CN106487773A - A kind of encryption and decryption method and device - Google Patents
A kind of encryption and decryption method and device Download PDFInfo
- Publication number
- CN106487773A CN106487773A CN201510555464.3A CN201510555464A CN106487773A CN 106487773 A CN106487773 A CN 106487773A CN 201510555464 A CN201510555464 A CN 201510555464A CN 106487773 A CN106487773 A CN 106487773A
- Authority
- CN
- China
- Prior art keywords
- decryption
- encryption
- black list
- switching command
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of encryption and decryption method and device, and described encipher-decipher method includes:According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list and object decryption table;Carry out encryption and decryption using the target black list after switching and object decryption table.The solution of the present invention, enters Mobile state adjustment according to switching command, can rapidly repair security breaches to the encryption table and decryption table required for encryption and decryption, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of encryption and decryption method and device.
Background technology
Currently, encipher-decipher method emerges in an endless stream, and difficulty is also increasing.But, any password is calculated certain
Under the cipher mode of method, crack simply matter of time.
Specifically, current end product carries out simple encryption frequently with base64 encoding mechanism, that is, exist
WEBUI end, to sensitive parameter, such as modification logging, wifi password, APN parameter, DHCP parameter etc., leads to
Cross base64 to be encrypted and be issued to WEBSERVER end, be then decrypted at WEBSERVER end.
But this encipher-decipher method suffers from the drawback that:It is easy to lead to after parameter after encryption is intercepted by hacker
Cross HTTP facility and crack out original sensitive parameter, and expand the security breaches of end product;If repaiied
Mend security breaches, need to spend substantial amounts of man power and material to go to change software code, upgraded version etc..
Content of the invention
It is an object of the invention to provide a kind of encryption and decryption method and device, solve to add present in prior art
The big technical problem of probability that decryption method is cracked, can lift the safety of end product, reduce plus
The probability that manner of decryption is cracked.
In order to realize above-mentioned purpose, the present invention provides a kind of encipher-decipher method, for a terminal, including:
According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list
With object decryption table;
Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
Preferably, described according to switching command, the encryption table and decryption table that described terminal is currently in use switches
Also include before step for target black list and object decryption table:
From cloud server switching command.
Preferably, the described step from cloud server switching command includes:
Within a preset time interval, automatically from cloud server switching command.
Preferably, described according to switching command, the encryption table and decryption table that described terminal is currently in use switches
Also include before step for target black list and object decryption table:
Within a preset time interval, automatically generate switching command.
The present invention also provides a kind of ciphering and deciphering device, is arranged at a terminal, including:
Handover module, for according to switching command, the encryption table and decryption table that described terminal is currently in use is cut
It is changed to target black list and object decryption table;
Encryption/decryption module, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
Preferably, described ciphering and deciphering device also includes:
Receiver module, for from cloud server switching command.
Preferably, described receiver module is specifically within a preset time interval, automatically from cloud server
Switching command.
Preferably, described ciphering and deciphering device also includes:
Generation module, within a preset time interval, automatically generating switching command.
The present invention also provides a kind of encipher-decipher method, for a Cloud Server, including:
Send a switching command a to terminal so that described terminal can be according to described switching command, by it just
Switch to target black list and object decryption table in the encryption table and decryption table using, and using the mesh after switching
Mark black list and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
Preferably, the described step sending a switching command a to terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
The present invention provides a kind of ciphering and deciphering device again, is arranged at a Cloud Server, including:
Sending module, for sending a switching command a to terminal so that described terminal can be cut according to described
Change instruction, the encryption table and decryption table being currently in use switches to target black list and object decryption table, and
Carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
Preferably, described sending module is specifically within a preset time interval, automatically sending a switching command
To a terminal so that described terminal can be according to described switching command, the black list being currently in use is conciliate
Close table switches to target black list and object decryption table, and is carried out using the target black list after switching and target
Encryption and decryption.
By the technique scheme of the present invention, the beneficial effects of the present invention is:
The encryption and decryption method and device of the present invention, conciliates to the black list required for encryption and decryption according to switching command
Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away
When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
Brief description
The flow chart that Fig. 1 represents the encipher-decipher method of one embodiment of the invention.
Fig. 2 represents the structural representation of the ciphering and deciphering device of one embodiment of the invention.
The flow chart that Fig. 3 represents the encipher-decipher method of another embodiment of the present invention.
Fig. 4 represents the structural representation of the ciphering and deciphering device of another embodiment of the present invention.
The flow chart that Fig. 5 represents the encipher-decipher method of the specific embodiment of the invention.
Specific embodiment
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with accompanying drawing pair
Specific embodiment is described in detail.
Shown in Figure 1, the embodiment of the present invention provides a kind of encipher-decipher method, for a terminal, including:
S101:According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target
Black list and object decryption table;
S102:Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
The encipher-decipher method of the embodiment of the present invention, conciliates to the black list required for encryption and decryption according to switching command
Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away
When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
Wherein, in described switching command, there is toggle path information, for the switching of instruction terminal, Ji Jiangzheng
Switch to target black list and object decryption table in the encryption table and decryption table using.
In order to realize handoff procedure, according to the size of tag memory, in terminal, preserve at least two sets black lists
And decryption table, and the encryption table and decryption table of every suit is all coupling, that is, decryption table is one kind of black list
Inversely.When a set of encryption table and decryption table goes wrong, may be switched to another set of encryption table and decryption table,
Quick realization change encryption mechanism.
For example, terminal A is currently in use black list 1 and decryption table 1 carries out encryption and decryption, when terminal A
Encryption and decryption mode when being cracked, according to switching command, black list 1 and decryption table 1 are switched to target to add
Close table 3 and object decryption table 3, and carry out adding using the target black list 3 after switching and object decryption table 3
Deciphering, that is, update encryption and decryption mode, it is to avoid again by hacker's success attack in the short time.
In the specific embodiment of the invention, described according to switching command, the black list that described terminal is currently in use
Also include before switching to target black list and the step of object decryption table with decryption table:
From cloud server switching command.
In practical application, when assault successfully a certain area an end product when, this area same
Terminal Type product will be easily by success attack, so that safety easily in the similar end product in this area
Problem.In order to repair the security breaches of the same money end product in this area, can be switched by Cloud Server
The encryption and decryption mode of all same money end products, it is to avoid the expansion further of safety problem.
In order to further lift the safety of end product, the described step from cloud server switching command
Rapid inclusion:
Within a preset time interval, automatically from cloud server switching command.
So, within a preset time interval, automatically from cloud server switching command, and cut according to described
Change the encryption table and decryption table that instruction dynamic adjustment terminal is used, can greatly increase hack close
The difficulty of code, lifts the safety of end product further.
Additionally, it is also possible to carry out encryption and decryption mode in itself using terminal in the case of not against Cloud Server
Switching.I.e. in the specific embodiment of the invention, described according to switching command, described terminal is currently in use
Encryption table and decryption table switch to target black list and the step of object decryption table before also include:
Within a preset time interval, automatically generate switching command.
So, in the case of economizing on resources, equally ensure that the safety of end product.
It should be noted that the terminal in the present invention is, for example, MBB product, UFI product or CPE product
Deng the present invention is not limited.
In the specific embodiment of the invention, in order to increase the difficulty of hack encryption and decryption mode, described encryption
Default in table and decryption table is irregular mapping relations of milli between character, i.e. mapping between character is closed
System is irregular, or the mapping relations being obtained using the more difficult AES cracking.So, do not knowing about
In the case of encryption table and decryption table, it is difficult to the content after cracking encryption, reduce what encryption and decryption mode was cracked
Probability.
For example, black list can be as shown in table 1, and matching decryption table can be as shown in table 2:
Character | Encryption | Character | Encryption | Character | Encryption | Character | Encryption |
a | V | u | a | O | 23 | 8 | lo7 |
b | B | v | 12s | P | sw | 9 | h7 |
c | AD | w | 12d | Q | hy | . | jj |
d | SG | x | d2 | R | hy | , | j7 |
e | CD | y | 5f | S | sfd | ! | g67 |
q | asd | K | sad12 | 4 | m4 | ||
t | bg | N | 2 | 7 | 89p |
Table 1
Character | Deciphering | Character | Deciphering | Character | Deciphering | Character | Deciphering |
V | a | a | u | 23 | O | lo7 | 8 |
B | b | 12s | v | sw | P | h7 | 9 |
AD | c | 12d | w | hy | Q | jj | . |
SG | d | d2 | x | hy | R | j7 | , |
CD | e | 5f | y | sfd | S | g67 | ! |
asd | q | sad12 | K | m4 | 4 | ||
bg | t | 2 | N | 89p | 7 |
Table 2
When the decryption table of the black list according to table 1 and table 2 carries out encryption and decryption, such as terminal WEBUI end obtains
The login password arriving is a8u7, can obtain encryption parameter Vlo7a89p after table 1 encryption, by encryption ginseng
Number Vlo7a89p is issued to WEBSERVER end, then deciphers through table 2 at WEBSERVER end
Login password a8u7 just can be obtained afterwards.
Shown in Figure 2, the embodiment of the present invention also provides a kind of ciphering and deciphering device, is arranged at a terminal, with
Encipher-decipher method shown in Fig. 1 is corresponding, and described ciphering and deciphering device includes:
Handover module 21, for according to switching command, the black list that be currently in use described terminal and deciphering
Table switches to target black list and object decryption table;
Encryption/decryption module 22, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
The ciphering and deciphering device of the embodiment of the present invention, conciliates to the black list required for encryption and decryption according to switching command
Close table enters Mobile state adjustment, can rapidly repair security breaches, the safety of lifting end product, and keep away
When exempting to occur safety problem, expend substantial amounts of man power and material and go to change software code, upgraded version.
In practical application, when assault successfully a certain area an end product when, this area same
Terminal Type product will be easily by success attack, so that safety easily in the similar end product in this area
Problem.In order to repair the security breaches of the same money end product in this area, can be switched by Cloud Server
The encryption and decryption mode of all same money end products, it is to avoid the expansion further of safety problem.
Based on the above, in the specific embodiment of the invention, described ciphering and deciphering device also includes:
Receiver module, for from cloud server switching command.
In order to further lift the safety of end product, described receiver module is specifically in Preset Time
In interval, automatically from cloud server switching command.
So, within a preset time interval, automatically from cloud server switching command, and cut according to described
Change the encryption table and decryption table that instruction dynamic adjustment terminal is used, can greatly increase hack close
The difficulty of code, lifts the safety of end product further.
Additionally, it is also possible to carry out encryption and decryption mode in itself using terminal in the case of not against Cloud Server
Switching.I.e. in the specific embodiment of the invention, described ciphering and deciphering device also includes:
Generation module, within a preset time interval, automatically generating switching command.
In the specific embodiment of the invention, in order to increase the difficulty of hack encryption and decryption mode, described encryption
Default in table and decryption table is irregular mapping relations of milli between character, i.e. mapping between character is closed
System is irregular, or the mapping relations being obtained using the more difficult AES cracking.So, do not knowing about
In the case of encryption table and decryption table, it is difficult to the content after cracking encryption, reduce what encryption and decryption mode was cracked
Probability.
Shown in Figure 3, the embodiment of the present invention also provides a kind of encipher-decipher method, for a Cloud Server,
Including:
S301:Send a switching command a to terminal so that described terminal can according to described switching command,
The encryption table and decryption table being currently in use switches to target black list and object decryption table, and using switching
Target black list afterwards and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
The encipher-decipher method of the embodiment of the present invention, by sending switching command to terminal so that described terminal energy
Enough according to described switching command, the encryption table and decryption table being currently in use switches to target black list and mesh
Mark decryption table, and carry out encryption and decryption using the target black list after switching and target, can rapidly repair peace
Full leak, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of manpower and
Material resources go to change software code, upgraded version.
Specifically, in order to further lift the safety of end product, described transmission one switching command to
The step of terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
In such manner, it is possible to ensure terminal within a preset time interval, its black list of being used of dynamic switching and
Decryption table, greatly increases the difficulty of decryption, lifts the safety of end product further.
Shown in Figure 4, the embodiment of the present invention also provides a kind of ciphering and deciphering device, is arranged at a Cloud Server,
Corresponding with the encipher-decipher method shown in Fig. 3, described ciphering and deciphering device includes:
Sending module 41, for sending a switching command a to terminal so that described terminal can be according to institute
State switching command, the encryption table and decryption table being currently in use switches to target black list and object decryption table,
And carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
The ciphering and deciphering device of the embodiment of the present invention, by sending switching command to terminal so that described terminal energy
Enough according to described switching command, the encryption table and decryption table being currently in use switches to target black list and mesh
Mark decryption table, and carry out encryption and decryption using the target black list after switching and target, can rapidly repair peace
Full leak, the safety of lifting end product, and when avoiding the occurrence of safety problem, expend substantial amounts of manpower and
Material resources go to change software code, upgraded version.
In the specific embodiment of the invention, described sending module specifically within a preset time interval, automatically
Send a switching command a to terminal so that it can be made by described terminal according to described switching command
Encryption table and decryption table switches to target black list and object decryption table, and is added using the target after switching
Close table and target carry out encryption and decryption.
For the ease of understanding the present invention, below by Fig. 5, detailed Jie is carried out to the encipher-decipher method of the present invention
Continue.
Shown in Figure 5, terminal is, for example, UFI product, mainly includes WEBUI end and WEBSERVER
End, and between described WEBUI end and WEBSERVER end, pass through security socket layer Hyper text transfer
Agreement HTTPS interacts, and n black list is deposited at described WEBUI end, simultaneously described
WEBSERVER deposits at end corresponding n decryption table.
In the specific embodiment of the invention, so that switching command is sent for specific application scenarios by Cloud Server
Encipher-decipher method provided in an embodiment of the present invention is introduced, specifically, described encipher-decipher method include with
Lower step:
S501:Cloud Server sends switching command to terminal, and described switching command instruction terminal is by black list 1
Switch to target black list 2 and object decryption table 2 with decryption table 1;
S502:According to described switching command, the black list 1 that it is currently in use and decryption table 1 are carried out terminal
Switching, switches to target black list 2 and object decryption table 2, and utilizes described black list 2 and decryption table 2
Carry out encryption and decryption.
The above is only the preferred embodiment of the present invention it is noted that common for the art
For technical staff, under the premise without departing from the principles of the invention, some improvements and modifications can also be made,
These improvements and modifications also should be regarded as protection scope of the present invention.
Claims (12)
1. a kind of encipher-decipher method, for a terminal it is characterised in that including:
According to switching command, the encryption table and decryption table that described terminal is currently in use switches to target black list
With object decryption table;
Carry out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
2. encipher-decipher method according to claim 1 it is characterised in that described according to switching command,
The encryption table and decryption table that described terminal is currently in use switches to target black list and the step of object decryption table
Also include before rapid:
From cloud server switching command.
3. encipher-decipher method according to claim 2 is it is characterised in that described connect from Cloud Server
The step receiving switching command includes:
Within a preset time interval, automatically from cloud server switching command.
4. encipher-decipher method according to claim 1 it is characterised in that described according to switching command,
The encryption table and decryption table that described terminal is currently in use switches to target black list and the step of object decryption table
Also include before rapid:
Within a preset time interval, automatically generate switching command.
5. a kind of ciphering and deciphering device, is arranged at a terminal it is characterised in that including:
Handover module, for according to switching command, the encryption table and decryption table that described terminal is currently in use is cut
It is changed to target black list and object decryption table;
Encryption/decryption module, for carrying out encryption and decryption using the target black list after switching and object decryption table;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
6. ciphering and deciphering device according to claim 5 is it is characterised in that also include:
Receiver module, for from cloud server switching command.
7. ciphering and deciphering device according to claim 6 is it is characterised in that described receiver module is concrete
For within a preset time interval, automatically from cloud server switching command.
8. ciphering and deciphering device according to claim 5 is it is characterised in that also include:
Generation module, within a preset time interval, automatically generating switching command.
9. a kind of encipher-decipher method, for a Cloud Server it is characterised in that including:
Send a switching command a to terminal so that described terminal can be according to described switching command, by it just
Switch to target black list and object decryption table in the encryption table and decryption table using, and using the mesh after switching
Mark black list and target carry out encryption and decryption;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
10. encipher-decipher method according to claim 9 is it is characterised in that described transmission one switching refers to
The step making a terminal includes:
Within a preset time interval, automatically send a switching command to a terminal.
A kind of 11. ciphering and deciphering devices, are arranged at a Cloud Server it is characterised in that including:
Sending module, for sending a switching command a to terminal so that described terminal can be cut according to described
Change instruction, the encryption table and decryption table being currently in use switches to target black list and object decryption table, and
Carry out encryption and decryption using the target black list after switching and target;
Wherein, preserve at least two sets encryption table and decryption tables in described terminal, and the black list of every suit and
Decryption table is all coupling.
12. ciphering and deciphering devices according to claim 11 are it is characterised in that described sending module has
Body is used within a preset time interval, automatically sends a switching command a to terminal so that described terminal can
According to described switching command, the encryption table and decryption table being currently in use switches to target black list and target
Decryption table, and carry out encryption and decryption using the target black list after switching and target.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510555464.3A CN106487773A (en) | 2015-09-01 | 2015-09-01 | A kind of encryption and decryption method and device |
PCT/CN2016/080921 WO2017036158A1 (en) | 2015-09-01 | 2016-05-03 | Method and device for encryption and decryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510555464.3A CN106487773A (en) | 2015-09-01 | 2015-09-01 | A kind of encryption and decryption method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106487773A true CN106487773A (en) | 2017-03-08 |
Family
ID=58188394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510555464.3A Withdrawn CN106487773A (en) | 2015-09-01 | 2015-09-01 | A kind of encryption and decryption method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106487773A (en) |
WO (1) | WO2017036158A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598151A (en) * | 2018-11-29 | 2019-04-09 | 中国电子科技集团公司第四十七研究所 | Instruction code dynamic encryption and decryption method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1983924A (en) * | 2006-05-30 | 2007-06-20 | 华为技术有限公司 | Decoding switch method, decoder and terminal equipment |
AU2007244719A1 (en) * | 2006-04-28 | 2007-11-08 | Qualcomm Incorporated | Uninterrupted transmission during a change in ciphering configuration |
CN101399662A (en) * | 2008-09-27 | 2009-04-01 | 北京创毅视讯科技有限公司 | Method, system, conditional receiving module and customer terminal for obtaining service key |
CN101478752A (en) * | 2009-01-12 | 2009-07-08 | 中兴通讯股份有限公司 | Cipher key replacing method, system and device |
CN103873895A (en) * | 2012-12-14 | 2014-06-18 | 中国传媒大学 | DVB/IPTV dual-mode interactive business protection system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8369525B2 (en) * | 2002-10-24 | 2013-02-05 | At&T Mobility Ii Llc | Dynamic password update for wireless encryption system |
WO2012163043A1 (en) * | 2011-11-09 | 2012-12-06 | 华为技术有限公司 | Method, device and system for protecting data security in cloud |
CN103051963B (en) * | 2012-11-30 | 2018-02-13 | 北京视博数字电视科技有限公司 | A kind of method of controlling security of digital-television terminal equipment |
CN103457995A (en) * | 2013-06-07 | 2013-12-18 | 北京百纳威尔科技有限公司 | Data information storage method for terminal equipment, terminal equipment and cloud terminal server |
-
2015
- 2015-09-01 CN CN201510555464.3A patent/CN106487773A/en not_active Withdrawn
-
2016
- 2016-05-03 WO PCT/CN2016/080921 patent/WO2017036158A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2007244719A1 (en) * | 2006-04-28 | 2007-11-08 | Qualcomm Incorporated | Uninterrupted transmission during a change in ciphering configuration |
CN1983924A (en) * | 2006-05-30 | 2007-06-20 | 华为技术有限公司 | Decoding switch method, decoder and terminal equipment |
CN101399662A (en) * | 2008-09-27 | 2009-04-01 | 北京创毅视讯科技有限公司 | Method, system, conditional receiving module and customer terminal for obtaining service key |
CN101478752A (en) * | 2009-01-12 | 2009-07-08 | 中兴通讯股份有限公司 | Cipher key replacing method, system and device |
CN103873895A (en) * | 2012-12-14 | 2014-06-18 | 中国传媒大学 | DVB/IPTV dual-mode interactive business protection system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598151A (en) * | 2018-11-29 | 2019-04-09 | 中国电子科技集团公司第四十七研究所 | Instruction code dynamic encryption and decryption method |
CN109598151B (en) * | 2018-11-29 | 2023-02-21 | 中国电子科技集团公司第四十七研究所 | Dynamic encryption and decryption method for instruction code |
Also Published As
Publication number | Publication date |
---|---|
WO2017036158A1 (en) | 2017-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102355340B1 (en) | Apparatus and method for mobility procedures involving mobility management entity relocation | |
KR102567587B1 (en) | Apparatuses and methods for wireless communication | |
CN101232731B (en) | Method and system for UE to generate cryptographic key switching from UTRAN to EUTRAN | |
CN101946535A (en) | System and method for performing handovers, or key management while performing handovers in a wireless communication system | |
KR20100021385A (en) | Security protected non -access stratum protocol operation supporting method in mobile telecommunication system | |
RU2530331C2 (en) | Multicast key negotiation method suitable for group calling system and respective system | |
US7107051B1 (en) | Technique to establish wireless session keys suitable for roaming | |
CN104202308A (en) | Implementation method of safe batch configuration of Wi-Fi Internet of Things system | |
CN105557007A (en) | Method and system to enable secure communication for inter-enb transmission | |
CN101981892A (en) | Systems and methods for group key distribution and management for wireless communications systems | |
CN104065765A (en) | WIFI data transmitting method and system and related method thereof | |
US20150229620A1 (en) | Key management in machine type communication system | |
CN101267668A (en) | Secret key generation method, device and system | |
CN102457844A (en) | Method and system for managing group key in M2M (machine-to-machine) group authentication | |
CN109450627B (en) | Mobile equipment communication network integrating quantum communication and wireless communication and communication method thereof | |
KR20100126691A (en) | System and method for performing handovers, or key management while performing handovers in a wireless communication system | |
US10616761B2 (en) | Method, server, base station and communication system for configuring security parameters | |
CN106487773A (en) | A kind of encryption and decryption method and device | |
CN104902473A (en) | Wireless network access authentication method and device based on CPK (Combined Public Key Cryptosystem) identity authentication | |
KR20100092353A (en) | Methods and apparatus of managing a traffic encryption key | |
Southern et al. | Wireless security: securing mobile UMTS communications from interoperation of GSM | |
CN105393567B (en) | Method and device for secure transmission of data | |
CN109451493B (en) | WPA-based key configuration method and device | |
CN110169128B (en) | Communication method, device and system | |
CN104301332A (en) | Secret key distribution system based on wireless cascading |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170308 |
|
WW01 | Invention patent application withdrawn after publication |