CN103986572B - Cryptographic system and its disposable random cipher generation method based on spatial variations and application - Google Patents

Cryptographic system and its disposable random cipher generation method based on spatial variations and application Download PDF

Info

Publication number
CN103986572B
CN103986572B CN201410149122.7A CN201410149122A CN103986572B CN 103986572 B CN103986572 B CN 103986572B CN 201410149122 A CN201410149122 A CN 201410149122A CN 103986572 B CN103986572 B CN 103986572B
Authority
CN
China
Prior art keywords
status information
cryptographic
feature
feature status
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410149122.7A
Other languages
Chinese (zh)
Other versions
CN103986572A (en
Inventor
刘翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Liu Xiang
Original Assignee
Suzhou Tai You Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Tai You Information Technology Co Ltd filed Critical Suzhou Tai You Information Technology Co Ltd
Priority to CN201410149122.7A priority Critical patent/CN103986572B/en
Publication of CN103986572A publication Critical patent/CN103986572A/en
Application granted granted Critical
Publication of CN103986572B publication Critical patent/CN103986572B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

Disposable random cipher generation method and application the invention discloses cryptographic system and its based on spatial variations, including cryptographic system, gather the dynamic-change information of mobile communication equipment and set feature status information matching degree, according to the matching degree dynamic lock-out state of selection setting, meet then lock-in feature status information and send user reminding information, the feature status information of locking is generated into specific cryptographic bitstream and is cached, the establishment of cryptographic bitstream includes using signature algorithm and hash algorithm, random cipher generation system is applied to set many Synchronizing Passwords confirmations of mobile communication equipment, many mobile communication equipments are simultaneously and synchronization is moved, consistent and synchronous cipher key is obtained using hash algorithm, transmitted by network system and verified.Through the above way, the characteristics of cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations with application there is distinct device to produce disposable random cipher to be encrypted communication according to being synchronized with the movement.

Description

Cryptographic system and its disposable random cipher generation method based on spatial variations with Using
Technical field
The present invention relates to system encryption field, more particularly to cryptographic system and its disposable random based on spatial variations Method for generating cipher code and application.
Background technology
Pass through the skills such as the Quick Response Code identification of wireless protocols or camera and display screen between general mobile communication equipment Art interactive information, but there is be stolen information and the danger by assault, existing password encryption skill in communication process Art is encrypted using the fixed password in effective time set in advance, or is added using operation method set in advance Close, either fixed password or operation method set in advance are a kind of encryption mode set in advance, for example, in Liang Tai Communicated between the equipment of encryption, a side is equipped with " spy " software, by the fixed password for obtaining or by advance The operation method of setting produces key that the communication of pattern is fixed with the opposing party, then Content of Communication is stolen or the opposing party meets with Under fire behavior, causes serious influence, or even the loss for producing information and property;
In the prior art, random and synchronization a disposable encrypting key cannot be produced between two equipment of encryption Spoon, once be stolen fixed password or operation method set in advance, the opposing party be configured just be easy to shoot its " Gu It is fixed constant " side, eavesdropped in its communication process and produced attack, and these behaviors can be continued until The change of existing communication pattern.
The content of the invention
The present invention solves the technical problem of provide a kind of cryptographic system and its based on spatial variations it is disposable with Secret code generating method and application, movement is synchronized by two or many mobile communication equipments, and collection mobile message is simultaneously Setting out corresponding disposable synchronization key carries out two or many stochastic pattern synchronous crypto-operations and identification of mobile communication equipment Protection.
In order to solve the above technical problems, primary and foremost purpose of the invention is to provide a kind of cryptographic system.
The disposable random of spatial variations is based on another object of the present invention is to provide a kind of above-mentioned cryptographic system application Method for generating cipher code.
A further object of the present invention is to provide the disposable random cipher that a kind of above-mentioned cryptographic system is based on spatial variations The application of generation method.
To achieve these goals, the present invention uses following technical scheme:Cryptographic system is based on the disposable of spatial variations Random cipher generation method, comprises the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is believed according to the significant condition Breath searches feature set in advance with reference to database, determines the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the significant condition letter is met Breath matching degree, goes to step(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores and sends or receive to caching and simultaneously by transport module.
In a preferred embodiment of the present invention, step(1)The dynamic feature information is rate of acceleration change, angular speed At least one in rate of change, change in displacement rate and geomagnetic fieldvector value and its rate of change.
In a preferred embodiment of the present invention, step(3)It is dynamic according to feature status information matching degree selection setting State lock-out state is specifically included:The dynamic-change information being kept in motion according to communication equipment obtains corresponding significant condition letter Breath matching degree, the feature status information, the feature status information are locked according to the feature status information matching degree automatically Matching degree includes that rate of acceleration change, rate of change of angular, change in displacement rate and geomagnetic fieldvector value and its relevant parameter change At least one matching in rate, the rate of change of geomagnetic fieldvector value includes eccentricity.
In a preferred embodiment of the present invention, step(5)The establishment of the cryptographic bitstream includes using signature algorithm And Hash(HASH)At least one in algorithm.
A kind of application is based on the cryptographic system of the disposable random cipher generation method of spatial variations, including:
Acquisition module:Dynamic-change information for gathering mobile communication equipment, separates from dynamic-change information and sets out State characteristic information;
Coding module:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module:For searching feature set in advance with reference to database according to the feature status information, institute is determined Feature status information matching degree is stated, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module:For locking the feature status information and sending user reminding information;
Output module:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm At least one algorithm sets AES and corresponding decipherment algorithm, and the feature status information is generated message in cipher by AES Breath flows and caches;
Transport module:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module:For the cryptographic bitstream in other cryptographic systems for receiving to be carried out with the cryptographic bitstream of itself Contrast verification, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
In a preferred embodiment of the present invention, the acquisition module is made up of N axle Motion sensing components, the N axles fortune Dynamic sensing component is by N axle acceleration sensors and its corresponding processor group into the network system includes cable-network transmission System and wireless network transmission system.
In a preferred embodiment of the present invention, the N axles Motion sensing component is three-axis moving sensing component, six axles fortune Any one in dynamic sensing component and nine axle Motion sensing components.
A kind of cryptographic system is based on the application of the disposable random cipher generation method of spatial variations.
In a preferred embodiment of the present invention, many mobile communication equipments of the matching based on spatial variations once Property random cipher generation method press following operating procedure:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable of spatial variations Random cipher generation method;
(2)M platforms mobile communication equipment is moved simultaneously operate and obtain synchronous generation feature status information it is concurrent Send user reminding information;
(3)The feature status information of synchronous generation is generated consistent and synchronous message in cipher by M platforms mobile communication equipment Breath flows and caches;
(4)Cryptographic bitstream is transmitted and is received by transport module;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, is tested Demonstrate,prove failure then return to step(2).
In a preferred embodiment of the present invention, step(1)To step(3)Described in M be more than 2 integer.
The beneficial effects of the invention are as follows:Cryptographic system of the present invention and its disposable random cipher based on spatial variations are generated Method synchronizes movement with application by two or many mobile communication equipments, gathers mobile message and sets out corresponding Disposable synchronization key carries out synchronous crypto-operation and the identification protecting of two or many mobile communication equipments, by synchronous shifting The information such as angular speed, the rate of change of linear acceleration and speed and corresponding earth's magnetic field and its rate of change extracted in dynamic equipment can With the both sides of communication or it is multi-party between interim key synchronization system is set is encrypted communication and protects.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will make needed for embodiment description Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing, wherein:
Fig. 1 is the one of cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations and application The flow chart of preferred embodiment.
The mark of each part is as follows in accompanying drawing:1st, acquisition module, 2, coding module, 3, matching module, 4, locking module, 5, Output module, 6, transport module, 7, authentication module.
Specific embodiment
The technical scheme in the embodiment of the present invention will be clearly and completely described below, it is clear that described implementation Example is only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area is common All other embodiment that technical staff is obtained under the premise of creative work is not made, belongs to the model of present invention protection Enclose.
Fig. 1 is referred to, the embodiment of the present invention includes:
Cryptographic system and its disposable random cipher generation method based on spatial variations, comprise the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is believed according to the significant condition Breath searches feature set in advance with reference to database, determines the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the significant condition letter is met Breath matching degree, goes to step(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores to caching and sends or receive simultaneously by transport module 6.
Step(1)The dynamic feature information is rate of acceleration change, rate of change of angular, change in displacement rate and earth's magnetic field At least one in vector value and its rate of change.
Step(3)Specifically included according to the feature status information matching degree dynamic lock-out state of selection setting:According to logical The dynamic-change information that letter equipment is kept in motion obtains corresponding feature status information matching degree, according to the significant condition Information matches degree locks the feature status information automatically, and the feature status information matching degree includes rate of acceleration change, angle At least one matching in percentage speed variation, change in displacement rate and geomagnetic fieldvector value and its relevant parameter rate of change, earth magnetism The rate of change of field vector value includes eccentricity.
Step(5)The establishment of the cryptographic bitstream includes using signature algorithm and Hash(HASH)In algorithm at least one Kind.
A kind of cryptographic system of the disposable random cipher generation method based on spatial variations, including:
Acquisition module 1:Dynamic-change information for gathering mobile communication equipment, separates from dynamic-change information and sets out State characteristic information;
Coding module 2:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module 3:For searching feature set in advance with reference to database according to the feature status information, institute is determined Feature status information matching degree is stated, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module 4:For locking the feature status information and sending user reminding information;
Output module 5:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm At least one algorithm set AES and corresponding decipherment algorithm, AES by the feature status information generate password Information flow is simultaneously cached;
Transport module 6:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module 7:For the cryptographic bitstream in other cryptographic systems for receiving to be flowed into the encrypted message of itself Row contrast verification, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
In the present invention, the acquisition module 1 is made up of N axle Motion sensing components, and the N axles Motion sensing component is by N axles Acceleration transducer and its corresponding processor group into, wherein, processor includes motion sensing chip, and processor is to kinesthesia Surveying the data of component acquisition carries out computing and treatment operation;The present invention relies on current existing motion sensing technology to the feature Status information matching degree is analyzed and judges.
The network system includes cable network Transmission system and wireless network transmission system.
The N axles Motion sensing component is three-axis moving sensing component, six axle Motion sensing components and nine axle motion sensings Any one in component;
Wherein, three-axis moving sensing component includes three axis accelerometer, and six axle Motion sensing components include three-axis gyroscope And three axis accelerometer, nine axle Motion sensing components include three-axis gyroscope, three axis accelerometer and three axis magnetometer;Described three Axle refers to three directions of length, width and height in space;Can be to the rate of acceleration change of mobile phone, angle speed by N axles Motion sensing component The dynamic-change information such as degree rate of change, change in displacement rate and geomagnetic fieldvector value and its change of corresponding eccentricity is monitored simultaneously Measured value is automatically extracted, when measured value is more than reduced value set in advance, measured value is carried out automatically locking concurrently User reminding information is sent, the feature status information for locking is carried out into computing, encoded, generated specific cryptographic bitstream and deposit To caching, wherein the algorithm of computing includes signature algorithm and Hash for storage(HASH)Algorithm, the present invention relies on existing signature at present Algorithm and Hash(HASH)Algorithm carries out computing to the feature status information and treatment is operated.
A kind of cryptographic system is based on the application of the disposable random cipher generation method of spatial variations.
Described many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching are by following Operating procedure:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable of spatial variations Random cipher generation method;
(2)M platforms mobile communication equipment is moved simultaneously operate and obtain synchronous generation feature status information it is concurrent Send user reminding information;
(3)The feature status information of synchronous generation is generated consistent and synchronous message in cipher by M platforms mobile communication equipment Breath flows and caches;
(4)Cryptographic bitstream is transmitted and is received by transport module 6;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, is tested Demonstrate,prove failure then return to step(2).
Step(1)To step(3)Described in M be more than 2 integer.
In the present invention, the mobile communication equipment intelligent electronic such as including intelligent mobile phone, panel computer, Wearable sensor Product facility;Wherein, M platforms mobile communication equipment moves operation and includes combining closely M platform mobile communication equipments simultaneously Produce together and synchronously and move, also including M platforms mobile communication equipment is fixed together simultaneously by other plant equipment for aiding in It is synchronous to produce motion.
In the present invention, the Hash of use(HASH)Algorithm is one-to-many AES, is One-Way Encryption and can not decrypt Encryption technology, but Hash(HASH)Algorithm is not the direct encrypted feature status information as other methods, but first Some treatment are carried out to feature status information, is then re-encrypted.This treatment first done is exactly that basis wants encrypted feature state to believe The length of breath generates a random salt value, is then together encrypted with this salt value and the feature status information to be encrypted Cryptographic bitstream is formed, and cryptographic bitstream is stored in the caching in database;In checking, Hash(HASH)Algorithm is first Salt values are read from database, being then combined with the cryptographic bitstream that other cryptographic systems are submitted to salt values carries out hash Encryption, then be compared with the cryptographic bitstream of caching in database, it is identical, pass through, do not pass through otherwise;
In addition, Hash(HASH)Algorithm is encrypting again to one-time pad encryption, that is to say, that is secondary encryption, and moves The equipment dynamic monitoring data that N axle Motion sensing components in communication equipment are detected is random dynamic moving data, with Time, space, earth's magnetic field and its motion state are all constantly changing, and the collection of data is random and is not easy to imitate, therefore In theory, Hash(HASH)The random secret key that algorithm combines random feature status information establishment is safer.
Cryptographic system of the present invention and its disposable random cipher generation method based on spatial variations and the beneficial effect applied It is really:
First, movement is synchronized by two or many mobile communication equipments, gathers mobile message and set out corresponding Disposable synchronous key carry out synchronous crypto-operation and the identification protecting of two or many mobile communication equipments, by synchronous The information such as the angular speed, the rate of change of linear acceleration and speed and corresponding earth's magnetic field and its rate of change that are extracted on mobile device Can the both sides of communication or it is multi-party between interim key synchronization system is set is encrypted communication and protects;Can also be by This password generation mechanism is comprehensively used with other pin modes that prestore, and strengthens secrecy effect;
2nd, there is key to set compared with common communication key random and synchronous, cipher round results more insure, be difficult by Imitate and steal, can be widely applied to the fields such as automation equipment identification, paying and encryption file transmission.
Embodiments of the invention are the foregoing is only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright description is made, or directly or indirectly it is used in other related technology necks Domain, is included within the scope of the present invention.

Claims (6)

1. a kind of cryptographic system of the disposable random cipher generation method based on spatial variations, described based on spatial variations one Secondary property random cipher generation method, comprises the following steps:
(1)The dynamic-change information of mobile communication equipment is gathered, dynamic feature information is isolated from dynamic-change information;
(2)Dynamic feature information is generated into feature status information according to pre-arranged code mode, is looked into according to the feature status information Look for feature set in advance with reference to database, determine the feature status information matching degree;
(3)According to the feature status information matching degree dynamic lock-out state of selection setting, the feature status information is met With degree, step is gone to(4), otherwise, go to step(1);
(4)Lock the feature status information and send user reminding information;
(5)The feature status information for locking is carried out into computing, coding, cryptographic bitstream is generated;
(6)Cryptographic bitstream stores and sends or receive to caching and simultaneously by transport module;
Step(1)The dynamic feature information is rate of acceleration change, rate of change of angular, change in displacement rate and geomagnetic fieldvector At least one in value and its rate of change;
Step(3)Specifically included according to the feature status information matching degree dynamic lock-out state of selection setting:Set according to communication The standby dynamic-change information being kept in motion obtains corresponding feature status information matching degree, according to the feature status information Matching degree locks the feature status information automatically, and the feature status information matching degree includes rate of acceleration change, angular speed At least one matching in rate of change, change in displacement rate and geomagnetic fieldvector value and its relevant parameter rate of change, earth's magnetic field arrow The rate of change of value includes eccentricity;
Step(5)The establishment of the cryptographic bitstream includes using signature algorithm and Hash(HASH)At least one in algorithm, It is characterised in that it includes:
Acquisition module:Dynamic-change information for gathering mobile communication equipment, isolates dynamic spy from dynamic-change information Reference ceases;
Coding module:For dynamic feature information to be generated into feature status information according to pre-arranged code mode;
Matching module:For searching feature set in advance with reference to database according to the feature status information, the spy is determined Symptom state information matches degree, according to the feature status information matching degree dynamic lock-out state of selection setting;
Locking module:For locking the feature status information and sending user reminding information;
Output module:For using signature algorithm and Hash to the feature status information for locking(HASH)In algorithm at least A kind of algorithm sets AES and corresponding decipherment algorithm, and the feature status information is generated cryptographic bitstream by AES And cache;
Transport module:For cryptographic bitstream to be transmitted and be received by network system;
Authentication module:For the cryptographic bitstream in other cryptographic systems for receiving to be contrasted with the cryptographic bitstream of itself Checking, cryptographic bitstream is identical, is decrypted using identical decipherment algorithm, and cryptographic bitstream difference is then returned.
2. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 1, it is special Levy and be, the acquisition module is made up of N axle Motion sensing components, the N axles Motion sensing component is by N axle acceleration sensors And its corresponding processor group is into the network system includes cable network Transmission system and wireless network transmission system.
3. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 2, it is special Levy and be, the N axles Motion sensing component is three-axis moving sensing component, six axle Motion sensing components and nine axle motion sensing groups Any one in part.
4. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 1 is applied to The many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching.
5. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 4, it is special Levy and be, described many disposable random cipher generation methods based on spatial variations of mobile communication equipment of matching press following behaviour Make step:
(1)M platforms mobile communication equipment is simultaneously provided with identical cryptographic system and identical and is based on the disposable random of spatial variations Method for generating cipher code;
(2)M platforms mobile communication equipment is moved simultaneously and is operated and is obtained the synchronous feature status information for generating and send use Family prompting message;
(3)The feature status information of synchronous generation is generated consistent and synchronous cryptographic bitstream by M platforms mobile communication equipment And cache;
(4)Cryptographic bitstream is transmitted and is received by transport module;
(5)The cryptographic bitstream received by itself encrypted message flow verification, is proved to be successful, and carries out next step operation, and checking is lost Lose then return to step(2).
6. the cryptographic system of the disposable random cipher generation method based on spatial variations according to claim 5, it is special Levy and be:Step(1)To step(3)Described in M be more than 2 integer.
CN201410149122.7A 2014-04-15 2014-04-15 Cryptographic system and its disposable random cipher generation method based on spatial variations and application Active CN103986572B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410149122.7A CN103986572B (en) 2014-04-15 2014-04-15 Cryptographic system and its disposable random cipher generation method based on spatial variations and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410149122.7A CN103986572B (en) 2014-04-15 2014-04-15 Cryptographic system and its disposable random cipher generation method based on spatial variations and application

Publications (2)

Publication Number Publication Date
CN103986572A CN103986572A (en) 2014-08-13
CN103986572B true CN103986572B (en) 2017-07-11

Family

ID=51278399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410149122.7A Active CN103986572B (en) 2014-04-15 2014-04-15 Cryptographic system and its disposable random cipher generation method based on spatial variations and application

Country Status (1)

Country Link
CN (1) CN103986572B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106204038A (en) * 2016-06-24 2016-12-07 广州正峰电子科技有限公司 The method and device that a kind of password string generates
CN110365661B (en) * 2019-06-28 2021-11-26 苏州浪潮智能科技有限公司 Network security authentication method and device
CN110443927B (en) * 2019-08-12 2021-04-27 北京百佑科技有限公司 Visitor password generation method, visitor password verification method, server and intelligent door lock

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001156773A (en) * 1999-11-25 2001-06-08 Nippon Telegr & Teleph Corp <Ntt> Encryption method, decoding method, encryption system, encryption device, decoder, storage medium storing encryption program and storage medium storing decoding program
EP2151086B1 (en) * 2007-04-30 2017-06-07 Telefonaktiebolaget LM Ericsson (publ) Method for establishing a random number for security and encryption, and a communications apparatus
CN101656728B (en) * 2009-09-24 2013-02-13 杭州永控科技有限公司 Secure transmission method using time-varying incidental information flow as key information
CN101789862A (en) * 2010-01-25 2010-07-28 中兴通讯股份有限公司 Encryption and decryption device and method based on gravity acceleration
CN102724034A (en) * 2012-05-17 2012-10-10 人民搜索网络股份公司 Encryption/decryption system and method based on space motion
CN103051460B (en) * 2013-01-29 2015-08-19 赵忠华 Based on dynamic token system and the encryption method thereof of inertial technology
CN103401689B (en) * 2013-08-22 2017-02-08 赵忠华 Positional information based dynamic token and encryption method thereof

Also Published As

Publication number Publication date
CN103986572A (en) 2014-08-13

Similar Documents

Publication Publication Date Title
CN103905202B (en) A kind of RFID lightweight mutual authentication methods based on PUF
Lei et al. A lightweight authentication protocol for UAV networks based on security and computational resource optimization
CN107438230B (en) Safe wireless ranging
CN104104500B (en) A kind of method and apparatus of quantum secure transmission
CN104184733B (en) A kind of RFID lightweight mutual authentication methods encoded based on CRC
CN106209823B (en) A kind of lightweight file remote encryption method under mobile cloud computing environment
CN103457722B (en) Bidirectional identity authentication and data safety transmission providing body area network safety method based on Shamir threshold
CN111447053B (en) Data secure transmission method and system
CN103581900B (en) Communication safety control method, device, the first mobile terminal and mobile healthy equipment
CN103414690A (en) Publicly-verifiable cloud data possession checking method
CN107683582A (en) Certification instruction pen equipment
CN105117658B (en) A kind of cryptosecurity management method and equipment based on finger print identifying
CN102594551B (en) Method for reliable statistics of privacy data on radio frequency identification (RFID) tag
CN103986572B (en) Cryptographic system and its disposable random cipher generation method based on spatial variations and application
CN103051460A (en) Dynamic token system based on inertial technology and encryption method thereof
CN112422500B (en) Cross-platform data transmission method and device, storage medium and electronic device
CN103186744A (en) Terminal encryption and decryption method and terminal
CN102185696B (en) Mobile phone user authentication method without trusted third party on basis of handwriting characteristics
CN106131829A (en) Modified model method for distributing key in a kind of large-scale layer-stepping wireless sensor network
CN103138923A (en) Method, device and system for internodal authentication
CN112530053B (en) Control method and system of intelligent lock, lock equipment, server and storage medium
Ji et al. Survey of secure communications of internet of things with artificial intelligence
CN108683500A (en) A kind of WBAN method for secret protection based on the characteristic of channel
CN104539602B (en) A kind of safety key managing method being applied in cloud storage
CN103457915A (en) Military Internet of Things security protocol capable of being proved in formalized mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220901

Address after: Room 323, Chamber of Commerce Building, No. 929 Binhai Avenue, Danxi Street, Xiangshan County, Ningbo City, Zhejiang Province, 315700

Patentee after: Liu Xiang

Address before: 215400 No. 20, Jian Xiong Road, science and Education Town, Taicang, Suzhou, Jiangsu

Patentee before: SUZHOU TAIYOU INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right