CN104408623A - Identity authentication method suitable for product payment - Google Patents

Identity authentication method suitable for product payment Download PDF

Info

Publication number
CN104408623A
CN104408623A CN201410532473.6A CN201410532473A CN104408623A CN 104408623 A CN104408623 A CN 104408623A CN 201410532473 A CN201410532473 A CN 201410532473A CN 104408623 A CN104408623 A CN 104408623A
Authority
CN
China
Prior art keywords
data
authenticating party
certified side
certified
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410532473.6A
Other languages
Chinese (zh)
Inventor
林志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Centerm Information Co Ltd
Original Assignee
Fujian Centerm Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Centerm Information Co Ltd filed Critical Fujian Centerm Information Co Ltd
Priority to CN201410532473.6A priority Critical patent/CN104408623A/en
Publication of CN104408623A publication Critical patent/CN104408623A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification numbers [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention provides an identity authentication method suitable for product payment. The identity authentication method comprises the following steps: combining an authentication party random number, an authenticated party random number and identity flag data into authenticated party input data through a first algorithm; obtaining authenticated party security data for the authenticated party input data through a Hash algorithm; shortening the authenticated party security data through a second algorithm to obtain authenticated party authentication data; transferring the authenticated party authentication data and the authenticated party random number to an authentication party from the authenticated party; combining the authentication party random number, the authenticated party random number and the identity flag data into authentication party input data by the authentication party; obtaining authentication party authentication data for the authentication party input data through the Hash algorithm and a second algorithm; comparing the authenticated party authentication data with the authentication party authentication data, and ensuring that the identity authentication is qualified if the authenticated party authentication data is the same with the authentication party authentication data. The identity authentication method can be used for products which can not operate complex computation, so that the capability of the products on avoiding that the authentication data is intercepted to attack the identity flag data is enhanced.

Description

A kind of identity identifying method being applicable to payment product
[technical field]
The present invention relates to a kind of identity identifying method being applicable to pay product.
[background technology]
In the total solution paying product, need payment terminal product to coordinate with backstage payment system and just can complete payment function, in order to the security that terminal and background system dock, often need to carry out unidirectional or bidirectional identity authentication between terminal and background system.At payment terminal interiors of products, in time relating to the data collaborative work of multiple sensitive service module, in order to ensure that sensitive service module is called by receiver, module directly unidirectional or bidirectional identity authentication also to be carried out.Therefore, in payment product, authentication is necessary mechanism.
At present, pay authentication in product to be realized by encrypting and decrypting function.According to the algorithm of existing use, the authentication utilizing symmetric encipherment algorithm to realize and the authentication utilizing rivest, shamir, adelman to realize can be divided into.
Utilize the authentication that symmetric encipherment algorithm realizes, certification both sides transmit plaintext and the ciphertext pair of arranging secret key encryption with one mutually, whether certification both sides equal ciphertext by encrypted result expressly, or whether the decrypted result of ciphertext equals expressly to judge that whether the key of the other side is consistent with one's own side, and then judge that whether the identity of the other side is legal.Symmetric encipherment algorithm conventional in financial system, as DES, AES etc., the common methods of its security attack, a large amount of exactly collection plaintext and ciphertext calculate encryption key to carrying out violence.Utilize the authentication of symmetric encipherment algorithm work to exist expressly and ciphertext to the transmission on communication line, this just makes assailant have channel to collect offensive plaintext and ciphertext pair, implements attack to authentication.Even if add random factor in the authentication implemented utilizing symmetric encipherment algorithm, assailant also can pass through forgery authenticating party, and realize independent attack by reducing or controlling random factor amount to another authenticating party, symmetric key is deduced in violence.Once one end is captured, namely whole authentication is broken.Therefore, the authentication based on symmetric encipherment algorithm is most only for the certification of end product internal module, is rarely used in the certification between terminal and long-range background system.
Utilize the authentication of rivest, shamir, adelman, overcome the shortcoming of the authentication of symmetric cryptography, even if expressly and ciphertext transmit on communication line, assailant also cannot within effective time by cleartext-ciphertext to extrapolating the certification PKI and private key pair that certification both sides hold separately.But based on the identity identifying method of rivest, shamir, adelman, the computing environment depending on certification both sides can support rivest, shamir, adelman, as RSA, elliptic curve scheduling algorithm.Rivest, shamir, adelman often relate to Large-number operation, for the end product that CPU computing power is lower, often cannot complete asymmetric encryption computing at short notice, on them, use the authentication of asymmetric encryption also just not possess practicality.Therefore, utilize the authentication of rivest, shamir, adelman to there is limitation in the selection of product solution, the authentication based on symmetric encipherment algorithm can not be substituted completely.
[summary of the invention]
The technical problem to be solved in the present invention, be to provide a kind of identity identifying method being applicable to pay product, it utilizes hash algorithm to the conversion realizing identity marks data and count to secure data at random, greatly strengthen and prevent assailant from utilizing intercepting secure data to attack the ability of identity marks data, and, the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, therefore, the requirement of the present invention to hardware is lower, substantially existing common flush bonding processor can both support the quick operation of Hash class algorithm, make major part payment product can both provide the identity authentication function of high security.
The present invention is achieved in that
Be applicable to the identity identifying method paying product, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm;
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described hash algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through.
Further, described identity identifying method is two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described non-reversible algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described hash algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
Further, described certified side is set with certified party name, and each certified party name is unique identification, and in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side;
Before performing described step 60, first authenticating party finds according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.
Tool of the present invention has the following advantages:
The present invention utilizes the irreversible property of hash algorithm and the avalanche effect characteristic rule greatly increased by calculating data to guess the difficulty of separating former data.Therefore, utilize hash algorithm to realize identity marks data and to count to the conversion of verify data at random, utilize preventing assailant intercept in ability that verify data attacks identity marks data stronger than symmetric encipherment algorithm.And the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, and substantially now common flush bonding processor can both support the quick operation of hash algorithm, make major part payment product can both provide the identity authentication function of high security.
[accompanying drawing explanation]
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the principle schematic of the inventive method.
Fig. 2 is the schematic flow sheet of the inventive method.
[embodiment]
Refer to Fig. 1 and Fig. 2, a kind of identity identifying method being applicable to payment product, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; The data length of described identity marks data generally can not be less than 8 bytes, and very little, security reduces byte number.
Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number; Described authenticating party random number can be a binary data, and produced when each certification is initiated by authenticating party, its data length generally can not be less than 4 bytes.The authenticating party random number produced during each certification of authenticating party is random, there will not be continuous several times certification to use the situation of identical authenticating party random number; Certified side's random number can be a binary data, is produced when each certification by certified side; The data length of certified side's random number generally can not be less than 4 bytes, and the certified side's random number produced when certified side needs to ensure each certification is random, there will not be continuous several times certification to use the situation of identical certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm; The data length of described certified side input data requires to be not less than 32 bytes, and when carrying out authentication to avoid different times, certified side's input Data duplication rate of generation is too high;
Described first algorithm is a kind of algorithm multiple data being pieced together data, such as, described first algorithm can be directly form new data (namely generating certified side input data) end to end for the byte stream of three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data), can also be mutual for three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data) XOR is obtained new data (namely generating certified side input data).Except above-mentioned two kinds of modes, can also be, using after any two the data XORs in three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data) as DES secret key encryption the 3rd data, obtain certified side input data, therefore, described first algorithm is a kind of algorithm of broad sense, as long as the algorithm that three data can be pieced together data is all feasible, the mode of how split can customize.
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
When described hash algorithm can select the Hash class algorithms such as SHA-1/SHA-256, this type of algorithm, by the accreditation of PCI PTS certification, possesses the security requirement that financial industry uses.Because hash algorithm possesses irreversible property and avalanche effect characteristic, irreversible property refers to that the data calculated by hash algorithm cannot push over out former data in direction; Even if avalanche effect characteristic refers to its data calculated of little amendment that a bit only occurs former data and also has great difference, therefore, the rule that this characteristic can increase through the data calculated guesses the difficulty of separating former data;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data; The object certified side's secure data being converted to certified side's verify data is the data length reducing certified side's verify data, improves transfer efficiency during certification, and increases the complexity of certified side's verify data, improves the difficulty of attacking.The length of certified side's verify data is generally not less than 8 bytes and is not more than 32 bytes;
Described second algorithm is a kind of algorithm data shortened, such as, described second algorithm can be do mutual XOR after data half-and-half being split, data are made to be only the half of original length, described second algorithm can also be do mutual encryption with DES after Data Division is become two sections, or does the computings such as CRC check after Data Division is become two sections, therefore, described second algorithm comprises all operational methods that data can be shortened, and the object that data shortened is transfer efficiency when improving certification;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described non-reversible algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through, if not identical, then certified side's authentication failure.
Described identity identifying method can also be two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described non-reversible algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described non-reversible algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
It should be noted that, in step 80-step 110, occur that " new " is as attribute, object is that distinguishing the data produced when initiating certification by authenticating party is different from the data produced when initiating certification by certified side.
The present invention can also set certified party name, and each certified party name is unique identification, and therefore, in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side; Before performing described step 60, first authenticating party looks for according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.Authenticating party fast finding can be realized like this to should the identity marks data of certified side.
The rule that the present invention utilizes the irreversible property of non-reversible algorithm and avalanche effect characteristic greatly to increase the data by calculating guesses the difficulty of separating former data.Therefore, utilize non-reversible algorithm to realize the conversion of identity marks data to verify data, utilize preventing assailant intercept in ability that verify data attacks identity marks data stronger than symmetric encipherment algorithm.And the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, and substantially now common flush bonding processor can both support the quick operation of hash algorithm, make major part payment product can both provide the identity authentication function of high security.
Although the foregoing describe the specific embodiment of the present invention; but be familiar with those skilled in the art to be to be understood that; specific embodiment described by us is illustrative; instead of for the restriction to scope of the present invention; those of ordinary skill in the art, in the modification of the equivalence done according to spirit of the present invention and change, should be encompassed in scope that claim of the present invention protects.

Claims (3)

1. be applicable to the identity identifying method paying product, it is characterized in that, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm;
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described hash algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through.
2. a kind of identity identifying method being applicable to payment product according to claim 1, is characterized in that: described identity identifying method is two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described hash algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described hash algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
3. a kind of identity identifying method being applicable to payment product according to claim 1, it is characterized in that, described certified side is set with certified party name, each certified party name is unique identification, in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side;
Before performing described step 60, first authenticating party finds according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.
CN201410532473.6A 2014-10-11 2014-10-11 Identity authentication method suitable for product payment Pending CN104408623A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410532473.6A CN104408623A (en) 2014-10-11 2014-10-11 Identity authentication method suitable for product payment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410532473.6A CN104408623A (en) 2014-10-11 2014-10-11 Identity authentication method suitable for product payment

Publications (1)

Publication Number Publication Date
CN104408623A true CN104408623A (en) 2015-03-11

Family

ID=52646252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410532473.6A Pending CN104408623A (en) 2014-10-11 2014-10-11 Identity authentication method suitable for product payment

Country Status (1)

Country Link
CN (1) CN104408623A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825383A (en) * 2016-03-18 2016-08-03 桂林电子科技大学 Random number generation and verification method with both sides in participation
CN106850193A (en) * 2017-03-23 2017-06-13 中国人民公安大学 A kind of cloud storage persistent data detection method based on MD5 and key
CN107615797A (en) * 2015-05-25 2018-01-19 邵通 A kind of device, method and system of hiding subscriber identity data
CN108599932A (en) * 2018-04-10 2018-09-28 国网山东省电力公司博兴县供电公司 A kind of identity identifying method for electric system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102509128A (en) * 2011-09-30 2012-06-20 江苏科技大学 Security authentication method of radio-frequency identification system
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash
CN102576394A (en) * 2009-05-20 2012-07-11 罗尔夫·延奇 Unique identifier, method for providing said unique identifier and use of said unique identifier
US20130097427A1 (en) * 2011-10-12 2013-04-18 Goldkey Security Corporation Soft-Token Authentication System
US8726021B2 (en) * 2008-12-19 2014-05-13 University Of Washington Scalable RFID systems: a privacy-preserving protocol with constant-time identification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8726021B2 (en) * 2008-12-19 2014-05-13 University Of Washington Scalable RFID systems: a privacy-preserving protocol with constant-time identification
CN102576394A (en) * 2009-05-20 2012-07-11 罗尔夫·延奇 Unique identifier, method for providing said unique identifier and use of said unique identifier
CN102509128A (en) * 2011-09-30 2012-06-20 江苏科技大学 Security authentication method of radio-frequency identification system
US20130097427A1 (en) * 2011-10-12 2013-04-18 Goldkey Security Corporation Soft-Token Authentication System
CN102437910A (en) * 2011-10-18 2012-05-02 国家超级计算深圳中心(深圳云计算中心) Data encryption/decryption checking method and system
CN102510335A (en) * 2011-11-10 2012-06-20 西北工业大学 RFID (Radio Frequency Identification Device) mutual authentication method based on Hash

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615797A (en) * 2015-05-25 2018-01-19 邵通 A kind of device, method and system of hiding subscriber identity data
CN105825383A (en) * 2016-03-18 2016-08-03 桂林电子科技大学 Random number generation and verification method with both sides in participation
CN106850193A (en) * 2017-03-23 2017-06-13 中国人民公安大学 A kind of cloud storage persistent data detection method based on MD5 and key
CN108599932A (en) * 2018-04-10 2018-09-28 国网山东省电力公司博兴县供电公司 A kind of identity identifying method for electric system

Similar Documents

Publication Publication Date Title
CN101478548B (en) Data transmission ciphering and integrity checking method
Xin A mixed encryption algorithm used in internet of things security transmission system
US20130073850A1 (en) Hybrid encryption schemes
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN105447407A (en) Off-line data encryption method and decryption method and corresponding apparatus and system
CN104023013A (en) Data transmission method, server side and client
CN102946602A (en) Mobile information system based privacy protection and encryption method
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN102387152A (en) Preset-key-based symmetric encryption communication method
US11870891B2 (en) Certificateless public key encryption using pairings
CN107770127A (en) The transmission method and device of a kind of data
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN103986583A (en) Dynamic encryption method and encryption communication system thereof
CN107094108A (en) The method for being connected to the part of data/address bus and encryption function being realized in the part
CN103905183B (en) Method for improving safety of communication transmission of embedded encryption chip
CN107534558B (en) Method for protecting the information security of data transmitted via a data bus and data bus system
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
WO2020164252A1 (en) Identity-based identity hiding key agreement method based on bilinear paring
CN104408623A (en) Identity authentication method suitable for product payment
CN109104278A (en) A kind of encrypting and decrypting method
CN103458401B (en) A kind of voice encryption communication system and communication means
CN101931535A (en) Method for adaptively performing data encryption and authentication without authentication center
CN109587149A (en) A kind of safety communicating method and device of data
Dung A method for constructing public-key block cipher schemes based on elliptic curves

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150311