CN105701390A - Encryption terminal remote management method, encryption terminal and manager - Google Patents

Encryption terminal remote management method, encryption terminal and manager Download PDF

Info

Publication number
CN105701390A
CN105701390A CN201610131161.3A CN201610131161A CN105701390A CN 105701390 A CN105701390 A CN 105701390A CN 201610131161 A CN201610131161 A CN 201610131161A CN 105701390 A CN105701390 A CN 105701390A
Authority
CN
China
Prior art keywords
key
encryption
manager
encrypted
ciphering terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610131161.3A
Other languages
Chinese (zh)
Inventor
刘馨靖
周晓龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201610131161.3A priority Critical patent/CN105701390A/en
Publication of CN105701390A publication Critical patent/CN105701390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Abstract

The invention provides an encryption terminal remote management method, an encryption terminal and a manager. The encryption terminal remote management method is applied to the encryption terminal. The encryption terminal comprises an encryption card. The encryption terminal remote management method comprises the steps that the encryption terminal acquires an encryption key and decrypts the encryption key with a private key of the encryption card, wherein the encryption key is a key obtained after an encryption key in an encryption and decryption key pair allocated by the manager is encrypted by the manager with the a public key of the encryption card; the encryption terminal encrypts a file to be encrypted with the decrypted encryption key through the encryption card; the encryption terminal sends the information of an encryption result to the manager. Remote management of the encryption terminal is achieved, in other words, files in the encryption terminal can be encrypted even when a terminal user can not operate the encryption terminal, and safety performance is high.

Description

Method, ciphering terminal and the manager that ciphering terminal remotely manages
Technical field
The present invention relates to communication technical field, particularly relate to method, ciphering terminal and manager that a kind of ciphering terminal remotely manages。
Background technology
Along with popularizing of intelligent terminal, the safety problem that mobile terminal faces is day by day serious, there is many security breaches and hiding back door in the operating systems such as Android (Android), iOS, the serious threat individual privacy of user, trade secret, wealth and national security。The demand of secure communication is increased by government, lifeblood industry and business people day by day, and the demand of mobile security has become the focus that user pays close attention to。
At present, the mode data of intelligent terminal and application being encrypted is broadly divided into soft encryption and hardware encryption two kinds。Wherein, soft encryption refers to hardware device that need not be extra, is realized the mode of encryption completely by software;Hardware encryption refers to the mode being realized encryption by hardware device such as encrypted card。And for hardware encryption mode, existing encryption intelligent terminal often adopts the hardware encryption mode of built-in encryption card, when encrypting intelligent terminal and losing, application and file cannot be encrypted by the encrypted card in intelligent terminal, therefore cannot ensure safety。
Summary of the invention
The present invention provides method, ciphering terminal and the manager that a kind of ciphering terminal remotely manages, to overcome the poor problem of safety in prior art。
First aspect, the present invention provides a kind of method that ciphering terminal remotely manages, and is applied to ciphering terminal, and described ciphering terminal includes encrypted card, and described method includes:
Ciphering terminal obtains encryption key, and by the private key of described encrypted card, described encryption key is decrypted;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described ciphering terminal adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
The information of encrypted result is sent to manager by described ciphering terminal。
Second aspect, the present invention provides a kind of method that ciphering terminal remotely manages, and is applied to ciphering terminal, and described ciphering terminal includes encrypted card, and described method includes:
Manager distribution encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described manager adopts the PKI of described encrypted card that described encryption key is encrypted;
Described manager sends the encryption key after encrypting to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
Described manager receives the information of the encrypted result that described ciphering terminal sends。
The third aspect, the present invention provides a kind of ciphering terminal, and described ciphering terminal includes encrypted card, and described ciphering terminal also includes:
Acquisition module, is used for obtaining encryption key;
Deciphering module, for being decrypted described encryption key by the private key of described encrypted card;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Encrypting module, is encrypted the file that need to encrypt for the encryption key after adopting deciphering by described encrypted card;
Sending module, for being sent to manager by the information of encrypted result。
Fourth aspect, the present invention provides a kind of manager, including:
Distribution module, is used for distributing encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Encrypting module, for adopting the PKI of described encrypted card that described encryption key is encrypted;
Sending module, for the encryption key after sending encryption to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and is encrypted the file that need to encrypt by the encryption key after the employing deciphering of described encrypted card;
Receiver module, for receiving the information of the encrypted result that described ciphering terminal sends。
Method, ciphering terminal and the manager that ciphering terminal of the present invention remotely manages, is obtained encryption key by ciphering terminal, and by the private key of described encrypted card, described encryption key is decrypted;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;Ciphering terminal adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;The information of encrypted result is sent to manager by ciphering terminal, achieve the long-range management to ciphering terminal, namely when ciphering terminal cannot be operated by terminal use, it is also possible to the file in ciphering terminal is encrypted, compared to existing technologies, safety is higher。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Fig. 1 is the schematic flow sheet of method one embodiment that ciphering terminal of the present invention remotely manages;
Fig. 2 is the network topological diagram of the inventive method embodiment;
Fig. 3 is the interaction flow schematic diagram one of the inventive method embodiment;
Fig. 4 is the interaction flow schematic diagram two of the inventive method embodiment;
Fig. 5 is the interaction flow schematic diagram of another embodiment of the inventive method;
Fig. 6 is the schematic flow sheet of another embodiment of method that ciphering terminal of the present invention remotely manages;
Fig. 7 is the structural representation of ciphering terminal one embodiment of the present invention;
Fig. 8 is the structural representation of manager one embodiment of the present invention。
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
Fig. 1 is the schematic flow sheet of method one embodiment that ciphering terminal of the present invention remotely manages。Fig. 2 is the network topological diagram of the inventive method embodiment。Fig. 3 is the interaction flow schematic diagram one of the inventive method embodiment。Fig. 4 is the interaction flow schematic diagram two of the inventive method embodiment。As it is shown in figure 1, the method for the present embodiment, being applied to ciphering terminal, this ciphering terminal includes encrypted card, and the executive agent of the present embodiment is ciphering terminal, and described method includes:
Step 101, ciphering terminal obtain encryption key, and by the private key of described encrypted card, described encryption key are decrypted;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Step 102, described ciphering terminal adopt the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
The information of encrypted result is sent to manager by step 103, described ciphering terminal;
Wherein, the information of described encrypted result may include that the identification information of encryption times, the identification information of described encrypted card, described ciphering terminal。
Specifically, if need the application in ciphering terminal or file are encrypted, such as ciphering terminal is lost, or when after ciphering terminal loss, user needs to report the loss, such as Fig. 3, shown in Fig. 4, ciphering terminal obtains encryption key, can be such as that ciphering terminal sends key request to manager, or, manager is initiated request by terminal use, and after the authentication of this terminal use passed through by manager, manager distribution encryption and decryption double secret key, this encryption and decryption double secret key includes encryption key and decruption key, encryption key after the public key encryption of the described encrypted card of employing is handed down to ciphering terminal with the form of note (or network data transmission) by manager, ciphering terminal is decrypted by the private key pair encryption key of encrypted card, and adopt the encryption key after deciphering that the file that need to encrypt is encrypted, thus the data protected in ciphering terminal。The encryption key that manager issues is encrypted by adopting the PKI in ciphering terminal, it is possible to effectively prevent key to be intercepted in transmitting procedure, thus ensureing to issue the safety of key。
Ciphering terminal obtain key mode can also by ciphering terminal timing or keep in real time one the mode such as to be connected with manager long obtaining key, by advance key storage to encrypted card being realized the encryption to file。
Encrypting after successfully, the information of encrypted result can be returned to manager by ciphering terminal, and manager can store the scrambled record of the information including encrypted result, and this scrambled record can also include the encryption and decryption double secret key of manager distribution。
Wherein, in actual applications, as it is shown on figure 3, before described ciphering terminal acquisition encryption key, also include:
The identity of terminal use is verified by described ciphering terminal by described encrypted card;
If checking is not passed through, then send key request, encryption key described in acquisition request to manager。
Specifically, when subscriber authentication uses the encryption application in ciphering terminal and file for user every time, if subscriber authentication failure, now ciphering terminal is likely to lose, in order to ensure the safety of data in ciphering terminal, therefore ciphering terminal sends key request to administrative center, obtains the encryption key file to needing encryption in ciphering terminal and is encrypted。
Wherein, in actual applications, as shown in Figure 4, described ciphering terminal obtains encryption key, including:
When described manager is to after being verified of user identity, described ciphering terminal receives the described encryption key that described manager sends。
Specifically, manager is sometimes for remotely controlling encryption application and file in ciphering terminal, for instance the file in ciphering terminal is encrypted。Such as when needing after user encryption lost terminal to report the loss or needing, after authentication failure, situations such as reactivating, at this moment, manager has only to the identification card number by terminal use, phone number, or the Back ground Information such as service password checking identity is (different to the requirement of security performance according to reality, checking information and mode are not limited to these several), when being verified, remotely the encryption application in ciphering terminal and file can be encrypted, information according to terminal use and the information of encrypted card, distribution encryption and decryption double secret key, it is sent to ciphering terminal after being encrypted by the encryption key of encryption and decryption cipher key pair, after encryption key is decrypted by ciphering terminal, utilize this encryption key that the file that need to encrypt is encrypted, thus realizing the long-range management to ciphering terminal。
Authentication is except above-mentioned mode, for instance can also by being connected the formal verification user identity such as comparison identity card picture and bio-identification (such as fingerprint, face) with user video。
The method that the ciphering terminal that the present embodiment provides remotely manages, is obtained encryption key by ciphering terminal, and by the private key of described encrypted card, described encryption key is decrypted;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;Ciphering terminal adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;The information of encrypted result is sent to manager by ciphering terminal, achieve the long-range management to ciphering terminal, namely when ciphering terminal cannot be operated by terminal use, it is also possible to the file in ciphering terminal is encrypted, compared to existing technologies, safety is higher。
Fig. 5 is the interaction flow schematic diagram of another embodiment of the inventive method。On the embodiment basis shown in Fig. 1, in actual applications, the method for the present embodiment, also include:
Described ciphering terminal obtains decruption key, and by the private key of described encrypted card, described decruption key is decrypted;Described decruption key is the key after manager adopts the decruption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described ciphering terminal adopts the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
The information of decrypted result is sent to manager by described ciphering terminal;
Wherein, the information of described decrypted result includes: decryption time, the identification information of described encrypted card, described ciphering terminal identification information。
Wherein, in actual applications, described ciphering terminal obtains decruption key, including:
When described manager is to after being verified of user identity, described ciphering terminal receives the described decruption key that described manager sends。
Specifically, manager is sometimes for remotely controlling encryption application and file in ciphering terminal, for instance the file in ciphering terminal is decrypted。Such as when needing to reactivate situations such as (as when forgetting Password) after user encryption lost terminal is given for change again or after authentication failure, at this moment, as shown in Figure 5, manager receives the request that encryption application or file are decrypted that terminal use sends, and manager is by Back ground Information checking user identity such as the identification card number of terminal use, phone number, service passwords;After authentication success, the information such as the binding of subscriber phone number, the ID of encrypted card, encrypted card and ciphering terminal and this user encryption application enciphering/deciphering record are inquired about by administrative center;By a up-to-date scrambled record, the encryption and decryption key used during manager inquiry encryption;Manager uses the PKI of encrypted card that decruption key is encrypted, and obtains a new decruption key, is handed down to and the ciphering terminal of encrypted card binding with the form of note (or network data transmission) by this decruption key;This decruption key that ciphering terminal receiving management device issues, and adopt the private key of encrypted card that this decruption key is decrypted;And use the file that the need in ciphering terminal are deciphered by the decruption key after deciphering to be decrypted;After successful decryption, the information of decrypted result being returned to manager, manager stores this deciphering record。
Ciphering terminal obtain key mode can also by ciphering terminal timing or keep in real time one the mode such as to be connected with manager long obtaining key, by advance key storage to encrypted card being realized the deciphering to file。
In above-mentioned detailed description of the invention, ciphering terminal obtains decruption key, and by the private key of described encrypted card, described decruption key is decrypted;Described decruption key is the key after manager adopts the decruption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;Ciphering terminal adopts the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card, achieve the long-range management to ciphering terminal, not only need to reactivate situations such as (as forgetting Password) when user encryption lost terminal but also after giving for change or after authentication failure, when ciphering terminal cannot be operated by terminal use, it is also possible to the file in ciphering terminal is decrypted。
Fig. 6 is the schematic flow sheet of another embodiment of method that ciphering terminal of the present invention remotely manages。As shown in Figure 6, the method for the present embodiment is applied to ciphering terminal, and described ciphering terminal includes encrypted card, and the executive agent of the present embodiment is manager, and described method includes:
Step 601, manager distribution encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Step 602, described manager adopt the PKI of described encrypted card that described encryption key is encrypted;
Step 603, described manager send the encryption key after encrypting to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and adopt the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
Step 604, described manager receive the information of the encrypted result that described ciphering terminal sends;
Wherein, the information of described encrypted result includes: encryption times, the identification information of described encrypted card, described ciphering terminal identification information。
Specifically, if need the application in ciphering terminal or file are encrypted, such as ciphering terminal is lost, or when after ciphering terminal loss, user needs to report the loss, such as Fig. 3, shown in Fig. 4, ciphering terminal obtains encryption key, can be such as that ciphering terminal sends key request to manager, or, manager is initiated request by terminal use, and after the authentication of this terminal use passed through by manager, manager distribution encryption and decryption double secret key, this encryption and decryption double secret key includes encryption key and decruption key, encryption key after the public key encryption of the described encrypted card of employing is handed down to ciphering terminal with the form of note (or network data transmission) by manager, ciphering terminal is decrypted by the private key pair encryption key of encrypted card, and adopt the encryption key after deciphering that the file that need to encrypt is encrypted, thus the data protected in ciphering terminal。The encryption key that manager issues is encrypted by adopting the PKI in ciphering terminal, it is possible to effectively prevent key to be intercepted in transmitting procedure, thus ensureing to issue the safety of key。
Encrypting after successfully, the information of encrypted result can be returned to manager by ciphering terminal, and manager can store the scrambled record of the information including encrypted result, and this scrambled record can also include the encryption and decryption double secret key of manager distribution。
Wherein, in actual applications, described manager storage scrambled record;Described scrambled record includes: the information of described encrypted result, described encryption and decryption double secret key。
Wherein, in actual applications, before described manager distribution encryption and decryption double secret key, also include:
The identity of the user of described ciphering terminal is verified。
On the embodiment basis shown in Fig. 6, in actual applications, the method for the present embodiment, also include:
The encryption and decryption double secret key used in described scrambled record inquired about by described manager;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described manager adopts the PKI of described encrypted card that described decruption key is encrypted;
Described manager sends the decruption key after encrypting to described ciphering terminal, so that described decruption key is decrypted by described ciphering terminal by the private key of described encrypted card, and adopt the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
Described manager receives the information of the decrypted result that described ciphering terminal sends;
Wherein, the information of described decrypted result includes: decryption time, the identification information of described encrypted card, described ciphering terminal identification information。
Wherein, in actual applications, described manager storage deciphering record;Described deciphering record includes: the information of described decrypted result, described encryption and decryption double secret key。
Specifically, as it is shown in figure 5, manager receives the request that encryption application or file are decrypted that terminal use sends, manager is by Back ground Information checking user identity such as the identification card number of terminal use, phone number, service passwords;After authentication success, the information such as the binding of subscriber phone number, the ID of encrypted card, encrypted card and ciphering terminal and this user encryption application enciphering/deciphering record are inquired about by administrative center;By a up-to-date scrambled record, the encryption and decryption key used during manager inquiry encryption;Manager uses the PKI of encrypted card that decruption key is encrypted, and obtains a new decruption key, is handed down to and the ciphering terminal of encrypted card binding with the form of note (or network data transmission) by this decruption key;This decruption key that ciphering terminal receiving management device issues, and adopt the private key of encrypted card that this decruption key is decrypted;And use the file that the need in ciphering terminal are deciphered by the decruption key after deciphering to be decrypted;After successful decryption, the information of decrypted result being returned to manager, manager stores this deciphering record。
It should be noted that for the embodiment of the method for manager side, owing to it essentially corresponds to the embodiment of the method for ciphering terminal side, so relevant part illustrates referring to the part of the embodiment of the method for ciphering terminal side。
Fig. 7 is the structural representation of ciphering terminal one embodiment of the present invention。As it is shown in fig. 7, the ciphering terminal of the present embodiment includes encrypted card (not shown), also include: acquisition module 701, deciphering module 702, encrypting module 703 and sending module 704;
Wherein, acquisition module 701, it is used for obtaining encryption key;
Deciphering module 702, for being decrypted described encryption key by the private key of described encrypted card;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Encrypting module 703, is encrypted the file that need to encrypt for the encryption key after adopting deciphering by described encrypted card;
Sending module 704, for being sent to manager by the information of encrypted result。
Alternatively, as a kind of enforceable mode, described acquisition module 701, it is additionally operable to obtain decruption key;
Described deciphering module 702, is additionally operable to the private key by described encrypted card and described decruption key is decrypted;Described decruption key is the key after manager adopts the decruption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described deciphering module 702, is additionally operable to the decruption key after adopting deciphering by described encrypted card and the file that need to decipher is decrypted;
Described sending module 704, is additionally operable to the information of decrypted result is sent to manager。
Alternatively, as a kind of enforceable mode, also include:
Authentication module, for being verified the identity of terminal use by described encrypted card;
If checking is not passed through, then sending module 704 is for sending key request, encryption key described in acquisition request to manager。
Alternatively, as a kind of enforceable mode, described acquisition module 701, specifically for:
When described manager is to after being verified of the identity of terminal use, described ciphering terminal receives the described encryption key that described manager sends。
Alternatively, as a kind of enforceable mode, described acquisition module 701, specifically for:
When described manager is to after being verified of user identity, described ciphering terminal receives the described decruption key that described manager sends。
It should be noted that for the embodiment of ciphering terminal, owing to it essentially corresponds to the embodiment of the method for ciphering terminal side, so relevant part illustrates referring to the part of the embodiment of the method for ciphering terminal side。
Fig. 8 is the structural representation of manager one embodiment of the present invention。As shown in Figure 8, the manager of the present embodiment, including: distribution module 801, encrypting module 802, sending module 803 and receiver module 804;
Wherein, distribute module 801, be used for distributing encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Encrypting module 802, for adopting the PKI of described encrypted card that described encryption key is encrypted;
Sending module 803, for the encryption key after sending encryption to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and adopt the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
Receiver module 804, for receiving the information of the encrypted result that described ciphering terminal sends。
Alternatively, as a kind of enforceable mode, also include:
Memory module, is used for storing scrambled record;Described scrambled record includes: the information of described encrypted result, described encryption and decryption double secret key。
Alternatively, as a kind of enforceable mode, also include:
Acquisition module, for obtaining the encryption and decryption double secret key used in described scrambled record;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described encrypting module 802, is additionally operable to the PKI adopting described encrypted card and described decruption key is encrypted;
Described sending module 803, it is additionally operable to the decruption key after sending encryption to described ciphering terminal, so that described decruption key is decrypted by described ciphering terminal by the private key of described encrypted card, and adopt the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
Described receiver module 804, is additionally operable to receive the information of the decrypted result that described ciphering terminal sends。
Alternatively, as a kind of enforceable mode, described memory module, it is additionally operable to storage deciphering record;Described deciphering record includes: the information of described decrypted result, described encryption and decryption double secret key。
Alternatively, as a kind of enforceable mode, also include:
Authentication module, for being verified the identity of the user of described ciphering terminal。
It should be noted that for the embodiment of manager, owing to it essentially corresponds to the embodiment of the method for manager side, so relevant part illustrates referring to the part of the embodiment of the method for manager side。
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can be completed by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program upon execution, performs to include the step of said method embodiment;And aforesaid storage medium includes: the various media that can store program code such as ROM, RAM, magnetic disc or CDs。
Last it is noted that various embodiments above is only in order to illustrate technical scheme, it is not intended to limit;Although the present invention being described in detail with reference to foregoing embodiments, it will be understood by those within the art that: the technical scheme described in foregoing embodiments still can be modified by it, or wherein some or all of technical characteristic is carried out equivalent replacement;And these amendments or replacement, do not make the essence of appropriate technical solution depart from the scope of various embodiments of the present invention technical scheme。

Claims (15)

1. the method that a ciphering terminal remotely manages, it is characterised in that be applied to ciphering terminal, described ciphering terminal includes encrypted card, and described method includes:
Ciphering terminal obtains encryption key, and by the private key of described encrypted card, described encryption key is decrypted;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described ciphering terminal adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
The information of encrypted result is sent to manager by described ciphering terminal。
2. method according to claim 1, it is characterised in that also include:
Described ciphering terminal obtains decruption key, and by the private key of described encrypted card, described decruption key is decrypted;Described decruption key is the key after manager adopts the decruption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described ciphering terminal adopts the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
The information of decrypted result is sent to manager by described ciphering terminal。
3. method according to claim 1 and 2, it is characterised in that described ciphering terminal also includes before obtaining encryption key:
The identity of terminal use is verified by described ciphering terminal by described encrypted card;
If checking is not passed through, then send key request, encryption key described in acquisition request to manager。
4. method according to claim 1 and 2, it is characterised in that described ciphering terminal obtains encryption key, including:
When described manager is to after being verified of the identity of terminal use, described ciphering terminal receives the described encryption key that described manager sends。
5. method according to claim 2, it is characterised in that described ciphering terminal obtains decruption key, including:
When described manager is to after being verified of user identity, described ciphering terminal receives the described decruption key that described manager sends。
6. the method that a ciphering terminal remotely manages, it is characterised in that be applied to ciphering terminal, described ciphering terminal includes encrypted card, and described method includes:
Manager distribution encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described manager adopts the PKI of described encrypted card that described encryption key is encrypted;
Described manager sends the encryption key after encrypting to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and adopts the encryption key after deciphering that the file that need to encrypt is encrypted by described encrypted card;
Described manager receives the information of the encrypted result that described ciphering terminal sends。
7. method according to claim 6, it is characterised in that described manager storage scrambled record;Described scrambled record includes: the information of described encrypted result, described encryption and decryption double secret key。
8. method according to claim 7, it is characterised in that also include:
Described manager obtains the encryption and decryption double secret key used in described scrambled record;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described manager adopts the PKI of described encrypted card that described decruption key is encrypted;
Described manager sends the decruption key after encrypting to described ciphering terminal, so that described decruption key is decrypted by described ciphering terminal by the private key of described encrypted card, and adopt the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
Described manager receives the information of the decrypted result that described ciphering terminal sends。
9. method according to claim 8, it is characterised in that described manager storage deciphering record;Described deciphering record includes: the information of described decrypted result, described encryption and decryption double secret key。
10. the method according to any one of claim 6-9, it is characterised in that before described manager distribution encryption and decryption double secret key, also include:
The identity of the user of described ciphering terminal is verified。
11. a ciphering terminal, it is characterised in that described ciphering terminal includes encrypted card, and described ciphering terminal also includes:
Acquisition module, is used for obtaining encryption key;
Deciphering module, for being decrypted described encryption key by the private key of described encrypted card;Described encryption key is the key after manager adopts the encryption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Encrypting module, is encrypted the file that need to encrypt for the encryption key after adopting deciphering by described encrypted card;
Sending module, for being sent to manager by the information of encrypted result。
12. ciphering terminal according to claim 11, it is characterised in that
Described acquisition module, is additionally operable to obtain decruption key;
Described deciphering module, is additionally operable to the private key by described encrypted card and described decruption key is decrypted;Described decruption key is the key after manager adopts the decruption key of encryption and decryption cipher key pair that described manager is distributed by the PKI of described encrypted card to be encrypted;
Described deciphering module, is additionally operable to the decruption key after adopting deciphering by described encrypted card and the file that need to decipher is decrypted;
Described sending module, is additionally operable to the information of decrypted result is sent to manager。
13. a manager, it is characterised in that including:
Distribution module, is used for distributing encryption and decryption double secret key;Described encryption and decryption double secret key includes: encryption key and decruption key;
Encrypting module, for adopting the PKI of described encrypted card that described encryption key is encrypted;
Sending module, for the encryption key after sending encryption to described ciphering terminal, so that described encryption key is decrypted by described ciphering terminal by described encrypted card, and is encrypted the file that need to encrypt by the encryption key after the employing deciphering of described encrypted card;
Receiver module, for receiving the information of the encrypted result that described ciphering terminal sends。
14. manager according to claim 13, it is characterised in that also include:
Memory module, is used for storing scrambled record;Described scrambled record includes: the information of described encrypted result, described encryption and decryption double secret key。
15. manager according to claim 14, it is characterised in that also include:
Acquisition module, for obtaining the encryption and decryption double secret key used in described scrambled record;Described encryption and decryption double secret key includes: encryption key and decruption key;
Described encrypting module, is additionally operable to the PKI adopting described encrypted card and described decruption key is encrypted;
Described sending module, it is additionally operable to the decruption key after sending encryption to described ciphering terminal, so that described decruption key is decrypted by described ciphering terminal by the private key of described encrypted card, and adopt the decruption key after deciphering that the file that need to decipher is decrypted by described encrypted card;
Described receiver module, is additionally operable to receive the information of the decrypted result that described ciphering terminal sends。
CN201610131161.3A 2016-03-08 2016-03-08 Encryption terminal remote management method, encryption terminal and manager Pending CN105701390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610131161.3A CN105701390A (en) 2016-03-08 2016-03-08 Encryption terminal remote management method, encryption terminal and manager

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610131161.3A CN105701390A (en) 2016-03-08 2016-03-08 Encryption terminal remote management method, encryption terminal and manager

Publications (1)

Publication Number Publication Date
CN105701390A true CN105701390A (en) 2016-06-22

Family

ID=56221029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610131161.3A Pending CN105701390A (en) 2016-03-08 2016-03-08 Encryption terminal remote management method, encryption terminal and manager

Country Status (1)

Country Link
CN (1) CN105701390A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656510A (en) * 2017-01-04 2017-05-10 天地融科技股份有限公司 Encryption key acquisition method and system
CN106682521A (en) * 2016-11-28 2017-05-17 北京计算机技术及应用研究所 File transparent encryption and decryption system and method based on driver layer
CN107181589A (en) * 2017-04-11 2017-09-19 北京奇艺世纪科技有限公司 A kind of fort machine private key management method and device
CN111314062A (en) * 2020-01-14 2020-06-19 支付宝(杭州)信息技术有限公司 Smart card data issuing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144439A1 (en) * 2003-12-26 2005-06-30 Nam Je Park System and method of managing encryption key management system for mobile terminals
CN101115060A (en) * 2007-08-09 2008-01-30 上海格尔软件股份有限公司 Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN103067160A (en) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050144439A1 (en) * 2003-12-26 2005-06-30 Nam Je Park System and method of managing encryption key management system for mobile terminals
CN101115060A (en) * 2007-08-09 2008-01-30 上海格尔软件股份有限公司 Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN103067160A (en) * 2013-01-14 2013-04-24 江苏智联天地科技有限公司 Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103259651A (en) * 2013-05-30 2013-08-21 成都欣知科技有限公司 Encryption and decryption method and system of terminal data
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682521A (en) * 2016-11-28 2017-05-17 北京计算机技术及应用研究所 File transparent encryption and decryption system and method based on driver layer
CN106682521B (en) * 2016-11-28 2020-02-07 北京计算机技术及应用研究所 File transparent encryption and decryption system and method based on driver layer
CN106656510A (en) * 2017-01-04 2017-05-10 天地融科技股份有限公司 Encryption key acquisition method and system
CN106656510B (en) * 2017-01-04 2019-07-30 天地融科技股份有限公司 A kind of encryption key acquisition methods and system
CN107181589A (en) * 2017-04-11 2017-09-19 北京奇艺世纪科技有限公司 A kind of fort machine private key management method and device
CN107181589B (en) * 2017-04-11 2020-09-22 北京奇艺世纪科技有限公司 Bastion machine private key management method and device
CN111314062A (en) * 2020-01-14 2020-06-19 支付宝(杭州)信息技术有限公司 Smart card data issuing method and device, electronic equipment and storage medium
CN111314062B (en) * 2020-01-14 2022-10-18 支付宝(杭州)信息技术有限公司 Smart card data issuing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN103179086B (en) Remote storage processing method and the system of data
CN101950347B (en) Method and system for encrypting data
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
CN105653986B (en) A kind of data guard method and device based on microSD card
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN101783800A (en) Embedded system safety communication method, device and system
CN102123027A (en) Information security processing method and mobile terminal
CN102801730A (en) Information protection method and device for communication and portable devices
CN107547203B (en) Anti-counterfeiting tracing method and system
CN104200176A (en) System and method for carrying out transparent encryption and decryption on file in intelligent mobile terminal
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
CN111970114B (en) File encryption method, system, server and storage medium
CN103248476A (en) Data encryption key management method, system and terminal
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN102866960A (en) Method for realizing encryption in storage card, decrypting method and device
CN105701390A (en) Encryption terminal remote management method, encryption terminal and manager
CN113472793A (en) Personal data protection system based on hardware password equipment
CN103577769A (en) File content safety management method and management system
CN103177225B (en) A kind of data managing method and system
CN112507296A (en) User login verification method and system based on block chain
CN104796399A (en) Key negotiation method of data encryption transmission
CN103207976A (en) Mobile storage file leakage-preventing method and confidential U-disk based on same
KR20190134935A (en) System for protecting personal stored file securely in cloud environment
CN103577763A (en) Mobile terminal device with data protection function and data protection method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160622

RJ01 Rejection of invention patent application after publication