CN107733912A - Information ciphering method, information authentication method, terminal and computer-readable recording medium - Google Patents
Information ciphering method, information authentication method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107733912A CN107733912A CN201711048071.9A CN201711048071A CN107733912A CN 107733912 A CN107733912 A CN 107733912A CN 201711048071 A CN201711048071 A CN 201711048071A CN 107733912 A CN107733912 A CN 107733912A
- Authority
- CN
- China
- Prior art keywords
- terminal
- identification information
- key
- information
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of information ciphering method,Information authentication method,Terminal and computer-readable recording medium,Getting the identification information of terminal,After key corresponding to terminal and public key,The identification information of terminal can be encrypted using key,Identification information after being encrypted,The encryption to identification information is realized so in the case of without encryption chip,So that improve Information Security in the case of not increasing cost,And the identification information of terminal can carry out corresponding with public key,And the identification information of corresponding terminal and public key are sent to server,After so server obtains the identification information of terminal,The identification information of terminal can be obtained using public key corresponding to terminal,So that on the premise of Information Security is improved,Server still can normally obtain information and carry out authentification of message.
Description
Technical field
The invention belongs to field of information security technology, and in particular, more particularly to a kind of information ciphering method, information are recognized
Card method, terminal and computer-readable recording medium.
Background technology
SN (Serial Number, sequence number) and IMEI (International Mobile Equipment
Identity, electronics string number) identification information as terminal, authentication can be carried out to terminal by SN/IMEI.
Terminal can use clear-text way storage SN/IMEI at present, but this storage mode causes SN/IMEI easily quilts
Distort, lead to not be authenticated terminal, therefore to improve SN/IMEI security, can be deposited using the following two kinds mode
Store up SN/IMEI:
A kind of mode is:SN/IMEI is encrypted storage, but this mode causes the service being authenticated to terminal
Device can not get SN/IMEI;
Another way is:Encryption chip is implanted into the terminal, and SN/IMEI, but this side are stored by encryption chip
Formula can increase the cost of terminal.
The content of the invention
In view of this, it is an object of the invention to provide a kind of information ciphering method, information authentication method, terminal and calculating
Machine readable storage medium storing program for executing, for improving Information Security in the case where not increasing cost, and allow server normal
Obtain information and carry out authentification of message.Technical scheme is as follows:
The present invention provides a kind of information ciphering method, and methods described includes:
Obtain the identification information of terminal, key and public key corresponding to terminal;
The identification information of the terminal is encrypted using key corresponding to the terminal, the body after being encrypted
Part identification information;
The identification information of the terminal and the public key are carried out correspondingly, and by the identity of the corresponding terminal
Identification information and the public key are sent to server.
Preferably, before carrying out the identification information of the terminal and the public key to correspond to, methods described is also wrapped
Include:Identification information after the encryption is stored in the first storage region, wherein first storage region with it is described
Terminal is communicatively coupled, and first storage region it is safe in be communicatively coupled with the terminal other deposit
The security in storage area domain.
Preferably, first storage region is the RPMB regions of the terminal.
Preferably, using before the identification information of the terminal is encrypted key corresponding to the terminal,
Methods described also includes:Key corresponding to the terminal is encrypted, the key after being encrypted.
Preferably, the key is encrypted, the key after being encrypted includes:Using RPMB keys to the terminal
Corresponding key is encrypted, the key after being encrypted.
Preferably, methods described also includes:By the key storage after the encryption in the first storage region.
The present invention also provides a kind of information authentication method, and methods described includes:
After the certification request of server transmission is received, the identity letter after key corresponding to terminal and encryption is obtained
Breath;
Using key corresponding to the terminal, the identification information after encryption is decrypted, obtains the terminal
Identification information;
The identification information of the terminal is sent to the server, terminal-pair should as described in the server by utilizing
Public key the identification information of the terminal is authenticated.
Preferably, the identification information after encryption is decrypted, obtained using key corresponding to the terminal described
To after the identification information of the terminal, methods described also includes:Identification information to the terminal and described recognize
The first information carried in card request is signed, and obtains result of signing;
The identification information by the terminal, which is sent to the server, to be included:The signature result is sent to
The server, identity of the public key corresponding to the terminal as described in the server by utilizing to the terminal in the signature result
Identification information is authenticated.
Preferably, the first information to being carried in the identification information of the terminal and the certification request is carried out
Signature, obtaining signature result includes:Utilize key corresponding to the terminal, the identification information to the terminal and described
One information is signed, and obtains result of signing.
Preferably, after the certification request of server transmission is received, key corresponding to terminal and the body after encryption are obtained
Part identification information includes:
After the certification request of server transmission is received, the key after encryption and encryption are obtained from the first storage region
Identification information afterwards, wherein first storage region is communicatively coupled with the terminal, and first memory block
The safe security in other storage regions being communicatively coupled with the terminal in domain;
Key after encryption is decrypted, obtains key corresponding to the terminal.
Preferably, described pair encryption after key be decrypted including:Carried out using the key after RPMB key pair encryptions
Decryption.
Preferably, first storage region is the RPMB regions of the terminal.
The present invention also provides a kind of terminal, and the terminal includes:
Acquiring unit, for obtaining the identification information of terminal, key and public key corresponding to terminal;
Ciphering unit, for the identification information of the terminal to be encrypted using key corresponding to the terminal,
Identification information after being encrypted;
Corresponding unit, for the identification information of the terminal and the public key to be carried out correspondingly;
Transmitting element, for the identification information of the corresponding terminal and the public key to be sent to server.
Preferably, the terminal also includes:Memory cell, for the identification information after the encryption to be stored in into
In one storage region, wherein first storage region is communicatively coupled with the terminal, and first storage region
The safe security in other storage regions being communicatively coupled with the terminal.
Preferably, first storage region is the RPMB regions of the terminal.
Preferably, the ciphering unit, it is additionally operable to that key corresponding to the terminal is encrypted, it is close after being encrypted
Key.
Preferably, the ciphering unit, specifically for key corresponding to the terminal is encrypted using RPMB keys,
Key after being encrypted.
Preferably, the key storage after the encryption is in the first storage region.
The present invention also provides a kind of terminal, and the terminal includes:
Acquiring unit, for after the certification request of server transmission is received, obtaining key and encryption corresponding to terminal
Identification information afterwards;
Decryption unit, for using key corresponding to the terminal, being decrypted, obtaining to the identification information after encryption
To the identification information of the terminal;
Transmitting element, for the identification information of the terminal to be sent into the server, by server profit
Public key is authenticated to the identification information of the terminal corresponding to the terminal.
Preferably, the terminal also includes:Signature unit, for the identification information to the terminal and the certification
The first information carried in request is signed, and obtains result of signing;
The transmitting element, specifically for the signature result is sent into the server, by the server by utilizing
Public key corresponding to the terminal is authenticated to the identification information of the terminal in the signature result.
Preferably, the signature unit, specifically for utilizing key corresponding to the terminal, to the identity mark of the terminal
Know information and the first information is signed, obtain result of signing.
Preferably, the acquiring unit, specifically for after the certification request of server transmission is received, being stored from first
The key after encryption and the identification information after encryption are obtained in region, and triggers the decryption unit to the key after encryption
It is decrypted, obtains key corresponding to the terminal, wherein first storage region is communicatively coupled with the terminal, and
The safe security in other storage regions being communicatively coupled with the terminal of first storage region.
Preferably, the decryption unit, specifically for being decrypted using the key after RPMB key pair encryptions.
Preferably, first storage region is the RPMB regions of the terminal.
The present invention also provides a kind of terminal, and the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
The processor performs above- mentioned information encryption method when calling described program code.
The present invention also provides a kind of terminal, and the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
Above- mentioned information authentication method when the processor calls described program code.
The present invention also provides a kind of computer-readable recording medium, and calculating is stored with the computer-readable recording medium
Machine program, the computer program realize above- mentioned information encryption method when being executed by processor.
The present invention also provides a kind of computer-readable recording medium, and calculating is stored with the computer-readable recording medium
Machine program, the computer program realize above- mentioned information authentication method when being executed by processor.
Compared with prior art, above-mentioned technical proposal provided by the invention has the following advantages that:
By above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, can
So that the identification information of terminal to be encrypted using key, the identification information after being encrypted, need not so add
The encryption to identification information is realized in the case of close chip so that Information Security is improved in the case of not increasing cost,
And the identification information of terminal can be carried out with public key it is corresponding, and by the identification information and public key of corresponding terminal
Send to server, after such server obtains the identification information of terminal, end can be obtained using public key corresponding to terminal
The identification information at end so that on the premise of Information Security is improved, server still can normally obtain information and carry out letter
Cease certification.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of information ciphering method provided in an embodiment of the present invention;
Fig. 2 is another flow chart of information ciphering method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of information authentication method provided in an embodiment of the present invention;
Fig. 4 is another flow chart of information authentication method provided in an embodiment of the present invention;
Fig. 5 is a kind of a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of another structural representation of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of structural representation of another terminal provided in an embodiment of the present invention;
Fig. 8 is another structural representation of another terminal provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Referring to Fig. 1, it illustrates a kind of flow chart of information ciphering method provided in an embodiment of the present invention, can include
Following steps:
101:Obtain the identification information of terminal, key and public key corresponding to terminal.Wherein, the identity letter of terminal
Breath is different from the identification information of other-end, so that terminal and other-end are carried out into area by the identification information of terminal
Point.In the present embodiment, the identification information of terminal can be the SN of terminal and at least one of the IMEI of terminal.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal
Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal
Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and
Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
102:The identification information of terminal is encrypted using key corresponding to terminal, the identity mark after being encrypted
Information is known, to improve the security of identification information by cipher mode.
In the present embodiment, the mode identification information of terminal being encrypted using key corresponding to terminal can be with
It is:The identification information of terminal is encrypted according to certain AES using key corresponding to terminal, can such as be utilized
The identification information of terminal is encrypted according to symmetric encipherment algorithm or rivest, shamir, adelman for key.
Wherein, symmetric encipherment algorithm can be but not limited to:AES (Advanced Encryption Standard, height
Level encryption standard), DES (Data Encryption Algorithm, DEA) and 3DES (Triple DES, it is triple
At least one of DEA), rivest, shamir, adelman can be but not limited to:RSA、DSA(Digital
At least one of Signature Algorithm, Digital Signature Algorithm) and ECC (elliptic curve encryption algorithm).
For terminal, the terminal can be integrated with multiple encryption algorithms, such as CPU (Central in terminal
Processing Unit, central processing unit) in integrate multiple encryption algorithms, so using key corresponding to terminal to terminal
Identification information when being encrypted, a kind of AES can be arbitrarily chosen from this multiple encryption algorithms and be encrypted;
Or call AES to be encrypted according to preset rules, wherein preset rules can be that multiple encryption algorithms are arranged
Sequence, and periodically invoked each AES is encrypted.
103:The identification information of terminal and public key are carried out correspondingly, and by the identification information of corresponding terminal
Sent with public key to server, realize the identification information of terminal and the one-to-one corresponding of public key.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and
Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is
Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal
Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal
In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key,
The identification information of terminal can be encrypted using key, the identification information after being encrypted, so need not
The encryption to identification information is realized in the case of encryption chip so that improve information security in the case of not increasing cost
Property, and the identification information of terminal can be carried out with public key it is corresponding, and by the identification information of corresponding terminal and
Public key is sent to server, after such server obtains the identification information of terminal, can be obtained using public key corresponding to terminal
To the identification information of terminal so that on the premise of Information Security is improved, server still can normally obtain information and enter
Row information certification.
Referring to Fig. 2, it illustrates another flow chart of information ciphering method provided in an embodiment of the present invention, can wrap
Include following steps:
201:Obtain the identification information of terminal, key and public key corresponding to terminal.Wherein, the identity letter of terminal
Breath is different from the identification information of other-end, so that terminal and other-end are carried out into area by the identification information of terminal
Point.In the present embodiment, the identification information of terminal can be the SN of terminal and at least one of the IMEI of terminal.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal
Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal
Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and
Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
202:The identification information of terminal is encrypted using key corresponding to terminal, the identity mark after being encrypted
Information is known, to improve the security of identification information by cipher mode.
203:Identification information after encryption is stored in the first storage region.
Wherein the first storage region is communicatively coupled with terminal, and the first storage region is safe in can with terminal
The security of other communicatively coupled storage regions, the identification information after encryption is so stored in the first storage region
In can improve encryption after identification information security.
So-called be communicatively coupled refers to:Be located in the first storage region in terminal or outside terminal in the case of, encryption
Identification information afterwards is possibly stored in the first storage region.In the case where the first storage region is located at outside terminal,
First storage region can be with an independent storage device or can be cloud storage platform, have by one or more
Line or radio connection communicate with terminal, first storage region.
For the first storage region, the first storage region can be a region for forbidding changing storage content, this
Identification information of the sample after by encryption, which is stored to the first storage region, other staff, can only obtain the identity after the encryption
Identification information, and it can not be modified, so as to improve the security of the identification information after encryption.Such as first
Storage region can be RPMB (Replay Protected Memory Block) region of terminal, and the RPMB regions are terminals
In one forbid change storage content region.
204:The identification information of terminal and public key are carried out correspondingly, and by the identification information of corresponding terminal
Sent with public key to server, realize the identification information of terminal and the one-to-one corresponding of public key.
For step 201,202 and 204:It is identical with above-mentioned steps 101 to 103, to this embodiment of the present invention no longer
Illustrate.
It was found from above-mentioned technical proposal, the identification information of terminal is encrypted using key corresponding to terminal
Under the premise of, the identification information storage after encryption can also be arrived to the first safe memory block than other storage regions
It is (such as safe to particular memory region further through storage so on the basis of identification information is improved with encryption in domain
The first storage region) mode further improve the security of identification information.
In addition in the above-described embodiments, it is being encrypted to the identification information of terminal using key corresponding to terminal
Before, information ciphering method provided in an embodiment of the present invention can also include:Key corresponding to terminal is encrypted, encrypted
Key afterwards, so as to increase the security of key corresponding to terminal.
Can be to the feasible pattern that key corresponding to terminal is encrypted:Using RPMB keys to key corresponding to terminal
It is encrypted, the key after being encrypted.The description of wherein RPMB keys refers to the standardization of JEDEC (solid state technology association)
Document, for protecting the safety in RPMB regions.
And can be to the feasible pattern that key corresponding to terminal is encrypted using RPMB keys:Utilize RPMB key roots
Key corresponding to terminal is encrypted according to certain AES, can such as utilize RPMB keys according to symmetric encipherment algorithm or non-
The identification information of terminal is encrypted symmetric encipherment algorithm.
Wherein, symmetric encipherment algorithm can be but not limited to:At least one of AES, DES and 3DES, it is asymmetric to add
Close algorithm can be but not limited to:At least one of RSA, DSA and ECC.
For terminal, the terminal can be integrated with multiple encryption algorithms, and a variety of encryptions are integrated such as in the CPU of terminal
Algorithm, so using RPMB keys to key is encrypted corresponding to terminal when, can from this multiple encryption algorithms arbitrarily
A kind of AES is chosen to be encrypted;Or call AES to be encrypted according to preset rules, wherein preset rules
Can be that multiple encryption algorithms are ranked up, and periodically invoked each AES is encrypted.Also, to terminal
When key corresponding to identification information and terminal is encrypted, identical or different AES can be chosen.
In order to further improve the security of key corresponding to terminal, the key after encryption can be stored in the first memory block
In domain.Wherein the first storage region is to store the region of the identification information after encrypting, due to the safety of the first storage region
Property higher than the security of other storage regions being communicatively coupled with terminal, so the key storage after encryption is deposited first
In storage area domain, the security of the key after encryption can be improved.
Referring to Fig. 3, it illustrates a kind of flow chart of information authentication method provided in an embodiment of the present invention, can include
Following steps:
301:After the certification request of server transmission is received, key corresponding to terminal and the identity mark after encryption are obtained
Know information.
Wherein, certification request is used to verify whether the identification information of terminal is correct, is such as initiated in terminal to server
Some function is asked, and needs to verify whether the identification information of terminal is correct when asking such as payment function, in checking terminal
In the case of identification information is correct, corresponding processing is performed, such as performs payment processes.
In the present embodiment, obtaining the feasible pattern of key corresponding to terminal and the identification information after encryption includes:
After the certification request of server transmission is received, the key after encryption and the identity after encryption are obtained from the first storage region
Identification information, the key after encryption is decrypted, obtains key corresponding to terminal.
Wherein, the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal
The security for other storage regions being communicatively coupled.Such as the explanation in above-mentioned embodiment, the first storage region can be one
The individual region for forbidding changing storage content, so Yi Dan the identification information after by encryption and the key storage after encryption to the
One storage region, other staff can only obtain the identification information after the encryption and the key after encryption, and it can not be entered
Row change, so as to improve the security of the identification information after encryption and the key after encryption.Such as first memory block
Domain can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
For the key after encryption, the key after encryption is decrypted the embodiment of the present invention feasible pattern can be with
It is:It is decrypted using the key after RPMB key pair encryptions, and the key after using RPMB key pair encryptions is decrypted
When the key after encryption can be decrypted according to certain decipherment algorithm using RPMB keys, decrypting process use decryption calculate
Method is, it is necessary to depending on the AES used when key corresponding to terminal is encrypted.
302:Using key corresponding to terminal, the identification information after encryption is decrypted, obtains the identity of terminal
Identification information.As can using terminal corresponding to key the identification information after encryption is solved according to certain decipherment algorithm
Close, the decipherment algorithm that decrypting process uses is, it is necessary to the AES used during depending on the identification information of terminal being encrypted
Depending on.
303:The identification information of terminal is sent to server, public key is to terminal as corresponding to server by utilizing terminal
Identification information be authenticated.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and
Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is
Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal
Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal
In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key,
The identification information after key pair encryption corresponding to terminal can be utilized to be decrypted, obtain the identification information of terminal,
And the identification information of terminal is sent to server, identity of the public key to terminal as corresponding to server by utilizing terminal
Information is authenticated, and is realized on the premise of Information Security is improved, and server, which still can normally obtain information and enter row information, to be recognized
Card.
Referring to Fig. 4, it illustrates another flow chart of information authentication method provided in an embodiment of the present invention, can wrap
Include following steps:
401:After the certification request of server transmission is received, key corresponding to terminal and the identity mark after encryption are obtained
Know information.
402:Using key corresponding to terminal, the identification information after encryption is decrypted, obtains the identity of terminal
Identification information.
In the present embodiment, step 401 and 402:It is identical with above-mentioned steps 301 and 302, this present embodiment is no longer explained
State.
403:The first information carried in the identification information and certification request of terminal is signed, obtains signature knot
Fruit.Wherein, the first information is used to prevent Replay Attack, if the first information can be the random number that server generates at random,
To ensure the security of certification by the first information.
In the present embodiment, a kind of feasible pattern bag that the identification information to terminal and the first information are signed
Include:The identification information and the first information of terminal are signed using key corresponding to terminal, obtain result of signing.Such as profit
Key is believed the identification information of terminal and first according to certain AES, such as rivest, shamir, adelman corresponding to terminal
Breath is signed.
It can certainly be signed using other modes, such as the identification information and the first information of terminal are arranged
Row, the signature of identification information to terminal and the first information is realized with this.Such as the first information can be arranged in terminal
Identification information a position on, such as can be any one in following arrangement mode:
Before being arranged in the identification information of terminal, it is arranged in after the identification information of terminal and is arranged in terminal
Identification information among.
404:Signature result is sent to server, public key is to the end in signature result as corresponding to server by utilizing terminal
The identification information at end is authenticated.
Server is after signature result is received, according to the identification information and the signer of the first information to terminal
Formula, the identification information of terminal is extracted from signature result, it is right that its is then got according to the identification information of terminal
Whether the public key answered, the identification information of the terminal extracted by its corresponding public key verifications are correct.
For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but
It is that those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to the present invention, certain
A little steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification
The embodiment stated belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
Corresponding with above method embodiment, the embodiment of the present invention also provides a kind of terminal, its structural representation such as Fig. 5 institutes
Show, can include:Acquiring unit 11, ciphering unit 12, corresponding unit 13 and transmitting element 14.
Acquiring unit 11, for obtaining the identification information of terminal, key and public key corresponding to terminal.Wherein, terminal
Identification information it is different from the identification information of other-end, with by the identification information of terminal by terminal and its
He makes a distinction terminal.In the present embodiment, the identification information of terminal can be in the SN of terminal and the IMEI of terminal
It is at least one.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal
Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal
Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and
Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
Ciphering unit 12, for the identification information of terminal to be encrypted using key corresponding to terminal, added
Identification information after close.In the present embodiment, the identification information of terminal is added using key corresponding to terminal
Close mode can be:The identification information of terminal is added according to certain AES using key corresponding to terminal
It is close, the identification information of terminal can such as be added according to symmetric encipherment algorithm or rivest, shamir, adelman using key
It is close.Wherein, symmetric encipherment algorithm, rivest, shamir, adelman and how to choose AES and can refer to above method embodiment
In related description, this present embodiment is no longer illustrated.
Corresponding unit 13, for carrying out the identification information of terminal and public key correspondingly, to realize the identity of terminal
The one-to-one corresponding of information and public key.
Transmitting element 14, for the identification information of corresponding terminal and public key to be sent to server.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and
Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is
Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal
Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal
In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key,
The identification information of terminal can be encrypted using key, the identification information after being encrypted, so need not
The encryption to identification information is realized in the case of encryption chip so that improve information security in the case of not increasing cost
Property, and the identification information of terminal can be carried out with public key it is corresponding, and by the identification information of corresponding terminal and
Public key is sent to server, after such server obtains the identification information of terminal, can be obtained using public key corresponding to terminal
To the identification information of terminal so that on the premise of Information Security is improved, server still can normally obtain information and enter
Row information certification.
Referring to Fig. 6, it illustrates a kind of another structural representation of terminal provided in an embodiment of the present invention, in Fig. 5
On the basis of, it can also include:Memory cell 15, for the identification information after encryption to be stored in the first storage region,
Wherein the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal communicably coupling
The security for other storage regions closed, so the identification information after encryption, which is stored in the first storage region, to improve
The security of identification information after encryption.
For the first storage region, the first storage region can be a region for forbidding changing storage content, this
Identification information of the sample after by encryption, which is stored to the first storage region, other staff, can only obtain the identity after the encryption
Identification information, and it can not be modified, so as to improve the security of the identification information after encryption.Such as first
Storage region can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
In addition, in the present embodiment, ciphering unit 12, it is additionally operable to that key corresponding to terminal is encrypted, is encrypted
Key afterwards.Key corresponding to terminal is encrypted using RPMB keys for specific ciphering unit 12, close after being encrypted
Key.
And can be to the feasible pattern that key corresponding to terminal is encrypted using RPMB keys:Utilize RPMB key roots
Key corresponding to terminal is encrypted according to certain AES, can such as utilize RPMB keys according to symmetric encipherment algorithm or non-
The identification information of terminal is encrypted symmetric encipherment algorithm.Wherein, symmetric encipherment algorithm, rivest, shamir, adelman and
AES how is chosen can no longer to illustrate this present embodiment refering to the related description in above method embodiment.
In order to further improve the security of key corresponding to terminal, memory cell 15 can also deposit the key after encryption
Storage is in the first storage region.Wherein the first storage region is to store the region of the identification information after encrypting, due to first
The safe security in other storage regions being communicatively coupled with terminal of storage region, so will be close after encryption
Key is stored in the first storage region, can improve the security of the key after encryption.
Referring to Fig. 7, it illustrates a kind of structural representation of another terminal provided in an embodiment of the present invention, can wrap
Include:Acquiring unit 21, decryption unit 22 and transmitting element 23.
Acquiring unit 21, for after the certification request of server transmission is received, obtaining key corresponding to terminal and adding
Identification information after close.Wherein, certification request be used for verify terminal identification information it is whether correct, such as terminal to
Server initiates the request of some function, needs to verify whether the identification information of terminal is correct when asking such as payment function,
In the case of verifying that the identification information of terminal is correct, corresponding processing is performed, such as performs payment processes.
In the present embodiment, acquiring unit 21 obtain terminal corresponding to key and encryption after identification information it is feasible
Mode includes:After the certification request of server transmission is received, the key after encryption is obtained from the first storage region and is added
Identification information after close, and trigger decryption unit 22 and the key after encryption is decrypted, obtain key corresponding to terminal.
Wherein, the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal
The security for other storage regions being communicatively coupled.Such as the explanation in above-mentioned embodiment, the first storage region can be one
The individual region for forbidding changing storage content, so Yi Dan the identification information after by encryption and the key storage after encryption to the
One storage region, other staff can only obtain the identification information after the encryption and the key after encryption, and it can not be entered
Row change, so as to improve the security of the identification information after encryption and the key after encryption.Such as first memory block
Domain can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
For the key after encryption, the key after encryption is decrypted decryption unit 22 feasible pattern can be with
It is:It is decrypted using the key after RPMB key pair encryptions, and the key after using RPMB key pair encryptions is decrypted
When the key after encryption can be decrypted according to certain decipherment algorithm using RPMB keys, decrypting process use decryption calculate
Method is, it is necessary to depending on the AES used when key corresponding to terminal is encrypted.
Decryption unit 22, for using key corresponding to terminal, being decrypted, obtaining to the identification information after encryption
The identification information of terminal.As can utilize terminal corresponding to key according to certain decipherment algorithm to the identity after encryption
Information is decrypted, and the decipherment algorithm that decrypting process uses is, it is necessary to use during depending on the identification information of terminal being encrypted
AES depending on.
Transmitting element 23, should by server by utilizing terminal-pair for the identification information of terminal to be sent into server
Public key the identification information of terminal is authenticated.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key,
The identification information after key pair encryption corresponding to terminal can be utilized to be decrypted, obtain the identification information of terminal,
And the identification information of terminal is sent to server, identity of the public key to terminal as corresponding to server by utilizing terminal
Information is authenticated, and is realized on the premise of Information Security is improved, and server, which still can normally obtain information and enter row information, to be recognized
Card.
Referring to Fig. 8, it illustrates another structural representation of another terminal provided in an embodiment of the present invention, scheming
It can also include on the basis of 7:Signature unit 24, for the first letter carried in the identification information and certification request to terminal
Breath is signed, and obtains result of signing.Wherein, the first information is used to prevent Replay Attack, if the first information can be server
The random number generated at random, to ensure the security of certification by the first information.
In the present embodiment, a kind of feasible pattern bag that the identification information to terminal and the first information are signed
Include:The identification information and the first information of terminal are signed using key corresponding to terminal, obtain result of signing.Such as profit
Key is believed the identification information of terminal and first according to certain AES, such as rivest, shamir, adelman corresponding to terminal
Breath is signed.
It can certainly be signed using other modes, such as the identification information and the first information of terminal are arranged
Row, the signature of identification information to terminal and the first information is realized with this.Such as the first information can be arranged in terminal
Identification information a position on, such as can be any one in following arrangement mode:
Before being arranged in the identification information of terminal, it is arranged in after the identification information of terminal and is arranged in terminal
Identification information among.
Corresponding, transmitting element 23, specifically for signature result is sent into server, by server by utilizing terminal-pair
The public key answered is authenticated to the identification information of the terminal in signature result.
As server receive signature result after, according to the identification information and the signer of the first information to terminal
Formula, the identification information of terminal is extracted from signature result, it is right that its is then got according to the identification information of terminal
Whether the public key answered, the identification information of the terminal extracted by its corresponding public key verifications are correct.
The embodiment of the present invention also provides a kind of terminal, and terminal includes:Processor, memory and input/output interface.Wherein,
Have program stored therein code in memory.
Input/output interface is used to be called to receive and/or send information.
Above- mentioned information encryption method is performed during processor caller code.
The embodiment of the present invention also provides a kind of terminal, and terminal includes:Processor, memory and input/output interface.Wherein,
Have program stored therein code in memory.
Input/output interface is used to be called to receive and/or send information.
Above- mentioned information authentication method during processor caller code.
The embodiment of the present invention also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium
There is computer program, the computer program realizes above- mentioned information encryption method when being executed by processor.
The embodiment of the present invention also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium
There is computer program, the computer program realizes above- mentioned information authentication method when being executed by processor.
Implementation process and explanation for each step in above-mentioned terminal and computer-readable recording medium etc. refer to
Related description in above method embodiment, this embodiment of the present invention is no longer illustrated.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that
A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except other identical element in the process including the key element, method, article or equipment being also present.
The foregoing description of the disclosed embodiments, those skilled in the art are enable to realize or using the present invention.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and generic principles defined herein can
Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited
The embodiments shown herein is formed on, and is to fit to consistent with principles disclosed herein and features of novelty most wide
Scope.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of information ciphering method, it is characterised in that methods described includes:
Obtain the identification information of terminal, key and public key corresponding to terminal;
The identification information of the terminal is encrypted using key corresponding to the terminal, the identity mark after being encrypted
Know information;
The identification information of the terminal and the public key are carried out correspondingly, and by the identity of the corresponding terminal
Information and the public key are sent to server.
2. according to the method for claim 1, it is characterised in that by the identification information of the terminal and the public key
Before correspond to, methods described also includes:Identification information after the encryption is stored in the first storage region, its
Described in the first storage region be communicatively coupled with the terminal, and first storage region it is safe in it is described
The security for other storage regions that terminal is communicatively coupled.
3. method according to claim 1 or 2, it is characterised in that utilizing key corresponding to the terminal to the end
Before the identification information at end is encrypted, methods described also includes:Key corresponding to the terminal is encrypted, obtained
Key after encryption.
4. a kind of information authentication method, it is characterised in that methods described includes:
After the certification request of server transmission is received, key corresponding to terminal and the identification information after encryption are obtained;
Using key corresponding to the terminal, the identification information after encryption is decrypted, obtains the identity of the terminal
Identification information;
The identification information of the terminal is sent to the server, it is public corresponding to the terminal as described in the server by utilizing
Key is authenticated to the identification information of the terminal.
5. according to the method for claim 4, it is characterised in that described using key corresponding to the terminal, to encryption
Identification information afterwards is decrypted, and after obtaining the identification information of the terminal, methods described also includes:To described
The first information carried in the identification information of terminal and the certification request is signed, and obtains result of signing;
The identification information by the terminal, which is sent to the server, to be included:The signature result is sent to described
Server, identity of the public key corresponding to the terminal as described in the server by utilizing to the terminal in the signature result
Information is authenticated.
6. the method according to claim 4 or 5, it is characterised in that described to receive the certification request of server transmission
Afterwards, obtaining key corresponding to terminal and the identification information after encryption includes:
After the certification request of server transmission is received, after key and encryption after encryption are obtained from the first storage region
Identification information, wherein first storage region is communicatively coupled with the terminal, and first storage region
The safe security in other storage regions being communicatively coupled with the terminal;
Key after encryption is decrypted, obtains key corresponding to the terminal.
7. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, for obtaining the identification information of terminal, key and public key corresponding to terminal;
Ciphering unit, for the identification information of the terminal to be encrypted using key corresponding to the terminal, obtain
Identification information after encryption;
Corresponding unit, for the identification information of the terminal and the public key to be carried out correspondingly;
Transmitting element, for the identification information of the corresponding terminal and the public key to be sent to server.
8. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, after after the certification request of server transmission is received, obtaining key corresponding to terminal and encryption
Identification information;
Decryption unit, for using key corresponding to the terminal, being decrypted to the identification information after encryption, obtaining institute
State the identification information of terminal;
Transmitting element, for the identification information of the terminal to be sent into the server, by the server by utilizing institute
Public key corresponding to terminal is stated to be authenticated the identification information of the terminal.
9. a kind of terminal, it is characterised in that the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
Perform claim requires the information authentication method described in 4 to 6 any one when the processor calls described program code.
10. a kind of computer-readable recording medium, computer program is stored with the computer-readable recording medium, its feature
It is, the computer program realizes the information authentication method described in claim 4 to 6 any one when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711048071.9A CN107733912A (en) | 2017-10-31 | 2017-10-31 | Information ciphering method, information authentication method, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711048071.9A CN107733912A (en) | 2017-10-31 | 2017-10-31 | Information ciphering method, information authentication method, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107733912A true CN107733912A (en) | 2018-02-23 |
Family
ID=61202927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711048071.9A Pending CN107733912A (en) | 2017-10-31 | 2017-10-31 | Information ciphering method, information authentication method, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107733912A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924144A (en) * | 2018-07-13 | 2018-11-30 | Oppo广东移动通信有限公司 | Data capture method, data-acquisition system, terminal and diagnostic tool |
CN109005153A (en) * | 2018-06-27 | 2018-12-14 | 努比亚技术有限公司 | Request, control method, terminal and computer readable storage medium is added in meeting |
CN110266641A (en) * | 2019-05-13 | 2019-09-20 | 中国联合网络通信集团有限公司 | Information-reading method and device |
CN110430051A (en) * | 2019-08-01 | 2019-11-08 | 北京永新视博数字电视技术有限公司 | A kind of method for storing cipher key, device and server |
CN110719288A (en) * | 2019-10-12 | 2020-01-21 | 深圳市道通科技股份有限公司 | Cloud service access method, cloud server and terminal |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
CN115471860B (en) * | 2022-09-14 | 2024-02-13 | 联通数字科技有限公司 | Express real name checking method, system and computer readable storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427351A (en) * | 2001-12-17 | 2003-07-02 | 北京兆日科技有限责任公司 | User's identity authentication method of dynamic electron cipher equipment and its resources sharing system |
CN101018129A (en) * | 2006-12-31 | 2007-08-15 | 华东师范大学 | Public security broadcast control media management and authentication method for recognizing non tampering integrity |
CN101136748A (en) * | 2006-08-31 | 2008-03-05 | 普天信息技术研究院 | Identification authentication method and system |
CN101778102A (en) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | Safety authentication method of sensor, sensor and authentication system thereof |
CN102026195A (en) * | 2010-12-17 | 2011-04-20 | 北京交通大学 | One-time password (OTP) based mobile terminal identity authentication method and system |
CN102033820A (en) * | 2009-09-29 | 2011-04-27 | 北京爱国者存储科技有限责任公司 | Flash memory device and network authentication method thereof |
CN103597492A (en) * | 2012-06-07 | 2014-02-19 | Sk普兰尼特有限公司 | Improved security function-based cloud service system and method for supporting same |
CN105551101A (en) * | 2016-02-01 | 2016-05-04 | 天津中兴智联科技有限公司 | ETC reader convenient for application expansion and working method thereof |
CN106899410A (en) * | 2016-09-13 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of method and device of equipment identities certification |
CN107196922A (en) * | 2017-05-03 | 2017-09-22 | 国民认证科技(北京)有限公司 | Identity identifying method, user equipment and server |
US20170300920A1 (en) * | 2015-01-08 | 2017-10-19 | Baidu Online Network Technology (Beijing) Co., Ltd | Method Of And Apparatus For Authenticating Fingerprint, Smart Terminal And Computer Storage Medium |
-
2017
- 2017-10-31 CN CN201711048071.9A patent/CN107733912A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1427351A (en) * | 2001-12-17 | 2003-07-02 | 北京兆日科技有限责任公司 | User's identity authentication method of dynamic electron cipher equipment and its resources sharing system |
CN101136748A (en) * | 2006-08-31 | 2008-03-05 | 普天信息技术研究院 | Identification authentication method and system |
CN101018129A (en) * | 2006-12-31 | 2007-08-15 | 华东师范大学 | Public security broadcast control media management and authentication method for recognizing non tampering integrity |
CN102033820A (en) * | 2009-09-29 | 2011-04-27 | 北京爱国者存储科技有限责任公司 | Flash memory device and network authentication method thereof |
CN101778102A (en) * | 2009-12-31 | 2010-07-14 | 卓望数码技术(深圳)有限公司 | Safety authentication method of sensor, sensor and authentication system thereof |
CN102026195A (en) * | 2010-12-17 | 2011-04-20 | 北京交通大学 | One-time password (OTP) based mobile terminal identity authentication method and system |
CN103597492A (en) * | 2012-06-07 | 2014-02-19 | Sk普兰尼特有限公司 | Improved security function-based cloud service system and method for supporting same |
US20170300920A1 (en) * | 2015-01-08 | 2017-10-19 | Baidu Online Network Technology (Beijing) Co., Ltd | Method Of And Apparatus For Authenticating Fingerprint, Smart Terminal And Computer Storage Medium |
CN105551101A (en) * | 2016-02-01 | 2016-05-04 | 天津中兴智联科技有限公司 | ETC reader convenient for application expansion and working method thereof |
CN106899410A (en) * | 2016-09-13 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of method and device of equipment identities certification |
CN107196922A (en) * | 2017-05-03 | 2017-09-22 | 国民认证科技(北京)有限公司 | Identity identifying method, user equipment and server |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109005153A (en) * | 2018-06-27 | 2018-12-14 | 努比亚技术有限公司 | Request, control method, terminal and computer readable storage medium is added in meeting |
CN109005153B (en) * | 2018-06-27 | 2021-08-31 | 努比亚技术有限公司 | Conference joining request, control method, terminal and computer readable storage medium |
CN108924144A (en) * | 2018-07-13 | 2018-11-30 | Oppo广东移动通信有限公司 | Data capture method, data-acquisition system, terminal and diagnostic tool |
CN110266641A (en) * | 2019-05-13 | 2019-09-20 | 中国联合网络通信集团有限公司 | Information-reading method and device |
CN110266641B (en) * | 2019-05-13 | 2021-08-17 | 中国联合网络通信集团有限公司 | Information reading method, system, device and computer readable storage medium |
CN110430051A (en) * | 2019-08-01 | 2019-11-08 | 北京永新视博数字电视技术有限公司 | A kind of method for storing cipher key, device and server |
CN110719288A (en) * | 2019-10-12 | 2020-01-21 | 深圳市道通科技股份有限公司 | Cloud service access method, cloud server and terminal |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
CN113572717B (en) * | 2020-04-29 | 2024-02-20 | 青岛海尔洗涤电器有限公司 | Communication connection establishment method, washing and protecting equipment and server |
CN112291190A (en) * | 2020-07-28 | 2021-01-29 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN112291190B (en) * | 2020-07-28 | 2022-10-14 | 国网思极网安科技(北京)有限公司 | Identity authentication method, terminal and server |
CN115471860B (en) * | 2022-09-14 | 2024-02-13 | 联通数字科技有限公司 | Express real name checking method, system and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107733912A (en) | Information ciphering method, information authentication method, terminal and computer-readable recording medium | |
US10595201B2 (en) | Secure short message service (SMS) communications | |
US11032075B2 (en) | Methods for secure cryptogram generation | |
US10491384B2 (en) | Device for secure multi-party cryptographic authorization | |
US8700908B2 (en) | System and method for managing secure information within a hybrid portable computing device | |
CN106612180A (en) | Method and device for realizing session identifier synchronization | |
US9275241B2 (en) | Cryptographic method | |
US20150113283A1 (en) | Protecting credentials against physical capture of a computing device | |
CN103201998A (en) | Data processing for securing local resources in a mobile device | |
CN106878245A (en) | The offer of graphic code information, acquisition methods, device and terminal | |
KR20140134663A (en) | Method for verifying the identity of a user of a communicating terminal and associated system | |
CN104322003A (en) | Cryptographic authentication and identification method using real-time encryption | |
WO2017036201A1 (en) | Protection method for cardless account transfer or deposit withdrawal, and mobile phone system | |
CN108401494B (en) | Method and system for transmitting data | |
CN103081395A (en) | Method for authenticating a portable data storage medium | |
US8806216B2 (en) | Implementation process for the use of cryptographic data of a user stored in a data base | |
US20150324572A1 (en) | Method for generating an identifier | |
US9876774B2 (en) | Communication security system and method | |
CN111064736A (en) | Data transmission method and equipment | |
CN107026734A (en) | A kind of method and system that Password Management is carried out using certification lasting effectiveness | |
Cobourne et al. | Using the smart card web server in secure branchless banking | |
CN104980913B (en) | Protect the method and terminal device of data information security in terminal device | |
Oliveira | Dynamic QR codes for Ticketing Systems | |
CN112925534A (en) | Embedded application unloading method and device for cryptographic chip | |
Nithyanand | Securing plastic money using an rfid based protocol stack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |