CN104618093A - Data encrypting method and device - Google Patents

Data encrypting method and device Download PDF

Info

Publication number
CN104618093A
CN104618093A CN201510024467.4A CN201510024467A CN104618093A CN 104618093 A CN104618093 A CN 104618093A CN 201510024467 A CN201510024467 A CN 201510024467A CN 104618093 A CN104618093 A CN 104618093A
Authority
CN
China
Prior art keywords
data
dispersion factor
master key
key
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510024467.4A
Other languages
Chinese (zh)
Other versions
CN104618093B (en
Inventor
冯岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gosuncn Iot Technology Co ltd
Original Assignee
SHENZHEN ZTEWELINK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ZTEWELINK TECHNOLOGY Co Ltd filed Critical SHENZHEN ZTEWELINK TECHNOLOGY Co Ltd
Priority to CN201510024467.4A priority Critical patent/CN104618093B/en
Publication of CN104618093A publication Critical patent/CN104618093A/en
Application granted granted Critical
Publication of CN104618093B publication Critical patent/CN104618093B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses data encrypting method and device. The method comprises the steps of presetting at least two groups of keys; selecting one group of the preset keys as the main keys encrypting the data according to the main keys and the 3DES encryption algorithm. According to the method, a plurality of groups of keys are preset, one group is selected as the main key during each encrypting, and therefore, different keys are used in different encryption and difficultly broken by other people, and as a result, the safety security can be improved; in addition, scattering factors Kc (session key) can be generated according to the main key and used as the encrypting key for 3DES encrypting of the data, thus the difficulty of other people at breaking is increased, and as a result, the data security is further improved.

Description

Data ciphering method and device
Technical field
The present invention relates to communication technical field, especially relate to a kind of data ciphering method and device.
Background technology
In traditional 2G/3G module application, module data generally all adopts clear-text way.But along with developing rapidly of Internet of Things, module application is more and more extensive, and security request data is also more and more important, therefore starts to adopt cipher mode to guarantee data security.
In prior art, two kinds of modes are mainly contained to the data encryption in Internet of Things communication.A kind of cipher mode is encrypted passage, there is provided escape way, SSH can provide safe socket passage, and the data based on SSH can carry out transparent transmission, but this cipher mode underaction, can not design specific safety encipher mode for specific application scenario.
Another kind of cipher mode is encrypted upper layer data, can design suitable secure cryptographic algorithm flexibly, be therefore widely applied according to various application.Main application 3DES cryptographic algorithm at present, 3DES (or being called Triple DES) is the common name of triple DEA (TDEA, Triple Data EncryptionAlgorithm) block encryption.It is the equal of apply three des encryption algorithms to each data block.Due to the enhancing of Computing ability, the key length of master DES password becomes easily by Brute Force; Namely 3DES is that design is used to provide the relatively simple method of one, and the key length namely by increasing DES avoids similar attack.But existing 3DES cipher mode, the key of use is unique, fixing, and have by the risk that other people crack, the fail safe of data is not high.
Summary of the invention
Main purpose of the present invention is to provide a kind of data ciphering method and device, is intended to improve Information Security.
To achieve these objectives, the present invention proposes a kind of data ciphering method, comprises step:
Preset at least two group keys;
One group is chosen as master key from the key preset;
According to described master key and 3DES cryptographic algorithm, data are encrypted.
Preferably, choose one group the described key from presetting to comprise as master key:
Generate a random number, from the key preset, choose one group as master key according to described random number and preset algorithm.
Preferably, the every group key preset has a call number, and described preset algorithm is: N=< (n & 0x07) %5>, wherein N is cipher key index number, and n is random number.
Preferably, described being encrypted data according to described master key and 3DES cryptographic algorithm comprises:
Dispersion factor Kc is generated according to described master key, random number and terminal exclusive identification code;
Described dispersion factor Kc and 3DES cryptographic algorithm is utilized to be encrypted data.
Preferably, describedly generate dispersion factor Kc according to described master key, random number and terminal exclusive identification code and comprise:
A, obtain dispersion factor 1 according to described terminal exclusive identification code, obtain dispersion factor 2 according to described random number;
B, using described dispersion factor 1 as source data, carry out 3des-ecb calculating with described master key, obtain data k1;
C, using the result that obtains after described dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with described master key, obtain data k2;
D, utilize described dispersion factor 2 to replace described dispersion factor 1, utilize k1+k2 to replace described master key, repeat step b and c, obtain K1 and K2, definition dispersion factor Kc=k1+k2.
The present invention proposes a kind of data encryption device simultaneously, comprises arranging module, choosing module and encrypting module, wherein:
Module is set, for presetting at least two group keys;
Choose module, for choosing one group as master key from the key preset;
Encrypting module, for being encrypted data according to described master key and 3DES cryptographic algorithm.
Preferably, choose described in module for: generate a random number, from the key preset, choose one group as master key according to described random number and preset algorithm.
Preferably, described arrange module for: for preset every group key work out a call number; Described preset algorithm is: N=< (n & 0x07) %5>, wherein N is cipher key index number, and n is random number.
Preferably, described encrypting module is used for:
Dispersion factor Kc is generated according to described master key, random number and terminal exclusive identification code;
Described dispersion factor Kc and 3DES cryptographic algorithm is utilized to be encrypted data.
Preferably, described encrypting module generates described dispersion factor Kc by following steps:
A, obtain dispersion factor 1 according to described terminal exclusive identification code, obtain dispersion factor 2 according to described random number;
B, using described dispersion factor 1 as source data, carry out 3des-ecb calculating with described master key, obtain data k1;
C, using the result that obtains after described dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with described master key, obtain data k2;
D, utilize described dispersion factor 2 to replace described dispersion factor 1, utilize k1+k2 to replace described master key, repeat step b and c, obtain K1 and K2, define described dispersion factor Kc=K1+K2.
A kind of data ciphering method provided by the present invention, by presetting many group keys, from many group keys, choose one group as master key during each encryption, the key used when making at every turn to encrypt all is not quite similar, therefore be not easy to be cracked by other people, improve the fail safe of data.
Further, generate dispersion factor Kc (session key) according to master key, recycling dispersion factor Kc carries out 3DES encryption as encryption key to data, is more difficultly cracked by other people, further increases the fail safe of data.
Accompanying drawing explanation
Fig. 1 is the flow chart of data ciphering method first embodiment of the present invention;
Fig. 2 is the flow chart of data ciphering method second embodiment of the present invention;
Fig. 3 is the flow chart generating dispersion factor Kc mono-example in the embodiment of the present invention;
Fig. 4 is the flow chart to data deciphering in the embodiment of the present invention;
Fig. 5 is the module diagram of data encryption device one embodiment of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Data ciphering method of the present invention, by presetting at least two group keys, then from the key preset, one group is chosen as master key, finally according to master key and 3DES cryptographic algorithm, data are encrypted, comprise and directly utilize master key to carry out 3DES encryption to data, or generate dispersion factor Kc according to master key, recycling dispersion factor Kc carries out 3DES encryption to data.Be described in detail below by way of specific embodiment.
See Fig. 1, propose data ciphering method first embodiment of the present invention, described data ciphering method comprises the following steps:
Step S10: preset many group keys
In the present embodiment, in terminal and server, need pre-buried many group keys, or at least two group keys, The more the better in principle, the present embodiment is pre-buried 5 group keys preferably.
Step S11: choose one group as master key from many group keys
Before data are encrypted, from pre-buried many group keys, first select one group as the master key of encryption.When selecting master key, can Stochastic choice, also can select according to preset rules or preset algorithm.
Step S12: utilize master key and 3DES cryptographic algorithm to be encrypted data
After have selected master key, then utilize this master key to carry out 3DES encryption to data, concrete cipher mode is encrypted identical with the 3DES of prior art, is not repeated herein.
Encrypt principle according to 3DES, before data are encrypted, must ensure that data length to be encrypted is the integral multiple of 8, if the multiple less than 8, then need to fill this be-encrypted data, as mended " 20 " after be-encrypted data, until add to the integral multiple of 8.Such as, suppose that be-encrypted data is one group of 16 binary data: { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39}, become after it is filled: { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39,0x20,0x20,0x20,0x20,0x20,0x20,0x20}.
The data ciphering method of the present embodiment, owing to having preset many group keys, the key used during each encryption has all been not quite similar, and is therefore not easy to be cracked by other people, improves the fail safe of data.
See Fig. 2, propose DEA second embodiment of the present invention, described DEA comprises the following steps:
Step S20: preset many group keys
In the present embodiment, each terminal has an exclusive identification code, needs pre-buried many group keys in terminal and server, or at least two group keys, and The more the better in principle, the present embodiment is pre-buried 5 group keys preferably, such as set key group as:
{0xd1,0x21,0xf0,0x1c,0x2d,0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f,0x7b,0x1e,0x6f,0x62,
0x11,0xA2,0xB1,0x1C,0x2D,0xD6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B,0x1C,0x6A,0x32,
0x21,0x21,0xF0,0x1C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x54,0x9F,0x7B,0x11,0x6F,0x66,
0xA1,0x21,0xF0,0x1C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B,0x1E,0x6B,0x42,
0xB1,0x21,0xF0,0x2C,0x2D,0xB6,0x30,0xA2,0x33,0x81,0x24,0x9F,0x7B,0x1E,0x6A,0xF3};
Meanwhile, the present embodiment is also numbered, for each key works out a call number the key generated.Such as, 5 group keys manipulative indexing 1-5 respectively.
Step S21: generate a random number
When needs are encrypted data, first generate a random number.
Step S22: choose one group as master key from many group keys according to random number and preset algorithm
In the present embodiment, preset algorithm is preferably expression formula N=< (n & 0x07) %5>, and wherein N is cipher key index number, and n is random number.Suppose that random number is 25, then can obtain cipher key index N=< (25 & 0x07) %5>=1 according to preset algorithm, namely Selecting Index number is that the key of 1 is as master key.
It will be understood by those skilled in the art that described preset algorithm is not limited to this, can set arbitrarily as required.Such as, random number can also be defined as any one in cipher key index number, when the some random numbers of generation, then namely the key that this random number is corresponding elects master key as, and the random number as generated is 3, then Selecting Index number is the key of 3.
Step S23: generate dispersion factor Kc according to master key, random number and terminal exclusive identification code
Step S24: utilize dispersion factor Kc and 3DES cryptographic algorithm to be encrypted data
The present embodiment generates dispersion factor Kc (session key) according to master key, and recycling dispersion factor Kc carries out 3DES encryption as encryption key to data, is therefore more difficultly cracked by other people, further increases the fail safe of data.
Wherein, as shown in Figure 3, for step S23, dispersion factor Kc can be generated preferably by with under type:
Step S231: obtain dispersion factor 1 according to terminal exclusive identification code, obtains dispersion factor 2 according to random number
Wherein, when terminal exclusive identification code (or claiming terminal number) and random number are less than 8 bytes, " 20 " need be filled below and supply 8 bytes as dispersion factor 1 and dispersion factor 2.
Suppose that terminal exclusive identification code is 0x0001020304, then dispersion factor 1 is 0x0001020304202020; Random number is 0x12345678, then dispersion factor 2 is 0x1234567820202020.
In certain embodiments, also conversely, dispersion factor 1 can be obtained according to random number, obtain dispersion factor 2 according to terminal exclusive identification code.
Step S232: using dispersion factor 1 as source data, carries out 3des-ecb calculating with master key, obtains data k1
Such as, suppose that dispersion factor 1 is for 0x001020304202020, master key is 0xd1,0x21,0xf0,0x1c, 0x2d, 0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f, 0x7b, 0x1e, 0x6f, 0x62, carries out 3des-ecb calculating by dispersion factor and master key, obtains data k1=0xb96a353f973a160a.
Step S233: using the result that obtains after dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with master key, obtain data k2
Such as, suppose that dispersion factor 1 is for 0x0001020304, carry out XOR ^0xFF, the result obtained is as source data and master key 0xd1,0x21,0xf0,0x1c, 0x2d, 0xb6,0x30,0xa2,0x33,0x81,0x24,0x9f, 0x7b, 0x1e, 0x6f, 0x62 carry out 3des-ecb calculating, obtain data k2=0x870ab659763d2d8b.
Step S234: using dispersion factor 2 as source data, carries out 3des-ecb calculating with (k1+k2), obtains data K1.Be 0x2123ad971821f2a4 as obtained K1 in the present embodiment.
Step S235: using the result that obtains after dispersion factor 2 carries out XOR as source data, carry out 3des-ecb calculating with (k1+k2), obtain data K2.If the K2 in the present embodiment is 0xd52991bea64dd60c.
Step S234 and S235 and step S232 and S233, to similar, only need utilize dispersion factor 2 to replace dispersion factor 1, utilizes (k1+k2) to replace master key, repeats step S232 and S233, do not repeat them here.
Step S236: obtain dispersion factor Kc=K1+K2
Finally, by (K1+K2) as dispersion factor Kc, dispersion factor Kc is utilized to carry out 3DES encryption to data.
It will be understood by those skilled in the art that the mode generating dispersion factor Kc is not limited to this, can also be other general generating mode.
To the deciphering flow process of aforementioned enciphered data as shown in Figure 4, comprise the following steps:
Step S30: parse random number expressly and terminal exclusive identification code from enciphered data
Step S31: obtain master key according to random number and preset algorithm
Step S32: generate dispersion factor Kc according to master key, random number and terminal exclusive identification code
Step S31 and S32 are identical with S23 with step S22 during encryption respectively, are not repeated herein.
Step S33: utilize dispersion factor Kc to be decrypted enciphered data
Finally utilize dispersion factor Kc as key pair encryption decrypt data, concrete manner of decryption is deciphered identical with the 3DES of prior art, is not repeated herein.If have unnecessary filling " 20 " in the data after deciphering, also need to remove " 20 ".
In the present embodiment, to data be encrypted for terminal, be terminal or server to decrypt data.
See Fig. 5, propose encryption device one embodiment of the present invention, described encryption device can be terminal, or is applied to the module product of terminal.Described encryption device comprises and arranges module, chooses module and encrypting module.
Module is set: for presetting at least two group keys.
Arrange module two or more sets keys pre-buried in the terminal, The more the better in principle, the present embodiment is pre-buried 5 group keys preferably.Preferably, arrange module to be numbered, for each key works out a call number the key generated.Such as, 5 group keys manipulative indexing 1-5 respectively.
Choose module: for choosing one group as master key from the key preset.
Before data are encrypted, first have choose module select from pre-buried many group keys one group as encryption master key.When selecting master key, can Stochastic choice, also can select according to preset rules or preset algorithm.
Preferably, choose module and first generate a random number, then from many group keys, choose one group as master key according to random number and preset algorithm.Described preset algorithm is preferably expression formula N=< (n & 0x07) %5>, and wherein N is cipher key index number, and n is random number.
It will be understood by those skilled in the art that described preset algorithm is not limited to this, can set arbitrarily as required.Such as, random number can also be defined as any one in cipher key index number, when the some random numbers of generation, then namely the key that this random number is corresponding elects master key as, and the random number as generated is 3, then Selecting Index number is the key of 3.
Encrypting module: for being encrypted data according to master key and 3DES cryptographic algorithm.
In certain embodiments, after have selected master key, encrypting module can directly utilize master key to carry out 3DES encryption to data, and concrete cipher mode is encrypted identical with the 3DES of prior art, is not repeated herein.
Encrypt principle according to 3DES, before data are encrypted, must ensure that data length to be encrypted is the integral multiple of 8, if the multiple less than 8, encrypting module then needs to fill this be-encrypted data, as mended " 20 " after be-encrypted data, until add to the integral multiple of 8.Such as, suppose that be-encrypted data is: { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38,0x39}, becomes after filling: { 0x31,0x32,0x33,0x34,0x35,0x36,0x37,0x38 to it, 0x39,0x20,0x20,0x20,0x20,0x20,0x20,0x20}.
Thus by presetting many group keys, the key used when making to encrypt all is not quite similar, and is therefore not easy to be cracked by other people, improves the fail safe of data at every turn.
In a preferred embodiment, encrypting module generates dispersion factor Kc according to master key, random number and terminal exclusive identification code, and recycling dispersion factor Kc carries out 3DES encryption to data.
Concrete, encrypting module obtains dispersion factor 1 according to terminal exclusive identification code, obtains dispersion factor 2 according to random number; Using dispersion factor 1 as source data, carry out 3des-ecb calculating with master key, obtain data k1; Using the result that obtains after dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with master key, obtain data k2; Using dispersion factor 2 as source data, carry out 3des-ecb calculating with (k1+k2), obtain data K1; Using the result that obtains after dispersion factor 2 carries out XOR as source data, carry out 3des-ecb calculating with (k1+k2), obtain data K2; Finally obtain dispersion factor Kc=K1+K2.
Thus the present embodiment generates dispersion factor Kc (session key) according to master key, recycling dispersion factor Kc carries out 3DES encryption as encryption key to data, is therefore more difficultly cracked by other people, further increases the fail safe of data.
It should be noted that: the data encryption device that above-described embodiment provides, when enciphered data, is only illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules.In addition, the data encryption device that above-described embodiment provides and data ciphering method embodiment belong to same design, and its specific implementation process refers to embodiment of the method, and the technical characteristic in embodiment of the method is all corresponding applicable in device embodiment, repeats no more here.
One of ordinary skill in the art will appreciate that, realize the hardware that all or part of step in above-described embodiment method can control to be correlated with by program to complete, described program can be stored in a computer read/write memory medium, and described storage medium can be ROM/RAM, disk, CD etc.
Should be understood that; these are only the preferred embodiments of the present invention; can not therefore limit the scope of the claims of the present invention; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a data ciphering method, is characterized in that, comprises step:
Preset at least two group keys;
One group is chosen as master key from the key preset;
According to described master key and 3DES cryptographic algorithm, data are encrypted.
2. data ciphering method according to claim 1, is characterized in that, chooses one group and comprise as master key the described key from presetting:
Generate a random number, from the key preset, choose one group as master key according to described random number and preset algorithm.
3. data ciphering method according to claim 2, it is characterized in that, the every group key preset has a call number, described preset algorithm is: N=< (n & 0x07) %5>, wherein N is cipher key index number, and n is random number.
4. data ciphering method according to claim 2, is characterized in that, described being encrypted data according to described master key and 3DES cryptographic algorithm comprises:
Dispersion factor Kc is generated according to described master key, random number and terminal exclusive identification code;
Described dispersion factor Kc and 3DES cryptographic algorithm is utilized to be encrypted data.
5. data ciphering method according to claim 4, is characterized in that, describedly generates dispersion factor Kc according to described master key, random number and terminal exclusive identification code and comprises:
A, obtain dispersion factor 1 according to described terminal exclusive identification code, obtain dispersion factor 2 according to described random number;
B, using described dispersion factor 1 as source data, carry out 3des-ecb calculating with described master key, obtain data k1;
C, using the result that obtains after described dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with described master key, obtain data k2;
D, utilize described dispersion factor 2 to replace described dispersion factor 1, utilize k1+k2 to replace described master key, repeat step b and c, obtain K1 and K2, definition dispersion factor Kc=k1+k2.
6. a data encryption device, is characterized in that, comprises arranging module, choosing module and encrypting module, wherein:
Module is set, for presetting at least two group keys;
Choose module, for choosing one group as master key from the key preset;
Encrypting module, for being encrypted data according to described master key and 3DES cryptographic algorithm.
7. data encryption device according to claim 6, is characterized in that, described in choose module for: generate a random number, from the key preset, choose one group as master key according to described random number and preset algorithm.
8. data encryption device according to claim 7, is characterized in that, described arrange module for: for preset every group key work out a call number; Described preset algorithm is: N=< (n & 0x07) %5>, wherein N is cipher key index number, and n is random number.
9. data encryption device according to claim 7, is characterized in that, described encrypting module is used for:
Dispersion factor Kc is generated according to described master key, random number and terminal exclusive identification code;
Described dispersion factor Kc and 3DES cryptographic algorithm is utilized to be encrypted data.
10. data encryption device according to claim 9, is characterized in that, described encrypting module generates described dispersion factor Kc by following steps:
A, obtain dispersion factor 1 according to described terminal exclusive identification code, obtain dispersion factor 2 according to described random number;
B, using described dispersion factor 1 as source data, carry out 3des-ecb calculating with described master key, obtain data k1;
C, using the result that obtains after described dispersion factor 1 carries out XOR as source data, carry out 3des-ecb calculating with described master key, obtain data k2;
D, utilize described dispersion factor 2 to replace described dispersion factor 1, utilize k1+k2 to replace described master key, repeat step b and c, obtain K1 and K2, define described dispersion factor Kc=K1+K2.
CN201510024467.4A 2015-01-16 2015-01-16 Data ciphering method and device Active CN104618093B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510024467.4A CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510024467.4A CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Publications (2)

Publication Number Publication Date
CN104618093A true CN104618093A (en) 2015-05-13
CN104618093B CN104618093B (en) 2019-07-19

Family

ID=53152388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510024467.4A Active CN104618093B (en) 2015-01-16 2015-01-16 Data ciphering method and device

Country Status (1)

Country Link
CN (1) CN104618093B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228117A (en) * 2015-09-14 2016-01-06 深圳市优友互联有限公司 Based on low rate communication means and the device of user terminal
CN105245505A (en) * 2015-09-14 2016-01-13 深圳市优友互联有限公司 Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN105827661A (en) * 2016-05-31 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Method and device for secure communication
CN109040132A (en) * 2018-09-26 2018-12-18 南京南瑞继保电气有限公司 One kind being based on the randomly selected encryption communication method of shared key
CN110366183A (en) * 2019-08-02 2019-10-22 中国工商银行股份有限公司 Short message safety protecting method and device
CN111526016A (en) * 2020-04-26 2020-08-11 南方电网科学研究院有限责任公司 Parameter configuration method and device for cryptographic algorithm
CN111865561A (en) * 2020-06-28 2020-10-30 深圳市七星电气与智能化工程科技有限公司 Data encryption and decryption method and device and electronic equipment
CN114124350A (en) * 2021-11-11 2022-03-01 弥达斯科技(深圳)有限公司 Consensus algorithm for improving performance in network heterogeneous environment
CN114726544A (en) * 2022-04-18 2022-07-08 北京数字认证股份有限公司 Method and system for acquiring digital certificate

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212642A (en) * 2006-12-25 2008-07-02 北京握奇数据系统有限公司 Broadcast signal processing method, system, and receiver
CN103501220A (en) * 2013-09-29 2014-01-08 程碧波 Encryption method and device
CN103716157A (en) * 2013-12-13 2014-04-09 厦门市美亚柏科信息股份有限公司 Grouped multiple-key encryption method and grouped multiple-key encryption device
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101212642A (en) * 2006-12-25 2008-07-02 北京握奇数据系统有限公司 Broadcast signal processing method, system, and receiver
CN103501220A (en) * 2013-09-29 2014-01-08 程碧波 Encryption method and device
CN103716157A (en) * 2013-12-13 2014-04-09 厦门市美亚柏科信息股份有限公司 Grouped multiple-key encryption method and grouped multiple-key encryption device
CN104038336A (en) * 2014-06-20 2014-09-10 上海动联信息技术股份有限公司 Data encryption method based on 3DES

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245505A (en) * 2015-09-14 2016-01-13 深圳市优友互联有限公司 Data transmitting method and device, data receiving method and device, and receiving-transmitting system
CN105228117A (en) * 2015-09-14 2016-01-06 深圳市优友互联有限公司 Based on low rate communication means and the device of user terminal
CN105827661A (en) * 2016-05-31 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Method and device for secure communication
CN105827661B (en) * 2016-05-31 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Method and device for secure communication
CN109040132B (en) * 2018-09-26 2021-05-28 南京南瑞继保电气有限公司 Encryption communication method based on random selection of shared secret key
CN109040132A (en) * 2018-09-26 2018-12-18 南京南瑞继保电气有限公司 One kind being based on the randomly selected encryption communication method of shared key
CN110366183A (en) * 2019-08-02 2019-10-22 中国工商银行股份有限公司 Short message safety protecting method and device
CN111526016A (en) * 2020-04-26 2020-08-11 南方电网科学研究院有限责任公司 Parameter configuration method and device for cryptographic algorithm
CN111526016B (en) * 2020-04-26 2022-12-23 南方电网科学研究院有限责任公司 Parameter configuration method and device for cryptographic algorithm
CN111865561A (en) * 2020-06-28 2020-10-30 深圳市七星电气与智能化工程科技有限公司 Data encryption and decryption method and device and electronic equipment
CN111865561B (en) * 2020-06-28 2023-10-13 深圳市七星电气与智能化工程科技有限公司 Data encryption and decryption method and device and electronic equipment
CN114124350A (en) * 2021-11-11 2022-03-01 弥达斯科技(深圳)有限公司 Consensus algorithm for improving performance in network heterogeneous environment
CN114726544A (en) * 2022-04-18 2022-07-08 北京数字认证股份有限公司 Method and system for acquiring digital certificate
CN114726544B (en) * 2022-04-18 2024-02-09 北京数字认证股份有限公司 Method and system for acquiring digital certificate

Also Published As

Publication number Publication date
CN104618093B (en) 2019-07-19

Similar Documents

Publication Publication Date Title
CN104618093B (en) Data ciphering method and device
CN103366102B (en) For content transmission and the system for numeral copyright management of distribution
CN102377564B (en) Method and device for encrypting private key
CN103618607B (en) A kind of Security Data Transmission and key exchange method
CN102624522B (en) A kind of key encryption method based on file attribute
CN105260668A (en) File encryption method and electronic device
CN103580855B (en) Usbkey management method based on sharing technology
TWI809292B (en) Data encryption and decryption method, device, storage medium and encrypted file
CN109067522B (en) Random number verifiable secret sharing method
CN102710414B (en) Randomized document block encryption method
CN101043326B (en) Dynamic information encrypting system and method
CN103973736A (en) Data sharing method and device
CN105468940B (en) Method for protecting software and device
CN105406969A (en) Apparatus And Method For Data Encryption
CN103873233A (en) Digital film secret key distributing method, device and system based on management website
CN103841469A (en) Digital film copyright protection method and device
CN105637801A (en) Polymorphic encryption key matrices
CN102833075A (en) Identity authentication and digital signature method based on three-layered overlapping type key management technology
CN105024992A (en) Implementing use-dependent security settings in a single white-box implementation
CN106411515A (en) Method of using cipher machine to segment secret key so as to increase secret key safety and system thereof
CN105095695A (en) Realizing authorization via incorrect functional behavior of a white-box implementation
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN107707562A (en) A kind of method, apparatus of asymmetric dynamic token Encrypt and Decrypt algorithm
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
CB02 Change of applicant information

Address after: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant after: SHENZHEN ZTEWELINK TECHNOLOGY Co.,Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant before: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

COR Change of bibliographic data
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: MINDRAY building, 518000 Guangdong city of Shenzhen province Nanshan District Guangdong streets high-tech industrial park of science and technology 12 South Road 2 B zone C

Applicant after: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

Address before: A District No. 9018 Han innovation building in Nanshan District high tech Zone in Shenzhen city of Guangdong Province, North Central Avenue, 518000 Floor 9

Applicant before: SHENZHEN ZTEWELINK TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information

Address after: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Applicant after: Gaoxing Wulian Technology Co.,Ltd.

Address before: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Applicant before: Shenzhen Zhongxing Wulian Technology Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 518000 606, block a, sharing building, No. 78, Keyuan North Road, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: Gosuncn IOT Technology Co.,Ltd.

Address before: 518000 Guangdong, Shenzhen, Nanshan District, Guangdong Province, Nanshan District high tech Industrial Park, South Korea 12 road, MINDRAY Building 2 floor B area, zone 12

Patentee before: Gaoxing Wulian Technology Co.,Ltd.

CP03 Change of name, title or address