CN105722067A - 移动终端上数据加/解密方法及装置 - Google Patents
移动终端上数据加/解密方法及装置 Download PDFInfo
- Publication number
- CN105722067A CN105722067A CN201410721298.5A CN201410721298A CN105722067A CN 105722067 A CN105722067 A CN 105722067A CN 201410721298 A CN201410721298 A CN 201410721298A CN 105722067 A CN105722067 A CN 105722067A
- Authority
- CN
- China
- Prior art keywords
- key
- encryption
- identification information
- data
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (12)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410721298.5A CN105722067B (zh) | 2014-12-02 | 2014-12-02 | 移动终端上数据加/解密方法及装置 |
EP15866319.5A EP3229510B1 (en) | 2014-12-02 | 2015-11-26 | Method and apparatus for encrypting/decrypting data on mobile terminal |
SG11201703941RA SG11201703941RA (en) | 2014-12-02 | 2015-11-26 | Method and apparatus for encrypting/decrypting data on mobile terminal |
PCT/CN2015/095588 WO2016086788A1 (zh) | 2014-12-02 | 2015-11-26 | 移动终端上数据加/解密方法及装置 |
JP2017529311A JP6533291B2 (ja) | 2014-12-02 | 2015-11-26 | モバイル端末上のデータを暗号化/復号化するための方法及び装置 |
KR1020177014346A KR102051720B1 (ko) | 2014-12-02 | 2015-11-26 | 모바일 단말 상의 데이터를 암호화/복호화하는 방법 및 장치 |
US15/601,531 US11134377B2 (en) | 2014-12-02 | 2017-05-22 | Encrypting/decrypting data on mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410721298.5A CN105722067B (zh) | 2014-12-02 | 2014-12-02 | 移动终端上数据加/解密方法及装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105722067A true CN105722067A (zh) | 2016-06-29 |
CN105722067B CN105722067B (zh) | 2019-08-13 |
Family
ID=56090997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410721298.5A Active CN105722067B (zh) | 2014-12-02 | 2014-12-02 | 移动终端上数据加/解密方法及装置 |
Country Status (7)
Country | Link |
---|---|
US (1) | US11134377B2 (zh) |
EP (1) | EP3229510B1 (zh) |
JP (1) | JP6533291B2 (zh) |
KR (1) | KR102051720B1 (zh) |
CN (1) | CN105722067B (zh) |
SG (1) | SG11201703941RA (zh) |
WO (1) | WO2016086788A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108235798A (zh) * | 2017-12-27 | 2018-06-29 | 福建联迪商用设备有限公司 | 一种公私钥对获取方法、系统和pos终端 |
CN109286921A (zh) * | 2018-09-25 | 2019-01-29 | 锐达互动科技股份有限公司 | 一种便携式多场景教学身份认证方法 |
CN110661814A (zh) * | 2019-10-14 | 2020-01-07 | 江苏国泰新点软件有限公司 | 一种投标文件加解密方法、装置、设备和介质 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018109850A1 (ja) * | 2016-12-14 | 2018-06-21 | 三菱電機株式会社 | 通信機器、電気機器、端末、通信方法およびプログラム |
KR102525429B1 (ko) * | 2018-04-27 | 2023-04-26 | 에릭슨엘지엔터프라이즈 주식회사 | 시스템 식별자를 생성 및 저장하는 사설 교환기 장치 및 방법 |
JP6894469B2 (ja) * | 2019-06-11 | 2021-06-30 | 株式会社ユビキタスAiコーポレーション | 情報処理装置およびその制御プログラム |
CN111901099A (zh) * | 2020-06-16 | 2020-11-06 | 上海眼控科技股份有限公司 | 一种用于加密车辆信息的方法、系统及设备 |
CN112906034B (zh) * | 2021-03-16 | 2022-04-05 | 北京深思数盾科技股份有限公司 | 一种密钥保存方法、装置、存储介质及电子设备 |
CN113114457A (zh) * | 2021-04-06 | 2021-07-13 | 支付宝(杭州)信息技术有限公司 | 数据处理方法及装置 |
CN114143026B (zh) * | 2021-10-26 | 2024-01-23 | 福建福诺移动通信技术有限公司 | 基于非对称与对称加密的数据安全接口及其工作方法 |
CN114399007B (zh) * | 2021-11-30 | 2024-04-30 | 中国建设银行股份有限公司 | 信息反馈的方法、装置、计算机设备和存储介质 |
CN115618374A (zh) * | 2022-01-18 | 2023-01-17 | 云丁网络技术(北京)有限公司 | 用于提高通信安全的方法和装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1607511A (zh) * | 2003-10-14 | 2005-04-20 | 联想(北京)有限公司 | 数据保护方法及保护系统 |
CN101478595A (zh) * | 2008-09-08 | 2009-07-08 | 广东南方信息安全产业基地有限公司 | 移动通信终端数据保护方法 |
CN101711028A (zh) * | 2009-11-26 | 2010-05-19 | 南京烽火星空通信发展有限公司 | 一种移动终端设备上用户数据的自动保护方法 |
CN101778381A (zh) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | 数字证书生成方法、用户密钥获取方法、移动终端及设备 |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3788056B2 (ja) * | 1998-08-07 | 2006-06-21 | カシオ計算機株式会社 | 電子スチルカメラ |
JP2002016592A (ja) * | 2000-04-25 | 2002-01-18 | Open Loop:Kk | 暗号鍵管理システム及び暗号鍵管理方法 |
JP2003085321A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | コンテンツ利用権限管理システム、コンテンツ利用権限管理方法、および情報処理装置、並びにコンピュータ・プログラム |
US7373515B2 (en) * | 2001-10-09 | 2008-05-13 | Wireless Key Identification Systems, Inc. | Multi-factor authentication system |
CN100508448C (zh) * | 2001-10-12 | 2009-07-01 | 松下电器产业株式会社 | 内容处理装置 |
US20030217037A1 (en) * | 2002-01-22 | 2003-11-20 | Uwe Bicker | Method and system for anonymous test administration and user-enabled personal health risk assessment |
DE602004011284T8 (de) | 2003-04-16 | 2009-08-13 | Nec Corp. | Mobiles Endgerät, Verwaltungsverfahren für seine Daten und Rechnerprogramm zur Datenverwaltung |
JP3800198B2 (ja) * | 2003-05-16 | 2006-07-26 | ソニー株式会社 | 情報処理装置、およびアクセス制御処理方法、並びにコンピュータ・プログラム |
CN100403814C (zh) * | 2004-11-25 | 2008-07-16 | 华为技术有限公司 | 一种组播广播业务密钥控制方法 |
JP2006301887A (ja) * | 2005-04-19 | 2006-11-02 | Toshiba Corp | 情報記憶再生システムとその情報端末及び情報バックアップ装置 |
US8719954B2 (en) * | 2006-10-11 | 2014-05-06 | Bassilic Technologies Llc | Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content |
JP5053032B2 (ja) * | 2007-10-16 | 2012-10-17 | 株式会社バッファロー | データ管理装置、データ管理方法およびデータ管理プログラム |
KR100958108B1 (ko) * | 2007-11-12 | 2010-05-17 | 한국전자통신연구원 | 이동통신 단말기의 프로그램 불법복제 방지 방법 및 장치 |
US8824684B2 (en) * | 2007-12-08 | 2014-09-02 | International Business Machines Corporation | Dynamic, selective obfuscation of information for multi-party transmission |
CN101335579A (zh) * | 2008-08-01 | 2008-12-31 | 北京创毅视讯科技有限公司 | 一种实现条件接收的方法及条件接收装置 |
US8307410B2 (en) * | 2008-08-12 | 2012-11-06 | Mastercard International Incorporated | Systems, methods, and computer readable media for providing for secure offline data transfer between wireless smart devices |
US8589680B2 (en) | 2010-04-07 | 2013-11-19 | Apple Inc. | System and method for synchronizing encrypted data on a device having file-level content protection |
US8433901B2 (en) * | 2010-04-07 | 2013-04-30 | Apple Inc. | System and method for wiping encrypted data on a device having file-level content protection |
CN101977299A (zh) * | 2010-09-19 | 2011-02-16 | 中兴通讯股份有限公司 | 一种手机电视内容保护的方法及系统 |
CN102170357B (zh) * | 2011-05-31 | 2013-09-25 | 北京虎符科技有限公司 | 组合密钥动态安全管理系统 |
CN103067401B (zh) * | 2013-01-10 | 2015-07-01 | 天地融科技股份有限公司 | 密钥保护方法和系统 |
US9143492B2 (en) * | 2013-03-15 | 2015-09-22 | Fortinet, Inc. | Soft token system |
KR102124413B1 (ko) * | 2013-12-30 | 2020-06-19 | 삼성에스디에스 주식회사 | 아이디 기반 키 관리 시스템 및 방법 |
US9641344B1 (en) * | 2013-09-20 | 2017-05-02 | Mobile Iron, Inc. | Multiple factor authentication in an identity certificate service |
JP2015065495A (ja) * | 2013-09-24 | 2015-04-09 | ルネサスエレクトロニクス株式会社 | 暗号鍵供給方法、半導体集積回路および暗号鍵管理装置 |
US10445233B2 (en) * | 2014-06-23 | 2019-10-15 | Canon Kabushiki Kaisha | Information processing apparatus, information processing method, and storage medium |
-
2014
- 2014-12-02 CN CN201410721298.5A patent/CN105722067B/zh active Active
-
2015
- 2015-11-26 EP EP15866319.5A patent/EP3229510B1/en active Active
- 2015-11-26 JP JP2017529311A patent/JP6533291B2/ja active Active
- 2015-11-26 KR KR1020177014346A patent/KR102051720B1/ko active IP Right Grant
- 2015-11-26 WO PCT/CN2015/095588 patent/WO2016086788A1/zh active Application Filing
- 2015-11-26 SG SG11201703941RA patent/SG11201703941RA/en unknown
-
2017
- 2017-05-22 US US15/601,531 patent/US11134377B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1607511A (zh) * | 2003-10-14 | 2005-04-20 | 联想(北京)有限公司 | 数据保护方法及保护系统 |
CN101478595A (zh) * | 2008-09-08 | 2009-07-08 | 广东南方信息安全产业基地有限公司 | 移动通信终端数据保护方法 |
CN101711028A (zh) * | 2009-11-26 | 2010-05-19 | 南京烽火星空通信发展有限公司 | 一种移动终端设备上用户数据的自动保护方法 |
CN101778381A (zh) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | 数字证书生成方法、用户密钥获取方法、移动终端及设备 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108235798A (zh) * | 2017-12-27 | 2018-06-29 | 福建联迪商用设备有限公司 | 一种公私钥对获取方法、系统和pos终端 |
WO2019127145A1 (zh) * | 2017-12-27 | 2019-07-04 | 福建联迪商用设备有限公司 | 一种公私钥对获取方法、系统和pos终端 |
CN109286921A (zh) * | 2018-09-25 | 2019-01-29 | 锐达互动科技股份有限公司 | 一种便携式多场景教学身份认证方法 |
CN109286921B (zh) * | 2018-09-25 | 2021-07-02 | 锐达互动科技股份有限公司 | 一种便携式多场景教学身份认证方法 |
CN110661814A (zh) * | 2019-10-14 | 2020-01-07 | 江苏国泰新点软件有限公司 | 一种投标文件加解密方法、装置、设备和介质 |
Also Published As
Publication number | Publication date |
---|---|
JP6533291B2 (ja) | 2019-06-19 |
US11134377B2 (en) | 2021-09-28 |
US20170264435A1 (en) | 2017-09-14 |
EP3229510B1 (en) | 2021-07-21 |
JP2017538353A (ja) | 2017-12-21 |
SG11201703941RA (en) | 2017-06-29 |
KR102051720B1 (ko) | 2019-12-03 |
CN105722067B (zh) | 2019-08-13 |
EP3229510A4 (en) | 2018-06-20 |
KR20170091609A (ko) | 2017-08-09 |
WO2016086788A1 (zh) | 2016-06-09 |
EP3229510A1 (en) | 2017-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105722067A (zh) | 移动终端上数据加/解密方法及装置 | |
US10187200B1 (en) | System and method for generating a multi-stage key for use in cryptographic operations | |
CN101789865B (zh) | 一种用于加密的专用服务器及加密方法 | |
CN103378971B (zh) | 一种数据加密系统及方法 | |
CN103067160A (zh) | 一种加密sd卡的动态密钥生成的方法及系统 | |
CN107453880A (zh) | 一种云数据安全存储方法和系统 | |
CN111404953A (zh) | 一种消息加密方法、解密方法及相关装置、系统 | |
JP2014175970A (ja) | 情報配信システム、情報処理装置及びプログラム | |
CN112738133A (zh) | 一种rsa认证方法 | |
KR101358375B1 (ko) | 스미싱 방지를 위한 문자메시지 보안 시스템 및 방법 | |
CN104734847A (zh) | 面向公钥密码应用的共享对称密钥数据加密和解密方法 | |
CN107342865B (zh) | 一种基于sm4的认证加密算法 | |
CN102740246B (zh) | 媒体消息处理方法、系统及装置 | |
Rathidevi et al. | Trends of cryptography stepping from ancient to modern | |
CN107689867B (zh) | 一种在开放环境下的密钥保护方法和系统 | |
CN107276961A (zh) | 一种基于密码算法加密和解密数据的方法及装置 | |
WO2018059303A1 (zh) | 一种短信中信息加解密的方法和装置 | |
KR101793528B1 (ko) | 무인증서 공개키 암호 시스템 | |
Pandey et al. | Data security using various cryptography Techniques: A Recent Survey | |
CN111010386A (zh) | 一种基于共享账本的隐私保护与数据监管控制方法 | |
US20170126399A1 (en) | Encryption apparatus, storage system, decryption apparatus, encryption method, decryption method, and computer readable medium | |
Hidayat | Application of the AES Cryptographic Algorithm for E-mail Encryption and Description | |
JP2015070498A (ja) | 鍵交換システム、鍵交換装置、その方法、及びプログラム | |
Patgiri et al. | SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data | |
CN111162901B (zh) | 非sim终端的应用共享密钥获取方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1226237 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201010 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20201010 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Patentee after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Patentee before: Alibaba Group Holding Ltd. |
|
TR01 | Transfer of patent right |