CN105025007A - A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers - Google Patents
A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers Download PDFInfo
- Publication number
- CN105025007A CN105025007A CN201510312418.0A CN201510312418A CN105025007A CN 105025007 A CN105025007 A CN 105025007A CN 201510312418 A CN201510312418 A CN 201510312418A CN 105025007 A CN105025007 A CN 105025007A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- application
- server
- cpk
- secure communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006854 communication Effects 0.000 title claims abstract description 45
- 238000004891 communication Methods 0.000 title claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 7
- 239000011159 matrix material Substances 0.000 claims description 6
- 238000001629 sign test Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 13
- 238000007726 management method Methods 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 238000013517 stratification Methods 0.000 description 3
- 238000009825 accumulation Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510312418.0A CN105025007A (en) | 2015-06-09 | 2015-06-09 | A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510312418.0A CN105025007A (en) | 2015-06-09 | 2015-06-09 | A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105025007A true CN105025007A (en) | 2015-11-04 |
Family
ID=54414712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510312418.0A Pending CN105025007A (en) | 2015-06-09 | 2015-06-09 | A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025007A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105282179A (en) * | 2015-11-27 | 2016-01-27 | 中国电子科技集团公司第五十四研究所 | Family Internet of things security control method based on CPK |
CN106713236A (en) * | 2015-11-17 | 2017-05-24 | 成都腾甲数据服务有限公司 | End-to-end identity authentication and encryption method based on CPK identifier authentication |
CN108012268A (en) * | 2017-12-08 | 2018-05-08 | 北京虎符信息技术有限公司 | A kind of mobile phone terminal SIM card and the method for safe handling App, medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859091A (en) * | 2006-06-06 | 2006-11-08 | 南相浩 | Credible link safety verifying system and method based on CPK |
US20090097657A1 (en) * | 2007-10-05 | 2009-04-16 | Scheidt Edward M | Constructive Channel Key |
CN101150399B (en) * | 2007-10-12 | 2011-01-19 | 四川长虹电器股份有限公司 | Generation method for share secret key |
CN103618607A (en) * | 2013-11-29 | 2014-03-05 | 北京易国信科技发展有限公司 | Method for data security transmission and key exchange |
-
2015
- 2015-06-09 CN CN201510312418.0A patent/CN105025007A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859091A (en) * | 2006-06-06 | 2006-11-08 | 南相浩 | Credible link safety verifying system and method based on CPK |
US20090097657A1 (en) * | 2007-10-05 | 2009-04-16 | Scheidt Edward M | Constructive Channel Key |
CN101150399B (en) * | 2007-10-12 | 2011-01-19 | 四川长虹电器股份有限公司 | Generation method for share secret key |
CN103618607A (en) * | 2013-11-29 | 2014-03-05 | 北京易国信科技发展有限公司 | Method for data security transmission and key exchange |
Non-Patent Citations (1)
Title |
---|
许照慧等: "基于CPK的终端软件安全管理系统的研究", 《计算机工程与设计》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106713236A (en) * | 2015-11-17 | 2017-05-24 | 成都腾甲数据服务有限公司 | End-to-end identity authentication and encryption method based on CPK identifier authentication |
CN105282179A (en) * | 2015-11-27 | 2016-01-27 | 中国电子科技集团公司第五十四研究所 | Family Internet of things security control method based on CPK |
CN105282179B (en) * | 2015-11-27 | 2018-12-25 | 中国电子科技集团公司第五十四研究所 | A method of family's Internet of Things security control based on CPK |
CN108012268A (en) * | 2017-12-08 | 2018-05-08 | 北京虎符信息技术有限公司 | A kind of mobile phone terminal SIM card and the method for safe handling App, medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101039182B (en) | Authentication system and method for issuing user identification certificate | |
Fan et al. | TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability | |
CN113556363B (en) | Data sharing method and system based on decentralized and distributed proxy re-encryption | |
Song et al. | Efficient Attribute‐Based Encryption with Privacy‐Preserving Key Generation and Its Application in Industrial Cloud | |
CN102088349B (en) | Personalized method and system of intelligent card | |
AU2006205987A1 (en) | Identifier-based private key generating method and device | |
CN107733654B (en) | Intelligent equipment firmware updating and official user certificate distribution method based on combined key | |
CN103618728A (en) | Attribute-based encryption method for multiple authority centers | |
CN112966022B (en) | Information query method, device and system of data transaction platform | |
CN113708917B (en) | APP user data access control system and method based on attribute encryption | |
Balamurugan et al. | Extensive survey on usage of attribute based encryption in cloud | |
Saxena et al. | Hybrid cloud computing for data security system | |
CN114244502A (en) | Signature key generation method and device based on SM9 algorithm and computer equipment | |
CN105025007A (en) | A secure communication mode based on a CPK and applied between handset applications and between the handset applications and servers | |
CN116644479A (en) | A tamper-proof electronic contract signing method based on blockchain technology | |
Li et al. | A privacy-preserving lightweight energy data sharing scheme based on blockchain for smart grid | |
EP4008086A1 (en) | System and method of cryptographic key management in a plurality of blockchain based computer networks | |
CN103490890A (en) | Combination public key authentication password method based on conic curves | |
CN116707969A (en) | Ciphertext attribute-based proxy re-encryption method and computer-readable storage medium containing the program | |
Jahan et al. | Method for providing secure and private fine-grained access to outsourced data | |
Ramesh et al. | Comparative analysis of applications of identity-based cryptosystem in IoT | |
Ding et al. | Secure Multi‐Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks | |
Silambarasan et al. | Attribute-based convergent encryption key management for secure deduplication in cloud | |
Bai | Comparative research on two kinds of certification systems of the public key infrastructure (PKI) and the identity based encryption (IBE) | |
Zhang et al. | Enabling efficient decentralized and privacy preserving data sharing in mobile cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Zhang Li Inventor after: Zong Xu Inventor after: Wang Yilei Inventor after: Ma Hong Inventor after: Shi Xiaobin Inventor after: Tang Lei Inventor before: Zong Xu Inventor before: Wang Yilei Inventor before: Shi Xiaobin Inventor before: Tang Lei |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170322 Address after: Kewei road Shenzhen city Guangdong province 518000 Nanshan District science and Technology Park No. 4 Room 102 Applicant after: Zhang Li Address before: 215000 Jiangsu, Suzhou high tech Zone, Chuk Yuen Road, No. 209 A5019 Applicant before: Wang Yilei |
|
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170517 Address after: Room 998, No. 5 building 401A Hangzhou city 311100 Zhejiang District of Yuhang province Wuchang Street West Applicant after: Hangzhou flash Mdt InfoTech Ltd Address before: Kewei road Shenzhen city Guangdong province 518000 Nanshan District science and Technology Park No. 4 Room 102 Applicant before: Zhang Li |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151104 |