CN103560892A - Secret key generation method and secret key generation device - Google Patents

Secret key generation method and secret key generation device Download PDF

Info

Publication number
CN103560892A
CN103560892A CN201310596368.4A CN201310596368A CN103560892A CN 103560892 A CN103560892 A CN 103560892A CN 201310596368 A CN201310596368 A CN 201310596368A CN 103560892 A CN103560892 A CN 103560892A
Authority
CN
China
Prior art keywords
key
encryption
specific data
data
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310596368.4A
Other languages
Chinese (zh)
Inventor
张亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE ICT Technologies Co Ltd
Original Assignee
ZTE ICT Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE ICT Technologies Co Ltd filed Critical ZTE ICT Technologies Co Ltd
Priority to CN201310596368.4A priority Critical patent/CN103560892A/en
Publication of CN103560892A publication Critical patent/CN103560892A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a secret key generation method and a secret key generation device. The secret key generation method comprises the steps that when an encryption command of a user for assigned data is received, a first secret key is generated randomly; a second secret key provided by the user is obtained; an encryption secret key for the assigned data is generated according to the first secret key and the second secret key to encrypt the assigned data. According to the technical scheme, complexity of the encryption secret key can be improved, therefore, data safety is guaranteed, and meanwhile controllability carried out on data encryption by the user is achieved.

Description

Key generation method and key generating device
Technical field
The present invention relates to areas of information technology, in particular to a kind of key generation method and a kind of key generating device.
Background technology
Along with the good application of computer software at aspects such as design, management, collaborative, safety, increasing enterprise introduces data security product, and core data (such as customer data, bid document, core code, company annual report, budget procurement plan, financing investment plan etc.) is deposited with the form of encrypting.
In correlation technique, because cryptographic algorithm belongs to encryption system, therefore from the encryption key of encryption system, can not thoroughly eliminate the worry of user to data security, be mainly reflected in following two aspects:
(1) ciphering process of data is to be carried out by encryption system, therefore can not determine in encryption system, whether there is leak, being reduced to after user's encryption Cipher-Text Stealing expressly.
(2) disabled user steals after ciphertext, may to encrypting ciphertext, crack by the supplier of encryption system.
Therefore, how effectively user data to be encrypted, realizing user becomes technical problem urgently to be resolved hurrily to data encryption controlled.
Summary of the invention
The present invention, just based on the problems referred to above, has proposed a kind of new key generation technique, can improve the complexity of encryption key, thereby guarantee the fail safe of data, has also realized controlled to data encryption of user simultaneously.
In view of this, the present invention proposes a kind of key generation method, comprising: when receiving user to the encrypted instruction of specific data, generate at random the first key; Obtain the second key that described user provides; According to described the first key and described the second key, generate the encryption key of described specific data, so that described specific data is encrypted.
In this technical scheme, the second key providing by random the first key generating of basis and user generates the encryption key to specific data, improved the complexity of encryption key, thereby guaranteed the fail safe of data, simultaneously, therefore because encryption key has comprised the second key that user provides, also realized controlled to data encryption of user.Wherein, the second key that user provides can be numeral, letter or its combination, can be also the finger print information that recognizes, people's face information etc.
In technique scheme, preferably, the described step that generates the encryption key of described data according to described the first key and described the second key is specially: according to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
In this technical scheme, the first key and the second key can according to the first key front, the second key after mode permutation and combination generate encryption key, also can according to the second key front, the first key after mode permutation and combination generate encryption key.
In technique scheme, preferably, also comprise: when the decryption instructions receiving the described specific data after encrypting, judge that whether the decruption key in described decryption instructions matches with described encryption key, if so, judges successful decryption, otherwise, judge Decryption failures.
In this technical scheme, judge when whether decruption key and encryption key match, need to judge in decruption key, whether the decruption key for the first key in encryption key matches with the first key, whether the decruption key for the second key matches with the second key, only in decruption key, for the first key in encryption key and the first key, match, and while matching for the decruption key of the second key and the second key, could judge successful decryption, if when not mating with the first key and/or not mating with the second key for the decruption key of the second key for the decruption key of the first key, all be judged to be Decryption failures, strengthened the complexity of deciphering, improved the fail safe of data.Wherein, the decruption key of the first key can be identical with the first key, can be not identical yet, and the decruption key of the second key can be identical with the second key, also can be not identical.
In technique scheme, preferably, also comprise: interval generates the first new key to schedule, and/or obtain the second new key that described user provides, and according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
In this technical scheme, because the time that encryption key is used is longer, more easily by unauthorized person, cracked, therefore by interval to schedule, encryption key is upgraded, can increase the difficulty that encryption key is cracked, thereby improve the fail safe of data.
In technique scheme, preferably, described the first key comprises: symmetric key or unsymmetrical key.
In this technical scheme, the speed of the encryption and decryption data of symmetric key, be applicable to big data quantity to be encrypted, and the cipher mode of unsymmetrical key is more flexible, therefore can data be encrypted for the different different encryption keys of need to selecting.
According to a further aspect in the invention, also proposed a kind of key generating device, having comprised: the first key generation unit, for when receiving user to the encrypted instruction of specific data, has generated the first key at random; Acquiring unit, the second key providing for obtaining described user; Encryption key generation unit, for generate the encryption key of described specific data according to described the first key and described the second key, so that described specific data is encrypted.
In this technical scheme, the second key providing by random the first key generating of basis and user generates the encryption key to specific data, improved the complexity of encryption key, thereby guaranteed the fail safe of data, simultaneously, therefore because encryption key has comprised the second key that user provides, also realized controlled to data encryption of user.Wherein, the second key that user provides can be numeral, letter or its combination, can be also the finger print information that recognizes, people's face information etc.
In technique scheme, preferably, described encryption key generation unit specifically for: according to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
In this technical scheme, the first key and the second key can according to the first key front, the second key after mode permutation and combination generate encryption key, also can according to the second key front, the first key after mode permutation and combination generate encryption key.
In technique scheme, preferably, also comprise: judging unit, during for decryption instructions receiving the described specific data after encrypting, judge that whether the decruption key in described decryption instructions matches with described encryption key, if so, judges successful decryption, otherwise, judge Decryption failures.In this technical scheme, judge when whether decruption key and encryption key match, need to judge in decruption key, whether the decruption key for the first key in encryption key matches with the first key, whether the decruption key for the second key matches with the second key, only in decruption key, for the first key in encryption key and the first key, match, and while matching for the decruption key of the second key and the second key, could judge successful decryption, if when not mating with the first key and/or not mating with the second key for the decruption key of the second key for the decruption key of the first key, all be judged to be Decryption failures, strengthened the complexity of deciphering, improved the fail safe of data.Wherein, the decruption key of the first key can be identical with the first key, can be not identical yet, and the decruption key of the second key can be identical with the second key, also can be not identical.
In technique scheme, preferably, described the first key generation unit also for: interval generates the first new key to schedule; Described acquiring unit is also for described in interval acquiring, user provides to schedule the second new key; Described encryption key generation unit also for: according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
In this technical scheme, because the time that encryption key is used is longer, more easily by unauthorized person, cracked, therefore by interval to schedule, encryption key is upgraded, can increase the difficulty that encryption key is cracked, thereby improve the fail safe of data.
In technique scheme, preferably, described the first key comprises: symmetric key or unsymmetrical key.
In this technical scheme, the speed of the encryption and decryption data of symmetric key, be applicable to big data quantity to be encrypted, and the cipher mode of unsymmetrical key is more flexible, therefore can data be encrypted for the different different encryption keys of need to selecting.
By above technical scheme, can improve the complexity of encryption key, thereby guarantee the fail safe of data, simultaneously also realized controlled to data encryption of user.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram of key generation method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of key generating device according to an embodiment of the invention;
Fig. 3 shows the structural representation of encryption key according to an embodiment of the invention;
Fig. 4 A to Fig. 4 B shows the schematic flow diagram of file decryption process according to an embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, in the situation that not conflicting, the application's embodiment and the feature in embodiment can combine mutually.
A lot of details have been set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subject to the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of key generation method according to an embodiment of the invention.
As shown in Figure 1, key generation method according to an embodiment of the invention, comprising: step 102, when receiving user to the encrypted instruction of specific data, generates the first key at random; Step 104, obtains the second key that described user provides; Step 106, generates the encryption key of described specific data, so that described specific data is encrypted according to described the first key and described the second key.
In this technical scheme, the second key providing by random the first key generating of basis and user generates the encryption key to specific data, improved the complexity of encryption key, thereby guaranteed the fail safe of data, simultaneously, therefore because encryption key has comprised the second key that user provides, also realized controlled to data encryption of user.Wherein, the second key that user provides can be numeral, letter or its combination, can be also the finger print information that recognizes, people's face information etc.
In technique scheme, preferably, the described step that generates the encryption key of described data according to described the first key and described the second key is specially: according to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
In this technical scheme, the first key and the second key can according to the first key front, the second key after mode permutation and combination generate encryption key, also can according to the second key front, the first key after mode permutation and combination generate encryption key.
In technique scheme, preferably, also comprise: when the decryption instructions receiving the described specific data after encrypting, judge that whether the decruption key in described decryption instructions matches with described encryption key, if so, judges successful decryption, otherwise, judge Decryption failures.
In this technical scheme, judge when whether decruption key and encryption key match, need to judge in decruption key, whether the decruption key for the first key in encryption key matches with the first key, whether the decruption key for the second key matches with the second key, only in decruption key, for the first key in encryption key and the first key, match, and while matching for the decruption key of the second key and the second key, could judge successful decryption, if when not mating with the first key and/or not mating with the second key for the decruption key of the second key for the decruption key of the first key, all be judged to be Decryption failures, strengthened the complexity of deciphering, improved the fail safe of data.Wherein, the decruption key of the first key can be identical with the first key, can be not identical yet, and the decruption key of the second key can be identical with the second key, also can be not identical.
In technique scheme, preferably, also comprise: interval generates the first new key to schedule, and/or obtain the second new key that described user provides, and according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
In this technical scheme, because the time that encryption key is used is longer, more easily by unauthorized person, cracked, therefore by interval to schedule, encryption key is upgraded, can increase the difficulty that encryption key is cracked, thereby improve the fail safe of data.
In technique scheme, preferably, described the first key comprises: symmetric key or unsymmetrical key.
In this technical scheme, the speed of the encryption and decryption data of symmetric key, be applicable to big data quantity to be encrypted, and the cipher mode of unsymmetrical key is more flexible, therefore can data be encrypted for the different different encryption keys of need to selecting.
Fig. 2 shows the schematic block diagram of key generating device according to an embodiment of the invention.
As shown in Figure 2, key generating device 200 according to an embodiment of the invention, comprising: the first key generation unit 202, for when receiving user to the encrypted instruction of specific data, generates the first key at random; Acquiring unit 204, the second key providing for obtaining described user; Encryption key generation unit 206, for generate the encryption key of described specific data according to described the first key and described the second key, so that described specific data is encrypted.
In this technical scheme, the second key providing by random the first key generating of basis and user generates the encryption key to specific data, improved the complexity of encryption key, thereby guaranteed the fail safe of data, simultaneously, therefore because encryption key has comprised the second key that user provides, also realized controlled to data encryption of user.Wherein, the second key that user provides can be numeral, letter or its combination, can be also the finger print information that recognizes, people's face information etc.
In technique scheme, preferably, described encryption key generation unit 206 specifically for: according to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
In this technical scheme, the first key and the second key can according to the first key front, the second key after mode permutation and combination generate encryption key, also can according to the second key front, the first key after mode permutation and combination generate encryption key.
In technique scheme, preferably, also comprise: judging unit 208, during for decryption instructions receiving the described specific data after encrypting, judge that whether the decruption key in described decryption instructions matches with described encryption key, if so, judges successful decryption, otherwise, judge Decryption failures.
In this technical scheme, judge when whether decruption key and encryption key match, need to judge in decruption key, whether the decruption key for the first key in encryption key matches with the first key, whether the decruption key for the second key matches with the second key, only in decruption key, for the first key in encryption key and the first key, match, and while matching for the decruption key of the second key and the second key, could judge successful decryption, if when not mating with the first key and/or not mating with the second key for the decruption key of the second key for the decruption key of the first key, all be judged to be Decryption failures, strengthened the complexity of deciphering, improved the fail safe of data.Wherein, the decruption key of the first key can be identical with the first key, can be not identical yet, and the decruption key of the second key can be identical with the second key, also can be not identical.
In technique scheme, preferably, described the first key generation unit 202 also for: interval generates the first new key to schedule; Described acquiring unit 204 is also for described in interval acquiring, user provides to schedule the second new key; Described encryption key generation unit 206 also for: according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
In this technical scheme, because the time that encryption key is used is longer, more easily by unauthorized person, cracked, therefore by interval to schedule, encryption key is upgraded, can increase the difficulty that encryption key is cracked, thereby improve the fail safe of data.
In technique scheme, preferably, described the first key comprises: symmetric key or unsymmetrical key.
In this technical scheme, the speed of the encryption and decryption data of symmetric key, be applicable to big data quantity to be encrypted, and the cipher mode of unsymmetrical key is more flexible, therefore can data be encrypted for the different different encryption keys of need to selecting.
Fig. 3 shows the structural representation of encryption key according to an embodiment of the invention.
As shown in Figure 3, encryption key 300 according to an embodiment of the invention, the first key 302 that comprises random generation, and the second key 304 of providing of user, because the first key 302 and the second key 304 carry out combination producing encryption key 300 according to predetermined order, therefore improved the complexity of encryption key, guaranteed the fail safe of data, therefore meanwhile, because encryption key has comprised the second key that user provides, also realized controlled to data encryption of user.
Fig. 4 A to Fig. 4 B shows the schematic flow diagram of file decryption process according to an embodiment of the invention.
As shown in Figure 4 A, when encryption ciphertext 402 is decrypted, if before in encryption key, the first key 302 is arranged in the second key 304, in decruption key, need to comprise the decruption key 404 of the first key and the decruption key 406 of the second key simultaneously, only have 404 pairs of the first keys 302 of decruption key by the first key to be decrypted, and 406 pairs of the second keys 304 of decruption key by the second key are decrypted, could be clear text file 408 by encrypt file 402 deciphering.When encrypt file 402 is decrypted, can be according to the decruption key of first verifying the first key 404 shown in Fig. 4 A, verify again the decruption key 406 of the second key, also can be according to the decruption key of first verifying the second key 406 shown in Fig. 4 B, then verify the decruption key 404 of the first key.Can certainly to the decruption key 406 of the decruption key 404 of the first key and the second key, verify simultaneously.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered in correlation technique, because cryptographic algorithm belongs to encryption system, therefore from the encryption key of encryption system, can not thoroughly eliminate the worry of user to data security.Therefore, the present invention proposes a kind of new key generation technique, can improve the complexity of encryption key, thereby guarantee the fail safe of data, simultaneously also realized controlled to data encryption of user.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a key generation method, is characterized in that, comprising:
When receiving user to the encrypted instruction of specific data, generate at random the first key;
Obtain the second key that described user provides;
According to described the first key and described the second key, generate the encryption key of described specific data, so that described specific data is encrypted.
2. key generation method according to claim 1, is characterized in that, the described step that generates the encryption key of described data according to described the first key and described the second key is specially:
According to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
3. key generation method according to claim 1, is characterized in that, also comprises:
When the decryption instructions receiving the described specific data after encrypting, judge whether the decruption key in described decryption instructions matches with described encryption key, if so, judge successful decryption, otherwise, judge Decryption failures.
4. key generation method according to claim 1, is characterized in that, also comprises:
Interval generates the first new key to schedule, and/or obtains the second new key that described user provides, and according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
5. according to the key generation method described in any one in claim 1 to 4, it is characterized in that, described the first key comprises: symmetric key or unsymmetrical key.
6. a key generating device, is characterized in that, comprising:
The first key generation unit, for when receiving user to the encrypted instruction of specific data, generates the first key at random;
Acquiring unit, the second key providing for obtaining described user;
Encryption key generation unit, for generate the encryption key of described specific data according to described the first key and described the second key, so that described specific data is encrypted.
7. key generating device according to claim 1, is characterized in that, described encryption key generation unit specifically for: according to predetermined order, described the first key and described the second key are carried out to permutation and combination, to generate described encryption key.
8. key generating device according to claim 6, is characterized in that, also comprises:
Judging unit, during for decryption instructions receiving the described specific data after encrypting, judges whether the decruption key in described decryption instructions matches with described encryption key, if so, judges successful decryption, otherwise, judge Decryption failures.
9. key generating device according to claim 6, is characterized in that, described the first key generation unit also for: interval generates the first new key to schedule;
Described acquiring unit is also for described in interval acquiring, user provides to schedule the second new key;
Described encryption key generation unit also for: according to described the first new key and/or described the second new key, the encryption key of described specific data is upgraded.
10. according to the key generating device described in any one in claim 6 to 9, it is characterized in that, described the first key comprises: symmetric key or unsymmetrical key.
CN201310596368.4A 2013-11-21 2013-11-21 Secret key generation method and secret key generation device Pending CN103560892A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310596368.4A CN103560892A (en) 2013-11-21 2013-11-21 Secret key generation method and secret key generation device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310596368.4A CN103560892A (en) 2013-11-21 2013-11-21 Secret key generation method and secret key generation device

Publications (1)

Publication Number Publication Date
CN103560892A true CN103560892A (en) 2014-02-05

Family

ID=50015048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310596368.4A Pending CN103560892A (en) 2013-11-21 2013-11-21 Secret key generation method and secret key generation device

Country Status (1)

Country Link
CN (1) CN103560892A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721393A (en) * 2014-12-02 2016-06-29 阿里巴巴集团控股有限公司 Data security encryption method and data security encryption device
CN105825142A (en) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 Method and device for encrypting and decrypting documents in mobile terminal
CN106034019A (en) * 2015-03-09 2016-10-19 深圳华智融科技有限公司 Key diffusion method and key diffusion device
CN108933666A (en) * 2017-05-27 2018-12-04 浙江苏泊尔家电制造有限公司 Obtain the method and device of capsule information
CN109274494A (en) * 2018-11-27 2019-01-25 新华三技术有限公司 A kind of method and device of key maintenance
CN110324359A (en) * 2019-08-02 2019-10-11 北京朋创天地科技有限公司 The publication of internet individual information safety, access method and system
CN110830252A (en) * 2019-11-25 2020-02-21 北京优奥创思科技发展有限公司 Data encryption method, device, equipment and storage medium
CN111049738A (en) * 2019-12-24 2020-04-21 杭州安司源科技有限公司 E-mail data security protection method based on hybrid encryption
CN111159732A (en) * 2019-12-16 2020-05-15 佛山科学技术学院 Safety data storage device
CN111615070A (en) * 2020-05-28 2020-09-01 上海依图网络科技有限公司 Service processing method and device
CN112602288A (en) * 2018-07-04 2021-04-02 维亚塞斯公司 Method for obtaining a sequence of encryption keys

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536399A (en) * 2006-09-28 2009-09-16 西门子公司 Method for providing a symmetric key for protecting a key management protocol
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information
CN102404120A (en) * 2011-10-28 2012-04-04 哈尔滨朗威电子技术开发有限公司 Encryption method and encryption system for electronic documents
CN103312500A (en) * 2012-03-13 2013-09-18 北京海泰方圆科技有限公司 Methods for protecting universal serial bus (USB) key information
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101536399A (en) * 2006-09-28 2009-09-16 西门子公司 Method for providing a symmetric key for protecting a key management protocol
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information
CN102404120A (en) * 2011-10-28 2012-04-04 哈尔滨朗威电子技术开发有限公司 Encryption method and encryption system for electronic documents
CN103312500A (en) * 2012-03-13 2013-09-18 北京海泰方圆科技有限公司 Methods for protecting universal serial bus (USB) key information
CN103401678A (en) * 2013-07-30 2013-11-20 成都卫士通信息产业股份有限公司 Method for ensuring data transmission safety of Internet of things

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721393A (en) * 2014-12-02 2016-06-29 阿里巴巴集团控股有限公司 Data security encryption method and data security encryption device
CN106034019A (en) * 2015-03-09 2016-10-19 深圳华智融科技有限公司 Key diffusion method and key diffusion device
CN106034019B (en) * 2015-03-09 2019-03-22 深圳华智融科技股份有限公司 A kind of key divergent method and device
CN105825142A (en) * 2016-02-22 2016-08-03 北京启迪思创科技有限公司 Method and device for encrypting and decrypting documents in mobile terminal
CN108933666A (en) * 2017-05-27 2018-12-04 浙江苏泊尔家电制造有限公司 Obtain the method and device of capsule information
CN108933666B (en) * 2017-05-27 2023-10-31 浙江苏泊尔家电制造有限公司 Method and device for acquiring capsule information
CN112602288A (en) * 2018-07-04 2021-04-02 维亚塞斯公司 Method for obtaining a sequence of encryption keys
CN109274494A (en) * 2018-11-27 2019-01-25 新华三技术有限公司 A kind of method and device of key maintenance
CN110324359A (en) * 2019-08-02 2019-10-11 北京朋创天地科技有限公司 The publication of internet individual information safety, access method and system
CN110830252B (en) * 2019-11-25 2022-06-10 北京优奥创思科技发展有限公司 Data encryption method, device, equipment and storage medium
CN110830252A (en) * 2019-11-25 2020-02-21 北京优奥创思科技发展有限公司 Data encryption method, device, equipment and storage medium
CN111159732A (en) * 2019-12-16 2020-05-15 佛山科学技术学院 Safety data storage device
CN111049738A (en) * 2019-12-24 2020-04-21 杭州安司源科技有限公司 E-mail data security protection method based on hybrid encryption
CN111615070A (en) * 2020-05-28 2020-09-01 上海依图网络科技有限公司 Service processing method and device
CN111615070B (en) * 2020-05-28 2022-06-21 上海依图网络科技有限公司 Service processing method and device

Similar Documents

Publication Publication Date Title
CN103560892A (en) Secret key generation method and secret key generation device
CN105471584B (en) A kind of identity identifying method based on quantum key encryption
CN102427449B (en) Trusted mobile storage method based on security chips
CN101640590B (en) Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof
CN100495421C (en) Authentication protection method based on USB device
CN101043326B (en) Dynamic information encrypting system and method
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN102957708B (en) Application encrypting and decrypting method, server and terminal
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN103095452A (en) Random encryption method needing to adopt exhaustion method for deciphering
TW201409990A (en) Communication method utilizing fingerprint information for authentication
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN104268447A (en) Encryption method of embedded software
CN104125239B (en) A kind of method for network authorization transmitted based on data link encryption and system
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN110138548A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system
CN105450419A (en) Method, device and system
CN103177225B (en) A kind of data managing method and system
CN104881595B (en) The self-help remote unlocking method managed based on PIN code
CN116662957A (en) Identity authentication method, identity authentication device, computer readable storage medium and computer equipment
CN108959962B (en) API (application programming interface) secure calling method of dynamic library
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN100561913C (en) A kind of method of access code equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140205