CN106535184A - Key management method and system - Google Patents
Key management method and system Download PDFInfo
- Publication number
- CN106535184A CN106535184A CN201610908752.7A CN201610908752A CN106535184A CN 106535184 A CN106535184 A CN 106535184A CN 201610908752 A CN201610908752 A CN 201610908752A CN 106535184 A CN106535184 A CN 106535184A
- Authority
- CN
- China
- Prior art keywords
- key
- local device
- close pipe
- session key
- session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the invention discloses a key management method and system. The key management method includes the steps: if home terminal equipment detects that a user triggers the operation on opposite terminal equipment, the home terminal equipment sends a key application message to a key management server; according to the received key application message, the key management server generates a session key corresponding to an identifier of the home terminal equipment randomly, and sends the session key to the home terminal equipment; if the home terminal equipment receives the session key, the home terminal equipment sends a communication request to the opposite terminal equipment; according to the identifier of the home terminal equipment included in the communication request, the opposite terminal equipment requests the key management server to acquire the session key corresponding to the home terminal equipment; and if the opposite terminal equipment receives the session key, the opposite terminal equipment gives a response to the communication request and establishes communication connection with the home terminal equipment. The technical scheme of the key management method and system enables both the home terminal equipment and the opposite terminal equipment to safely acquire the session key of the communication of this time, thus improving generation safety and transmission safety for the session key, and guaranteeing safe transmission of the communication content.
Description
Technical field
A kind of the present invention relates to communication technical field, more particularly to method and system of key management.
Background technology
At present, the intelligent terminal such as smart mobile phone is widely spread, and user is being carried out using these intelligent terminals
During communication, Content of Communication is easily monitored and is stolen by Malware.And existing coded communication mode is generally all adopted
With software cryptography algorithm or hardware encryption algorithm, key information is generated by folk prescription, and is transmitted directly to other side, this to set up both sides
The mode of speech scrambling easily causes key information and is stolen, and causes communication process by malicious attack, brings safety to user
Hidden danger.
The content of the invention
The embodiment of the present invention provides a kind of method and system of key management, and the key that can improve coded communication generates peace
Full property and transmission security, so that ensure the safe transmission of Content of Communication.
In a first aspect, embodiments providing a kind of method of key management, the method includes:
If local device detects the operation that user's triggering is communicated with opposite equip., key Shen is sent to close pipe server
Please message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for that session is close
Key;
The close pipe server generates the local device mark right at random according to the key solicitation message for receiving
The session key answered, and the session key is sent to into the local device;
If the local device receives the session key, communication request, wherein, institute is sent to the opposite equip.
State communication request and carry the local device mark;
The local device mark that the opposite equip. is included according to the communication request, please to the close pipe server
The acquisition local device is asked to identify the corresponding session key;
If the opposite equip. receives the session key, the communication request is responded, built with the local device
Vertical communication connection.
On the other hand, a kind of system of key management is embodiments provided, the system includes local device, opposite end
Equipment and close pipe server;
The local device includes:
Key application unit, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe server
Key solicitation message is sent, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen
Please session key;
Communication request unit, if for receiving the session key, sending communication request to the opposite equip., its
In, the communication request carries the local device mark;
The opposite equip. includes:
Key acquiring unit, for the local device mark included according to the communication request, takes to the close pipe
Local device described in business device acquisition request identifies the corresponding session key;
Communication response unit, if for receiving the session key, responding the communication request, is set with the local terminal
It is standby to set up communication connection;
The close pipe server includes:
Key generating unit, for according to the key solicitation message for receiving, generating the local device mark at random
Know the corresponding session key, and the session key is sent to into the local device;
Key obtains processing unit, obtains the corresponding meeting of the local device mark for processing the opposite equip.
The request of words key.
The embodiment of the present invention by local device detect user triggering communicate with opposite equip. operation when, Xiang Miguan
Server sends key solicitation message, applies for session key, and receive random generation that close pipe server sends this
Communication request is sent to opposite equip. after the session key of communication, opposite equip. please to close pipe server after receiving communication request
The session key is sought, and is responded to local device return communication after the session key that close pipe server sends is received, made
The session key that local device and opposite equip. all get safely this communication is obtained, the generation security of session key is improve
And transmission security, so as to ensure the safe transmission of Content of Communication.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below needed for it is to be used
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention one is provided;
Fig. 2 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention two is provided;
Fig. 3 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention three is provided;
Fig. 4 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention four is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this
Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art
Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated
The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole
The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are clearly indicated hereafter, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more and be possible to combination being associated in the item listed, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the local device described in the embodiment of the present invention including but not limited to such as has the sensitive table of touch
Other of the mobile phone in face (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc
Portable set.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have
The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch pad).
In discussion below, describe to include the local device of display and touch sensitive surface.However, should manage
Solution, local device can include that one or more of the other physical User of such as physical keyboard, mouse and/or control-rod connects
Jaws equipment.
Local device supports various application programs, such as it is following in one or more:Drawing application program, demonstration application
Program, word-processing application, website establishment application program, disk imprinting application program, spreadsheet applications, game are answered
With program, telephony application, videoconference application, email application, instant messaging applications, forging
Refining supports that application program, photo management application program, digital camera application program, digital camera application program, web-browsing should
With program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on local device can be using at least one of such as touch sensitive surface
Public physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change touch is quick
The corresponding information shown in the one or more functions on sense surface and local device.So, the public physics frame of local device
Structure (for example, touch sensitive surface) can support the various application journeys with user interface directly perceived and transparent for a user
Sequence.
Embodiment one:
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention one is provided, this
The executive agent of embodiment includes local device, opposite equip. terminal and server, and wherein, local device and opposite equip. are
Terminal device, which can be specifically the equipment such as smart mobile phone or other intelligent terminals.The method of the key management shown in Fig. 1 can
To comprise the following steps:
If S101, local device detect the operation that user's triggering is communicated with opposite equip., send to close pipe server
Key solicitation message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for that session is close
Key.
Specifically, close pipe server is mainly used in completing the generation of key and encryption storage, encryption process and to key
Management etc..
When local device detects user's triggering of local device with the traffic operation of opposite equip., and opposite equip.
Before setting up communication connection, local device sends the key solicitation message for carrying local device mark to close pipe server, is used for
The session key used during application and the coded communication of opposite equip..
Local device is identified for unique mark local device, and which can be specifically the client identification module of local device
The identification code that (Subscriber Identification Module, SIM) blocks, or the corresponding communicating number of SIM, or
Central processing unit (Central Processing Unit, CPU) identification code, or other can be with unique mark local device
Identification information, is not limited herein.
, according to the key solicitation message for receiving, the random local device that generates identifies corresponding meeting for S102, close pipe server
Words key, and the session key is sent to into local device.
Specifically, close pipe server receives the key solicitation message of local device transmission, according in key solicitation message
Local device mark, it is random to generate and the local device corresponding session key of mark, and the session key is sent to into local terminal
Equipment.
It should be noted that session key is used for the message encryption of local device and opposite equip. in communication process conciliating
Close, in connection setup each time, local device all can be close to the session used in close pipe server application this communication process
Key, and the session key be randomly generated it is unique, different its session key of communication process are also differed, so as to
Ensure that words one are close, improve the security of Content of Communication transmission in communication process.
If S103, local device receive session key, communication request is sent to opposite equip., wherein, the communication please
Seek carrying local device mark.
Specifically, if local device receives the session key of this communication that close pipe server sends, set to opposite end
Preparation send communication request message, and the communication request message carries local device mark.
Communication request message can be transmitted by internet message, and it is close that the communication request message need not carry session
Key.
S104, opposite equip. are identified according to the local device that communication request is included, and obtain local terminal to close pipe server request
The corresponding session key of device identification.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message
The local device mark of carrying, and the corresponding session key of local device mark is obtained to close pipe server request.
If S105, opposite equip. receive session key, communication request is responded, set up with local device and communicate to connect.
Specifically, if opposite equip. receives the corresponding session key of local device mark that close pipe server sends,
The communication request message that response local device sends, sets up and the communication connection of local device so that local device user with it is right
Call can be encrypted using session key between end equipment user.
Session key used in communication process need not be sent out during connection setup by local device and opposite equip.
Other side is given, but by the application of close pipe server and obtains the session key, so as to improve the security of session key.
Knowable to the method for the key management of above-mentioned Fig. 1 examples, in the present embodiment, local device detect user triggering with
During the operation of opposite equip. communication, key solicitation message is sent to close pipe server, apply for session key, and receiving close pipe
Communication request is sent to opposite equip. after the session key of this communication of the random generation that server sends, opposite equip. is received
To after communication request to close pipe server request session key, and after the session key that close pipe server sends is received
Respond to local device return communication so that local device and opposite equip. all get safely the session key of this communication,
Generation security and the transmission security of session key is improve, so as to ensure the safe transmission of Content of Communication.
Embodiment two:
Fig. 2 is referred to, Fig. 2 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention two is provided, this
The executive agent of embodiment includes local device, opposite equip. terminal and server, and wherein, local device and opposite equip. are
Terminal device, which can be specifically the equipment such as smart mobile phone or other intelligent terminals.The method of the key management shown in Fig. 2 can
To comprise the following steps:
If S201, local device detect the operation that user's triggering is communicated with opposite equip., application bag is set up.
Specifically, when local device detects user's triggering of local device with the traffic operation of opposite equip., with
Opposite equip. set up communication connection before, local device set up application bag, this application bag for the application of close pipe server with it is right
The session key used during the coded communication of end equipment.
S202, local device are signed to applying for bag using the signature private key for prestoring, and using the close pipe public key for prestoring
Application bag after signature is encrypted.
Specifically, local device can be beforehand through e-business certification authorized organization (CA, Certificate
Authority) apply digital certificate, while beforehand through safety chip generate signature key pair, signature key to including signature
Public signature key is sent to close pipe server and is preserved by public key and signature private key, local device.Dense tubular system (DTS) can pre- Mr.
Into the corresponding encryption key of local device to close pipe key pair, for the interaction message between local device encryption conciliate
It is close.Close pipe key is to including close pipe private key and close pipe public key, encryption key is to including encrypted public key and encryption key.Numbers above
Certificate, encryption key are to, signature key to generating the behaviour that can be communicated with opposite equip. in user's triggering with close pipe key pair
Carry out before work, specifically corresponding private communication application software can carry out in starting up of terminal or in first time using terminal
Carry out during registration, be not limited herein.
Safety chip is by using fixed commercial cipher algorithm, realizing the encryption and decryption to data, for example, safe core
Piece can use domestic A3 chips.Terminal with safety chip can be encrypted to communication process, it is ensured that communication security, together
When the Information Security that is stored in safety chip it is higher, be difficult to be stolen.Each safety chip is when dispatching from the factory with unique
Sequence number.
Application bag after local device is identified and encrypted by S203, local device generates key solicitation message, and this is close
Key solicitation message is sent to close pipe server, and wherein, the key solicitation message carries local device mark, the key solicitation message
For applying for session key.
Specifically, local device is identified for unique mark local device, and which can be specifically that the client of local device knows
The identification code that other module (Subscriber Identification Module, SIM) blocks, or the corresponding messenger of SIM
Code, or central processing unit (Central Processing Unit, CPU) identification code, or other can be with unique mark local terminal
The identification information of equipment, is not limited herein.
Application bag after local device is identified and encrypted by local device generates key solicitation message, and by the key application
Message is sent to close pipe server.Close pipe server be mainly used in completing the generation of key and encryption storage, encryption process and
Management to key etc..
, according to the key solicitation message for receiving, the random local device that generates identifies corresponding meeting for S204, close pipe server
Words key, and the session key is sent to into local device.
It should be noted that session key is used for the message encryption of local device and opposite equip. in communication process conciliating
Close, in connection setup each time, local device all can be close to the session used in close pipe server application this communication process
Key, and the session key be randomly generated it is unique, different its session key of communication process are also differed, so as to
Ensure that words one are close, improve the security of Content of Communication transmission in communication process.
Specifically, according to the key solicitation message for receiving, random generation local device mark is corresponding for close pipe server
Session key, and the detailed process that the session key is sent to local device can be complete to step S2045 by step S2041
Into detailed description is as follows:
S2041, close pipe server are identified according to the local device that key solicitation message is included, and obtain the local device for prestoring
Corresponding close pipe key is identified to, the public signature key of local device and the encryption key pair of local device.
Specifically, close pipe server receives the key solicitation message of local device transmission, obtains in key solicitation message
Local device mark, identified to obtain the local device that prestores and identify corresponding close pipe key according to local device, local terminal set
The encryption key pair of standby public signature key and local device.
S2042, close pipe server are decrypted to the application bag that key solicitation message is included using close pipe private key, and are used
Public signature key carries out sign test to the application bag after decryption.
Specifically, as local device signature private key used in step S202 is signed to applying for bag, and using close
Pipe public key is encrypted to the application bag after signature, therefore, close pipe server identifies corresponding close pipe private key using local device
Application bag is decrypted, and identifies corresponding public signature key using local device carries out sign test to the application bag after decryption.
If S2043, sign test success, close pipe server generate session key at random, and the session key and local terminal are set
Standby mark correspondence is preserved.
Specifically, if the sign test result in step S2042 is sign test success, close pipe server confirms the identity of local device
The key solicitation message safety that legal and local device sends, then close pipe server generate session key at random, and by the meeting
Key is corresponding with local device mark is stored in close pipe server for words.
S2044, close pipe server are encrypted to session key using encrypted public key, and using after close pipe private key pair encryption
Session key signed.
Specifically, close pipe server identifies meeting of the corresponding encrypted public key to generating in step S2043 using local device
Words key is encrypted, and the session key identified after corresponding close pipe private key pair encryption using local device is signed.
Session key after signature is sent to local device by S2045, close pipe server.
Specifically, the session key encrypted in step S2044 and sign is sent to local device by close pipe server.
If S205, local device receive session key, communication request is sent to opposite equip., wherein, the communication please
Seek carrying local device mark.
Specifically, if local device receives session key, the detailed process for sending communication request to opposite equip. can
To be completed to step S2053 by step S2051, describe in detail as follows:
If S2051, local device receive the session key after signature, session key is tested using close pipe public key
Sign.
Specifically, if local device receives the encryption of close pipe server transmission and the session key after signature, use
The close pipe public key for prestoring carries out sign test to the session key.
If S2052, sign test success, local device are decrypted to session key using the encryption key for prestoring, are obtained
Session key after decryption.
Specifically, if sign test success, local device confirms that the session key is sent from close pipe server legitimacy, local terminal
Equipment is decrypted to session key using the encryption key for prestoring, the session key after being decrypted, and local device is by the meeting
Words key is stored in safety chip, for encryption and decryption in communication process to communication information.
S2053, local device send communication request to opposite equip..
Specifically, communication request message can be transmitted by internet message, and the communication request message carries local terminal and sets
Standby mark, it is not necessary to carry session key.
S206, opposite equip. are identified according to the local device that communication request is included, and obtain local terminal to close pipe server request
The corresponding session key of device identification.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message
The local device mark of carrying, and the corresponding session key of local device mark is obtained to close pipe server request.
Specifically, opposite equip. is identified according to the local device that communication request is included, and obtains this to close pipe server request
End equipment is identified the detailed process of corresponding session key and can be completed to step S2062 by step S2061, is described in detail such as
Under:
S2061, opposite equip. are identified according to the local device that communication request is included, and send key request to close pipe server
Message, wherein, the secret key request message carries local device mark, and the secret key request message is right for obtaining local device mark
The session key answered.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message
The local device mark of carrying, sends the secret key request message for carrying local device mark to close pipe server, for obtaining this
End equipment identifies corresponding session key.
It should be noted that the secret key request message that opposite equip. is sent to dense tubular system (DTS), can according to step S201
Key solicitation message identical method is sent to step S203 local device to dense tubular system (DTS) to be processed, adopt and local device
Identical is encrypted and signature scheme is encrypted to secret key request message and signs, and here is omitted.
Local device is identified corresponding session key according to the secret key request message for receiving by S2062, close pipe server
It is sent to opposite equip..
Specifically, close pipe server receives the secret key request message of opposite equip., can using with step S2041 to walk
Rapid S2042 is decrypted to key solicitation message identical and the mode of sign test obtains decryption and the secret key request message after sign test, this
Place repeats no more.
Close pipe server obtains local device mark corresponding according to the local device mark carried in secret key request message
Session key, and to the session key and signature after, the session key is sent to into opposite equip., concrete encryption and is signed
Mode can using with step S2044 identical method, here is omitted.
If S207, opposite equip. receive session key, communication request is responded, set up with local device and communicate to connect.
Specifically, if opposite equip. receives the corresponding session key of local device mark that close pipe server sends,
The communication request message that response local device sends, sets up and the communication connection of local device so that local device user with it is right
Call can be encrypted using session key between end equipment user.
Session key used in communication process need not be sent out during connection setup by local device and opposite equip.
Other side is given, but by the application of close pipe server and obtains the session key, so as to improve the security of session key.
Knowable to the method for the key management of above-mentioned Fig. 2 examples, in the present embodiment, local device detect user triggering with
During the operation of opposite equip. communication, application bag is set up, signed to applying for bag using the signature private key for prestoring, and using prestoring
Close pipe public key the application bag after signature is encrypted, by local device identify and encrypt after application bag generate key application
Message, and the key solicitation message is sent to into close pipe server, for applying for session key, close pipe server is according to key Shen
Please message package contain local device mark, identify the Shen that corresponding close pipe private key is included to key solicitation message using local device
Please wrap and be decrypted, corresponding public signature key is identified using local device carries out sign test to the application bag after decryption, and in sign test
It is random after success to generate session key, corresponding encrypted public key is identified using local device and session key is encrypted, and make
After the session key identified after corresponding close pipe private key pair encryption with local device is signed, the session key is sent to into this
End equipment, by local device and the interacting message mode of this ciphering signature of close pipe server, it is ensured that session key is being passed
Security during defeated, simultaneously because unique, different its session of communication process that session key is randomly generated
Key is also differed, close so as to ensure words one, improves the security of Content of Communication transmission in communication process;Local device is to meeting
Words key is decrypted and is stored in safety chip with after sign test, and sends communication request to opposite equip., and the call request is not
Need carry session key, after opposite equip. receives communication request, using with local device identical encrypted transmission mode with
Close pipe server carries out interacting message, and to close pipe server request session key, close pipe server is identified according to local device
Get corresponding session key and be sent to opposite equip., opposite equip. returns to local device logical after receiving session key
Letter response, sets up the communication connection with local device, so that local device and opposite equip. all get safely this leading to
The session key of letter, improves generation security and the transmission security of session key, so as to the safety for ensureing Content of Communication is passed
It is defeated.
Embodiment three:
Fig. 3 is referred to, Fig. 3 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention three is provided.In order to
It is easy to explanation, illustrate only the part related to the embodiment of the present invention.Before the system 300 of the key management of Fig. 3 examples can be
A kind of executive agent of the method for key management of the offer of embodiment one is provided.The system 300 of the key management of Fig. 3 examples is main to wrap
Local device 31, opposite equip. 32 and close pipe server 33 is included, is described in detail as follows:
Local device 31 includes:
Key application unit 311, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe service
Device 33 sends key solicitation message, and wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen
Please session key;
Communication request unit 312, if for receiving the session key that close pipe server 33 sends, to opposite equip. 32
Communication request is sent, wherein, the communication request carries local device mark;
Opposite equip. 32 includes:
Key acquiring unit 321, for the local device mark included according to communication request, asks to close pipe server 33
Obtain local device and identify corresponding session key;
Communication response unit 322, if for receiving the session key that close pipe server 33 sends, respond communication request
The communication request that unit 312 sends, is set up with local device 31 and is communicated to connect;
Close pipe server 33 includes:
Key generating unit 331, the key solicitation message of the transmission of key application unit 311 received for basis, with
Machine generates local device and identifies corresponding session key, and the session key is sent to local device 31;
Key obtains processing unit 332, obtains the corresponding session key of local device mark for processing opposite equip. 32
Request.
Local device 31, opposite equip. 32 and close pipe server 33 in the system 300 of the key management that the present embodiment is provided
Each unit realize the process of respective function, specifically refer to the description of aforementioned embodiment illustrated in fig. 1, here is omitted.
Knowable to the system 300 of the key management of above-mentioned Fig. 3 examples, in the present embodiment, local device detects user and touches
When sending out the operation communicated with opposite equip., key solicitation message is sent to close pipe server, apply for session key, and receiving
Communication request, opposite equip. are sent to opposite equip. after the session key of this communication of the random generation that close pipe server sends
Receive after communication request to close pipe server request session key, and it is close the session that close pipe server sends is received
Respond to local device return communication after key so that the session that local device and opposite equip. all get safely this communication is close
Key, improves generation security and the transmission security of session key, so as to ensure the safe transmission of Content of Communication.
Example IV:
Fig. 4 is referred to, Fig. 4 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention four is provided.In order to
It is easy to explanation, illustrate only the part related to the embodiment of the present invention.Before the system 400 of the key management of Fig. 4 examples can be
A kind of executive agent of the method for key management of the offer of embodiment two is provided.The system 400 of the key management of Fig. 4 examples is main to wrap
Local device 41, opposite equip. 42 and close pipe server 43 is included, is described in detail as follows:
Local device 41 includes:
Key application unit 411, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe service
Device 43 sends key solicitation message, and wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen
Please session key;
Communication request unit 412, if for receiving the session key that close pipe server 43 sends, to opposite equip. 42
Communication request is sent, wherein, the communication request carries local device mark;
Opposite equip. 42 includes:
Key acquiring unit 421, for the local device mark included according to communication request, asks to close pipe server 33
Obtain local device and identify corresponding session key;
Communication response unit 422, if for receiving the session key that close pipe server 43 sends, respond communication request
The communication request that unit 412 sends, is set up with local device 41 and is communicated to connect;
Close pipe server 43 includes:
Key generating unit 431, the key solicitation message of the transmission of key application unit 411 received for basis, with
Machine generates local device and identifies corresponding session key, and the session key is sent to local device 41;
Key obtains processing unit 432, obtains the corresponding session key of local device mark for processing opposite equip. 42
Request.
Further, key application unit 411 includes:
Unit 4111 is set up in application, if for detecting the operation that user's triggering is communicated with opposite equip., setting up application
Bag;
Application ciphering unit 4112, sets up the application bag of the foundation of unit 4111 for the signature private key that use prestores to application
Signed, and the application bag after signature is encrypted using the close pipe public key for prestoring;
Application transmitting element 4113, for identifying local device and applying the application Bao Sheng after ciphering unit 4112 is encrypted
Into key solicitation message, and the key solicitation message is sent to into close pipe server 43.
Further, Key generating unit 431 includes:
Acquiring unit 4311, the local device that the key solicitation message for being sent according to application transmitting element 4113 is included
Mark, obtains the local device that prestores and identifies corresponding close pipe key to, the public signature key of local device 41 and local device 41
Encryption key pair, wherein, close pipe key to including close pipe private key and close pipe public key, encryption key to including encrypted public key and plus
Close private key;
First sign test unit 4312, the close pipe private key for being obtained using acquiring unit 4311 are included to key solicitation message
Application bag be decrypted, and the public signature key obtained using acquiring unit 4311 carries out sign test to the application bag after decryption;
First sign test success unit 4313, if for the sign test success of the first sign test unit 4312, generate session at random
Key, and preserve the session key corresponding with local device mark is stated;
Ciphering unit 4314, for the encrypted public key that obtained using acquiring unit 4311 to the first sign test success unit 4313
The session key of generation is encrypted, and the session key after the close pipe private key pair encryption obtained using acquiring unit 4311 is carried out
Signature;
First transmitting element 4315, is sent to local device 41 for the session key after ciphering unit 4314 is signed.
Further, communication request unit 412 includes:
Second sign test unit 4121, if for receiving the session key after the signature that the first transmitting element 4315 sends,
Sign test is carried out to the session key using the close pipe public key for prestoring then;
Second sign test success unit 4122, if for the sign test success of the second sign test unit 4121, using adding for prestoring
Close private key is decrypted to session key, the session key after being decrypted;
Second transmitting element 4123, for sending communication request to opposite equip. 42.
Further, key acquiring unit 421, the communication request for being additionally operable to be sent according to the second transmitting element 4123 include
Local device mark, send secret key request message to close pipe server 43, wherein, the secret key request message carries local device
Mark, secret key request message are used for obtaining the corresponding session key of local device mark;
Key obtains processing unit 432, and the key request for being additionally operable to be sent according to the key acquiring unit 421 for receiving disappears
Local device is identified corresponding session key and is sent to opposite equip. 42 by breath.
Local device 41, opposite equip. 42 and close pipe server 43 in the system 400 of the key management that the present embodiment is provided
Each unit realize the process of respective function, specifically refer to the description of aforementioned embodiment illustrated in fig. 3, here is omitted.
Knowable to the system 400 of the key management of above-mentioned Fig. 4 examples, in the present embodiment, local device detects user and touches
When sending out the operation communicated with opposite equip., application bag is set up, signed to applying for bag using the signature private key for prestoring, and used
The close pipe public key for prestoring is encrypted to the application bag after signature, and the application bag after local device is identified and encrypted generates key
Solicitation message, and the key solicitation message is sent to into close pipe server, for applying for session key, close pipe server is according to close
The local device mark that key solicitation message is included, identifies corresponding close pipe private key using local device and key solicitation message is included
Application bag be decrypted, identify corresponding public signature key using local device carries out sign test to the application bag after decryption, and
It is random after sign test success to generate session key, corresponding encrypted public key being identified using local device, session key is encrypted,
And after the session key identified after corresponding close pipe private key pair encryption using local device is signed, the session key is sent
To local device, by local device and the interacting message mode of this ciphering signature of close pipe server, it is ensured that session key
Security in transmitting procedure, simultaneously because session key be randomly generated it is unique, different communication process its
Session key is also differed, close so as to ensure words one, improves the security of Content of Communication transmission in communication process;Local device
Session key is decrypted and sign test after be stored in safety chip, and to opposite equip. send communication request, the call please
Ask and need not carry session key, after opposite equip. receives communication request, adopt and local device identical encrypted transmission side
Formula carries out interacting message with close pipe server, and to close pipe server request session key, close pipe server is according to local device
Mark gets corresponding session key and is sent to opposite equip., and opposite equip. is returned to local device after receiving session key
Communication response is returned, the communication connection with local device is set up, so that local device and opposite equip. all get safely this
The session key of secondary communication, improves generation security and the transmission security of session key, so as to ensure the peace of Content of Communication
It is complete to transmit.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware
With the interchangeability of software, composition and the step of each example is generally described in the above description according to function.This
A little functions actually with hardware or software mode performing, the application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can use different methods to realize described function to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, foregoing description【System
System】, local device and unit specific work process, may be referred to the corresponding process in preceding method embodiment, here is no longer
Repeat.
In several embodiments provided herein, it should be understood that disclosed【System】, local device and side
Method, can be realized by another way.For example, device embodiment described above is only schematic, for example, described
The division of unit, only a kind of division of logic function can have other dividing mode, such as multiple units when actually realizing
Or component can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.In addition, shown
The coupling each other shown or discuss or direct-coupling or communication connection can be by some interfaces, between device or unit
Connect coupling or communicate to connect, or electricity, machinery or other forms connections.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit
When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part that in other words prior art is contributed, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, use so that a computer including some instructions
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain of requirement is defined.
Claims (10)
1. a kind of method of key management, it is characterised in that methods described includes:
If local device detects the operation that user's triggering is communicated with opposite equip., key application is sent to close pipe server and disappeared
Breath, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for session key;
The close pipe server generates the local device mark corresponding at random according to the key solicitation message for receiving
The session key, and the session key is sent to into the local device;
If the local device receives the session key, communication request is sent to the opposite equip., it is wherein, described logical
Letter request carries the local device mark;
The local device mark that the opposite equip. is included according to the communication request, obtains to the close pipe server request
Take the local device and identify the corresponding session key;
If the opposite equip. receives the session key, the communication request is responded, set up logical with the local device
Letter connection.
2. method according to claim 1, it is characterised in that triggering is set with opposite end if the local device detects user
The operation of standby communication, then sending key solicitation message to close pipe server includes:
If the local device detects the operation that user's triggering is communicated with opposite equip., application bag is set up;
The local device is signed to the application bag using the signature private key for prestoring, and using the close pipe public key pair for prestoring
The application bag after signature is encrypted;
The application bag after the local device is identified and encrypted by the local device generates the key solicitation message, and
The key solicitation message is sent to into the close pipe server.
3. method according to claim 2, it is characterised in that the close pipe server is according to the key Shen for receiving
Please message, generate the local device at random and identify the corresponding session key, and the session key is sent to described
Local device includes:
The local device mark that the close pipe server is included according to the key solicitation message, obtains described for prestoring
End equipment identifies corresponding close pipe key to, the public signature key of the local device and the encryption key pair of the local device,
Wherein, the close pipe key is to including close pipe private key and close pipe public key, the encryption key is to private including encrypted public key and encryption
Key;
The close pipe server is decrypted to the application bag that the key solicitation message is included using the close pipe private key,
And using the public signature key to decryption after the application bag carry out sign test;
If sign test success, the close pipe server generates session key at random, and the session key is set with the local terminal
Standby mark correspondence is preserved;
The close pipe server is encrypted to the session key using the encrypted public key, and uses the close pipe private key pair
The session key after encryption is signed;
The close pipe server by signature after the session key be sent to the local device.
4. method according to claim 3, it is characterised in that if the local device receives the session key,
Communication request is sent to the opposite equip. includes:
If the local device receives the session key after signature, using the close pipe public key to the session key
Carry out sign test;
If the sign test success, the local device are solved to the session key using the encryption key for prestoring
Close, after being decrypted the session key;
The local device sends communication request to opposite equip..
5. the method according to any one of Claims 1-4, it is characterised in that the opposite equip. please according to the communication
The local device mark for including is sought, and the local device is obtained to the close pipe server request and is identified the corresponding meeting
Words key includes:
The local device mark that the opposite equip. is included according to the communication request, sends close to the close pipe server
Key request message, wherein, the secret key request message carries the local device mark, and the secret key request message is used for obtaining
The local device identifies the corresponding session key;
The local device is identified the corresponding meeting according to the secret key request message for receiving by the close pipe server
Words key is sent to the opposite equip..
6. a kind of system of key management, it is characterised in that the system includes local device, opposite equip. and close pipe service
Device;
The local device includes:
Key application unit, if for detecting the operation that user's triggering is communicated with opposite equip., send to close pipe server
Key solicitation message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for meeting
Words key;
Communication request unit, if for receiving the session key, sending communication request to the opposite equip., wherein,
The communication request carries the local device mark;
The opposite equip. includes:
Key acquiring unit, for the local device mark included according to the communication request, to the close pipe server
Local device described in acquisition request identifies the corresponding session key;
Communication response unit, if for receiving the session key, responding the communication request, is built with the local device
Vertical communication connection;
The close pipe server includes:
Key generating unit, it is right for according to the key solicitation message for receiving, generating the local device mark at random
The session key answered, and the session key is sent to into the local device;
Key obtains processing unit, close for processing the corresponding session of the opposite equip. acquisition local device mark
The request of key.
7. system according to claim 6, it is characterised in that the key application unit includes:
Unit is set up in application, if for detecting the operation that user's triggering is communicated with opposite equip., setting up application bag;
Application ciphering unit, signs to the application bag for the signature private key that use prestores, and using the close pipe for prestoring
Public key to signature after the application bag be encrypted;
Application transmitting element, generates the key application for the application bag after the local device is identified and encrypted and disappears
Breath, and the key solicitation message is sent to into the close pipe server.
8. system according to claim 7, it is characterised in that the Key generating unit includes:
Acquiring unit, for the local device mark included according to the key solicitation message, obtains described for prestoring
End equipment identifies corresponding close pipe key to, the public signature key of the local device and the encryption key pair of the local device,
Wherein, the close pipe key is to including close pipe private key and close pipe public key, the encryption key is to private including encrypted public key and encryption
Key;
First sign test unit, for being solved to the application bag that the key solicitation message is included using the close pipe private key
It is close, and using the public signature key to decryption after the application bag carry out sign test;
First sign test success unit, if for sign test success, generate session key at random, and by the session key with it is described
Local device mark correspondence is preserved;
Ciphering unit, for being encrypted to the session key using the encrypted public key, and uses the close pipe private key pair
The session key after encryption is signed;
First transmitting element, is sent to the local device for the session key after by signature.
9. system according to claim 8, it is characterised in that the communication request unit includes:
Second sign test unit, if for receiving the session key after signature, using the close pipe public key to the meeting
Words key carries out sign test;
Second sign test success unit, if for the sign test success, it is close to the session using the encryption key for prestoring
Key is decrypted, the session key after being decrypted;
Second transmitting element, for sending communication request to opposite equip..
10. the system according to any one of claim 6 to 9, it is characterised in that the key acquiring unit, is additionally operable to root
The local device mark included according to the communication request, sends secret key request message, wherein, institute to the close pipe server
State secret key request message and carry the local device mark, the secret key request message is right for obtaining the local device mark
The session key answered;
The key obtains processing unit, is additionally operable to according to the secret key request message for receiving, by the local device mark
Know the corresponding session key and be sent to the opposite equip..
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908752.7A CN106535184A (en) | 2016-10-18 | 2016-10-18 | Key management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908752.7A CN106535184A (en) | 2016-10-18 | 2016-10-18 | Key management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106535184A true CN106535184A (en) | 2017-03-22 |
Family
ID=58332574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610908752.7A Withdrawn CN106535184A (en) | 2016-10-18 | 2016-10-18 | Key management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106535184A (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449346A (en) * | 2018-03-22 | 2018-08-24 | 北京可信华泰科技有限公司 | A kind of key generation client |
CN108718313A (en) * | 2018-05-31 | 2018-10-30 | 深圳市文鼎创数据科技有限公司 | Application of software data uses method, terminal device and server safely |
CN109101803A (en) * | 2018-07-25 | 2018-12-28 | 腾讯科技(深圳)有限公司 | Biometric apparatus and method |
CN109286635A (en) * | 2018-11-08 | 2019-01-29 | 蓝信移动(北京)科技有限公司 | Multiterminal logon data encryption method |
CN109361680A (en) * | 2018-11-08 | 2019-02-19 | 蓝信移动(北京)科技有限公司 | End-to-end data encryption system |
CN110048842A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key processing method, equipment and computer readable storage medium |
CN110048843A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key transmission method, equipment and computer readable storage medium |
CN110176993A (en) * | 2019-05-30 | 2019-08-27 | 全链通有限公司 | Session cipher key distributing method, equipment and storage medium based on alliance's block chain |
CN110401677A (en) * | 2019-08-23 | 2019-11-01 | RealMe重庆移动通信有限公司 | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key |
CN110399740A (en) * | 2019-07-29 | 2019-11-01 | 浙江诺诺网络科技有限公司 | A kind of method and system of proxy data secure interactive |
CN110430204A (en) * | 2019-08-12 | 2019-11-08 | 徐州恒佳电子科技有限公司 | A kind of modified JSON safety communicating method based on third party's password book server |
CN111162999A (en) * | 2019-12-30 | 2020-05-15 | 广东盈世计算机科技有限公司 | Message processing method and device based on instant chat tool |
CN111182050A (en) * | 2019-12-26 | 2020-05-19 | 上海掌门科技有限公司 | Method and equipment for realizing communication between application and server |
CN112449345A (en) * | 2020-12-09 | 2021-03-05 | 中国联合网络通信集团有限公司 | Secure communication method and device |
CN112491533A (en) * | 2019-09-12 | 2021-03-12 | 华为技术有限公司 | Key generation method and device |
CN112688904A (en) * | 2019-10-18 | 2021-04-20 | 中兴通讯股份有限公司 | Secure channel establishing method, electronic equipment and storage medium |
CN112769560A (en) * | 2020-12-31 | 2021-05-07 | 中国农业银行股份有限公司 | Key management method and related device |
CN112989370A (en) * | 2021-02-09 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Secret key filling method, system, device, equipment and storage medium |
CN113242249A (en) * | 2021-05-18 | 2021-08-10 | 中铁信(北京)网络技术研究院有限公司 | Session control method and device |
CN113839924A (en) * | 2021-08-31 | 2021-12-24 | 青岛海尔科技有限公司 | Terminal interaction method and device, storage medium and electronic equipment |
CN114745134A (en) * | 2022-03-30 | 2022-07-12 | 恒玄科技(上海)股份有限公司 | Method, system, equipment and computer readable medium for transferring media data stream |
CN114785751A (en) * | 2021-01-06 | 2022-07-22 | 腾讯科技(深圳)有限公司 | Message transmission method and related device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060221174A1 (en) * | 2005-04-04 | 2006-10-05 | Leadtek Research Inc. | Method of videophone data transmission |
KR20090015736A (en) * | 2007-08-09 | 2009-02-12 | 삼성전자주식회사 | Authentication method in communication system |
CN101479984A (en) * | 2006-04-25 | 2009-07-08 | 斯蒂芬·L.·博伦 | Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks |
CN101540669A (en) * | 2008-03-20 | 2009-09-23 | 深圳市奥联科技有限公司 | Method for distributing keys and protecting information for wireless mobile communication network |
CN104683304A (en) * | 2013-11-29 | 2015-06-03 | 中国移动通信集团公司 | A processing method, device and system for secure communication services |
-
2016
- 2016-10-18 CN CN201610908752.7A patent/CN106535184A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060221174A1 (en) * | 2005-04-04 | 2006-10-05 | Leadtek Research Inc. | Method of videophone data transmission |
CN101479984A (en) * | 2006-04-25 | 2009-07-08 | 斯蒂芬·L.·博伦 | Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks |
KR20090015736A (en) * | 2007-08-09 | 2009-02-12 | 삼성전자주식회사 | Authentication method in communication system |
CN101540669A (en) * | 2008-03-20 | 2009-09-23 | 深圳市奥联科技有限公司 | Method for distributing keys and protecting information for wireless mobile communication network |
CN104683304A (en) * | 2013-11-29 | 2015-06-03 | 中国移动通信集团公司 | A processing method, device and system for secure communication services |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449346B (en) * | 2018-03-22 | 2021-07-27 | 北京可信华泰科技有限公司 | Key generation client |
CN108449346A (en) * | 2018-03-22 | 2018-08-24 | 北京可信华泰科技有限公司 | A kind of key generation client |
CN108718313A (en) * | 2018-05-31 | 2018-10-30 | 深圳市文鼎创数据科技有限公司 | Application of software data uses method, terminal device and server safely |
CN109101803A (en) * | 2018-07-25 | 2018-12-28 | 腾讯科技(深圳)有限公司 | Biometric apparatus and method |
CN109101803B (en) * | 2018-07-25 | 2023-06-23 | 腾讯科技(深圳)有限公司 | Biometric identification apparatus and method |
CN109286635A (en) * | 2018-11-08 | 2019-01-29 | 蓝信移动(北京)科技有限公司 | Multiterminal logon data encryption method |
CN109361680A (en) * | 2018-11-08 | 2019-02-19 | 蓝信移动(北京)科技有限公司 | End-to-end data encryption system |
CN110048843A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key transmission method, equipment and computer readable storage medium |
CN110176993A (en) * | 2019-05-30 | 2019-08-27 | 全链通有限公司 | Session cipher key distributing method, equipment and storage medium based on alliance's block chain |
CN110048843B (en) * | 2019-05-30 | 2021-09-10 | 全链通有限公司 | Session key transmission method, device and computer readable storage medium |
CN110048842B (en) * | 2019-05-30 | 2021-09-10 | 全链通有限公司 | Session key processing method, device and computer readable storage medium |
CN110048842A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key processing method, equipment and computer readable storage medium |
CN110399740A (en) * | 2019-07-29 | 2019-11-01 | 浙江诺诺网络科技有限公司 | A kind of method and system of proxy data secure interactive |
CN110399740B (en) * | 2019-07-29 | 2021-05-25 | 浙江诺诺网络科技有限公司 | Method and system for safe interaction of proxy data |
CN110430204A (en) * | 2019-08-12 | 2019-11-08 | 徐州恒佳电子科技有限公司 | A kind of modified JSON safety communicating method based on third party's password book server |
CN110401677B (en) * | 2019-08-23 | 2022-05-17 | RealMe重庆移动通信有限公司 | Method and device for acquiring digital copyright key, storage medium and electronic equipment |
CN110401677A (en) * | 2019-08-23 | 2019-11-01 | RealMe重庆移动通信有限公司 | Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key |
CN112491533A (en) * | 2019-09-12 | 2021-03-12 | 华为技术有限公司 | Key generation method and device |
CN112491533B (en) * | 2019-09-12 | 2022-09-02 | 华为技术有限公司 | Key generation method and device |
CN112688904A (en) * | 2019-10-18 | 2021-04-20 | 中兴通讯股份有限公司 | Secure channel establishing method, electronic equipment and storage medium |
CN111182050A (en) * | 2019-12-26 | 2020-05-19 | 上海掌门科技有限公司 | Method and equipment for realizing communication between application and server |
CN111182050B (en) * | 2019-12-26 | 2022-10-11 | 上海掌门科技有限公司 | Method and equipment for realizing communication between application and server |
CN111162999A (en) * | 2019-12-30 | 2020-05-15 | 广东盈世计算机科技有限公司 | Message processing method and device based on instant chat tool |
CN112449345B (en) * | 2020-12-09 | 2024-02-09 | 中国联合网络通信集团有限公司 | Secure communication method and device |
CN112449345A (en) * | 2020-12-09 | 2021-03-05 | 中国联合网络通信集团有限公司 | Secure communication method and device |
CN112769560A (en) * | 2020-12-31 | 2021-05-07 | 中国农业银行股份有限公司 | Key management method and related device |
CN112769560B (en) * | 2020-12-31 | 2023-03-24 | 中国农业银行股份有限公司 | Key management method and related device |
CN114785751A (en) * | 2021-01-06 | 2022-07-22 | 腾讯科技(深圳)有限公司 | Message transmission method and related device |
CN114785751B (en) * | 2021-01-06 | 2024-04-26 | 腾讯科技(深圳)有限公司 | Message transmission method and related device |
CN112989370B (en) * | 2021-02-09 | 2023-06-30 | 腾讯科技(深圳)有限公司 | Key filling method, system, device, equipment and storage medium |
CN112989370A (en) * | 2021-02-09 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Secret key filling method, system, device, equipment and storage medium |
CN113242249B (en) * | 2021-05-18 | 2022-03-08 | 中铁信(北京)网络技术研究院有限公司 | Session control method and device |
CN113242249A (en) * | 2021-05-18 | 2021-08-10 | 中铁信(北京)网络技术研究院有限公司 | Session control method and device |
CN113839924A (en) * | 2021-08-31 | 2021-12-24 | 青岛海尔科技有限公司 | Terminal interaction method and device, storage medium and electronic equipment |
CN113839924B (en) * | 2021-08-31 | 2024-04-23 | 青岛海尔科技有限公司 | Terminal interaction method and device, storage medium and electronic equipment |
CN114745134A (en) * | 2022-03-30 | 2022-07-12 | 恒玄科技(上海)股份有限公司 | Method, system, equipment and computer readable medium for transferring media data stream |
CN114745134B (en) * | 2022-03-30 | 2024-05-31 | 恒玄科技(上海)股份有限公司 | Method, system, device and computer readable medium for streaming media data stream |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106535184A (en) | Key management method and system | |
CN106453330A (en) | Identity authentication method and system | |
WO2021184755A1 (en) | Application access method and apparatus, and electronic device and storage medium | |
US8719573B2 (en) | Secure peer discovery and authentication using a shared secret | |
CN101720071B (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN102195957A (en) | Resource sharing method, device and system | |
CN103067160A (en) | Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD) | |
CN104967597A (en) | Third-party application message authentication method and system based on secure channel | |
CN108683501A (en) | Based on quantum communication network using timestamp as the multiple identity authorization system and method for random number | |
CN106341375A (en) | Method and system for realizing resource encrypted access | |
CN106790223A (en) | The method and apparatus and its system of a kind of data transfer | |
CN103107994A (en) | Vitualization environment data security partition method and system | |
CN106686585A (en) | Binding method and system | |
CN104917807A (en) | Resource transfer method, apparatus and system | |
CN106899584A (en) | Management method and its device that a kind of hardware device is accessed | |
CN109063450B (en) | Control method of safe storage medium, safe storage medium and system | |
CN109145641A (en) | Method for protecting privacy and system | |
CN104796262B (en) | Data ciphering method and terminal system | |
CN110213056A (en) | Anti- quantum calculation energy-saving communication method and system and computer equipment based on online static signature | |
CN116366364A (en) | Terminal data processing method and system for cloud computer | |
CN106779662A (en) | The processing method and financial terminal of a kind of financial business | |
CN105871540A (en) | Cipher machine and cryptogrammic operation implementation method based on host machine | |
CN106712959B (en) | method and system for realizing communication security | |
CN106992978A (en) | Network safety managing method and server | |
CN107493281A (en) | encryption communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170322 |