CN106535184A - Key management method and system - Google Patents

Key management method and system Download PDF

Info

Publication number
CN106535184A
CN106535184A CN201610908752.7A CN201610908752A CN106535184A CN 106535184 A CN106535184 A CN 106535184A CN 201610908752 A CN201610908752 A CN 201610908752A CN 106535184 A CN106535184 A CN 106535184A
Authority
CN
China
Prior art keywords
key
local device
close pipe
session key
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610908752.7A
Other languages
Chinese (zh)
Inventor
刘岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610908752.7A priority Critical patent/CN106535184A/en
Publication of CN106535184A publication Critical patent/CN106535184A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention discloses a key management method and system. The key management method includes the steps: if home terminal equipment detects that a user triggers the operation on opposite terminal equipment, the home terminal equipment sends a key application message to a key management server; according to the received key application message, the key management server generates a session key corresponding to an identifier of the home terminal equipment randomly, and sends the session key to the home terminal equipment; if the home terminal equipment receives the session key, the home terminal equipment sends a communication request to the opposite terminal equipment; according to the identifier of the home terminal equipment included in the communication request, the opposite terminal equipment requests the key management server to acquire the session key corresponding to the home terminal equipment; and if the opposite terminal equipment receives the session key, the opposite terminal equipment gives a response to the communication request and establishes communication connection with the home terminal equipment. The technical scheme of the key management method and system enables both the home terminal equipment and the opposite terminal equipment to safely acquire the session key of the communication of this time, thus improving generation safety and transmission safety for the session key, and guaranteeing safe transmission of the communication content.

Description

A kind of method and system of key management
Technical field
A kind of the present invention relates to communication technical field, more particularly to method and system of key management.
Background technology
At present, the intelligent terminal such as smart mobile phone is widely spread, and user is being carried out using these intelligent terminals During communication, Content of Communication is easily monitored and is stolen by Malware.And existing coded communication mode is generally all adopted With software cryptography algorithm or hardware encryption algorithm, key information is generated by folk prescription, and is transmitted directly to other side, this to set up both sides The mode of speech scrambling easily causes key information and is stolen, and causes communication process by malicious attack, brings safety to user Hidden danger.
The content of the invention
The embodiment of the present invention provides a kind of method and system of key management, and the key that can improve coded communication generates peace Full property and transmission security, so that ensure the safe transmission of Content of Communication.
In a first aspect, embodiments providing a kind of method of key management, the method includes:
If local device detects the operation that user's triggering is communicated with opposite equip., key Shen is sent to close pipe server Please message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for that session is close Key;
The close pipe server generates the local device mark right at random according to the key solicitation message for receiving The session key answered, and the session key is sent to into the local device;
If the local device receives the session key, communication request, wherein, institute is sent to the opposite equip. State communication request and carry the local device mark;
The local device mark that the opposite equip. is included according to the communication request, please to the close pipe server The acquisition local device is asked to identify the corresponding session key;
If the opposite equip. receives the session key, the communication request is responded, built with the local device Vertical communication connection.
On the other hand, a kind of system of key management is embodiments provided, the system includes local device, opposite end Equipment and close pipe server;
The local device includes:
Key application unit, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe server Key solicitation message is sent, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen Please session key;
Communication request unit, if for receiving the session key, sending communication request to the opposite equip., its In, the communication request carries the local device mark;
The opposite equip. includes:
Key acquiring unit, for the local device mark included according to the communication request, takes to the close pipe Local device described in business device acquisition request identifies the corresponding session key;
Communication response unit, if for receiving the session key, responding the communication request, is set with the local terminal It is standby to set up communication connection;
The close pipe server includes:
Key generating unit, for according to the key solicitation message for receiving, generating the local device mark at random Know the corresponding session key, and the session key is sent to into the local device;
Key obtains processing unit, obtains the corresponding meeting of the local device mark for processing the opposite equip. The request of words key.
The embodiment of the present invention by local device detect user triggering communicate with opposite equip. operation when, Xiang Miguan Server sends key solicitation message, applies for session key, and receive random generation that close pipe server sends this Communication request is sent to opposite equip. after the session key of communication, opposite equip. please to close pipe server after receiving communication request The session key is sought, and is responded to local device return communication after the session key that close pipe server sends is received, made The session key that local device and opposite equip. all get safely this communication is obtained, the generation security of session key is improve And transmission security, so as to ensure the safe transmission of Content of Communication.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below needed for it is to be used Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention one is provided;
Fig. 2 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention two is provided;
Fig. 3 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention three is provided;
Fig. 4 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention four is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are clearly indicated hereafter, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more and be possible to combination being associated in the item listed, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the local device described in the embodiment of the present invention including but not limited to such as has the sensitive table of touch Other of the mobile phone in face (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc Portable set.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch pad).
In discussion below, describe to include the local device of display and touch sensitive surface.However, should manage Solution, local device can include that one or more of the other physical User of such as physical keyboard, mouse and/or control-rod connects Jaws equipment.
Local device supports various application programs, such as it is following in one or more:Drawing application program, demonstration application Program, word-processing application, website establishment application program, disk imprinting application program, spreadsheet applications, game are answered With program, telephony application, videoconference application, email application, instant messaging applications, forging Refining supports that application program, photo management application program, digital camera application program, digital camera application program, web-browsing should With program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on local device can be using at least one of such as touch sensitive surface Public physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change touch is quick The corresponding information shown in the one or more functions on sense surface and local device.So, the public physics frame of local device Structure (for example, touch sensitive surface) can support the various application journeys with user interface directly perceived and transparent for a user Sequence.
Embodiment one:
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention one is provided, this The executive agent of embodiment includes local device, opposite equip. terminal and server, and wherein, local device and opposite equip. are Terminal device, which can be specifically the equipment such as smart mobile phone or other intelligent terminals.The method of the key management shown in Fig. 1 can To comprise the following steps:
If S101, local device detect the operation that user's triggering is communicated with opposite equip., send to close pipe server Key solicitation message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for that session is close Key.
Specifically, close pipe server is mainly used in completing the generation of key and encryption storage, encryption process and to key Management etc..
When local device detects user's triggering of local device with the traffic operation of opposite equip., and opposite equip. Before setting up communication connection, local device sends the key solicitation message for carrying local device mark to close pipe server, is used for The session key used during application and the coded communication of opposite equip..
Local device is identified for unique mark local device, and which can be specifically the client identification module of local device The identification code that (Subscriber Identification Module, SIM) blocks, or the corresponding communicating number of SIM, or Central processing unit (Central Processing Unit, CPU) identification code, or other can be with unique mark local device Identification information, is not limited herein.
, according to the key solicitation message for receiving, the random local device that generates identifies corresponding meeting for S102, close pipe server Words key, and the session key is sent to into local device.
Specifically, close pipe server receives the key solicitation message of local device transmission, according in key solicitation message Local device mark, it is random to generate and the local device corresponding session key of mark, and the session key is sent to into local terminal Equipment.
It should be noted that session key is used for the message encryption of local device and opposite equip. in communication process conciliating Close, in connection setup each time, local device all can be close to the session used in close pipe server application this communication process Key, and the session key be randomly generated it is unique, different its session key of communication process are also differed, so as to Ensure that words one are close, improve the security of Content of Communication transmission in communication process.
If S103, local device receive session key, communication request is sent to opposite equip., wherein, the communication please Seek carrying local device mark.
Specifically, if local device receives the session key of this communication that close pipe server sends, set to opposite end Preparation send communication request message, and the communication request message carries local device mark.
Communication request message can be transmitted by internet message, and it is close that the communication request message need not carry session Key.
S104, opposite equip. are identified according to the local device that communication request is included, and obtain local terminal to close pipe server request The corresponding session key of device identification.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message The local device mark of carrying, and the corresponding session key of local device mark is obtained to close pipe server request.
If S105, opposite equip. receive session key, communication request is responded, set up with local device and communicate to connect.
Specifically, if opposite equip. receives the corresponding session key of local device mark that close pipe server sends, The communication request message that response local device sends, sets up and the communication connection of local device so that local device user with it is right Call can be encrypted using session key between end equipment user.
Session key used in communication process need not be sent out during connection setup by local device and opposite equip. Other side is given, but by the application of close pipe server and obtains the session key, so as to improve the security of session key.
Knowable to the method for the key management of above-mentioned Fig. 1 examples, in the present embodiment, local device detect user triggering with During the operation of opposite equip. communication, key solicitation message is sent to close pipe server, apply for session key, and receiving close pipe Communication request is sent to opposite equip. after the session key of this communication of the random generation that server sends, opposite equip. is received To after communication request to close pipe server request session key, and after the session key that close pipe server sends is received Respond to local device return communication so that local device and opposite equip. all get safely the session key of this communication, Generation security and the transmission security of session key is improve, so as to ensure the safe transmission of Content of Communication.
Embodiment two:
Fig. 2 is referred to, Fig. 2 is a kind of schematic flow diagram of the method for key management that the embodiment of the present invention two is provided, this The executive agent of embodiment includes local device, opposite equip. terminal and server, and wherein, local device and opposite equip. are Terminal device, which can be specifically the equipment such as smart mobile phone or other intelligent terminals.The method of the key management shown in Fig. 2 can To comprise the following steps:
If S201, local device detect the operation that user's triggering is communicated with opposite equip., application bag is set up.
Specifically, when local device detects user's triggering of local device with the traffic operation of opposite equip., with Opposite equip. set up communication connection before, local device set up application bag, this application bag for the application of close pipe server with it is right The session key used during the coded communication of end equipment.
S202, local device are signed to applying for bag using the signature private key for prestoring, and using the close pipe public key for prestoring Application bag after signature is encrypted.
Specifically, local device can be beforehand through e-business certification authorized organization (CA, Certificate Authority) apply digital certificate, while beforehand through safety chip generate signature key pair, signature key to including signature Public signature key is sent to close pipe server and is preserved by public key and signature private key, local device.Dense tubular system (DTS) can pre- Mr. Into the corresponding encryption key of local device to close pipe key pair, for the interaction message between local device encryption conciliate It is close.Close pipe key is to including close pipe private key and close pipe public key, encryption key is to including encrypted public key and encryption key.Numbers above Certificate, encryption key are to, signature key to generating the behaviour that can be communicated with opposite equip. in user's triggering with close pipe key pair Carry out before work, specifically corresponding private communication application software can carry out in starting up of terminal or in first time using terminal Carry out during registration, be not limited herein.
Safety chip is by using fixed commercial cipher algorithm, realizing the encryption and decryption to data, for example, safe core Piece can use domestic A3 chips.Terminal with safety chip can be encrypted to communication process, it is ensured that communication security, together When the Information Security that is stored in safety chip it is higher, be difficult to be stolen.Each safety chip is when dispatching from the factory with unique Sequence number.
Application bag after local device is identified and encrypted by S203, local device generates key solicitation message, and this is close Key solicitation message is sent to close pipe server, and wherein, the key solicitation message carries local device mark, the key solicitation message For applying for session key.
Specifically, local device is identified for unique mark local device, and which can be specifically that the client of local device knows The identification code that other module (Subscriber Identification Module, SIM) blocks, or the corresponding messenger of SIM Code, or central processing unit (Central Processing Unit, CPU) identification code, or other can be with unique mark local terminal The identification information of equipment, is not limited herein.
Application bag after local device is identified and encrypted by local device generates key solicitation message, and by the key application Message is sent to close pipe server.Close pipe server be mainly used in completing the generation of key and encryption storage, encryption process and Management to key etc..
, according to the key solicitation message for receiving, the random local device that generates identifies corresponding meeting for S204, close pipe server Words key, and the session key is sent to into local device.
It should be noted that session key is used for the message encryption of local device and opposite equip. in communication process conciliating Close, in connection setup each time, local device all can be close to the session used in close pipe server application this communication process Key, and the session key be randomly generated it is unique, different its session key of communication process are also differed, so as to Ensure that words one are close, improve the security of Content of Communication transmission in communication process.
Specifically, according to the key solicitation message for receiving, random generation local device mark is corresponding for close pipe server Session key, and the detailed process that the session key is sent to local device can be complete to step S2045 by step S2041 Into detailed description is as follows:
S2041, close pipe server are identified according to the local device that key solicitation message is included, and obtain the local device for prestoring Corresponding close pipe key is identified to, the public signature key of local device and the encryption key pair of local device.
Specifically, close pipe server receives the key solicitation message of local device transmission, obtains in key solicitation message Local device mark, identified to obtain the local device that prestores and identify corresponding close pipe key according to local device, local terminal set The encryption key pair of standby public signature key and local device.
S2042, close pipe server are decrypted to the application bag that key solicitation message is included using close pipe private key, and are used Public signature key carries out sign test to the application bag after decryption.
Specifically, as local device signature private key used in step S202 is signed to applying for bag, and using close Pipe public key is encrypted to the application bag after signature, therefore, close pipe server identifies corresponding close pipe private key using local device Application bag is decrypted, and identifies corresponding public signature key using local device carries out sign test to the application bag after decryption.
If S2043, sign test success, close pipe server generate session key at random, and the session key and local terminal are set Standby mark correspondence is preserved.
Specifically, if the sign test result in step S2042 is sign test success, close pipe server confirms the identity of local device The key solicitation message safety that legal and local device sends, then close pipe server generate session key at random, and by the meeting Key is corresponding with local device mark is stored in close pipe server for words.
S2044, close pipe server are encrypted to session key using encrypted public key, and using after close pipe private key pair encryption Session key signed.
Specifically, close pipe server identifies meeting of the corresponding encrypted public key to generating in step S2043 using local device Words key is encrypted, and the session key identified after corresponding close pipe private key pair encryption using local device is signed.
Session key after signature is sent to local device by S2045, close pipe server.
Specifically, the session key encrypted in step S2044 and sign is sent to local device by close pipe server.
If S205, local device receive session key, communication request is sent to opposite equip., wherein, the communication please Seek carrying local device mark.
Specifically, if local device receives session key, the detailed process for sending communication request to opposite equip. can To be completed to step S2053 by step S2051, describe in detail as follows:
If S2051, local device receive the session key after signature, session key is tested using close pipe public key Sign.
Specifically, if local device receives the encryption of close pipe server transmission and the session key after signature, use The close pipe public key for prestoring carries out sign test to the session key.
If S2052, sign test success, local device are decrypted to session key using the encryption key for prestoring, are obtained Session key after decryption.
Specifically, if sign test success, local device confirms that the session key is sent from close pipe server legitimacy, local terminal Equipment is decrypted to session key using the encryption key for prestoring, the session key after being decrypted, and local device is by the meeting Words key is stored in safety chip, for encryption and decryption in communication process to communication information.
S2053, local device send communication request to opposite equip..
Specifically, communication request message can be transmitted by internet message, and the communication request message carries local terminal and sets Standby mark, it is not necessary to carry session key.
S206, opposite equip. are identified according to the local device that communication request is included, and obtain local terminal to close pipe server request The corresponding session key of device identification.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message The local device mark of carrying, and the corresponding session key of local device mark is obtained to close pipe server request.
Specifically, opposite equip. is identified according to the local device that communication request is included, and obtains this to close pipe server request End equipment is identified the detailed process of corresponding session key and can be completed to step S2062 by step S2061, is described in detail such as Under:
S2061, opposite equip. are identified according to the local device that communication request is included, and send key request to close pipe server Message, wherein, the secret key request message carries local device mark, and the secret key request message is right for obtaining local device mark The session key answered.
Specifically, opposite equip. receives the communication request message of local device transmission, obtains in the communication request message The local device mark of carrying, sends the secret key request message for carrying local device mark to close pipe server, for obtaining this End equipment identifies corresponding session key.
It should be noted that the secret key request message that opposite equip. is sent to dense tubular system (DTS), can according to step S201 Key solicitation message identical method is sent to step S203 local device to dense tubular system (DTS) to be processed, adopt and local device Identical is encrypted and signature scheme is encrypted to secret key request message and signs, and here is omitted.
Local device is identified corresponding session key according to the secret key request message for receiving by S2062, close pipe server It is sent to opposite equip..
Specifically, close pipe server receives the secret key request message of opposite equip., can using with step S2041 to walk Rapid S2042 is decrypted to key solicitation message identical and the mode of sign test obtains decryption and the secret key request message after sign test, this Place repeats no more.
Close pipe server obtains local device mark corresponding according to the local device mark carried in secret key request message Session key, and to the session key and signature after, the session key is sent to into opposite equip., concrete encryption and is signed Mode can using with step S2044 identical method, here is omitted.
If S207, opposite equip. receive session key, communication request is responded, set up with local device and communicate to connect.
Specifically, if opposite equip. receives the corresponding session key of local device mark that close pipe server sends, The communication request message that response local device sends, sets up and the communication connection of local device so that local device user with it is right Call can be encrypted using session key between end equipment user.
Session key used in communication process need not be sent out during connection setup by local device and opposite equip. Other side is given, but by the application of close pipe server and obtains the session key, so as to improve the security of session key.
Knowable to the method for the key management of above-mentioned Fig. 2 examples, in the present embodiment, local device detect user triggering with During the operation of opposite equip. communication, application bag is set up, signed to applying for bag using the signature private key for prestoring, and using prestoring Close pipe public key the application bag after signature is encrypted, by local device identify and encrypt after application bag generate key application Message, and the key solicitation message is sent to into close pipe server, for applying for session key, close pipe server is according to key Shen Please message package contain local device mark, identify the Shen that corresponding close pipe private key is included to key solicitation message using local device Please wrap and be decrypted, corresponding public signature key is identified using local device carries out sign test to the application bag after decryption, and in sign test It is random after success to generate session key, corresponding encrypted public key is identified using local device and session key is encrypted, and make After the session key identified after corresponding close pipe private key pair encryption with local device is signed, the session key is sent to into this End equipment, by local device and the interacting message mode of this ciphering signature of close pipe server, it is ensured that session key is being passed Security during defeated, simultaneously because unique, different its session of communication process that session key is randomly generated Key is also differed, close so as to ensure words one, improves the security of Content of Communication transmission in communication process;Local device is to meeting Words key is decrypted and is stored in safety chip with after sign test, and sends communication request to opposite equip., and the call request is not Need carry session key, after opposite equip. receives communication request, using with local device identical encrypted transmission mode with Close pipe server carries out interacting message, and to close pipe server request session key, close pipe server is identified according to local device Get corresponding session key and be sent to opposite equip., opposite equip. returns to local device logical after receiving session key Letter response, sets up the communication connection with local device, so that local device and opposite equip. all get safely this leading to The session key of letter, improves generation security and the transmission security of session key, so as to the safety for ensureing Content of Communication is passed It is defeated.
Embodiment three:
Fig. 3 is referred to, Fig. 3 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention three is provided.In order to It is easy to explanation, illustrate only the part related to the embodiment of the present invention.Before the system 300 of the key management of Fig. 3 examples can be A kind of executive agent of the method for key management of the offer of embodiment one is provided.The system 300 of the key management of Fig. 3 examples is main to wrap Local device 31, opposite equip. 32 and close pipe server 33 is included, is described in detail as follows:
Local device 31 includes:
Key application unit 311, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe service Device 33 sends key solicitation message, and wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen Please session key;
Communication request unit 312, if for receiving the session key that close pipe server 33 sends, to opposite equip. 32 Communication request is sent, wherein, the communication request carries local device mark;
Opposite equip. 32 includes:
Key acquiring unit 321, for the local device mark included according to communication request, asks to close pipe server 33 Obtain local device and identify corresponding session key;
Communication response unit 322, if for receiving the session key that close pipe server 33 sends, respond communication request The communication request that unit 312 sends, is set up with local device 31 and is communicated to connect;
Close pipe server 33 includes:
Key generating unit 331, the key solicitation message of the transmission of key application unit 311 received for basis, with Machine generates local device and identifies corresponding session key, and the session key is sent to local device 31;
Key obtains processing unit 332, obtains the corresponding session key of local device mark for processing opposite equip. 32 Request.
Local device 31, opposite equip. 32 and close pipe server 33 in the system 300 of the key management that the present embodiment is provided Each unit realize the process of respective function, specifically refer to the description of aforementioned embodiment illustrated in fig. 1, here is omitted.
Knowable to the system 300 of the key management of above-mentioned Fig. 3 examples, in the present embodiment, local device detects user and touches When sending out the operation communicated with opposite equip., key solicitation message is sent to close pipe server, apply for session key, and receiving Communication request, opposite equip. are sent to opposite equip. after the session key of this communication of the random generation that close pipe server sends Receive after communication request to close pipe server request session key, and it is close the session that close pipe server sends is received Respond to local device return communication after key so that the session that local device and opposite equip. all get safely this communication is close Key, improves generation security and the transmission security of session key, so as to ensure the safe transmission of Content of Communication.
Example IV:
Fig. 4 is referred to, Fig. 4 is a kind of schematic block diagram of the system of key management that the embodiment of the present invention four is provided.In order to It is easy to explanation, illustrate only the part related to the embodiment of the present invention.Before the system 400 of the key management of Fig. 4 examples can be A kind of executive agent of the method for key management of the offer of embodiment two is provided.The system 400 of the key management of Fig. 4 examples is main to wrap Local device 41, opposite equip. 42 and close pipe server 43 is included, is described in detail as follows:
Local device 41 includes:
Key application unit 411, if for detecting the operation that user's triggering is communicated with opposite equip., to close pipe service Device 43 sends key solicitation message, and wherein, the key solicitation message carries local device mark, and the key solicitation message is used for Shen Please session key;
Communication request unit 412, if for receiving the session key that close pipe server 43 sends, to opposite equip. 42 Communication request is sent, wherein, the communication request carries local device mark;
Opposite equip. 42 includes:
Key acquiring unit 421, for the local device mark included according to communication request, asks to close pipe server 33 Obtain local device and identify corresponding session key;
Communication response unit 422, if for receiving the session key that close pipe server 43 sends, respond communication request The communication request that unit 412 sends, is set up with local device 41 and is communicated to connect;
Close pipe server 43 includes:
Key generating unit 431, the key solicitation message of the transmission of key application unit 411 received for basis, with Machine generates local device and identifies corresponding session key, and the session key is sent to local device 41;
Key obtains processing unit 432, obtains the corresponding session key of local device mark for processing opposite equip. 42 Request.
Further, key application unit 411 includes:
Unit 4111 is set up in application, if for detecting the operation that user's triggering is communicated with opposite equip., setting up application Bag;
Application ciphering unit 4112, sets up the application bag of the foundation of unit 4111 for the signature private key that use prestores to application Signed, and the application bag after signature is encrypted using the close pipe public key for prestoring;
Application transmitting element 4113, for identifying local device and applying the application Bao Sheng after ciphering unit 4112 is encrypted Into key solicitation message, and the key solicitation message is sent to into close pipe server 43.
Further, Key generating unit 431 includes:
Acquiring unit 4311, the local device that the key solicitation message for being sent according to application transmitting element 4113 is included Mark, obtains the local device that prestores and identifies corresponding close pipe key to, the public signature key of local device 41 and local device 41 Encryption key pair, wherein, close pipe key to including close pipe private key and close pipe public key, encryption key to including encrypted public key and plus Close private key;
First sign test unit 4312, the close pipe private key for being obtained using acquiring unit 4311 are included to key solicitation message Application bag be decrypted, and the public signature key obtained using acquiring unit 4311 carries out sign test to the application bag after decryption;
First sign test success unit 4313, if for the sign test success of the first sign test unit 4312, generate session at random Key, and preserve the session key corresponding with local device mark is stated;
Ciphering unit 4314, for the encrypted public key that obtained using acquiring unit 4311 to the first sign test success unit 4313 The session key of generation is encrypted, and the session key after the close pipe private key pair encryption obtained using acquiring unit 4311 is carried out Signature;
First transmitting element 4315, is sent to local device 41 for the session key after ciphering unit 4314 is signed.
Further, communication request unit 412 includes:
Second sign test unit 4121, if for receiving the session key after the signature that the first transmitting element 4315 sends, Sign test is carried out to the session key using the close pipe public key for prestoring then;
Second sign test success unit 4122, if for the sign test success of the second sign test unit 4121, using adding for prestoring Close private key is decrypted to session key, the session key after being decrypted;
Second transmitting element 4123, for sending communication request to opposite equip. 42.
Further, key acquiring unit 421, the communication request for being additionally operable to be sent according to the second transmitting element 4123 include Local device mark, send secret key request message to close pipe server 43, wherein, the secret key request message carries local device Mark, secret key request message are used for obtaining the corresponding session key of local device mark;
Key obtains processing unit 432, and the key request for being additionally operable to be sent according to the key acquiring unit 421 for receiving disappears Local device is identified corresponding session key and is sent to opposite equip. 42 by breath.
Local device 41, opposite equip. 42 and close pipe server 43 in the system 400 of the key management that the present embodiment is provided Each unit realize the process of respective function, specifically refer to the description of aforementioned embodiment illustrated in fig. 3, here is omitted.
Knowable to the system 400 of the key management of above-mentioned Fig. 4 examples, in the present embodiment, local device detects user and touches When sending out the operation communicated with opposite equip., application bag is set up, signed to applying for bag using the signature private key for prestoring, and used The close pipe public key for prestoring is encrypted to the application bag after signature, and the application bag after local device is identified and encrypted generates key Solicitation message, and the key solicitation message is sent to into close pipe server, for applying for session key, close pipe server is according to close The local device mark that key solicitation message is included, identifies corresponding close pipe private key using local device and key solicitation message is included Application bag be decrypted, identify corresponding public signature key using local device carries out sign test to the application bag after decryption, and It is random after sign test success to generate session key, corresponding encrypted public key being identified using local device, session key is encrypted, And after the session key identified after corresponding close pipe private key pair encryption using local device is signed, the session key is sent To local device, by local device and the interacting message mode of this ciphering signature of close pipe server, it is ensured that session key Security in transmitting procedure, simultaneously because session key be randomly generated it is unique, different communication process its Session key is also differed, close so as to ensure words one, improves the security of Content of Communication transmission in communication process;Local device Session key is decrypted and sign test after be stored in safety chip, and to opposite equip. send communication request, the call please Ask and need not carry session key, after opposite equip. receives communication request, adopt and local device identical encrypted transmission side Formula carries out interacting message with close pipe server, and to close pipe server request session key, close pipe server is according to local device Mark gets corresponding session key and is sent to opposite equip., and opposite equip. is returned to local device after receiving session key Communication response is returned, the communication connection with local device is set up, so that local device and opposite equip. all get safely this The session key of secondary communication, improves generation security and the transmission security of session key, so as to ensure the peace of Content of Communication It is complete to transmit.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, composition and the step of each example is generally described in the above description according to function.This A little functions actually with hardware or software mode performing, the application-specific and design constraint depending on technical scheme.Specially Industry technical staff can use different methods to realize described function to each specific application, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, foregoing description【System System】, local device and unit specific work process, may be referred to the corresponding process in preceding method embodiment, here is no longer Repeat.
In several embodiments provided herein, it should be understood that disclosed【System】, local device and side Method, can be realized by another way.For example, device embodiment described above is only schematic, for example, described The division of unit, only a kind of division of logic function can have other dividing mode, such as multiple units when actually realizing Or component can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.In addition, shown The coupling each other shown or discuss or direct-coupling or communication connection can be by some interfaces, between device or unit Connect coupling or communicate to connect, or electricity, machinery or other forms connections.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can local to be located at one, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized and as independent production marketing or use using in the form of SFU software functional unit When, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part that in other words prior art is contributed, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, use so that a computer including some instructions Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or replacement should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain of requirement is defined.

Claims (10)

1. a kind of method of key management, it is characterised in that methods described includes:
If local device detects the operation that user's triggering is communicated with opposite equip., key application is sent to close pipe server and disappeared Breath, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for session key;
The close pipe server generates the local device mark corresponding at random according to the key solicitation message for receiving The session key, and the session key is sent to into the local device;
If the local device receives the session key, communication request is sent to the opposite equip., it is wherein, described logical Letter request carries the local device mark;
The local device mark that the opposite equip. is included according to the communication request, obtains to the close pipe server request Take the local device and identify the corresponding session key;
If the opposite equip. receives the session key, the communication request is responded, set up logical with the local device Letter connection.
2. method according to claim 1, it is characterised in that triggering is set with opposite end if the local device detects user The operation of standby communication, then sending key solicitation message to close pipe server includes:
If the local device detects the operation that user's triggering is communicated with opposite equip., application bag is set up;
The local device is signed to the application bag using the signature private key for prestoring, and using the close pipe public key pair for prestoring The application bag after signature is encrypted;
The application bag after the local device is identified and encrypted by the local device generates the key solicitation message, and The key solicitation message is sent to into the close pipe server.
3. method according to claim 2, it is characterised in that the close pipe server is according to the key Shen for receiving Please message, generate the local device at random and identify the corresponding session key, and the session key is sent to described Local device includes:
The local device mark that the close pipe server is included according to the key solicitation message, obtains described for prestoring End equipment identifies corresponding close pipe key to, the public signature key of the local device and the encryption key pair of the local device, Wherein, the close pipe key is to including close pipe private key and close pipe public key, the encryption key is to private including encrypted public key and encryption Key;
The close pipe server is decrypted to the application bag that the key solicitation message is included using the close pipe private key, And using the public signature key to decryption after the application bag carry out sign test;
If sign test success, the close pipe server generates session key at random, and the session key is set with the local terminal Standby mark correspondence is preserved;
The close pipe server is encrypted to the session key using the encrypted public key, and uses the close pipe private key pair The session key after encryption is signed;
The close pipe server by signature after the session key be sent to the local device.
4. method according to claim 3, it is characterised in that if the local device receives the session key, Communication request is sent to the opposite equip. includes:
If the local device receives the session key after signature, using the close pipe public key to the session key Carry out sign test;
If the sign test success, the local device are solved to the session key using the encryption key for prestoring Close, after being decrypted the session key;
The local device sends communication request to opposite equip..
5. the method according to any one of Claims 1-4, it is characterised in that the opposite equip. please according to the communication The local device mark for including is sought, and the local device is obtained to the close pipe server request and is identified the corresponding meeting Words key includes:
The local device mark that the opposite equip. is included according to the communication request, sends close to the close pipe server Key request message, wherein, the secret key request message carries the local device mark, and the secret key request message is used for obtaining The local device identifies the corresponding session key;
The local device is identified the corresponding meeting according to the secret key request message for receiving by the close pipe server Words key is sent to the opposite equip..
6. a kind of system of key management, it is characterised in that the system includes local device, opposite equip. and close pipe service Device;
The local device includes:
Key application unit, if for detecting the operation that user's triggering is communicated with opposite equip., send to close pipe server Key solicitation message, wherein, the key solicitation message carries local device mark, and the key solicitation message is used for applying for meeting Words key;
Communication request unit, if for receiving the session key, sending communication request to the opposite equip., wherein, The communication request carries the local device mark;
The opposite equip. includes:
Key acquiring unit, for the local device mark included according to the communication request, to the close pipe server Local device described in acquisition request identifies the corresponding session key;
Communication response unit, if for receiving the session key, responding the communication request, is built with the local device Vertical communication connection;
The close pipe server includes:
Key generating unit, it is right for according to the key solicitation message for receiving, generating the local device mark at random The session key answered, and the session key is sent to into the local device;
Key obtains processing unit, close for processing the corresponding session of the opposite equip. acquisition local device mark The request of key.
7. system according to claim 6, it is characterised in that the key application unit includes:
Unit is set up in application, if for detecting the operation that user's triggering is communicated with opposite equip., setting up application bag;
Application ciphering unit, signs to the application bag for the signature private key that use prestores, and using the close pipe for prestoring Public key to signature after the application bag be encrypted;
Application transmitting element, generates the key application for the application bag after the local device is identified and encrypted and disappears Breath, and the key solicitation message is sent to into the close pipe server.
8. system according to claim 7, it is characterised in that the Key generating unit includes:
Acquiring unit, for the local device mark included according to the key solicitation message, obtains described for prestoring End equipment identifies corresponding close pipe key to, the public signature key of the local device and the encryption key pair of the local device, Wherein, the close pipe key is to including close pipe private key and close pipe public key, the encryption key is to private including encrypted public key and encryption Key;
First sign test unit, for being solved to the application bag that the key solicitation message is included using the close pipe private key It is close, and using the public signature key to decryption after the application bag carry out sign test;
First sign test success unit, if for sign test success, generate session key at random, and by the session key with it is described Local device mark correspondence is preserved;
Ciphering unit, for being encrypted to the session key using the encrypted public key, and uses the close pipe private key pair The session key after encryption is signed;
First transmitting element, is sent to the local device for the session key after by signature.
9. system according to claim 8, it is characterised in that the communication request unit includes:
Second sign test unit, if for receiving the session key after signature, using the close pipe public key to the meeting Words key carries out sign test;
Second sign test success unit, if for the sign test success, it is close to the session using the encryption key for prestoring Key is decrypted, the session key after being decrypted;
Second transmitting element, for sending communication request to opposite equip..
10. the system according to any one of claim 6 to 9, it is characterised in that the key acquiring unit, is additionally operable to root The local device mark included according to the communication request, sends secret key request message, wherein, institute to the close pipe server State secret key request message and carry the local device mark, the secret key request message is right for obtaining the local device mark The session key answered;
The key obtains processing unit, is additionally operable to according to the secret key request message for receiving, by the local device mark Know the corresponding session key and be sent to the opposite equip..
CN201610908752.7A 2016-10-18 2016-10-18 Key management method and system Withdrawn CN106535184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908752.7A CN106535184A (en) 2016-10-18 2016-10-18 Key management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908752.7A CN106535184A (en) 2016-10-18 2016-10-18 Key management method and system

Publications (1)

Publication Number Publication Date
CN106535184A true CN106535184A (en) 2017-03-22

Family

ID=58332574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908752.7A Withdrawn CN106535184A (en) 2016-10-18 2016-10-18 Key management method and system

Country Status (1)

Country Link
CN (1) CN106535184A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449346A (en) * 2018-03-22 2018-08-24 北京可信华泰科技有限公司 A kind of key generation client
CN108718313A (en) * 2018-05-31 2018-10-30 深圳市文鼎创数据科技有限公司 Application of software data uses method, terminal device and server safely
CN109101803A (en) * 2018-07-25 2018-12-28 腾讯科技(深圳)有限公司 Biometric apparatus and method
CN109286635A (en) * 2018-11-08 2019-01-29 蓝信移动(北京)科技有限公司 Multiterminal logon data encryption method
CN109361680A (en) * 2018-11-08 2019-02-19 蓝信移动(北京)科技有限公司 End-to-end data encryption system
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110048843A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key transmission method, equipment and computer readable storage medium
CN110176993A (en) * 2019-05-30 2019-08-27 全链通有限公司 Session cipher key distributing method, equipment and storage medium based on alliance's block chain
CN110401677A (en) * 2019-08-23 2019-11-01 RealMe重庆移动通信有限公司 Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key
CN110399740A (en) * 2019-07-29 2019-11-01 浙江诺诺网络科技有限公司 A kind of method and system of proxy data secure interactive
CN110430204A (en) * 2019-08-12 2019-11-08 徐州恒佳电子科技有限公司 A kind of modified JSON safety communicating method based on third party's password book server
CN111162999A (en) * 2019-12-30 2020-05-15 广东盈世计算机科技有限公司 Message processing method and device based on instant chat tool
CN111182050A (en) * 2019-12-26 2020-05-19 上海掌门科技有限公司 Method and equipment for realizing communication between application and server
CN112449345A (en) * 2020-12-09 2021-03-05 中国联合网络通信集团有限公司 Secure communication method and device
CN112491533A (en) * 2019-09-12 2021-03-12 华为技术有限公司 Key generation method and device
CN112688904A (en) * 2019-10-18 2021-04-20 中兴通讯股份有限公司 Secure channel establishing method, electronic equipment and storage medium
CN112769560A (en) * 2020-12-31 2021-05-07 中国农业银行股份有限公司 Key management method and related device
CN112989370A (en) * 2021-02-09 2021-06-18 腾讯科技(深圳)有限公司 Secret key filling method, system, device, equipment and storage medium
CN113242249A (en) * 2021-05-18 2021-08-10 中铁信(北京)网络技术研究院有限公司 Session control method and device
CN113839924A (en) * 2021-08-31 2021-12-24 青岛海尔科技有限公司 Terminal interaction method and device, storage medium and electronic equipment
CN114745134A (en) * 2022-03-30 2022-07-12 恒玄科技(上海)股份有限公司 Method, system, equipment and computer readable medium for transferring media data stream
CN114785751A (en) * 2021-01-06 2022-07-22 腾讯科技(深圳)有限公司 Message transmission method and related device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060221174A1 (en) * 2005-04-04 2006-10-05 Leadtek Research Inc. Method of videophone data transmission
KR20090015736A (en) * 2007-08-09 2009-02-12 삼성전자주식회사 Authentication method in communication system
CN101479984A (en) * 2006-04-25 2009-07-08 斯蒂芬·L.·博伦 Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
CN104683304A (en) * 2013-11-29 2015-06-03 中国移动通信集团公司 A processing method, device and system for secure communication services

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060221174A1 (en) * 2005-04-04 2006-10-05 Leadtek Research Inc. Method of videophone data transmission
CN101479984A (en) * 2006-04-25 2009-07-08 斯蒂芬·L.·博伦 Dynamic distributed key system and method for identity management, authentication server, data security and protection against man-in-the-middle attacks
KR20090015736A (en) * 2007-08-09 2009-02-12 삼성전자주식회사 Authentication method in communication system
CN101540669A (en) * 2008-03-20 2009-09-23 深圳市奥联科技有限公司 Method for distributing keys and protecting information for wireless mobile communication network
CN104683304A (en) * 2013-11-29 2015-06-03 中国移动通信集团公司 A processing method, device and system for secure communication services

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449346B (en) * 2018-03-22 2021-07-27 北京可信华泰科技有限公司 Key generation client
CN108449346A (en) * 2018-03-22 2018-08-24 北京可信华泰科技有限公司 A kind of key generation client
CN108718313A (en) * 2018-05-31 2018-10-30 深圳市文鼎创数据科技有限公司 Application of software data uses method, terminal device and server safely
CN109101803A (en) * 2018-07-25 2018-12-28 腾讯科技(深圳)有限公司 Biometric apparatus and method
CN109101803B (en) * 2018-07-25 2023-06-23 腾讯科技(深圳)有限公司 Biometric identification apparatus and method
CN109286635A (en) * 2018-11-08 2019-01-29 蓝信移动(北京)科技有限公司 Multiterminal logon data encryption method
CN109361680A (en) * 2018-11-08 2019-02-19 蓝信移动(北京)科技有限公司 End-to-end data encryption system
CN110048843A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key transmission method, equipment and computer readable storage medium
CN110176993A (en) * 2019-05-30 2019-08-27 全链通有限公司 Session cipher key distributing method, equipment and storage medium based on alliance's block chain
CN110048843B (en) * 2019-05-30 2021-09-10 全链通有限公司 Session key transmission method, device and computer readable storage medium
CN110048842B (en) * 2019-05-30 2021-09-10 全链通有限公司 Session key processing method, device and computer readable storage medium
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110399740A (en) * 2019-07-29 2019-11-01 浙江诺诺网络科技有限公司 A kind of method and system of proxy data secure interactive
CN110399740B (en) * 2019-07-29 2021-05-25 浙江诺诺网络科技有限公司 Method and system for safe interaction of proxy data
CN110430204A (en) * 2019-08-12 2019-11-08 徐州恒佳电子科技有限公司 A kind of modified JSON safety communicating method based on third party's password book server
CN110401677B (en) * 2019-08-23 2022-05-17 RealMe重庆移动通信有限公司 Method and device for acquiring digital copyright key, storage medium and electronic equipment
CN110401677A (en) * 2019-08-23 2019-11-01 RealMe重庆移动通信有限公司 Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key
CN112491533A (en) * 2019-09-12 2021-03-12 华为技术有限公司 Key generation method and device
CN112491533B (en) * 2019-09-12 2022-09-02 华为技术有限公司 Key generation method and device
CN112688904A (en) * 2019-10-18 2021-04-20 中兴通讯股份有限公司 Secure channel establishing method, electronic equipment and storage medium
CN111182050A (en) * 2019-12-26 2020-05-19 上海掌门科技有限公司 Method and equipment for realizing communication between application and server
CN111182050B (en) * 2019-12-26 2022-10-11 上海掌门科技有限公司 Method and equipment for realizing communication between application and server
CN111162999A (en) * 2019-12-30 2020-05-15 广东盈世计算机科技有限公司 Message processing method and device based on instant chat tool
CN112449345B (en) * 2020-12-09 2024-02-09 中国联合网络通信集团有限公司 Secure communication method and device
CN112449345A (en) * 2020-12-09 2021-03-05 中国联合网络通信集团有限公司 Secure communication method and device
CN112769560A (en) * 2020-12-31 2021-05-07 中国农业银行股份有限公司 Key management method and related device
CN112769560B (en) * 2020-12-31 2023-03-24 中国农业银行股份有限公司 Key management method and related device
CN114785751A (en) * 2021-01-06 2022-07-22 腾讯科技(深圳)有限公司 Message transmission method and related device
CN114785751B (en) * 2021-01-06 2024-04-26 腾讯科技(深圳)有限公司 Message transmission method and related device
CN112989370B (en) * 2021-02-09 2023-06-30 腾讯科技(深圳)有限公司 Key filling method, system, device, equipment and storage medium
CN112989370A (en) * 2021-02-09 2021-06-18 腾讯科技(深圳)有限公司 Secret key filling method, system, device, equipment and storage medium
CN113242249B (en) * 2021-05-18 2022-03-08 中铁信(北京)网络技术研究院有限公司 Session control method and device
CN113242249A (en) * 2021-05-18 2021-08-10 中铁信(北京)网络技术研究院有限公司 Session control method and device
CN113839924A (en) * 2021-08-31 2021-12-24 青岛海尔科技有限公司 Terminal interaction method and device, storage medium and electronic equipment
CN113839924B (en) * 2021-08-31 2024-04-23 青岛海尔科技有限公司 Terminal interaction method and device, storage medium and electronic equipment
CN114745134A (en) * 2022-03-30 2022-07-12 恒玄科技(上海)股份有限公司 Method, system, equipment and computer readable medium for transferring media data stream
CN114745134B (en) * 2022-03-30 2024-05-31 恒玄科技(上海)股份有限公司 Method, system, device and computer readable medium for streaming media data stream

Similar Documents

Publication Publication Date Title
CN106535184A (en) Key management method and system
CN106453330A (en) Identity authentication method and system
WO2021184755A1 (en) Application access method and apparatus, and electronic device and storage medium
US8719573B2 (en) Secure peer discovery and authentication using a shared secret
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN102195957A (en) Resource sharing method, device and system
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN104967597A (en) Third-party application message authentication method and system based on secure channel
CN108683501A (en) Based on quantum communication network using timestamp as the multiple identity authorization system and method for random number
CN106341375A (en) Method and system for realizing resource encrypted access
CN106790223A (en) The method and apparatus and its system of a kind of data transfer
CN103107994A (en) Vitualization environment data security partition method and system
CN106686585A (en) Binding method and system
CN104917807A (en) Resource transfer method, apparatus and system
CN106899584A (en) Management method and its device that a kind of hardware device is accessed
CN109063450B (en) Control method of safe storage medium, safe storage medium and system
CN109145641A (en) Method for protecting privacy and system
CN104796262B (en) Data ciphering method and terminal system
CN110213056A (en) Anti- quantum calculation energy-saving communication method and system and computer equipment based on online static signature
CN116366364A (en) Terminal data processing method and system for cloud computer
CN106779662A (en) The processing method and financial terminal of a kind of financial business
CN105871540A (en) Cipher machine and cryptogrammic operation implementation method based on host machine
CN106712959B (en) method and system for realizing communication security
CN106992978A (en) Network safety managing method and server
CN107493281A (en) encryption communication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170322