CN105447394B - A kind of intelligent code key with local data encryption function - Google Patents

A kind of intelligent code key with local data encryption function Download PDF

Info

Publication number
CN105447394B
CN105447394B CN201510813731.2A CN201510813731A CN105447394B CN 105447394 B CN105447394 B CN 105447394B CN 201510813731 A CN201510813731 A CN 201510813731A CN 105447394 B CN105447394 B CN 105447394B
Authority
CN
China
Prior art keywords
encryption
key
local data
chip
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510813731.2A
Other languages
Chinese (zh)
Other versions
CN105447394A (en
Inventor
于晓艳
刘强
于治楼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Group Co Ltd filed Critical Inspur Group Co Ltd
Priority to CN201510813731.2A priority Critical patent/CN105447394B/en
Publication of CN105447394A publication Critical patent/CN105447394A/en
Application granted granted Critical
Publication of CN105447394B publication Critical patent/CN105447394B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of intelligent code key with local data encryption function, including encryption chip, the storage chip being connected with the encryption chip, power circuit, connecting interface, ancillary equipment;Wherein encryption chip is the microprocessor of an integrated processor, input/output port and memory;Massive store chip is NAND Flash chips, and the chip has NAND Flash controller, is connected with outside Flash and completes local data encryption storage;Power circuit is connected with main control chip and mass storage respectively, and monitoring provides stabilized power source;Connecting interface is used to connect local computer computer;Ancillary equipment, including LED light, the ancillary equipment is connected with encryption chip indicates USB Key working condition.The intelligent code key with local data encryption function compared with prior art, can carry out the mass data at encryption and decryption PC ends as the hardware key of encryption and decryption, and the encryption to local data can only carry out encryption and decryption with same encrypted U disk, improve security, and practicality is high.

Description

A kind of intelligent code key with local data encryption function
Technical field
The present invention relates to field of information security technology, specifically a kind of practical, band local data encryption function Intelligent code key.
Background technology
IT application process is rapidly accelerated, and ecommerce and the fast development of E-Government, also brings various information therewith Safety problem, the raising of generality, and safety applications functional requirement is used intelligent code key to increase.
Designed now with the USB Key based on various crypto chips, but its functional type is single, and crypto chip does not obtain Make full use of.For the user of intelligent code key, higher is also often required to its computer local data security, is had local The demand of data encryption.Common local data is encrypted has speed advantage using software cryptography, but software cryptography mode is harder Part cipher mode security is poor.And the local data based on external encryption chip is encrypted and non-national secret algorithm is for special occasions The Password Management policy of our countries is not met, it is also possible to leave stealthy back door hidden danger.Local data encryption need to set password to test Card process, increase secret grade.
Deficiency and demand for more than, it is proposed that a kind of intelligent code key with local data encryption function.
The content of the invention
The technical assignment of the present invention is to be directed to above weak point, there is provided a kind of practical, band local data encryption work( The intelligent code key of energy.
A kind of intelligent code key with local data encryption function, including encryption chip, be connected with the encryption chip Storage chip, power circuit, connecting interface, ancillary equipment;Wherein,
Encryption chip is the microprocessor of an integrated processor, input/output port and memory;
Massive store chip is NAND Flash chips, and the chip has NAND Flash controller, with outside Flash Local data encryption storage is completed in connection;
Power circuit is connected with main control chip and mass storage respectively, and monitoring provides stabilized power source;
Connecting interface is used to connect local computer computer;
Ancillary equipment, including LED light, the ancillary equipment is connected with encryption chip indicates USB Key working condition.
In the encryption chip, processor is used to produce and using RSA key pair and pair to Large Volume Data encryption and decryption Claim encryption key pair;Memory includes RAM, EEPROM and NORFLASH, wherein:The NORFLASH of memory includes EFLASH, DFLASH, ROM portion, wherein EFLASH part storage key are to, certificate and cryptography information, DFLASH parts Programme-control code is deposited, ROM storages start code.
The cipher key has two kinds of functions:USB Key functions and local data encryption and decryption functions, wherein,
USB Key functions are verified by PIN code, then pass through system specifically, user first uses CA user management instruments In control read cipher key in certificate and private key information;Cipher key USB Key are stepped on using private key signature encryption user Record information;Ciphertext after original text, the digital certificate of oneself and signature, which is packaged into message and is sent to certificate server, to be verified;Such as Fruit checking is all by the way that certificate server is then using client public key decryption ciphertext;Compare message and original text after DecryptDecryption again, it is identical then Represent that the authentication that user submits passes through;
Local data encryption and decryption functions are that the random number of generation is encryption dispersion factor in KEY, uses SM4 national secret algorithms Ciphertext will be encrypted in plain text, while using the interior public key encryption random numbers for generating key pair of KEY into digital envelope, by digital envelope Encrypted result is combined into ciphertext, host computer is uploaded to and is stored in encryption file;Local encryption data is decrypted, reads encryption The content of file, parses digital envelope and ciphertext respectively, and digital envelope is untied with the private key preserved in Key, uses random number As decryption factor, the ciphertext DecryptDecryption that will be parsed, you can complete local data decryption.
When above-mentioned cipher key is used to carry out encryption and decryption to the local data on computer, by by the local data on computer It is transferred to after slave computer and is carried out in slave computer.
Before local data encryption, initialized first, i.e., COS codes are divided into two passages, intelligent code key leads to Road and local data encrypted tunnel, ciphering process are carried out in local data encrypted tunnel, are then inputted password authentication and are somebody's turn to do The right to use of local data encrypted tunnel, obtains size and the path of select file, and file size is stored in into file front end, Ciphering process data are transmitted using 184KB sizes as block, and equipment, which is often wrapped, at most passes 8KB data, is finally delivered to slave computer And it is encrypted in slave computer.
The ciphering process is:First read the random number of encryption chip hardware generation, by the use of rsa public key encryptions random number as Digital envelope, encrypted buffer area is stored in, the front end as file;The byte of front end two for receiving data is extracted simultaneously, is sentenced The size of disconnected file, is then encrypted if greater than 184KB in units of 184KB, is otherwise carried out with actual file size Encryption;Encryption be the random number for first reading the generation of encryption chip hardware as Crypted password, mould is encrypted by hardware The plaintext received is encrypted to ciphertext by block with symmetric encipherment algorithm SM4;Data after encryption are also stored in encrypted buffer area, The back of digital envelope is put into, forms final encryption file, and file store path storage is encrypted according to host computer and uploaded to Host computer.
The key is to being a pair of the RSA generated inside key by GenRSAKey functions using the corresponding engine of chip Key pair.
The decrypting process is:Decrypting process is after input password authentication obtains the local data encrypted tunnel right to use, first The front end content of extraction encryption file is digital envelope, decrypts random number with the RSA private keys in key, judges file size, such as Fruit is more than 184KB, then is clear crytpographic key by adding to random number otherwise with actual file size in units of 184KB sizes Close chip decrypts original text with SM4 algorithms, uploads to host computer and decrypts the storage of file store path according to host computer, so as to complete The hardware enciphering and deciphering process of paired computer local data.
A kind of intelligent code key with local data encryption function of the present invention, has advantages below:
By the decryption function to local data and intelligent code key function forming in same circuit, USB is added Key application of function and practicality, it is easy to use;Using same encryption main control chip, increase the utilization rate of crypto chip, reduce Cost, improve cost performance;
Password encryption chip uses domestic crypto chip, to meet China to the national Password Management policy of special occasions It is required that reduce the hidden danger that external product back door is come to special occasions data safety storage tape;
Cipher mode is all realized using national secret algorithm and hardware encryption, improves security;
The mass data at encryption and decryption PC ends can be carried out as the hardware key of encryption and decryption, the encryption to local data can only be used same One encrypted U disk carries out encryption and decryption, and PIN verification process is set during use, increases secret grade, improves security, and practicality is high, full The sufficient market demand is easy to spread.
Brief description of the drawings
Accompanying drawing 1 realizes structured flowchart for the present invention's.
Accompanying drawing 2 is encryption and decryption flow chart of the invention.
Embodiment
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
The present invention provides a kind of intelligent code key with local data encryption function, as shown in Figure 1,
Storage chip, power circuit, connecting interface, the ancillary equipment being connected including encryption chip, with the encryption chip, Cipher mode is all encrypted using national secret algorithm hardware and realized, improves security.;Wherein,
Encryption chip is the microprocessor of an integrated processor, input/output port and memory;
Massive store chip is NAND Flash chips, and the chip has NAND Flash controller, with outside Flash Local data encryption storage is completed in connection;
Power circuit is connected with main control chip and mass storage respectively, and monitoring provides stabilized power source;
Connecting interface is used to connect local computer computer;
Ancillary equipment, including LED light, the ancillary equipment is connected with encryption chip indicates USB Key working condition.
In the encryption chip, processor is used to produce and using RSA key pair and pair to Large Volume Data encryption and decryption Claim encryption key pair;Memory includes RAM, EEPROM and NORFLASH, wherein:The NORFLASH of memory includes EFLASH, DFLASH, ROM portion, wherein EFLASH part storage key are to, certificate and cryptography information, DFLASH parts Programme-control code is deposited, ROM storages start code.
As shown in Figure 2, in actual use, after hardware USB Key are inserted into PC ends, driven without installing, main frame is certainly It is dynamic to be identified as MassStorage equipment, judge whether Key is initialized, otherwise may be used if being initialized first using needs Directly use, CD area can be now shown in my computer, is next divided into following two applicable cases:
If using USB Key functions, user need to first use CA user management instruments, verify by PIN code, then pass through Control in system reads certificate and private key information in USB Key.USB Key log in letter using private key signature encryption user Breath.Ciphertext after original text, the digital certificate of oneself and signature, which is packaged into message and is sent to certificate server, to be verified.If test Card is all by the way that certificate server is then using client public key decryption ciphertext.Compare message and original text after DecryptDecryption again, it is identical, represent The authentication that user submits passes through.
If carrying out local data encryption to computer end, the random number of generation is encryption dispersion factor in KEY, uses SM4 National secret algorithm will be encrypted to ciphertext in plain text, while using the interior public key encryption random numbers for generating key pair of KEY into digital envelope, will Digital envelope and ciphertext are combined into encrypted result, upload to host computer and are stored in encryption file.Local encryption data is decrypted, The content of encryption file is read, digital envelope and ciphertext is parsed respectively, digital envelope is untied with the private key preserved in Key, By the use of random number as decryption factor, the ciphertext DecryptDecryption that will be parsed, you can complete local data decryption.
When above-mentioned cipher key is used to carry out encryption and decryption to the local data on computer, by by the local data on computer It is transferred to after slave computer and is carried out in slave computer.
Before local data encryption, initialized first, i.e., COS codes are divided into two passages, intelligent code key leads to Road and local data encrypted tunnel, ciphering process are carried out in local data encrypted tunnel, are then inputted password authentication and are somebody's turn to do The right to use of local data encrypted tunnel, obtains size and the path of select file, and file size is stored in into file front end, Ciphering process data are transmitted using 184KB sizes as block, and equipment, which is often wrapped, at most passes 8KB data, is finally delivered to slave computer And it is encrypted in slave computer.
The ciphering process is:First read the random number of encryption chip hardware generation, by the use of rsa public key encryptions random number as Digital envelope, encrypted buffer area is stored in, the front end as file;The byte of front end two for receiving data is extracted simultaneously, is sentenced The size of disconnected file, is then encrypted if greater than 184KB in units of 184KB, is otherwise carried out with actual file size Encryption;Encryption be the random number for first reading the generation of encryption chip hardware as Crypted password, mould is encrypted by hardware The plaintext received is encrypted to ciphertext by block with symmetric encipherment algorithm SM4;Data after encryption are also stored in encrypted buffer area, The back of digital envelope is put into, forms final encryption file, and file store path storage is encrypted according to host computer and uploaded to Host computer.And private key does not go out KEY, the hardware encryption process that the Inter Milan algorithm based on the close chip of state is realized is completed.
The key is to being a pair of the RSA generated inside key by GenRSAKey functions using the corresponding engine of chip Key pair.
The decrypting process is:Decrypting process is after input password authentication obtains the local data encrypted tunnel right to use, first The front end content of extraction encryption file is digital envelope, decrypts random number with the RSA private keys in key, judges file size, such as Fruit is more than 184KB, then is clear crytpographic key by adding to random number otherwise with actual file size in units of 184KB sizes Close chip decrypts original text with SM4 algorithms, uploads to host computer and decrypts the storage of file store path according to host computer, so as to complete The hardware enciphering and deciphering process of paired computer local data.
Above-mentioned embodiment is only the specific case of the present invention, and scope of patent protection of the invention includes but is not limited to Above-mentioned embodiment, a kind of right of any intelligent code key with local data encryption function for meeting the present invention will The appropriate change or replacement that ask book and any technical field those of ordinary skill is done to it, should all fall into the present invention Scope of patent protection.

Claims (7)

1. a kind of intelligent code key with local data encryption function, it is characterised in that including encryption chip and the encryption core Storage chip that piece is connected, power circuit, connecting interface, ancillary equipment;Wherein,
Encryption chip is the microprocessor of an integrated processor, input/output port and memory;
Massive store chip is NAND Flash chips, and the chip has NAND Flash controller, is connected with outside Flash Complete local data encryption storage;
Power circuit is connected with main control chip and mass storage respectively, and monitoring provides stabilized power source;
Connecting interface is used to connect local computer computer;
Ancillary equipment, including LED light, the ancillary equipment is connected with encryption chip indicates USB Key working condition;
Cipher key has two kinds of functions:USB Key functions and local data encryption and decryption functions, wherein,
USB Key functions are verified, then by system by PIN code specifically, user first uses CA user management instruments Control reads certificate and private key information in cipher key;Cipher key USB Key log in letter using private key signature encryption user Breath;Ciphertext after original text, the digital certificate of oneself and signature, which is packaged into message and is sent to certificate server, to be verified;If test Card is all by the way that certificate server is then using client public key decryption ciphertext;Compare message and original text after DecryptDecryption again, it is identical, represent The authentication that user submits passes through;
Local data encryption and decryption functions are that the random number of generation is encryption dispersion factor in KEY, will be bright using SM4 national secret algorithms Text is encrypted to ciphertext, at the same using generation key pair in KEY public key encryption random number into digital envelope, by digital envelope and close Text is combined into encrypted result, uploads to host computer and is stored in encryption file;Local encryption data is decrypted, reads encryption file Content, parse digital envelope and ciphertext respectively, digital envelope untied with the private key preserved in Key, by the use of random number as Decryption factor, the ciphertext DecryptDecryption that will be parsed, you can complete local data decryption.
2. a kind of intelligent code key with local data encryption function according to claim 1, it is characterised in that described In encryption chip, processor is used to produce and using RSA key pair and the symmetric cryptographic key pair to Large Volume Data encryption and decryption; Memory includes RAM, EEPROM and NORFLASH, wherein:The NORFLASH of memory includes EFLASH, DFLASH, ROM portion Point, wherein EFLASH parts storage key is to, certificate and cryptography information, DFLASH parts storage programme-control code, ROM Storage starts code.
3. a kind of intelligent code key with local data encryption function according to claim 2, it is characterised in that above-mentioned When cipher key is used to carry out encryption and decryption to the local data on computer, by by the local data transfer on computer to slave computer Carried out afterwards in slave computer.
4. a kind of intelligent code key with local data encryption function according to claim 3, it is characterised in that local Before data encryption, initialized first, i.e., COS codes are divided into two passages, intelligent code key passage and local data Encrypted tunnel, ciphering process are carried out in local data encrypted tunnel, are then inputted password authentication and are obtained local data encryption The right to use of passage, size and the path of select file are obtained, file size is stored in file front end, encrypted number of passes According to being transmitted using 184KB sizes as block, equipment, which is often wrapped, at most passes 8KB data, is finally delivered to slave computer and in slave computer In be encrypted.
5. a kind of intelligent code key with local data encryption function according to claim 4, it is characterised in that described Ciphering process is:The random number of encryption chip hardware generation is first read, by the use of rsa public key encryptions random number as digital envelope, is deposited Encrypted buffer area is put into, the front end as file;The byte of front end two for receiving data is extracted simultaneously, judges the big of file It is small, then it is encrypted in units of 184KB if greater than 184KB, is otherwise encrypted with actual file size;Add Close processing be the random number for first reading the generation of encryption chip hardware as Crypted password, by hardware encryption module with symmetric cryptography The plaintext received is encrypted to ciphertext by algorithm SM4;Data after encryption are also stored in encrypted buffer area, are put into digital envelope Back, form final encryption file, and file store path storage is encrypted according to host computer and uploads to host computer.
6. a kind of intelligent code key with local data encryption function according to claim 5, it is characterised in that described Key is to being a pair of the RSA keys pair generated inside key by GenRSAKey functions using the corresponding engine of chip.
7. a kind of intelligent code key with local data encryption function according to claim 1, it is characterised in that described Decrypting process is:Decrypting process is first extraction encryption file after input password authentication obtains the local data encrypted tunnel right to use Front end content be digital envelope, decrypt random number with the RSA private keys in key, judge file size, if greater than 184KB, It is that clear crytpographic key is calculated by encryption chip with SM4 to random number then otherwise with actual file size in units of 184KB sizes Method decrypts original text, uploads to host computer and decrypts the storage of file store path according to host computer, local to computer so as to complete The hardware enciphering and deciphering process of data.
CN201510813731.2A 2015-11-23 2015-11-23 A kind of intelligent code key with local data encryption function Active CN105447394B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510813731.2A CN105447394B (en) 2015-11-23 2015-11-23 A kind of intelligent code key with local data encryption function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510813731.2A CN105447394B (en) 2015-11-23 2015-11-23 A kind of intelligent code key with local data encryption function

Publications (2)

Publication Number Publication Date
CN105447394A CN105447394A (en) 2016-03-30
CN105447394B true CN105447394B (en) 2018-02-23

Family

ID=55557557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510813731.2A Active CN105447394B (en) 2015-11-23 2015-11-23 A kind of intelligent code key with local data encryption function

Country Status (1)

Country Link
CN (1) CN105447394B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446697A (en) * 2016-07-26 2017-02-22 邬超 Method and device for saving private data
CN108985427A (en) * 2017-06-02 2018-12-11 广州智慧城市发展研究院 A kind of high safety RF type fingerprint U disk and safety implementation method
CN108681663B (en) * 2018-05-22 2021-02-09 广东润星科技有限公司 Encryption and decryption method for novel matrix type operation panel with function of binding numerical control machine tool
CN109101788B (en) * 2018-06-19 2022-06-03 光大环保技术研究院(南京)有限公司 Encryption device and encryption method for automatic combustion control system of incinerator
CN109194618A (en) * 2018-08-02 2019-01-11 广东浪潮大数据研究有限公司 A kind of file encrypting method, document encrypting apparatus and file encryption equipment
CN109412795A (en) * 2018-09-17 2019-03-01 江苏敏行信息技术有限公司 A kind of Virtual Intelligent cipher key
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software
CN110502909B (en) * 2019-08-06 2021-06-01 北京北信源软件股份有限公司 File encryption method and device and file decryption method and device
CN111241605A (en) * 2019-12-31 2020-06-05 航天信息股份有限公司 Safety storage device and method based on tax digital certificate

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483518A (en) * 2009-02-20 2009-07-15 北京天威诚信电子商务服务有限公司 Customer digital certificate private key management method and system
CN101674304A (en) * 2009-10-15 2010-03-17 浙江师范大学 Network identity authentication system and method
CN102930229A (en) * 2011-01-18 2013-02-13 苏州国芯科技有限公司 Office system for improving data security
CN103580868A (en) * 2013-08-29 2014-02-12 国家电网公司 Secure transmission method of electronic official document secure transmission system
CN104301115A (en) * 2014-10-22 2015-01-21 浪潮软件集团有限公司 Mobile phone and Bluetooth key signature verification ciphertext communication method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483518A (en) * 2009-02-20 2009-07-15 北京天威诚信电子商务服务有限公司 Customer digital certificate private key management method and system
CN101674304A (en) * 2009-10-15 2010-03-17 浙江师范大学 Network identity authentication system and method
CN102930229A (en) * 2011-01-18 2013-02-13 苏州国芯科技有限公司 Office system for improving data security
CN103580868A (en) * 2013-08-29 2014-02-12 国家电网公司 Secure transmission method of electronic official document secure transmission system
CN104301115A (en) * 2014-10-22 2015-01-21 浪潮软件集团有限公司 Mobile phone and Bluetooth key signature verification ciphertext communication method

Also Published As

Publication number Publication date
CN105447394A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN105447394B (en) A kind of intelligent code key with local data encryption function
CN100468438C (en) Encryption and decryption method for realizing hardware and software binding
CN103618607B (en) A kind of Security Data Transmission and key exchange method
CN201181472Y (en) Hardware key device and movable memory system
US11308241B2 (en) Security data generation based upon software unreadable registers
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CA2373787C (en) Self authentication ciphertext chaining
CN104468089A (en) Data protecting apparatus and method thereof
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN107528689B (en) Password modification method based on Ukey
CN103544453A (en) USB (universal serial bus) KEY based virtual desktop file protection method and device
CN107005577A (en) The processing method and processing unit of finger print data
CN104901810A (en) Data encrypted storage method based on domestic cryptographic algorithm
CN104410493A (en) Secure data storage method and secure data read method based on distributed system infrastructure
CN107911221A (en) The key management method of solid-state disk data safety storage
CN110233729A (en) A kind of encryption solid-state disk key management method based on PUF
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN101916344A (en) Method and system for verifying legality of software protection device
CN103605919A (en) Method and device for generating software authentication files and method and device for authenticating software
CN113722741A (en) Data encryption method and device and data decryption method and device
CN201716734U (en) Usb safe storage encryption device
CN109194467A (en) A kind of safe transmission method and system of encryption data
US10057054B2 (en) Method and system for remotely keyed encrypting/decrypting data with prior checking a token
CN206907059U (en) China second-generation identity card reads encryption system
CN1607511B (en) Data protection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180801

Address after: 250100 S06 tower, 1036, Chao Lu Road, hi tech Zone, Ji'nan, Shandong.

Patentee after: Shandong wave cloud Mdt InfoTech Ltd

Address before: No. 1036, Shandong high tech Zone wave road, Ji'nan, Shandong

Patentee before: Inspur Group Co., Ltd.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 250100 No. 1036 Tidal Road, Jinan High-tech Zone, Shandong Province, S01 Building, Tidal Science Park

Patentee after: Inspur cloud Information Technology Co., Ltd

Address before: 250100 Ji'nan science and technology zone, Shandong high tide Road, No. 1036 wave of science and Technology Park, building S06

Patentee before: SHANDONG LANGCHAO YUNTOU INFORMATION TECHNOLOGY Co.,Ltd.