CN106452754B - Multi-user online dynamic encryption method and device - Google Patents
Multi-user online dynamic encryption method and device Download PDFInfo
- Publication number
- CN106452754B CN106452754B CN201610953682.7A CN201610953682A CN106452754B CN 106452754 B CN106452754 B CN 106452754B CN 201610953682 A CN201610953682 A CN 201610953682A CN 106452754 B CN106452754 B CN 106452754B
- Authority
- CN
- China
- Prior art keywords
- key
- data
- different
- fragments
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 239000012634 fragment Substances 0.000 claims abstract description 40
- 230000005540 biological transmission Effects 0.000 claims description 13
- 238000012423 maintenance Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012946 outsourcing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a multi-person online dynamic encryption method and a device, wherein the method comprises the steps of obtaining different key fragments input by a plurality of persons online in real time, and mixing the key fragments of the plurality of persons into a key A according to a set mechanism through a background program. And the secret key A is encrypted by using a private key M through an asymmetric encryption algorithm to generate a ciphertext B encrypted by the secret key A. The cipher text B and the data encrypted by the key A are transmitted to a data receiving party, the receiving party decrypts the key B by using a public key M corresponding to a private key M to restore the key A, and then decrypts the encrypted data file by using the key A.
Description
Technical Field
The invention relates to the field of online dynamic encryption, in particular to a multi-user online dynamic encryption method and device.
Background
Encryption technology: the encryption technology is the main security measure for electronic information, and is the most common security measure, and the process of the encryption technology utilizes the technical measure to change important data into unreadable random code files (ciphertexts) for transmission, and the unreadable random code files are restored into original data (decrypted) by the same or different measures after reaching a destination. Encryption techniques are mainly classified into symmetric encryption and asymmetric encryption.
And (3) secret key: a key is a parameter that is input in an algorithm that converts plaintext into ciphertext or converts ciphertext into plaintext. Keys are divided into symmetric keys and asymmetric keys. It may exist in the form of a string, digital certificate, or U-shield.
Symmetric encryption: symmetric encryption adopts a symmetric cipher coding technology, and is characterized in that the same key is used for file encryption and decryption, namely, the encryption key can also be used as a decryption key. Due to its fast speed, symmetric encryption is often used when the sender of a message needs to encrypt a large amount of data. Symmetric encryption is also referred to as key encryption. A symmetrically encrypted key is also referred to herein as a unique key.
Asymmetric encryption: asymmetric encryption provides a pair of keys, a public key (public key) and a private key (private key), for encryption and decryption of data. The private key can only be safely kept by one party and cannot be leaked out, while the public key can be sent to any person who requests it. Asymmetric encryption uses one of the pair of keys for encryption, while decryption requires the other key. Asymmetric encryption is more secure than symmetric encryption, but the processing speed is slower.
When large-scale data encryption and decryption are processed, a symmetric encryption algorithm with high efficiency is often needed due to the consideration of operation speed, but keys used by the symmetric algorithm are the same key, and higher risks exist in use management.
Disclosure of Invention
The invention aims to provide a multi-user online dynamic encryption method and a multi-user online dynamic encryption device, which are consistent in encryption and decryption keys of symmetric encryption. The method has two risks, one is that a single custodian of the key masters the complete key, the risk of losing the key exists, in addition, a receiver of the data in the transmission process also has the possibility of losing the key, and although the key has an expiration mechanism, the risk is higher. The present invention reduces the risk of this process primarily through unique key generation and asymmetric key transmission.
In order to achieve the purpose, the invention provides the following scheme: a multi-user online dynamic encryption method comprises the following steps:
A. acquiring a plurality of different key fragments in real time on line;
B. mixing different key fragments into a key A;
C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B;
D. acquiring data to be transmitted, encrypting the data to be transmitted by a secret key A to obtain encrypted transmitted data, and sending a ciphertext B and the encrypted data to be transmitted to a data receiver;
E. and receiving the ciphertext B and the data transmitted after encryption, decrypting the ciphertext B through a public key M corresponding to the private key M to obtain a secret key A, and decrypting the data to be transmitted after encryption through the secret key A to obtain the decrypted data.
Optionally, before step a is executed, queue maintenance is performed on a plurality of different key fragment sources.
Optionally, before step a is executed, when the secure data transmission is initiated, the source queues of the multiple different key fragments are notified through a message mechanism, and the multiple different key fragments are collected through the message mechanism.
Optionally, in step B, the unique key is generated by a plurality of different key fragments through the obfuscation procedure, and the unique key is not repeated when the key fragments input each time are different.
The invention also provides a multi-user online dynamic encryption device, which comprises:
a maintaining module, configured to maintain a plurality of different key fragment queues;
the acquisition module is used for acquiring a plurality of different key fragments;
the confusion module is used for mixing different key fragments into a key A;
the encryption module is used for encrypting the secret key A and data to be transmitted;
and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the mode of dynamically generating the key by inputting the key segments on line by a plurality of persons enables the encrypted password to be changed every time without setting the failure time limit, and meanwhile, the key is dispersed in hands of the plurality of persons, and the whole key cannot be obtained by any key segment, and the information transmission is safer by the technical mode of transmitting the symmetric encryption key through asymmetric encryption. And finally, the symmetric encryption is used to ensure the decryption speed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a schematic flow chart of a multi-user online dynamic encryption method and apparatus according to the present invention;
FIG. 2 is a schematic diagram of a structural module of a multi-user online dynamic encryption method and apparatus according to the present invention;
fig. 3 is a schematic flowchart of a multi-user online dynamic encryption method and apparatus in embodiment 1 of the present invention;
fig. 4 is a flowchart illustrating a multi-user online dynamic encryption method and apparatus in embodiment 2 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a multi-user online dynamic encryption method and a device, comprising the following steps: A. acquiring a plurality of different key fragments in real time on line; B. mixing different key fragments into a key A; C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B; D. acquiring data to be transmitted, encrypting the data to be transmitted by a secret key A to obtain encrypted transmitted data, and sending a ciphertext B and the encrypted data to be transmitted to a data receiver; E. and receiving the ciphertext B and the data transmitted after encryption, decrypting the ciphertext B through a public key M corresponding to the private key M to obtain a secret key A, and decrypting the data to be transmitted after encryption through the secret key A to obtain the decrypted data. Before step a is executed, queue maintenance is performed on a plurality of different key fragment sources. Before step A is executed, when secret data transmission is initiated, a plurality of different secret key fragment source queues are informed through a message mechanism, and a plurality of different secret key fragments are collected through the message mechanism in a unified mode. In the step B, the plurality of different key fragments generate the unique key through the obfuscation procedure, and the unique key is not repeated when the key fragments input each time are different.
The invention also provides a multi-user online dynamic encryption device, which comprises: a maintaining module, configured to maintain a plurality of different key fragment queues; the acquisition module is used for acquiring a plurality of different key fragments; the confusion module is used for mixing different key fragments into a key A; the encryption module is used for encrypting the secret key A and data to be transmitted; and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Example one
The invention relates to a software program realized by J2EE, which has the main principle that a plurality of people are supported to input different key fragments mastered by themselves in real time on line, and the key fragments of the plurality of people are mixed into a key A according to a set mechanism through a background program. And the secret key A is encrypted by using a private key M through an asymmetric encryption algorithm to generate a ciphertext B encrypted by the secret key A. And transmitting the ciphertext B and the data encrypted by the key A to a data receiving party, decrypting the key B by the receiving party by using a public key M corresponding to the private key M to restore the key A, and decrypting the encrypted data file by using the key A.
The mode of dynamically generating the key by inputting the key segments on line by a plurality of persons enables the encrypted password to be changed every time without setting the failure time limit, and meanwhile, the key is dispersed in hands of the plurality of persons, and the whole key cannot be obtained by any key segment, and the information transmission is safer by the technical mode of transmitting the symmetric encryption key through asymmetric encryption. And finally, the symmetric encryption is used to ensure the decryption speed.
A secret key generator is adopted to generate a public key and a private key, a private key data sending party is used for encrypting data, and a public key data receiving party is used for decrypting data.
In the embodiment of the invention, a plurality of persons participate in the key generation, and any person is absent and cannot generate the same key again, so that the possibility of key leakage is reduced. The data adopts symmetric encryption, and the secret key adopts asymmetric encryption, thereby not only ensuring the transmission safety, but also ensuring the performance of big data encryption and decryption
Example two
The invention is used in the process of encrypting and transmitting the passwords of the rechargeable cards to the cooperative card makers so as to produce the rechargeable cards in batches.
During transfer, a plurality of employees of the operator input own key fragments on line (the data transfer input is different each time), and when all the employees complete the input, the key fragments are synthesized into a unique key by using a obfuscation program. And then encrypting the password data of the rechargeable card by using the unique key, simultaneously transmitting the unique key to a third-party card manufacturer through asymmetric encryption, restoring the unique key by using a decryption logic built in a decryption program at the card manufacturer side, and restoring the encrypted file by using the unique key.
In the process, the invention properly solves the problems of safe generation of the encryption key, encrypted transmission of the rechargeable card password and password decryption of a third party cooperation card manufacturer.
When the recharging card password is transmitted, in consideration of confidentiality, a plurality of persons participate in the encryption key generation process at the same time, and the risk of leakage of the plurality of persons at the same time is very low. And in the process of each key generation, because the password segments input by a plurality of people can be different (actually, the password segments input by a plurality of people are different each time), the encryption keys generated by the password data of the rechargeable card are different each time, and the risk range is reduced.
The cooperation card manufacturer outsourcing an enterprise for a third party, considering safety, the timeliness required by the encryption key is as short as possible, the timeliness is only limited to the transmission because the encryption keys transmitted each time are different, and meanwhile, the third party manufacturer takes the encryption text of the unique key, so that the leakage risk is reduced.
The number of the rechargeable cards is large, and although asymmetric encryption and decryption are used for key transmission, symmetric encryption and decryption are used for final decryption, so that the performance is high.
Firstly, configuring an employee list needing to participate in password generation, logging all employees in the employee list into a system when generating a rechargeable card password, and maintaining an employee online queue by the system.
The system sends an encryption key making application to the employees of the employee queue.
The queue uses websocket to notify the employees online, and after the employees receive the online message, everyone inputs the key fragment (alphanumeric chinese combined string).
And collecting all the password fragments in the employee queue through a message collection function.
And the obfuscating program exchanges the characters in all the code segments for multiple positions, and then carries out code conversion again to generate a unique key for symmetrically encrypting data.
The original data to be transmitted is encrypted using 3DES using the unique key to form an encrypted file a.
The operator holds the private key of asymmetric RSA and the card maker holds the public key. The operator re-encrypts the unique key with RSA using the private key to generate encrypted file B.
The encrypted files a and B are separately passed to the card manufacturer.
And the card manufacturer decrypts the encrypted file B by using the public key to obtain the unique public key.
And the card manufacturer decrypts the encrypted file A by using the unique public key to obtain the original data.
In the embodiment of the invention, two or more persons participate in the key generation, and any person is absent and cannot generate the same key again, so that the possibility of key leakage is reduced. The data is encrypted symmetrically, and the key is encrypted asymmetrically, so that the transmission safety is ensured, and the encryption and decryption performance of the big data is also ensured.
The principles and embodiments of the present invention are explained herein using various embodiments, which are merely used to help understand the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.
Claims (3)
1. A multi-user online dynamic encryption method is characterized by comprising the following steps:
A. acquiring a plurality of different key fragments in real time on line;
B. mixing the different key fragments into a key A;
C. setting a private key M, and encrypting the secret key A by using an asymmetric encryption algorithm through the private key M to obtain a ciphertext B;
D. acquiring data to be transmitted, encrypting the data to be transmitted by the secret key A to obtain encrypted data, and sending the ciphertext B and the encrypted data to be transmitted to a data receiver;
E. receiving the ciphertext B and the encrypted transmitted data, decrypting the ciphertext B through a public key corresponding to the private key M to obtain a secret key A, and decrypting the encrypted transmitted data through the secret key A to obtain decrypted data;
in the step B, the plurality of different key fragments generate the unique key through a confusion program, and the unique key cannot be repeated when the key fragments input each time are different;
before the step A, when the secure data transmission is initiated, notifying the source queues of the different key fragments through a message mechanism, and uniformly collecting the different key fragments through the message mechanism.
2. The multi-user online dynamic encryption method of claim 1, wherein before step A, the method further comprises maintaining a queue of the plurality of different key fragment sources.
3. An apparatus for implementing the multi-person online dynamic encryption method according to any one of claims 1 and 2, comprising:
a maintaining module, configured to maintain a plurality of different key fragment queues;
the acquisition module is used for acquiring a plurality of different key fragments;
the confusion module is used for mixing different key fragments into a key A; the plurality of different key fragments generate the unique key through the obfuscation program, and the unique key cannot be repeated when the key fragments input each time are different;
the encryption module is used for encrypting the secret key A and data to be transmitted;
and the decryption module is used for decrypting the encrypted secret key A and the transmitted data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610953682.7A CN106452754B (en) | 2016-11-03 | 2016-11-03 | Multi-user online dynamic encryption method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610953682.7A CN106452754B (en) | 2016-11-03 | 2016-11-03 | Multi-user online dynamic encryption method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106452754A CN106452754A (en) | 2017-02-22 |
CN106452754B true CN106452754B (en) | 2020-09-08 |
Family
ID=58179283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610953682.7A Active CN106452754B (en) | 2016-11-03 | 2016-11-03 | Multi-user online dynamic encryption method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106452754B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108540486A (en) * | 2018-04-23 | 2018-09-14 | 湖南东方华龙信息科技有限公司 | The generation of cloud key and application method |
CN111614667A (en) * | 2020-05-20 | 2020-09-01 | 北京科东电力控制系统有限责任公司 | Safety encryption method, device and system for real-time data transmission of power grid regulation and control information |
CN114745134B (en) * | 2022-03-30 | 2024-05-31 | 恒玄科技(上海)股份有限公司 | Method, system, device and computer readable medium for streaming media data stream |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338106A (en) * | 2013-07-18 | 2013-10-02 | 曙光云计算技术有限公司 | Methods and devices for ciphering and deciphering file |
CN104935565A (en) * | 2015-04-15 | 2015-09-23 | 浙江师范大学 | Vote processing system used for network voting system, vote processing method used for network voting system and vote processing device used for network voting system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100536393C (en) * | 2005-01-14 | 2009-09-02 | 中兴通讯股份有限公司 | Secret shared key mechanism based user management method |
US8705730B2 (en) * | 2010-12-23 | 2014-04-22 | Morega Systems Inc. | Elliptic curve cryptography with fragmented key processing and methods for use therewith |
CN104868996A (en) * | 2014-02-25 | 2015-08-26 | 中兴通讯股份有限公司 | Data encryption and decryption method, device thereof, and terminal |
CN103986583B (en) * | 2014-05-29 | 2019-11-29 | 上海斐讯数据通信技术有限公司 | A kind of dynamic encrypting method and its cryptographic communication system |
-
2016
- 2016-11-03 CN CN201610953682.7A patent/CN106452754B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103338106A (en) * | 2013-07-18 | 2013-10-02 | 曙光云计算技术有限公司 | Methods and devices for ciphering and deciphering file |
CN104935565A (en) * | 2015-04-15 | 2015-09-23 | 浙江师范大学 | Vote processing system used for network voting system, vote processing method used for network voting system and vote processing device used for network voting system |
Also Published As
Publication number | Publication date |
---|---|
CN106452754A (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101043326B (en) | Dynamic information encrypting system and method | |
CN102546181A (en) | Cloud storage encrypting and deciphering method based on secret key pool | |
CN107196926A (en) | A kind of cloud outsourcing privacy set comparative approach and device | |
CN105812366B (en) | Server, anti-crawler system and anti-crawler verification method | |
CN104052658A (en) | Privacy protection system and method based on social network | |
CN105376261B (en) | Encryption method and system for instant messaging message | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN109005027B (en) | Random data encryption and decryption method, device and system | |
CN105554031A (en) | Encryption method, encryption apparatus, decryption method, decryption apparatus and terminal | |
CN107181584B (en) | Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof | |
CN102833075A (en) | Identity authentication and digital signature method based on three-layered overlapping type key management technology | |
CN106452754B (en) | Multi-user online dynamic encryption method and device | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN204180095U (en) | A kind of ciphering and deciphering device for network data encryption transmission | |
CN104486756B (en) | A kind of encryption and decryption method and system of close writing paper short message | |
CN101431411A (en) | Dynamic encryption method for network game data | |
CN104113410A (en) | Method and device for data encryption transmission based on multi-table encryption method | |
Kuppuswamy et al. | New Innovation of Arabic language Encryption Technique using New symmetric key algorithm | |
CN108650277A (en) | A kind of data encryption and transmission method | |
KR101602803B1 (en) | The encryption and decryption Method of using to polarization | |
CN116962067A (en) | Information encryption method, device and equipment | |
CN106487509B (en) | A kind of method and host equipment generating key | |
CN112149166B (en) | Unconventional password protection method and intelligent bank machine | |
CN102025743A (en) | Method and device for exporting mirror image of virtual machine in cloud computing | |
KR101793528B1 (en) | Certificateless public key encryption system and receiving terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: Room 1004, 10th Floor, Building 26, No. 40 Xueyuan Road, Haidian District, Beijing, 100089 Patentee after: Guotou Fusion Technology Co.,Ltd. Country or region after: China Address before: Room 1004, 10th Floor, Building 26, No. 40 Xueyuan Road, Haidian District, Beijing, 100089 Patentee before: DATANG TELECOM CONVERGENCE COMMUNICATIONS CO.,LTD. Country or region before: China |