CN104408623A - Identity authentication method suitable for product payment - Google Patents
Identity authentication method suitable for product payment Download PDFInfo
- Publication number
- CN104408623A CN104408623A CN201410532473.6A CN201410532473A CN104408623A CN 104408623 A CN104408623 A CN 104408623A CN 201410532473 A CN201410532473 A CN 201410532473A CN 104408623 A CN104408623 A CN 104408623A
- Authority
- CN
- China
- Prior art keywords
- data
- authenticating party
- certified side
- certified
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Abstract
The invention provides an identity authentication method suitable for product payment. The identity authentication method comprises the following steps: combining an authentication party random number, an authenticated party random number and identity flag data into authenticated party input data through a first algorithm; obtaining authenticated party security data for the authenticated party input data through a Hash algorithm; shortening the authenticated party security data through a second algorithm to obtain authenticated party authentication data; transferring the authenticated party authentication data and the authenticated party random number to an authentication party from the authenticated party; combining the authentication party random number, the authenticated party random number and the identity flag data into authentication party input data by the authentication party; obtaining authentication party authentication data for the authentication party input data through the Hash algorithm and a second algorithm; comparing the authenticated party authentication data with the authentication party authentication data, and ensuring that the identity authentication is qualified if the authenticated party authentication data is the same with the authentication party authentication data. The identity authentication method can be used for products which can not operate complex computation, so that the capability of the products on avoiding that the authentication data is intercepted to attack the identity flag data is enhanced.
Description
[technical field]
The present invention relates to a kind of identity identifying method being applicable to pay product.
[background technology]
In the total solution paying product, need payment terminal product to coordinate with backstage payment system and just can complete payment function, in order to the security that terminal and background system dock, often need to carry out unidirectional or bidirectional identity authentication between terminal and background system.At payment terminal interiors of products, in time relating to the data collaborative work of multiple sensitive service module, in order to ensure that sensitive service module is called by receiver, module directly unidirectional or bidirectional identity authentication also to be carried out.Therefore, in payment product, authentication is necessary mechanism.
At present, pay authentication in product to be realized by encrypting and decrypting function.According to the algorithm of existing use, the authentication utilizing symmetric encipherment algorithm to realize and the authentication utilizing rivest, shamir, adelman to realize can be divided into.
Utilize the authentication that symmetric encipherment algorithm realizes, certification both sides transmit plaintext and the ciphertext pair of arranging secret key encryption with one mutually, whether certification both sides equal ciphertext by encrypted result expressly, or whether the decrypted result of ciphertext equals expressly to judge that whether the key of the other side is consistent with one's own side, and then judge that whether the identity of the other side is legal.Symmetric encipherment algorithm conventional in financial system, as DES, AES etc., the common methods of its security attack, a large amount of exactly collection plaintext and ciphertext calculate encryption key to carrying out violence.Utilize the authentication of symmetric encipherment algorithm work to exist expressly and ciphertext to the transmission on communication line, this just makes assailant have channel to collect offensive plaintext and ciphertext pair, implements attack to authentication.Even if add random factor in the authentication implemented utilizing symmetric encipherment algorithm, assailant also can pass through forgery authenticating party, and realize independent attack by reducing or controlling random factor amount to another authenticating party, symmetric key is deduced in violence.Once one end is captured, namely whole authentication is broken.Therefore, the authentication based on symmetric encipherment algorithm is most only for the certification of end product internal module, is rarely used in the certification between terminal and long-range background system.
Utilize the authentication of rivest, shamir, adelman, overcome the shortcoming of the authentication of symmetric cryptography, even if expressly and ciphertext transmit on communication line, assailant also cannot within effective time by cleartext-ciphertext to extrapolating the certification PKI and private key pair that certification both sides hold separately.But based on the identity identifying method of rivest, shamir, adelman, the computing environment depending on certification both sides can support rivest, shamir, adelman, as RSA, elliptic curve scheduling algorithm.Rivest, shamir, adelman often relate to Large-number operation, for the end product that CPU computing power is lower, often cannot complete asymmetric encryption computing at short notice, on them, use the authentication of asymmetric encryption also just not possess practicality.Therefore, utilize the authentication of rivest, shamir, adelman to there is limitation in the selection of product solution, the authentication based on symmetric encipherment algorithm can not be substituted completely.
[summary of the invention]
The technical problem to be solved in the present invention, be to provide a kind of identity identifying method being applicable to pay product, it utilizes hash algorithm to the conversion realizing identity marks data and count to secure data at random, greatly strengthen and prevent assailant from utilizing intercepting secure data to attack the ability of identity marks data, and, the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, therefore, the requirement of the present invention to hardware is lower, substantially existing common flush bonding processor can both support the quick operation of Hash class algorithm, make major part payment product can both provide the identity authentication function of high security.
The present invention is achieved in that
Be applicable to the identity identifying method paying product, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm;
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described hash algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through.
Further, described identity identifying method is two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described non-reversible algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described hash algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
Further, described certified side is set with certified party name, and each certified party name is unique identification, and in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side;
Before performing described step 60, first authenticating party finds according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.
Tool of the present invention has the following advantages:
The present invention utilizes the irreversible property of hash algorithm and the avalanche effect characteristic rule greatly increased by calculating data to guess the difficulty of separating former data.Therefore, utilize hash algorithm to realize identity marks data and to count to the conversion of verify data at random, utilize preventing assailant intercept in ability that verify data attacks identity marks data stronger than symmetric encipherment algorithm.And the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, and substantially now common flush bonding processor can both support the quick operation of hash algorithm, make major part payment product can both provide the identity authentication function of high security.
[accompanying drawing explanation]
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the principle schematic of the inventive method.
Fig. 2 is the schematic flow sheet of the inventive method.
[embodiment]
Refer to Fig. 1 and Fig. 2, a kind of identity identifying method being applicable to payment product, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; The data length of described identity marks data generally can not be less than 8 bytes, and very little, security reduces byte number.
Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number; Described authenticating party random number can be a binary data, and produced when each certification is initiated by authenticating party, its data length generally can not be less than 4 bytes.The authenticating party random number produced during each certification of authenticating party is random, there will not be continuous several times certification to use the situation of identical authenticating party random number; Certified side's random number can be a binary data, is produced when each certification by certified side; The data length of certified side's random number generally can not be less than 4 bytes, and the certified side's random number produced when certified side needs to ensure each certification is random, there will not be continuous several times certification to use the situation of identical certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm; The data length of described certified side input data requires to be not less than 32 bytes, and when carrying out authentication to avoid different times, certified side's input Data duplication rate of generation is too high;
Described first algorithm is a kind of algorithm multiple data being pieced together data, such as, described first algorithm can be directly form new data (namely generating certified side input data) end to end for the byte stream of three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data), can also be mutual for three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data) XOR is obtained new data (namely generating certified side input data).Except above-mentioned two kinds of modes, can also be, using after any two the data XORs in three data (authentication authorization and accounting side's random number, certified side's random number and identity marks data) as DES secret key encryption the 3rd data, obtain certified side input data, therefore, described first algorithm is a kind of algorithm of broad sense, as long as the algorithm that three data can be pieced together data is all feasible, the mode of how split can customize.
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
When described hash algorithm can select the Hash class algorithms such as SHA-1/SHA-256, this type of algorithm, by the accreditation of PCI PTS certification, possesses the security requirement that financial industry uses.Because hash algorithm possesses irreversible property and avalanche effect characteristic, irreversible property refers to that the data calculated by hash algorithm cannot push over out former data in direction; Even if avalanche effect characteristic refers to its data calculated of little amendment that a bit only occurs former data and also has great difference, therefore, the rule that this characteristic can increase through the data calculated guesses the difficulty of separating former data;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data; The object certified side's secure data being converted to certified side's verify data is the data length reducing certified side's verify data, improves transfer efficiency during certification, and increases the complexity of certified side's verify data, improves the difficulty of attacking.The length of certified side's verify data is generally not less than 8 bytes and is not more than 32 bytes;
Described second algorithm is a kind of algorithm data shortened, such as, described second algorithm can be do mutual XOR after data half-and-half being split, data are made to be only the half of original length, described second algorithm can also be do mutual encryption with DES after Data Division is become two sections, or does the computings such as CRC check after Data Division is become two sections, therefore, described second algorithm comprises all operational methods that data can be shortened, and the object that data shortened is transfer efficiency when improving certification;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described non-reversible algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through, if not identical, then certified side's authentication failure.
Described identity identifying method can also be two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described non-reversible algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described non-reversible algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
It should be noted that, in step 80-step 110, occur that " new " is as attribute, object is that distinguishing the data produced when initiating certification by authenticating party is different from the data produced when initiating certification by certified side.
The present invention can also set certified party name, and each certified party name is unique identification, and therefore, in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side; Before performing described step 60, first authenticating party looks for according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.Authenticating party fast finding can be realized like this to should the identity marks data of certified side.
The rule that the present invention utilizes the irreversible property of non-reversible algorithm and avalanche effect characteristic greatly to increase the data by calculating guesses the difficulty of separating former data.Therefore, utilize non-reversible algorithm to realize the conversion of identity marks data to verify data, utilize preventing assailant intercept in ability that verify data attacks identity marks data stronger than symmetric encipherment algorithm.And the hardware requirement performing hash algorithm is lower than rivest, shamir, adelman, and substantially now common flush bonding processor can both support the quick operation of hash algorithm, make major part payment product can both provide the identity authentication function of high security.
Although the foregoing describe the specific embodiment of the present invention; but be familiar with those skilled in the art to be to be understood that; specific embodiment described by us is illustrative; instead of for the restriction to scope of the present invention; those of ordinary skill in the art, in the modification of the equivalence done according to spirit of the present invention and change, should be encompassed in scope that claim of the present invention protects.
Claims (3)
1. be applicable to the identity identifying method paying product, it is characterized in that, each certified side holds identity marks data different from other certified sides, and underground, and authenticating party holds the identity marks data of each certified side; Described identity identifying method is specially:
First step 10, authenticating party produce an authenticating party random number, and give certified side by this authenticating party random number pass; After certified side receives authenticating party random number, produce certified side's random number;
Step 20, certified side piece together certified side's input data by authenticating party random number, certified side's random number and the identity marks data of himself by one first algorithm;
Step 30, described certified side's input data are by obtaining certified side's secure data after hash algorithm computing;
Step 40, described certified side's secure data are shortened by one second algorithm, obtain certified side's verify data;
Step 50, certified side by described certified side's verify data and certified side's random number pass to authenticating party;
Identity marks data corresponding to step 60, authenticating party authenticating party random number, certified side's random number and this certified side piece together authenticating party input data by described first algorithm; Then, described authenticating party input data obtain an authenticating party secure data by described hash algorithm; Finally, described authenticating party secure data is shortened by described second algorithm, obtains authenticating party verify data;
Step 70, authenticating party comparison authenticating party verify data and the certified side's verify data received, if identical, then the authentication of certified side is passed through.
2. a kind of identity identifying method being applicable to payment product according to claim 1, is characterized in that: described identity identifying method is two-way authentication, is specially, and passes through also to comprise afterwards in the authentication of the certified side of described step 70:
Step 80, first produce new certified side's random number by certified side, and by this certified side's random number pass to authenticating party; After authenticating party receives certified side's random number, produce a new authenticating party random number;
Identity marks data corresponding to step 90, authenticating party authenticating party random number, authenticating party random number and this certified side piece together new authenticating party input data by described first algorithm; By described new authenticating party input data by obtaining a new authenticating party secure data after described hash algorithm computing; Described new authenticating party secure data is shortened by described second algorithm, obtains a new authenticating party verify data;
Described new authenticating party verify data and authenticating party random number pass are given certified side by step 100, authenticating party; Certified side pieces together new certified side's input data by the identity marks data that new authenticating party random number, new certified side's random number and certified side hold self by described first algorithm; Then, described certified side's input data newly obtain new certified side's secure data by described hash algorithm; Finally, described certified side's secure data is newly shortened by described second algorithm, obtains new authenticating party verify data;
Certified side's verify data that step 110, certified side's comparison are new and the new authenticating party verify data received, if identical, then the authentication of authenticating party is passed through; By two-way authentication, further enhance the security of authentication.
3. a kind of identity identifying method being applicable to payment product according to claim 1, it is characterized in that, described certified side is set with certified party name, each certified party name is unique identification, in described step 50, described certified side's verify data, certified side's random number and certified party name are passed to authenticating party by certified side;
Before performing described step 60, first authenticating party finds according to certified party name the identity marks data that party name certified with this is corresponding, and then performs described step 60.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410532473.6A CN104408623A (en) | 2014-10-11 | 2014-10-11 | Identity authentication method suitable for product payment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410532473.6A CN104408623A (en) | 2014-10-11 | 2014-10-11 | Identity authentication method suitable for product payment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104408623A true CN104408623A (en) | 2015-03-11 |
Family
ID=52646252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410532473.6A Pending CN104408623A (en) | 2014-10-11 | 2014-10-11 | Identity authentication method suitable for product payment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104408623A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105825383A (en) * | 2016-03-18 | 2016-08-03 | 桂林电子科技大学 | Random number generation and verification method with both sides in participation |
CN106850193A (en) * | 2017-03-23 | 2017-06-13 | 中国人民公安大学 | A kind of cloud storage persistent data detection method based on MD5 and key |
CN107615797A (en) * | 2015-05-25 | 2018-01-19 | 邵通 | A kind of device, method and system of hiding subscriber identity data |
CN108599932A (en) * | 2018-04-10 | 2018-09-28 | 国网山东省电力公司博兴县供电公司 | A kind of identity identifying method for electric system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102509128A (en) * | 2011-09-30 | 2012-06-20 | 江苏科技大学 | Security authentication method of radio-frequency identification system |
CN102510335A (en) * | 2011-11-10 | 2012-06-20 | 西北工业大学 | RFID (Radio Frequency Identification Device) mutual authentication method based on Hash |
CN102576394A (en) * | 2009-05-20 | 2012-07-11 | 罗尔夫·延奇 | Unique identifier, method for providing said unique identifier and use of said unique identifier |
US20130097427A1 (en) * | 2011-10-12 | 2013-04-18 | Goldkey Security Corporation | Soft-Token Authentication System |
US8726021B2 (en) * | 2008-12-19 | 2014-05-13 | University Of Washington | Scalable RFID systems: a privacy-preserving protocol with constant-time identification |
-
2014
- 2014-10-11 CN CN201410532473.6A patent/CN104408623A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8726021B2 (en) * | 2008-12-19 | 2014-05-13 | University Of Washington | Scalable RFID systems: a privacy-preserving protocol with constant-time identification |
CN102576394A (en) * | 2009-05-20 | 2012-07-11 | 罗尔夫·延奇 | Unique identifier, method for providing said unique identifier and use of said unique identifier |
CN102509128A (en) * | 2011-09-30 | 2012-06-20 | 江苏科技大学 | Security authentication method of radio-frequency identification system |
US20130097427A1 (en) * | 2011-10-12 | 2013-04-18 | Goldkey Security Corporation | Soft-Token Authentication System |
CN102437910A (en) * | 2011-10-18 | 2012-05-02 | 国家超级计算深圳中心(深圳云计算中心) | Data encryption/decryption checking method and system |
CN102510335A (en) * | 2011-11-10 | 2012-06-20 | 西北工业大学 | RFID (Radio Frequency Identification Device) mutual authentication method based on Hash |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107615797A (en) * | 2015-05-25 | 2018-01-19 | 邵通 | A kind of device, method and system of hiding subscriber identity data |
CN105825383A (en) * | 2016-03-18 | 2016-08-03 | 桂林电子科技大学 | Random number generation and verification method with both sides in participation |
CN106850193A (en) * | 2017-03-23 | 2017-06-13 | 中国人民公安大学 | A kind of cloud storage persistent data detection method based on MD5 and key |
CN108599932A (en) * | 2018-04-10 | 2018-09-28 | 国网山东省电力公司博兴县供电公司 | A kind of identity identifying method for electric system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101478548B (en) | Data transmission ciphering and integrity checking method | |
Xin | A mixed encryption algorithm used in internet of things security transmission system | |
US20130073850A1 (en) | Hybrid encryption schemes | |
CN103684794A (en) | Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms | |
CN105447407A (en) | Off-line data encryption method and decryption method and corresponding apparatus and system | |
CN104023013A (en) | Data transmission method, server side and client | |
CN102946602A (en) | Mobile information system based privacy protection and encryption method | |
CN102780698A (en) | User terminal safety communication method in platform of Internet of Things | |
CN102387152A (en) | Preset-key-based symmetric encryption communication method | |
US11870891B2 (en) | Certificateless public key encryption using pairings | |
CN107770127A (en) | The transmission method and device of a kind of data | |
CN101931536B (en) | Method for encrypting and authenticating efficient data without authentication center | |
CN103986583A (en) | Dynamic encryption method and encryption communication system thereof | |
CN107094108A (en) | The method for being connected to the part of data/address bus and encryption function being realized in the part | |
CN103905183B (en) | Method for improving safety of communication transmission of embedded encryption chip | |
CN107534558B (en) | Method for protecting the information security of data transmitted via a data bus and data bus system | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
WO2020164252A1 (en) | Identity-based identity hiding key agreement method based on bilinear paring | |
CN104408623A (en) | Identity authentication method suitable for product payment | |
CN109104278A (en) | A kind of encrypting and decrypting method | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
CN101931535A (en) | Method for adaptively performing data encryption and authentication without authentication center | |
CN109587149A (en) | A kind of safety communicating method and device of data | |
Dung | A method for constructing public-key block cipher schemes based on elliptic curves |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150311 |