-tamper anti-repudiation with public-key mechanism.Preferably, control method provided by the invention can be applied in the financial transaction control system.For example, a message comprises multinomial data content, information such as password, bank's card number, random number, exchange hour, embodiment according to above-mentioned Fig. 1 to Fig. 5, preferably, described password, the encrypted rear part as described message of bank's card number, other guide is used as the part of described message as clear data.And encrypted password, bank's card number preferably can be regarded as the described initial encryption data of above-described embodiment.Further, it will be appreciated by those skilled in the art that in described message and can also comprise other guide, this other guide can be used as described initial encryption data, can be used as described clear data, this does not affect flesh and blood of the present invention yet, but determines according to concrete application needs.
On the basis of the above, further, control method provided by the invention obtains the first median after above-mentioned clear data is encrypted computing, and then generate secret value after described initial encryption data and described the first median are encrypted computing, and then described secret value is used as message and sends to transaction phase the other side (receiving terminal).
Further, it will be appreciated by those skilled in the art that by above-mentioned control method, improved the fail safe of concluding the business by twice cryptographic calculation, and described initial encryption data have enough fail safes because the needs private key is deciphered so be encrypted by control method provided by the invention.
Above specific embodiments of the invention are described.It will be appreciated that, the present invention is not limited to above-mentioned specific implementations, and those skilled in the art can make various distortion or modification within the scope of the claims, and this does not affect flesh and blood of the present invention.
Claims (9)
1. encryption control method that realizes anti-tamper anti-repudiation with public-key mechanism, it is used for being encrypted being transmitted data at transmitting terminal, and the described data that are transmitted comprise initial encryption data and clear data, it is characterized in that, comprise the steps:
A. described clear data is carried out the first cryptographic calculation, and with operation result as the first median;
B. described initial encryption data and described the first median are carried out the second cryptographic calculation, and with operation result as secret value, described secret value is sent to corresponding receiving terminal by described transmitting terminal.
2. encryption control method according to claim 1, is characterized in that, described the first cryptographic calculation is any one in following algorithm:
-MD5;
-SHA0;
-MD4;
-MD2;
-DES;
-3DES;
-AES or
-SHA1。
3. encryption control method according to claim 1 and 2, is characterized in that, described the second cryptographic calculation is any one in following algorithm:
-MD5;
-SHA0;
-MD4;
-MD2;
-DES;
-3DES;
-AES or
-SHA1。
4. the described encryption control method of any one according to claim 1 to 3, is characterized in that, obtain as follows described clear data at described receiving terminal, wherein, described plaintext is used to further processing:
I. by the operation method corresponding with described the second cryptographic calculation, described secret value is carried out computing, to obtain described the first median;
Ii. by the operation method corresponding with described the first cryptographic calculation, described the first median is carried out computing, to obtain described clear data.
5. enciphered control device of realizing anti-tamper anti-repudiation with public-key mechanism, it is used for being encrypted being transmitted data at transmitting terminal, and the described data that are transmitted comprise initial encryption data and clear data, it is characterized in that, comprising:
The first encryption device, it is used for described clear data is carried out the first cryptographic calculation, and with operation result as the first median; And
The second encryption device, it is used for described initial encryption data and described the first median are carried out the second cryptographic calculation, and with operation result as secret value, described secret value is sent to corresponding receiving terminal by described transmitting terminal.
6. enciphered control device according to claim 5, is characterized in that, described the first encryption device is completed described the first cryptographic calculation by any one in following algorithm:
-MD5;
-SHA0;
-MD4;
-MD2;
-DES;
-3DES;
-AES or
-SHA1。
7. according to claim 5 or 6 described enciphered control devices, is characterized in that, described the second encryption device is completed described the second cryptographic calculation by any one in following algorithm:
-MD5;
-SHA0;
-MD4;
-MD2;
-DES;
-3DES;
-AES or
-SHA1。
8. the described enciphered control device of any one according to claim 5 to 7, is characterized in that, also further comprises:
The 4th cryptographic calculation device, it is used for by the operation method corresponding with described the second cryptographic calculation, described secret value being carried out computing, to obtain described the first median;
The 3rd cryptographic calculation device, it is used for by the operation method corresponding with described the first cryptographic calculation, described the first median being carried out computing, to obtain described clear data.
9. financial transaction treatment system, it is used for generating Transaction Information, sends described Transaction Information and receive the feedback information corresponding with described Transaction Information, it is characterized in that, and it comprises the described enciphered control device of any one according to claim 5 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103662467A CN103117851A (en) | 2011-11-17 | 2011-11-17 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011103662467A CN103117851A (en) | 2011-11-17 | 2011-11-17 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103117851A true CN103117851A (en) | 2013-05-22 |
Family
ID=48416132
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011103662467A Pending CN103117851A (en) | 2011-11-17 | 2011-11-17 | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103117851A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312522A (en) * | 2013-06-24 | 2013-09-18 | 上海讯联数据服务有限公司 | Secure data transmission control method based on payment terminal full-message encryption |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN108183795A (en) * | 2017-12-29 | 2018-06-19 | 新开普电子股份有限公司 | All-purpose card key management method |
CN108959962A (en) * | 2018-06-27 | 2018-12-07 | 杭州安恒信息技术股份有限公司 | A kind of API secure calling method of dynamic base |
CN109150501A (en) * | 2018-08-30 | 2019-01-04 | 汉能移动能源控股集团有限公司 | Power generation amount information verification method, electricity charge settlement method and device, medium and equipment |
CN111080299A (en) * | 2019-12-27 | 2020-04-28 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN111612486A (en) * | 2019-02-25 | 2020-09-01 | 珠海横琴现联盛科技发展有限公司 | Online electronic coupon deduction method based on tamper-proof encryption algorithm |
CN112287394A (en) * | 2020-12-15 | 2021-01-29 | 深圳市深圳通有限公司 | Card number desensitization method, device, equipment and storage medium |
CN113569120A (en) * | 2021-08-04 | 2021-10-29 | 成都安恒信息技术有限公司 | System and method for realizing webpage non-repudiation through original data |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101321058A (en) * | 2007-06-07 | 2008-12-10 | 管海明 | Method and system for encoding and decoding digital message |
CN101795195A (en) * | 2010-01-29 | 2010-08-04 | 苏州位置科技有限公司 | Method for restricting encrypted certificated electronic map with variable information |
CN102117395A (en) * | 2009-12-31 | 2011-07-06 | 英华达(上海)电子有限公司 | Electronic digital information copyright protection method and system as well as electronic terminal |
-
2011
- 2011-11-17 CN CN2011103662467A patent/CN103117851A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101321058A (en) * | 2007-06-07 | 2008-12-10 | 管海明 | Method and system for encoding and decoding digital message |
CN102117395A (en) * | 2009-12-31 | 2011-07-06 | 英华达(上海)电子有限公司 | Electronic digital information copyright protection method and system as well as electronic terminal |
CN101795195A (en) * | 2010-01-29 | 2010-08-04 | 苏州位置科技有限公司 | Method for restricting encrypted certificated electronic map with variable information |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103312522A (en) * | 2013-06-24 | 2013-09-18 | 上海讯联数据服务有限公司 | Secure data transmission control method based on payment terminal full-message encryption |
CN105426708A (en) * | 2016-01-19 | 2016-03-23 | 北京鼎源科技有限公司 | Reinforcing method of application program of Android system |
CN105426708B (en) * | 2016-01-19 | 2018-08-21 | 北京鼎源科技有限公司 | A kind of reinforcement means of the application program of android system |
CN108183795A (en) * | 2017-12-29 | 2018-06-19 | 新开普电子股份有限公司 | All-purpose card key management method |
CN108959962A (en) * | 2018-06-27 | 2018-12-07 | 杭州安恒信息技术股份有限公司 | A kind of API secure calling method of dynamic base |
CN109150501A (en) * | 2018-08-30 | 2019-01-04 | 汉能移动能源控股集团有限公司 | Power generation amount information verification method, electricity charge settlement method and device, medium and equipment |
CN111612486A (en) * | 2019-02-25 | 2020-09-01 | 珠海横琴现联盛科技发展有限公司 | Online electronic coupon deduction method based on tamper-proof encryption algorithm |
CN111080299A (en) * | 2019-12-27 | 2020-04-28 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN111080299B (en) * | 2019-12-27 | 2020-12-15 | 广州骏伯网络科技有限公司 | Anti-repudiation method for transaction information, client and server |
CN112287394A (en) * | 2020-12-15 | 2021-01-29 | 深圳市深圳通有限公司 | Card number desensitization method, device, equipment and storage medium |
CN112287394B (en) * | 2020-12-15 | 2021-04-06 | 深圳市深圳通有限公司 | Card number desensitization method, device, equipment and storage medium |
CN113569120A (en) * | 2021-08-04 | 2021-10-29 | 成都安恒信息技术有限公司 | System and method for realizing webpage non-repudiation through original data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103117851A (en) | Encryption control method and device capable of achieving tamper-proofing and repudiation-proofing by means of public key infrastructure (PKI) | |
CN101478548B (en) | Data transmission ciphering and integrity checking method | |
JP2017063432A (en) | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |
CN104506534A (en) | Safety communication secret key negotiation interaction scheme | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN103986583A (en) | Dynamic encryption method and encryption communication system thereof | |
KR101608815B1 (en) | Method and system for providing service encryption in closed type network | |
CN113806772A (en) | Information encryption transmission method and device based on block chain | |
KR20170035665A (en) | Apparatus and method for exchanging encryption key | |
CN103036880A (en) | Network information transmission method, transmission equipment and transmission system | |
Obert et al. | Recommendations for trust and encryption in DER interoperability standards | |
CN103118363A (en) | Method, system, terminal device and platform device of secret information transmission | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN104243439A (en) | File transfer processing method and system and terminals | |
CN104243494A (en) | Data processing method | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN116132025A (en) | Key negotiation method, device and communication system based on preset key group | |
Prajapat et al. | Quantum safe lightweight encryption scheme for secure data sharing in Internet of Nano Things | |
CN117914483A (en) | Secure communication method, apparatus, device and medium | |
CN114422114B (en) | Time-controlled encryption method and system based on multi-time server | |
CN114928491A (en) | Internet of things security authentication method, device and system based on identification cryptographic algorithm | |
CN110365482B (en) | Data communication method and device | |
Mehta et al. | Cryptographic algorithms for secure internet of things | |
JP5932709B2 (en) | Transmission side device and reception side device | |
Arora et al. | Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130522 |