CN105227304A - Based on security privacy guard method and the system of ECC encryption - Google Patents

Based on security privacy guard method and the system of ECC encryption Download PDF

Info

Publication number
CN105227304A
CN105227304A CN201510675721.7A CN201510675721A CN105227304A CN 105227304 A CN105227304 A CN 105227304A CN 201510675721 A CN201510675721 A CN 201510675721A CN 105227304 A CN105227304 A CN 105227304A
Authority
CN
China
Prior art keywords
key
encryption
communication
access equipment
ustomer premises
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510675721.7A
Other languages
Chinese (zh)
Inventor
车光宁
张钊锋
庄健敏
封松林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Advanced Research Institute of CAS
Original Assignee
Shanghai Advanced Research Institute of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Advanced Research Institute of CAS filed Critical Shanghai Advanced Research Institute of CAS
Priority to CN201510675721.7A priority Critical patent/CN105227304A/en
Publication of CN105227304A publication Critical patent/CN105227304A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of security privacy guard method based on ECC encryption and system, the method comprises the steps: to carry out application for registration by ustomer premises access equipment to local side apparatus; Local side apparatus judges the relevance each other of key and the consistency of MAC Address, if be judged as legal, generate random authorization key, and is encrypted by public keys, and the authorization key after encryption and the message that succeeds in registration are sent to ustomer premises access equipment; Ustomer premises access equipment to be decrypted encrypted authorization key by unified public keys and to preserve, and to local side apparatus application communication key; Local side apparatus generates random communication key, and is encrypted communication key by the authorization key generated, and the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment; Ustomer premises access equipment is decrypted the encrypted communication key received, and then ustomer premises access equipment and local side apparatus carry out encryption and decryption by this communication key to interactive data communication.

Description

Based on security privacy guard method and the system of ECC encryption
Technical field
The present invention relates to the security privacy encryption technology based on ECC (EllipticCurvesCryptography, elliptic curve cipher is encoded), particularly relate to a kind of security privacy guard method based on ECC encryption and system.
Background technology
EOC is the abbreviation of coaxial Ethernet (EthernetOverCable), namely carries Ethernet and other multiple integrated services based on coaxial cable by various digital modulation technique.Due in national strategy to the active demand of the integration of three networks, and EOC is one of key technology of unification of three nets, and increasing chip and equipment vendors have put in the middle of the research and development main forces of EOC system.Although but various EOC system is each has something to recommend him in speed, anti-noise are anti-interference, still perfect not in communication security.
For the demand such as personal secrets of the different access device safety certifications under the access authentication of same equipment heterogeneous networks and consolidated network, subscriber equipment accessing Internet data, current EOC equipment encrypts by 56bitDES the safety encipher being upgraded to AES128bit substantially.But this encipherment scheme is owing to adopting fixing double secret key, is no matter that user encryption registration or secure communication afterwards are all easy to stolen hearer and capture and crack, thus causes the unsafe incidents such as privacy of user leaking data and the service of illegality equipment access network to occur.
Summary of the invention
For overcoming the deficiency that above-mentioned prior art exists; the object of the present invention is to provide a kind of security privacy guard method based on ECC encryption and system; it utilizes ECC (EllipticCurvesCryptography; elliptic curve cipher is encoded) public key cryptography; carry out dual safety certification for the authentication registration of access user and the secure communication in later stage, guarantee the secure communication between access network and equipment and data-privacy.
For reaching above-mentioned and other object, the present invention proposes a kind of security privacy guard method based on ECC encryption, comprises the steps:
Step one, carries out application for registration by ustomer premises access equipment to local side apparatus, provides manufacturer's key, public keys, device private and MAC Address expressly;
Step 2, this local side apparatus judges the relevance each other of key and the consistency of MAC Address, if be judged as illegal, then sends the feedback of refusal registration; If it is legal to be judged as, generates random authorization key, and be encrypted by public keys, then the authorization key after encryption is sent to this ustomer premises access equipment together with the message succeeded in registration;
Step 3, this ustomer premises access equipment receives after encryption after authorization key and the message that succeeds in registration, to be decrypted and to preserve, simultaneously to local side apparatus application communication key by unified public keys to encrypted authorization key;
Step 4, this local side apparatus generates random communication key after receiving communication key application, and is encrypted communication key by the authorization key generated, and then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment;
Step 5, this ustomer premises access equipment is decrypted the encrypted communication key received according to the authorization key preserved, and then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
Further, the method also comprises the steps:
Old authorization key and communication key expired before, this ustomer premises access equipment initiatively to the new mandate of this local side apparatus application and communication key, thus ensure that the dynamic encryption of communication.
Further, this manufacturer's key is private key given on elliptic curve, and this public keys encrypts generation by manufacturer's key through selected elliptic curve ECC.
Further, this device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption.
Further, this manufacturer's key and public keys are that all local side apparatus and ustomer premises access equipment are unified.
For achieving the above object, the present invention also provides a kind of security privacy protection system based on ECC encryption, comprising:
Register and authentication module, application for registration is carried out to local side apparatus by ustomer premises access equipment, manufacturer's key, public keys, device private and MAC Address are expressly provided, the relevance each other of key and the consistency of MAC Address is judged by this local side apparatus, if be judged as, non-rule sends refusal registration, if it is legal to be judged as, generates random authorization key, and be encrypted by public keys, the authorization key after encryption is sent to ustomer premises access equipment together with the message succeeded in registration;
Communication encryption module, to receive after encryption after authorization key and the message that succeeds in registration by this ustomer premises access equipment, by unified public keys encrypted authorization key be decrypted and preserve, simultaneously to local side apparatus application communication key, local side apparatus generates random communication key after receiving communication key application, and by the authorization key generated, communication key is encrypted, then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment, finally the encrypted communication key received is decrypted according to the authorization key preserved by ustomer premises access equipment, then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
Further, this system also comprises key updating module, old authorization key and communication key expired before, by this ustomer premises access equipment initiatively to the new mandate of local side apparatus application and communication key, thus ensure that the dynamic encryption of communication.
Further, this manufacturer's key is private key given on elliptic curve, this public keys encrypts generation by manufacturer's key through selected elliptic curve ECC, and this device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption.
Further, this key updating module upgrades as follows to authorization key:
This ustomer premises access equipment sends authorized application again at old authorization key inefficacy forward direction local side apparatus;
The authorization key that this local side apparatus public-key encryption is new, and send the authorization key after encryption;
The public keys deciphering of oneself of this ustomer premises access equipment adds overstocked authorization key and preserves.
Further, this key updating module upgrades as follows to communication key:
This ustomer premises access equipment sends new apply by letter at old communication key inefficacy forward direction local side apparatus;
This local side apparatus generates new communication key, and is encrypted communication key by up-to-date authorization key, then sends the communication key after encryption and application response;
The new authorization key deciphering of this ustomer premises access equipment adds overstocked communication key and preserves;
Local side and user side carry out the encryption and decryption of interactive communication by this new communication key.
Compared with prior art; the present invention is a kind of security privacy guard method based on ECC encryption and system; based on ECC elliptic curve cryptography technology; mutual safety certification between terminal equipment in EOC application and network service is improved; three level security strategies of register and authentication, communication encryption and key updating based on elliptic curve cryptography Technology design, ensure that the data security of network security and user.
Accompanying drawing explanation
Fig. 1 is the flow chart of steps of a kind of security privacy guard method based on ECC encryption of the present invention;
Fig. 2 is the system architecture diagram of a kind of security privacy protection system based on ECC encryption of the present invention;
Fig. 3 is the flow chart of the register and authentication flow process of register and authentication module in present pre-ferred embodiments;
Fig. 4 is the flow chart of the communication encryption process of communication encryption module in present pre-ferred embodiments;
Fig. 5 is the flow chart of the authorization key renewal process of key updating module in present pre-ferred embodiments;
Fig. 6 is the flow chart of the communication key renewal process of key updating module in present pre-ferred embodiments.
Embodiment
Below by way of specific instantiation and accompanying drawings embodiments of the present invention, those skilled in the art can understand other advantage of the present invention and effect easily by content disclosed in the present specification.The present invention is also implemented by other different instantiation or is applied, and the every details in this specification also can based on different viewpoints and application, carries out various modification and change not deviating under spirit of the present invention.
Fig. 1 is the flow chart of steps of a kind of security privacy guard method based on ECC encryption of the present invention.As shown in Figure 1, a kind of security privacy guard method based on ECC encryption of the present invention, comprises the steps:
Step 101, carry out application for registration by ustomer premises access equipment to local side apparatus, manufacturer's key (private key given on elliptic curve), public keys (encrypting generation through selected elliptic curve ECC by manufacturer's key), device private and MAC Address are expressly provided.Wherein device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption, and manufacturer's key and public keys are that all local side apparatus and ustomer premises access equipment are unified.
Step 102, local side apparatus judges the relevance each other of key and the consistency of MAC Address, if be judged as, non-rule sends refusal registration, if it is legal to be judged as, generate random authorization key, and be encrypted by public keys, then the authorization key after encryption is sent to ustomer premises access equipment together with the message succeeded in registration, so far whole register and authentication process completes.
Step 103, ustomer premises access equipment receives after encryption after authorization key and the message that succeeds in registration, to be decrypted and to preserve, simultaneously to local side apparatus application communication key by unified public keys to encrypted authorization key.
Step 104, local side apparatus generates random communication key after receiving communication key application, and is encrypted communication key by the authorization key generated, and then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment.
Step 105, ustomer premises access equipment is decrypted the encrypted communication key received according to the authorization key preserved, and then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
Preferably, in the present invention, for strengthening the fail safe communicated further, will dynamically update authorization key and communication key, these two keys all have the limited time limit; Old authorization key and communication key expired before, ustomer premises access equipment initiatively to the new mandate of local side apparatus application and communication key, thus can ensure that the dynamic encryption of communication, effectively prevents illegality equipment usurping service.
Fig. 2 is the system architecture diagram of a kind of security privacy protection system based on ECC encryption of the present invention.As shown in Figure 2, a kind of security privacy protection system based on ECC encryption of the present invention, comprising: register and authentication module 201, communication encryption module 202.
Wherein, register and authentication module 201, application for registration is carried out to local side apparatus by ustomer premises access equipment, manufacturer's key (private key given on elliptic curve) is provided, public keys (encrypting generation through selected elliptic curve ECC by manufacturer's key), device private, and MAC Address expressly, the relevance each other of key and the consistency of MAC Address is judged by local side apparatus, if be judged as, non-rule sends refusal registration, if it is legal to be judged as, generate random authorization key, and be encrypted by public keys, then the authorization key after encryption is sent to ustomer premises access equipment together with the message succeeded in registration.Wherein device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption, and manufacturer's key and public keys are that all local side apparatus and ustomer premises access equipment are unified.
Communication encryption module 202, to receive after encryption after authorization key and the message that succeeds in registration by ustomer premises access equipment, by unified public keys encrypted authorization key be decrypted and preserve, simultaneously to local side apparatus application communication key, local side apparatus generates random communication key after receiving communication key application, and by the authorization key generated, communication key is encrypted, then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment, finally the encrypted communication key received is decrypted according to the authorization key preserved by ustomer premises access equipment, then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
Preferably; the security privacy protection system of the present invention also comprises key updating module 203; old authorization key and communication key expired before; by ustomer premises access equipment initiatively to the new mandate of local side apparatus application and communication key; thus ensure that the dynamic encryption of communication, effectively prevent illegality equipment usurping service.
Fig. 3 is the flow chart of the register and authentication flow process of register and authentication module in present pre-ferred embodiments.As shown in Figure 2, this register and authentication process is as follows:
Step 3.1, subscriber equipment sends manufacturer's key, MAC Address, device private, public keys and application for registration to local side apparatus;
Step 3.2, is audited the legitimacy of this ustomer premises access equipment by local side apparatus;
Step 3.3, if illegal, then local side apparatus sends the notice of refusal registration to ustomer premises access equipment, and sends the warning of illegality equipment;
Step 3.4, if legal, then local side apparatus is generated authorization key and is encrypted authorization key by the public keys of ustomer premises access equipment;
Step 3.5, the authorization key after local side apparatus sends encryption to ustomer premises access equipment and the notice succeeded in registration.
Fig. 4 is the flow chart of the communication encryption process of communication encryption module in present pre-ferred embodiments.As shown in Figure 4, this communication encryption process is as follows:
Step 4.1, the authorization key after ustomer premises access equipment deciphers with the public keys of oneself encryption received also is preserved;
Step 4.2, ustomer premises access equipment sends the solicitation message of communication key to local side apparatus;
Step 4.3, local side apparatus is generated communication key and is encrypted communication key by authorization key;
Step 4.4, local side apparatus sends the communication key after encryption to ustomer premises access equipment and application is responded;
Step 4.5, the authorization key deciphering that ustomer premises access equipment is preserved adds overstocked communication key and preserves;
Step 4.6, local side and user side carry out the encryption and decryption of interactive communication by this communication key.
Fig. 5 is the flow chart of the authorization key renewal process of key updating module in present pre-ferred embodiments.As shown in Figure 5, this authorization key renewal process is as follows:
Step 5.1, ustomer premises access equipment sends authorized application again at old authorization key inefficacy forward direction local side apparatus;
Step 5.2, the authorization key that local side apparatus public-key encryption is new, and send the authorization key after encryption;
Step 5.3, the ustomer premises access equipment public keys deciphering of oneself adds overstocked authorization key and preserves;
Fig. 6 is the flow chart of the communication key renewal process of key updating module in present pre-ferred embodiments.As shown in Figure 6, this communication key renewal process is as follows:
Step 6.1, ustomer premises access equipment sends new apply by letter at old communication key inefficacy forward direction local side apparatus;
Step 6.2, local side apparatus generates new communication key, and is encrypted communication key by up-to-date authorization key, then sends the communication key after encryption and application response;
Step 6.3, ustomer premises access equipment new authorization key deciphering adds overstocked communication key and preserves;
Step 6.4, local side and user side carry out the encryption and decryption of interactive communication by this new communication key.
In sum; the present invention is a kind of security privacy guard method based on ECC encryption and system; based on ECC elliptic curve cryptography technology; mutual safety certification between terminal equipment in EOC application and network service is improved; three level security strategies of register and authentication, communication encryption and key updating based on elliptic curve cryptography Technology design, ensure that the data security of network security and user.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any those skilled in the art all without prejudice under spirit of the present invention and category, can carry out modifying to above-described embodiment and change.Therefore, the scope of the present invention, should listed by claims.

Claims (10)

1., based on a security privacy guard method for ECC encryption, comprise the steps:
Step one, carries out application for registration by ustomer premises access equipment to local side apparatus, provides manufacturer's key, public keys, device private and MAC Address expressly;
Step 2, this local side apparatus judges the relevance each other of key and the consistency of MAC Address, if be judged as illegal, then sends the feedback of refusal registration; If it is legal to be judged as, generates random authorization key, and be encrypted by public keys, then the authorization key after encryption is sent to this ustomer premises access equipment together with the message succeeded in registration;
Step 3, this ustomer premises access equipment receives after encryption after authorization key and the message that succeeds in registration, to be decrypted and to preserve, simultaneously to local side apparatus application communication key by unified public keys to encrypted authorization key;
Step 4, this local side apparatus generates random communication key after receiving communication key application, and is encrypted communication key by the authorization key generated, and then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment;
Step 5, this ustomer premises access equipment is decrypted the encrypted communication key received according to the authorization key preserved, and then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
2. a kind of security privacy guard method based on ECC encryption as claimed in claim 1, it is characterized in that, the method also comprises the steps:
Old authorization key and communication key expired before, this ustomer premises access equipment initiatively to the new mandate of this local side apparatus application and communication key, thus ensure that the dynamic encryption of communication.
3. a kind of security privacy guard method based on ECC encryption as claimed in claim 1, it is characterized in that: this manufacturer's key is private key given on elliptic curve, this public keys encrypts generation by manufacturer's key through selected elliptic curve ECC.
4. a kind of security privacy guard method based on ECC encryption as claimed in claim 3, is characterized in that: this device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption.
5. a kind of security privacy guard method based on ECC encryption as claimed in claim 1, is characterized in that: this manufacturer's key and public keys are that all local side apparatus and ustomer premises access equipment are unified.
6., based on a security privacy protection system for ECC encryption, comprising:
Register and authentication module, application for registration is carried out to local side apparatus by ustomer premises access equipment, manufacturer's key, public keys, device private and MAC Address are expressly provided, the relevance each other of key and the consistency of MAC Address is judged by this local side apparatus, if be judged as, non-rule sends refusal registration, if it is legal to be judged as, generates random authorization key, and be encrypted by public keys, the authorization key after encryption is sent to ustomer premises access equipment together with the message succeeded in registration;
Communication encryption module, to receive after encryption after authorization key and the message that succeeds in registration by this ustomer premises access equipment, by unified public keys encrypted authorization key be decrypted and preserve, simultaneously to local side apparatus application communication key, local side apparatus generates random communication key after receiving communication key application, and by the authorization key generated, communication key is encrypted, then the application answer of the communication key after encryption and communication key is sent to ustomer premises access equipment, finally the encrypted communication key received is decrypted according to the authorization key preserved by ustomer premises access equipment, then ustomer premises access equipment and local side apparatus are encrypted and decrypted interactive data communication by this communication key.
7. as claimed in claim 6 a kind of based on ECC encryption security privacy protection system; it is characterized in that: this system also comprises key updating module; old authorization key and communication key expired before; by this ustomer premises access equipment initiatively to the new mandate of local side apparatus application and communication key, thus ensure that the dynamic encryption of communication.
8. as claimed in claim 6 a kind of based on ECC encryption security privacy protection system; it is characterized in that: this manufacturer's key is private key given on elliptic curve; this public keys encrypts generation by manufacturer's key through selected elliptic curve ECC, and this device private is the combination formed according to set rule by device mac address and the public keys of manufacturer's secret key encryption.
9. as claimed in claim 7 a kind of based on ECC encryption security privacy protection system, it is characterized in that, this key updating module to authorization key upgrade as follows:
This ustomer premises access equipment sends authorized application again at old authorization key inefficacy forward direction local side apparatus;
The authorization key that this local side apparatus public-key encryption is new, and send the authorization key after encryption;
The public keys deciphering of oneself of this ustomer premises access equipment adds overstocked authorization key and preserves.
10. as claimed in claim 7 a kind of based on ECC encryption security privacy protection system, it is characterized in that, this key updating module to communication key upgrade as follows:
This ustomer premises access equipment sends new apply by letter at old communication key inefficacy forward direction local side apparatus;
This local side apparatus generates new communication key, and is encrypted communication key by up-to-date authorization key, then sends the communication key after encryption and application response;
The new authorization key deciphering of this ustomer premises access equipment adds overstocked communication key and preserves;
Local side and user side carry out the encryption and decryption of interactive communication by this new communication key.
CN201510675721.7A 2015-10-16 2015-10-16 Based on security privacy guard method and the system of ECC encryption Pending CN105227304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510675721.7A CN105227304A (en) 2015-10-16 2015-10-16 Based on security privacy guard method and the system of ECC encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510675721.7A CN105227304A (en) 2015-10-16 2015-10-16 Based on security privacy guard method and the system of ECC encryption

Publications (1)

Publication Number Publication Date
CN105227304A true CN105227304A (en) 2016-01-06

Family

ID=54996025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510675721.7A Pending CN105227304A (en) 2015-10-16 2015-10-16 Based on security privacy guard method and the system of ECC encryption

Country Status (1)

Country Link
CN (1) CN105227304A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978798A (en) * 2016-06-29 2016-09-28 深圳中兴网信科技有限公司 Message encryption transmission method, terminal and server
CN111431629A (en) * 2020-05-15 2020-07-17 南京邮电大学 ECC-based identity authentication protocol method between underwater acoustic sensor network nodes
CN115643103A (en) * 2022-11-03 2023-01-24 浪潮云信息技术股份公司 Big data encryption method using redundancy elimination technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531800A (en) * 2001-03-28 2004-09-22 �����ɷ� Method and apparatus for security in data processing system
CN1972434A (en) * 2005-11-23 2007-05-30 中国移动通信集团公司 Data protection method of multimedia broadcast multicast service
US20090204814A1 (en) * 2008-02-12 2009-08-13 Fisher Gerald B Method and apparatus for communicating information between a security panel and a security server
CN101741546A (en) * 2009-12-22 2010-06-16 上海全景数字技术有限公司 Method and system for registration and communication encryption applied to coaxially-bearing Ethernet device
CN103580855A (en) * 2013-11-07 2014-02-12 江南大学 Usbkey management plan based on sharing technology
CN104065479A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Key generation method and system and key distribution method and system based on group

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1531800A (en) * 2001-03-28 2004-09-22 �����ɷ� Method and apparatus for security in data processing system
CN1972434A (en) * 2005-11-23 2007-05-30 中国移动通信集团公司 Data protection method of multimedia broadcast multicast service
US20090204814A1 (en) * 2008-02-12 2009-08-13 Fisher Gerald B Method and apparatus for communicating information between a security panel and a security server
CN101741546A (en) * 2009-12-22 2010-06-16 上海全景数字技术有限公司 Method and system for registration and communication encryption applied to coaxially-bearing Ethernet device
CN103580855A (en) * 2013-11-07 2014-02-12 江南大学 Usbkey management plan based on sharing technology
CN104065479A (en) * 2014-07-11 2014-09-24 中国人民公安大学 Key generation method and system and key distribution method and system based on group

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978798A (en) * 2016-06-29 2016-09-28 深圳中兴网信科技有限公司 Message encryption transmission method, terminal and server
CN111431629A (en) * 2020-05-15 2020-07-17 南京邮电大学 ECC-based identity authentication protocol method between underwater acoustic sensor network nodes
CN111431629B (en) * 2020-05-15 2021-09-21 南京邮电大学 ECC-based identity authentication protocol method between underwater acoustic sensor network nodes
CN115643103A (en) * 2022-11-03 2023-01-24 浪潮云信息技术股份公司 Big data encryption method using redundancy elimination technology

Similar Documents

Publication Publication Date Title
US8059818B2 (en) Accessing protected data on network storage from multiple devices
KR100572498B1 (en) Method for establishing a key using over-the-air communication and password protocol and password protocol
CN109495274A (en) A kind of decentralization smart lock electron key distribution method and system
CN101409619B (en) Flash memory card and method for implementing virtual special network key exchange
KR20170139093A (en) A method for a network access device to access a wireless network access point, a network access device, an application server, and a non-volatile computer readable storage medium
CN106878016A (en) Data is activation, method of reseptance and device
CN105471833A (en) Safe communication method and device
CN104506515A (en) Firmware protection method and firmware protection device
CN103118363B (en) A kind of method of mutual biography secret information, system, terminal unit and platform device
CN103179114A (en) Fine-grained access control method for data in cloud storage
CN103001976A (en) Safe network information transmission method
CN108683510A (en) A kind of user identity update method of encrypted transmission
CN108880995B (en) Block chain-based unfamiliar social network user information and message pushing encryption method
CN111275202A (en) Machine learning prediction method and system for data privacy protection
CN102833246A (en) Social video information security method and system
CN101969638A (en) Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN101296083A (en) Enciphered data transmission method and system
CN102264068B (en) Shared key consultation method, system, network platform and terminal
CN111539496A (en) Vehicle information two-dimensional code generation method, two-dimensional code license plate, authentication method and system
CN106549858A (en) A kind of instant messaging encryption method based on id password
CN102685111B (en) Cryptographic sanction server and methods for use therewith
CN104243452A (en) Method and system for cloud computing access control
CN101118579B (en) Verification permissive method and system
JP2016522637A (en) Secured data channel authentication that implies a shared secret
CN105227304A (en) Based on security privacy guard method and the system of ECC encryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160106

RJ01 Rejection of invention patent application after publication