CN107733912A - Information ciphering method, information authentication method, terminal and computer-readable recording medium - Google Patents

Information ciphering method, information authentication method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107733912A
CN107733912A CN201711048071.9A CN201711048071A CN107733912A CN 107733912 A CN107733912 A CN 107733912A CN 201711048071 A CN201711048071 A CN 201711048071A CN 107733912 A CN107733912 A CN 107733912A
Authority
CN
China
Prior art keywords
terminal
identification information
key
information
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711048071.9A
Other languages
Chinese (zh)
Inventor
陈玉文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201711048071.9A priority Critical patent/CN107733912A/en
Publication of CN107733912A publication Critical patent/CN107733912A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of information ciphering method,Information authentication method,Terminal and computer-readable recording medium,Getting the identification information of terminal,After key corresponding to terminal and public key,The identification information of terminal can be encrypted using key,Identification information after being encrypted,The encryption to identification information is realized so in the case of without encryption chip,So that improve Information Security in the case of not increasing cost,And the identification information of terminal can carry out corresponding with public key,And the identification information of corresponding terminal and public key are sent to server,After so server obtains the identification information of terminal,The identification information of terminal can be obtained using public key corresponding to terminal,So that on the premise of Information Security is improved,Server still can normally obtain information and carry out authentification of message.

Description

Information ciphering method, information authentication method, terminal and computer-readable recording medium
Technical field
The invention belongs to field of information security technology, and in particular, more particularly to a kind of information ciphering method, information are recognized Card method, terminal and computer-readable recording medium.
Background technology
SN (Serial Number, sequence number) and IMEI (International Mobile Equipment Identity, electronics string number) identification information as terminal, authentication can be carried out to terminal by SN/IMEI.
Terminal can use clear-text way storage SN/IMEI at present, but this storage mode causes SN/IMEI easily quilts Distort, lead to not be authenticated terminal, therefore to improve SN/IMEI security, can be deposited using the following two kinds mode Store up SN/IMEI:
A kind of mode is:SN/IMEI is encrypted storage, but this mode causes the service being authenticated to terminal Device can not get SN/IMEI;
Another way is:Encryption chip is implanted into the terminal, and SN/IMEI, but this side are stored by encryption chip Formula can increase the cost of terminal.
The content of the invention
In view of this, it is an object of the invention to provide a kind of information ciphering method, information authentication method, terminal and calculating Machine readable storage medium storing program for executing, for improving Information Security in the case where not increasing cost, and allow server normal Obtain information and carry out authentification of message.Technical scheme is as follows:
The present invention provides a kind of information ciphering method, and methods described includes:
Obtain the identification information of terminal, key and public key corresponding to terminal;
The identification information of the terminal is encrypted using key corresponding to the terminal, the body after being encrypted Part identification information;
The identification information of the terminal and the public key are carried out correspondingly, and by the identity of the corresponding terminal Identification information and the public key are sent to server.
Preferably, before carrying out the identification information of the terminal and the public key to correspond to, methods described is also wrapped Include:Identification information after the encryption is stored in the first storage region, wherein first storage region with it is described Terminal is communicatively coupled, and first storage region it is safe in be communicatively coupled with the terminal other deposit The security in storage area domain.
Preferably, first storage region is the RPMB regions of the terminal.
Preferably, using before the identification information of the terminal is encrypted key corresponding to the terminal, Methods described also includes:Key corresponding to the terminal is encrypted, the key after being encrypted.
Preferably, the key is encrypted, the key after being encrypted includes:Using RPMB keys to the terminal Corresponding key is encrypted, the key after being encrypted.
Preferably, methods described also includes:By the key storage after the encryption in the first storage region.
The present invention also provides a kind of information authentication method, and methods described includes:
After the certification request of server transmission is received, the identity letter after key corresponding to terminal and encryption is obtained Breath;
Using key corresponding to the terminal, the identification information after encryption is decrypted, obtains the terminal Identification information;
The identification information of the terminal is sent to the server, terminal-pair should as described in the server by utilizing Public key the identification information of the terminal is authenticated.
Preferably, the identification information after encryption is decrypted, obtained using key corresponding to the terminal described To after the identification information of the terminal, methods described also includes:Identification information to the terminal and described recognize The first information carried in card request is signed, and obtains result of signing;
The identification information by the terminal, which is sent to the server, to be included:The signature result is sent to The server, identity of the public key corresponding to the terminal as described in the server by utilizing to the terminal in the signature result Identification information is authenticated.
Preferably, the first information to being carried in the identification information of the terminal and the certification request is carried out Signature, obtaining signature result includes:Utilize key corresponding to the terminal, the identification information to the terminal and described One information is signed, and obtains result of signing.
Preferably, after the certification request of server transmission is received, key corresponding to terminal and the body after encryption are obtained Part identification information includes:
After the certification request of server transmission is received, the key after encryption and encryption are obtained from the first storage region Identification information afterwards, wherein first storage region is communicatively coupled with the terminal, and first memory block The safe security in other storage regions being communicatively coupled with the terminal in domain;
Key after encryption is decrypted, obtains key corresponding to the terminal.
Preferably, described pair encryption after key be decrypted including:Carried out using the key after RPMB key pair encryptions Decryption.
Preferably, first storage region is the RPMB regions of the terminal.
The present invention also provides a kind of terminal, and the terminal includes:
Acquiring unit, for obtaining the identification information of terminal, key and public key corresponding to terminal;
Ciphering unit, for the identification information of the terminal to be encrypted using key corresponding to the terminal, Identification information after being encrypted;
Corresponding unit, for the identification information of the terminal and the public key to be carried out correspondingly;
Transmitting element, for the identification information of the corresponding terminal and the public key to be sent to server.
Preferably, the terminal also includes:Memory cell, for the identification information after the encryption to be stored in into In one storage region, wherein first storage region is communicatively coupled with the terminal, and first storage region The safe security in other storage regions being communicatively coupled with the terminal.
Preferably, first storage region is the RPMB regions of the terminal.
Preferably, the ciphering unit, it is additionally operable to that key corresponding to the terminal is encrypted, it is close after being encrypted Key.
Preferably, the ciphering unit, specifically for key corresponding to the terminal is encrypted using RPMB keys, Key after being encrypted.
Preferably, the key storage after the encryption is in the first storage region.
The present invention also provides a kind of terminal, and the terminal includes:
Acquiring unit, for after the certification request of server transmission is received, obtaining key and encryption corresponding to terminal Identification information afterwards;
Decryption unit, for using key corresponding to the terminal, being decrypted, obtaining to the identification information after encryption To the identification information of the terminal;
Transmitting element, for the identification information of the terminal to be sent into the server, by server profit Public key is authenticated to the identification information of the terminal corresponding to the terminal.
Preferably, the terminal also includes:Signature unit, for the identification information to the terminal and the certification The first information carried in request is signed, and obtains result of signing;
The transmitting element, specifically for the signature result is sent into the server, by the server by utilizing Public key corresponding to the terminal is authenticated to the identification information of the terminal in the signature result.
Preferably, the signature unit, specifically for utilizing key corresponding to the terminal, to the identity mark of the terminal Know information and the first information is signed, obtain result of signing.
Preferably, the acquiring unit, specifically for after the certification request of server transmission is received, being stored from first The key after encryption and the identification information after encryption are obtained in region, and triggers the decryption unit to the key after encryption It is decrypted, obtains key corresponding to the terminal, wherein first storage region is communicatively coupled with the terminal, and The safe security in other storage regions being communicatively coupled with the terminal of first storage region.
Preferably, the decryption unit, specifically for being decrypted using the key after RPMB key pair encryptions.
Preferably, first storage region is the RPMB regions of the terminal.
The present invention also provides a kind of terminal, and the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
The processor performs above- mentioned information encryption method when calling described program code.
The present invention also provides a kind of terminal, and the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
Above- mentioned information authentication method when the processor calls described program code.
The present invention also provides a kind of computer-readable recording medium, and calculating is stored with the computer-readable recording medium Machine program, the computer program realize above- mentioned information encryption method when being executed by processor.
The present invention also provides a kind of computer-readable recording medium, and calculating is stored with the computer-readable recording medium Machine program, the computer program realize above- mentioned information authentication method when being executed by processor.
Compared with prior art, above-mentioned technical proposal provided by the invention has the following advantages that:
By above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, can So that the identification information of terminal to be encrypted using key, the identification information after being encrypted, need not so add The encryption to identification information is realized in the case of close chip so that Information Security is improved in the case of not increasing cost, And the identification information of terminal can be carried out with public key it is corresponding, and by the identification information and public key of corresponding terminal Send to server, after such server obtains the identification information of terminal, end can be obtained using public key corresponding to terminal The identification information at end so that on the premise of Information Security is improved, server still can normally obtain information and carry out letter Cease certification.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of information ciphering method provided in an embodiment of the present invention;
Fig. 2 is another flow chart of information ciphering method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of information authentication method provided in an embodiment of the present invention;
Fig. 4 is another flow chart of information authentication method provided in an embodiment of the present invention;
Fig. 5 is a kind of a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of another structural representation of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of structural representation of another terminal provided in an embodiment of the present invention;
Fig. 8 is another structural representation of another terminal provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Referring to Fig. 1, it illustrates a kind of flow chart of information ciphering method provided in an embodiment of the present invention, can include Following steps:
101:Obtain the identification information of terminal, key and public key corresponding to terminal.Wherein, the identity letter of terminal Breath is different from the identification information of other-end, so that terminal and other-end are carried out into area by the identification information of terminal Point.In the present embodiment, the identification information of terminal can be the SN of terminal and at least one of the IMEI of terminal.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
102:The identification information of terminal is encrypted using key corresponding to terminal, the identity mark after being encrypted Information is known, to improve the security of identification information by cipher mode.
In the present embodiment, the mode identification information of terminal being encrypted using key corresponding to terminal can be with It is:The identification information of terminal is encrypted according to certain AES using key corresponding to terminal, can such as be utilized The identification information of terminal is encrypted according to symmetric encipherment algorithm or rivest, shamir, adelman for key.
Wherein, symmetric encipherment algorithm can be but not limited to:AES (Advanced Encryption Standard, height Level encryption standard), DES (Data Encryption Algorithm, DEA) and 3DES (Triple DES, it is triple At least one of DEA), rivest, shamir, adelman can be but not limited to:RSA、DSA(Digital At least one of Signature Algorithm, Digital Signature Algorithm) and ECC (elliptic curve encryption algorithm).
For terminal, the terminal can be integrated with multiple encryption algorithms, such as CPU (Central in terminal Processing Unit, central processing unit) in integrate multiple encryption algorithms, so using key corresponding to terminal to terminal Identification information when being encrypted, a kind of AES can be arbitrarily chosen from this multiple encryption algorithms and be encrypted; Or call AES to be encrypted according to preset rules, wherein preset rules can be that multiple encryption algorithms are arranged Sequence, and periodically invoked each AES is encrypted.
103:The identification information of terminal and public key are carried out correspondingly, and by the identification information of corresponding terminal Sent with public key to server, realize the identification information of terminal and the one-to-one corresponding of public key.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, The identification information of terminal can be encrypted using key, the identification information after being encrypted, so need not The encryption to identification information is realized in the case of encryption chip so that improve information security in the case of not increasing cost Property, and the identification information of terminal can be carried out with public key it is corresponding, and by the identification information of corresponding terminal and Public key is sent to server, after such server obtains the identification information of terminal, can be obtained using public key corresponding to terminal To the identification information of terminal so that on the premise of Information Security is improved, server still can normally obtain information and enter Row information certification.
Referring to Fig. 2, it illustrates another flow chart of information ciphering method provided in an embodiment of the present invention, can wrap Include following steps:
201:Obtain the identification information of terminal, key and public key corresponding to terminal.Wherein, the identity letter of terminal Breath is different from the identification information of other-end, so that terminal and other-end are carried out into area by the identification information of terminal Point.In the present embodiment, the identification information of terminal can be the SN of terminal and at least one of the IMEI of terminal.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
202:The identification information of terminal is encrypted using key corresponding to terminal, the identity mark after being encrypted Information is known, to improve the security of identification information by cipher mode.
203:Identification information after encryption is stored in the first storage region.
Wherein the first storage region is communicatively coupled with terminal, and the first storage region is safe in can with terminal The security of other communicatively coupled storage regions, the identification information after encryption is so stored in the first storage region In can improve encryption after identification information security.
So-called be communicatively coupled refers to:Be located in the first storage region in terminal or outside terminal in the case of, encryption Identification information afterwards is possibly stored in the first storage region.In the case where the first storage region is located at outside terminal, First storage region can be with an independent storage device or can be cloud storage platform, have by one or more Line or radio connection communicate with terminal, first storage region.
For the first storage region, the first storage region can be a region for forbidding changing storage content, this Identification information of the sample after by encryption, which is stored to the first storage region, other staff, can only obtain the identity after the encryption Identification information, and it can not be modified, so as to improve the security of the identification information after encryption.Such as first Storage region can be RPMB (Replay Protected Memory Block) region of terminal, and the RPMB regions are terminals In one forbid change storage content region.
204:The identification information of terminal and public key are carried out correspondingly, and by the identification information of corresponding terminal Sent with public key to server, realize the identification information of terminal and the one-to-one corresponding of public key.
For step 201,202 and 204:It is identical with above-mentioned steps 101 to 103, to this embodiment of the present invention no longer Illustrate.
It was found from above-mentioned technical proposal, the identification information of terminal is encrypted using key corresponding to terminal Under the premise of, the identification information storage after encryption can also be arrived to the first safe memory block than other storage regions It is (such as safe to particular memory region further through storage so on the basis of identification information is improved with encryption in domain The first storage region) mode further improve the security of identification information.
In addition in the above-described embodiments, it is being encrypted to the identification information of terminal using key corresponding to terminal Before, information ciphering method provided in an embodiment of the present invention can also include:Key corresponding to terminal is encrypted, encrypted Key afterwards, so as to increase the security of key corresponding to terminal.
Can be to the feasible pattern that key corresponding to terminal is encrypted:Using RPMB keys to key corresponding to terminal It is encrypted, the key after being encrypted.The description of wherein RPMB keys refers to the standardization of JEDEC (solid state technology association) Document, for protecting the safety in RPMB regions.
And can be to the feasible pattern that key corresponding to terminal is encrypted using RPMB keys:Utilize RPMB key roots Key corresponding to terminal is encrypted according to certain AES, can such as utilize RPMB keys according to symmetric encipherment algorithm or non- The identification information of terminal is encrypted symmetric encipherment algorithm.
Wherein, symmetric encipherment algorithm can be but not limited to:At least one of AES, DES and 3DES, it is asymmetric to add Close algorithm can be but not limited to:At least one of RSA, DSA and ECC.
For terminal, the terminal can be integrated with multiple encryption algorithms, and a variety of encryptions are integrated such as in the CPU of terminal Algorithm, so using RPMB keys to key is encrypted corresponding to terminal when, can from this multiple encryption algorithms arbitrarily A kind of AES is chosen to be encrypted;Or call AES to be encrypted according to preset rules, wherein preset rules Can be that multiple encryption algorithms are ranked up, and periodically invoked each AES is encrypted.Also, to terminal When key corresponding to identification information and terminal is encrypted, identical or different AES can be chosen.
In order to further improve the security of key corresponding to terminal, the key after encryption can be stored in the first memory block In domain.Wherein the first storage region is to store the region of the identification information after encrypting, due to the safety of the first storage region Property higher than the security of other storage regions being communicatively coupled with terminal, so the key storage after encryption is deposited first In storage area domain, the security of the key after encryption can be improved.
Referring to Fig. 3, it illustrates a kind of flow chart of information authentication method provided in an embodiment of the present invention, can include Following steps:
301:After the certification request of server transmission is received, key corresponding to terminal and the identity mark after encryption are obtained Know information.
Wherein, certification request is used to verify whether the identification information of terminal is correct, is such as initiated in terminal to server Some function is asked, and needs to verify whether the identification information of terminal is correct when asking such as payment function, in checking terminal In the case of identification information is correct, corresponding processing is performed, such as performs payment processes.
In the present embodiment, obtaining the feasible pattern of key corresponding to terminal and the identification information after encryption includes: After the certification request of server transmission is received, the key after encryption and the identity after encryption are obtained from the first storage region Identification information, the key after encryption is decrypted, obtains key corresponding to terminal.
Wherein, the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal The security for other storage regions being communicatively coupled.Such as the explanation in above-mentioned embodiment, the first storage region can be one The individual region for forbidding changing storage content, so Yi Dan the identification information after by encryption and the key storage after encryption to the One storage region, other staff can only obtain the identification information after the encryption and the key after encryption, and it can not be entered Row change, so as to improve the security of the identification information after encryption and the key after encryption.Such as first memory block Domain can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
For the key after encryption, the key after encryption is decrypted the embodiment of the present invention feasible pattern can be with It is:It is decrypted using the key after RPMB key pair encryptions, and the key after using RPMB key pair encryptions is decrypted When the key after encryption can be decrypted according to certain decipherment algorithm using RPMB keys, decrypting process use decryption calculate Method is, it is necessary to depending on the AES used when key corresponding to terminal is encrypted.
302:Using key corresponding to terminal, the identification information after encryption is decrypted, obtains the identity of terminal Identification information.As can using terminal corresponding to key the identification information after encryption is solved according to certain decipherment algorithm Close, the decipherment algorithm that decrypting process uses is, it is necessary to the AES used during depending on the identification information of terminal being encrypted Depending on.
303:The identification information of terminal is sent to server, public key is to terminal as corresponding to server by utilizing terminal Identification information be authenticated.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, The identification information after key pair encryption corresponding to terminal can be utilized to be decrypted, obtain the identification information of terminal, And the identification information of terminal is sent to server, identity of the public key to terminal as corresponding to server by utilizing terminal Information is authenticated, and is realized on the premise of Information Security is improved, and server, which still can normally obtain information and enter row information, to be recognized Card.
Referring to Fig. 4, it illustrates another flow chart of information authentication method provided in an embodiment of the present invention, can wrap Include following steps:
401:After the certification request of server transmission is received, key corresponding to terminal and the identity mark after encryption are obtained Know information.
402:Using key corresponding to terminal, the identification information after encryption is decrypted, obtains the identity of terminal Identification information.
In the present embodiment, step 401 and 402:It is identical with above-mentioned steps 301 and 302, this present embodiment is no longer explained State.
403:The first information carried in the identification information and certification request of terminal is signed, obtains signature knot Fruit.Wherein, the first information is used to prevent Replay Attack, if the first information can be the random number that server generates at random, To ensure the security of certification by the first information.
In the present embodiment, a kind of feasible pattern bag that the identification information to terminal and the first information are signed Include:The identification information and the first information of terminal are signed using key corresponding to terminal, obtain result of signing.Such as profit Key is believed the identification information of terminal and first according to certain AES, such as rivest, shamir, adelman corresponding to terminal Breath is signed.
It can certainly be signed using other modes, such as the identification information and the first information of terminal are arranged Row, the signature of identification information to terminal and the first information is realized with this.Such as the first information can be arranged in terminal Identification information a position on, such as can be any one in following arrangement mode:
Before being arranged in the identification information of terminal, it is arranged in after the identification information of terminal and is arranged in terminal Identification information among.
404:Signature result is sent to server, public key is to the end in signature result as corresponding to server by utilizing terminal The identification information at end is authenticated.
Server is after signature result is received, according to the identification information and the signer of the first information to terminal Formula, the identification information of terminal is extracted from signature result, it is right that its is then got according to the identification information of terminal Whether the public key answered, the identification information of the terminal extracted by its corresponding public key verifications are correct.
For foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a series of combination of actions, but It is that those skilled in the art should know, the present invention is not limited by described sequence of movement, because according to the present invention, certain A little steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, be retouched in specification The embodiment stated belongs to preferred embodiment, necessary to involved action and the module not necessarily present invention.
Corresponding with above method embodiment, the embodiment of the present invention also provides a kind of terminal, its structural representation such as Fig. 5 institutes Show, can include:Acquiring unit 11, ciphering unit 12, corresponding unit 13 and transmitting element 14.
Acquiring unit 11, for obtaining the identification information of terminal, key and public key corresponding to terminal.Wherein, terminal Identification information it is different from the identification information of other-end, with by the identification information of terminal by terminal and its He makes a distinction terminal.In the present embodiment, the identification information of terminal can be in the SN of terminal and the IMEI of terminal It is at least one.
For the identification information of terminal, key corresponding to terminal and public key are by the clothes that can be communicated with terminal Business device is generated and sent to terminal.Such as server can be close by being generated for the terminal according to the identification information of terminal Key and public key are sent to the terminal.Herein it should be noted is that:For different terminals, key corresponding to terminal and Public key can be different, but it is identical with public key to be also not excluded for key corresponding at least two terminals.
Ciphering unit 12, for the identification information of terminal to be encrypted using key corresponding to terminal, added Identification information after close.In the present embodiment, the identification information of terminal is added using key corresponding to terminal Close mode can be:The identification information of terminal is added according to certain AES using key corresponding to terminal It is close, the identification information of terminal can such as be added according to symmetric encipherment algorithm or rivest, shamir, adelman using key It is close.Wherein, symmetric encipherment algorithm, rivest, shamir, adelman and how to choose AES and can refer to above method embodiment In related description, this present embodiment is no longer illustrated.
Corresponding unit 13, for carrying out the identification information of terminal and public key correspondingly, to realize the identity of terminal The one-to-one corresponding of information and public key.
Transmitting element 14, for the identification information of corresponding terminal and public key to be sent to server.
Wherein, server stored in a manner of key-value pair (key-value) corresponding terminal identification information and Public key, in the identification information and public key of corresponding terminal, the identification information of terminal is key, and public key is Value, so when the identification information to terminal is authenticated, it can be searched based on the identification information of terminal Corresponding public key, it is whether correct with the identification information of the public key verifications terminals, with the identity mark of the public key verifications terminal In the case of knowledge information is correct, illustrate that the identification information of the terminal passes through checking.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, The identification information of terminal can be encrypted using key, the identification information after being encrypted, so need not The encryption to identification information is realized in the case of encryption chip so that improve information security in the case of not increasing cost Property, and the identification information of terminal can be carried out with public key it is corresponding, and by the identification information of corresponding terminal and Public key is sent to server, after such server obtains the identification information of terminal, can be obtained using public key corresponding to terminal To the identification information of terminal so that on the premise of Information Security is improved, server still can normally obtain information and enter Row information certification.
Referring to Fig. 6, it illustrates a kind of another structural representation of terminal provided in an embodiment of the present invention, in Fig. 5 On the basis of, it can also include:Memory cell 15, for the identification information after encryption to be stored in the first storage region, Wherein the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal communicably coupling The security for other storage regions closed, so the identification information after encryption, which is stored in the first storage region, to improve The security of identification information after encryption.
For the first storage region, the first storage region can be a region for forbidding changing storage content, this Identification information of the sample after by encryption, which is stored to the first storage region, other staff, can only obtain the identity after the encryption Identification information, and it can not be modified, so as to improve the security of the identification information after encryption.Such as first Storage region can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
In addition, in the present embodiment, ciphering unit 12, it is additionally operable to that key corresponding to terminal is encrypted, is encrypted Key afterwards.Key corresponding to terminal is encrypted using RPMB keys for specific ciphering unit 12, close after being encrypted Key.
And can be to the feasible pattern that key corresponding to terminal is encrypted using RPMB keys:Utilize RPMB key roots Key corresponding to terminal is encrypted according to certain AES, can such as utilize RPMB keys according to symmetric encipherment algorithm or non- The identification information of terminal is encrypted symmetric encipherment algorithm.Wherein, symmetric encipherment algorithm, rivest, shamir, adelman and AES how is chosen can no longer to illustrate this present embodiment refering to the related description in above method embodiment.
In order to further improve the security of key corresponding to terminal, memory cell 15 can also deposit the key after encryption Storage is in the first storage region.Wherein the first storage region is to store the region of the identification information after encrypting, due to first The safe security in other storage regions being communicatively coupled with terminal of storage region, so will be close after encryption Key is stored in the first storage region, can improve the security of the key after encryption.
Referring to Fig. 7, it illustrates a kind of structural representation of another terminal provided in an embodiment of the present invention, can wrap Include:Acquiring unit 21, decryption unit 22 and transmitting element 23.
Acquiring unit 21, for after the certification request of server transmission is received, obtaining key corresponding to terminal and adding Identification information after close.Wherein, certification request be used for verify terminal identification information it is whether correct, such as terminal to Server initiates the request of some function, needs to verify whether the identification information of terminal is correct when asking such as payment function, In the case of verifying that the identification information of terminal is correct, corresponding processing is performed, such as performs payment processes.
In the present embodiment, acquiring unit 21 obtain terminal corresponding to key and encryption after identification information it is feasible Mode includes:After the certification request of server transmission is received, the key after encryption is obtained from the first storage region and is added Identification information after close, and trigger decryption unit 22 and the key after encryption is decrypted, obtain key corresponding to terminal.
Wherein, the first storage region is communicatively coupled with terminal, and the first storage region it is safe in terminal The security for other storage regions being communicatively coupled.Such as the explanation in above-mentioned embodiment, the first storage region can be one The individual region for forbidding changing storage content, so Yi Dan the identification information after by encryption and the key storage after encryption to the One storage region, other staff can only obtain the identification information after the encryption and the key after encryption, and it can not be entered Row change, so as to improve the security of the identification information after encryption and the key after encryption.Such as first memory block Domain can be the RPMB regions of terminal, and the RPMB regions are a regions for forbidding changing storage content in terminal.
For the key after encryption, the key after encryption is decrypted decryption unit 22 feasible pattern can be with It is:It is decrypted using the key after RPMB key pair encryptions, and the key after using RPMB key pair encryptions is decrypted When the key after encryption can be decrypted according to certain decipherment algorithm using RPMB keys, decrypting process use decryption calculate Method is, it is necessary to depending on the AES used when key corresponding to terminal is encrypted.
Decryption unit 22, for using key corresponding to terminal, being decrypted, obtaining to the identification information after encryption The identification information of terminal.As can utilize terminal corresponding to key according to certain decipherment algorithm to the identity after encryption Information is decrypted, and the decipherment algorithm that decrypting process uses is, it is necessary to use during depending on the identification information of terminal being encrypted AES depending on.
Transmitting element 23, should by server by utilizing terminal-pair for the identification information of terminal to be sent into server Public key the identification information of terminal is authenticated.
It was found from above-mentioned technical proposal, the identification information of terminal is being got, after key corresponding to terminal and public key, The identification information after key pair encryption corresponding to terminal can be utilized to be decrypted, obtain the identification information of terminal, And the identification information of terminal is sent to server, identity of the public key to terminal as corresponding to server by utilizing terminal Information is authenticated, and is realized on the premise of Information Security is improved, and server, which still can normally obtain information and enter row information, to be recognized Card.
Referring to Fig. 8, it illustrates another structural representation of another terminal provided in an embodiment of the present invention, scheming It can also include on the basis of 7:Signature unit 24, for the first letter carried in the identification information and certification request to terminal Breath is signed, and obtains result of signing.Wherein, the first information is used to prevent Replay Attack, if the first information can be server The random number generated at random, to ensure the security of certification by the first information.
In the present embodiment, a kind of feasible pattern bag that the identification information to terminal and the first information are signed Include:The identification information and the first information of terminal are signed using key corresponding to terminal, obtain result of signing.Such as profit Key is believed the identification information of terminal and first according to certain AES, such as rivest, shamir, adelman corresponding to terminal Breath is signed.
It can certainly be signed using other modes, such as the identification information and the first information of terminal are arranged Row, the signature of identification information to terminal and the first information is realized with this.Such as the first information can be arranged in terminal Identification information a position on, such as can be any one in following arrangement mode:
Before being arranged in the identification information of terminal, it is arranged in after the identification information of terminal and is arranged in terminal Identification information among.
Corresponding, transmitting element 23, specifically for signature result is sent into server, by server by utilizing terminal-pair The public key answered is authenticated to the identification information of the terminal in signature result.
As server receive signature result after, according to the identification information and the signer of the first information to terminal Formula, the identification information of terminal is extracted from signature result, it is right that its is then got according to the identification information of terminal Whether the public key answered, the identification information of the terminal extracted by its corresponding public key verifications are correct.
The embodiment of the present invention also provides a kind of terminal, and terminal includes:Processor, memory and input/output interface.Wherein, Have program stored therein code in memory.
Input/output interface is used to be called to receive and/or send information.
Above- mentioned information encryption method is performed during processor caller code.
The embodiment of the present invention also provides a kind of terminal, and terminal includes:Processor, memory and input/output interface.Wherein, Have program stored therein code in memory.
Input/output interface is used to be called to receive and/or send information.
Above- mentioned information authentication method during processor caller code.
The embodiment of the present invention also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium There is computer program, the computer program realizes above- mentioned information encryption method when being executed by processor.
The embodiment of the present invention also provides a kind of computer-readable recording medium, is stored on the computer-readable recording medium There is computer program, the computer program realizes above- mentioned information authentication method when being executed by processor.
Implementation process and explanation for each step in above-mentioned terminal and computer-readable recording medium etc. refer to Related description in above method embodiment, this embodiment of the present invention is no longer illustrated.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
The foregoing description of the disclosed embodiments, those skilled in the art are enable to realize or using the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and generic principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited The embodiments shown herein is formed on, and is to fit to consistent with principles disclosed herein and features of novelty most wide Scope.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of information ciphering method, it is characterised in that methods described includes:
Obtain the identification information of terminal, key and public key corresponding to terminal;
The identification information of the terminal is encrypted using key corresponding to the terminal, the identity mark after being encrypted Know information;
The identification information of the terminal and the public key are carried out correspondingly, and by the identity of the corresponding terminal Information and the public key are sent to server.
2. according to the method for claim 1, it is characterised in that by the identification information of the terminal and the public key Before correspond to, methods described also includes:Identification information after the encryption is stored in the first storage region, its Described in the first storage region be communicatively coupled with the terminal, and first storage region it is safe in it is described The security for other storage regions that terminal is communicatively coupled.
3. method according to claim 1 or 2, it is characterised in that utilizing key corresponding to the terminal to the end Before the identification information at end is encrypted, methods described also includes:Key corresponding to the terminal is encrypted, obtained Key after encryption.
4. a kind of information authentication method, it is characterised in that methods described includes:
After the certification request of server transmission is received, key corresponding to terminal and the identification information after encryption are obtained;
Using key corresponding to the terminal, the identification information after encryption is decrypted, obtains the identity of the terminal Identification information;
The identification information of the terminal is sent to the server, it is public corresponding to the terminal as described in the server by utilizing Key is authenticated to the identification information of the terminal.
5. according to the method for claim 4, it is characterised in that described using key corresponding to the terminal, to encryption Identification information afterwards is decrypted, and after obtaining the identification information of the terminal, methods described also includes:To described The first information carried in the identification information of terminal and the certification request is signed, and obtains result of signing;
The identification information by the terminal, which is sent to the server, to be included:The signature result is sent to described Server, identity of the public key corresponding to the terminal as described in the server by utilizing to the terminal in the signature result Information is authenticated.
6. the method according to claim 4 or 5, it is characterised in that described to receive the certification request of server transmission Afterwards, obtaining key corresponding to terminal and the identification information after encryption includes:
After the certification request of server transmission is received, after key and encryption after encryption are obtained from the first storage region Identification information, wherein first storage region is communicatively coupled with the terminal, and first storage region The safe security in other storage regions being communicatively coupled with the terminal;
Key after encryption is decrypted, obtains key corresponding to the terminal.
7. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, for obtaining the identification information of terminal, key and public key corresponding to terminal;
Ciphering unit, for the identification information of the terminal to be encrypted using key corresponding to the terminal, obtain Identification information after encryption;
Corresponding unit, for the identification information of the terminal and the public key to be carried out correspondingly;
Transmitting element, for the identification information of the corresponding terminal and the public key to be sent to server.
8. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, after after the certification request of server transmission is received, obtaining key corresponding to terminal and encryption Identification information;
Decryption unit, for using key corresponding to the terminal, being decrypted to the identification information after encryption, obtaining institute State the identification information of terminal;
Transmitting element, for the identification information of the terminal to be sent into the server, by the server by utilizing institute Public key corresponding to terminal is stated to be authenticated the identification information of the terminal.
9. a kind of terminal, it is characterised in that the terminal includes:Processor, memory and input/output interface;
Have program stored therein code in the memory;
The input/output interface is used to be called to receive and/or send information;
Perform claim requires the information authentication method described in 4 to 6 any one when the processor calls described program code.
10. a kind of computer-readable recording medium, computer program is stored with the computer-readable recording medium, its feature It is, the computer program realizes the information authentication method described in claim 4 to 6 any one when being executed by processor.
CN201711048071.9A 2017-10-31 2017-10-31 Information ciphering method, information authentication method, terminal and computer-readable recording medium Pending CN107733912A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711048071.9A CN107733912A (en) 2017-10-31 2017-10-31 Information ciphering method, information authentication method, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711048071.9A CN107733912A (en) 2017-10-31 2017-10-31 Information ciphering method, information authentication method, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107733912A true CN107733912A (en) 2018-02-23

Family

ID=61202927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711048071.9A Pending CN107733912A (en) 2017-10-31 2017-10-31 Information ciphering method, information authentication method, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107733912A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924144A (en) * 2018-07-13 2018-11-30 Oppo广东移动通信有限公司 Data capture method, data-acquisition system, terminal and diagnostic tool
CN109005153A (en) * 2018-06-27 2018-12-14 努比亚技术有限公司 Request, control method, terminal and computer readable storage medium is added in meeting
CN110266641A (en) * 2019-05-13 2019-09-20 中国联合网络通信集团有限公司 Information-reading method and device
CN110430051A (en) * 2019-08-01 2019-11-08 北京永新视博数字电视技术有限公司 A kind of method for storing cipher key, device and server
CN110719288A (en) * 2019-10-12 2020-01-21 深圳市道通科技股份有限公司 Cloud service access method, cloud server and terminal
CN112291190A (en) * 2020-07-28 2021-01-29 国网思极网安科技(北京)有限公司 Identity authentication method, terminal and server
CN113572717A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Communication connection establishing method, washing and protecting equipment and server
CN115471860B (en) * 2022-09-14 2024-02-13 联通数字科技有限公司 Express real name checking method, system and computer readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427351A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 User's identity authentication method of dynamic electron cipher equipment and its resources sharing system
CN101018129A (en) * 2006-12-31 2007-08-15 华东师范大学 Public security broadcast control media management and authentication method for recognizing non tampering integrity
CN101136748A (en) * 2006-08-31 2008-03-05 普天信息技术研究院 Identification authentication method and system
CN101778102A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Safety authentication method of sensor, sensor and authentication system thereof
CN102026195A (en) * 2010-12-17 2011-04-20 北京交通大学 One-time password (OTP) based mobile terminal identity authentication method and system
CN102033820A (en) * 2009-09-29 2011-04-27 北京爱国者存储科技有限责任公司 Flash memory device and network authentication method thereof
CN103597492A (en) * 2012-06-07 2014-02-19 Sk普兰尼特有限公司 Improved security function-based cloud service system and method for supporting same
CN105551101A (en) * 2016-02-01 2016-05-04 天津中兴智联科技有限公司 ETC reader convenient for application expansion and working method thereof
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN107196922A (en) * 2017-05-03 2017-09-22 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server
US20170300920A1 (en) * 2015-01-08 2017-10-19 Baidu Online Network Technology (Beijing) Co., Ltd Method Of And Apparatus For Authenticating Fingerprint, Smart Terminal And Computer Storage Medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427351A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 User's identity authentication method of dynamic electron cipher equipment and its resources sharing system
CN101136748A (en) * 2006-08-31 2008-03-05 普天信息技术研究院 Identification authentication method and system
CN101018129A (en) * 2006-12-31 2007-08-15 华东师范大学 Public security broadcast control media management and authentication method for recognizing non tampering integrity
CN102033820A (en) * 2009-09-29 2011-04-27 北京爱国者存储科技有限责任公司 Flash memory device and network authentication method thereof
CN101778102A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Safety authentication method of sensor, sensor and authentication system thereof
CN102026195A (en) * 2010-12-17 2011-04-20 北京交通大学 One-time password (OTP) based mobile terminal identity authentication method and system
CN103597492A (en) * 2012-06-07 2014-02-19 Sk普兰尼特有限公司 Improved security function-based cloud service system and method for supporting same
US20170300920A1 (en) * 2015-01-08 2017-10-19 Baidu Online Network Technology (Beijing) Co., Ltd Method Of And Apparatus For Authenticating Fingerprint, Smart Terminal And Computer Storage Medium
CN105551101A (en) * 2016-02-01 2016-05-04 天津中兴智联科技有限公司 ETC reader convenient for application expansion and working method thereof
CN106899410A (en) * 2016-09-13 2017-06-27 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN107196922A (en) * 2017-05-03 2017-09-22 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109005153A (en) * 2018-06-27 2018-12-14 努比亚技术有限公司 Request, control method, terminal and computer readable storage medium is added in meeting
CN109005153B (en) * 2018-06-27 2021-08-31 努比亚技术有限公司 Conference joining request, control method, terminal and computer readable storage medium
CN108924144A (en) * 2018-07-13 2018-11-30 Oppo广东移动通信有限公司 Data capture method, data-acquisition system, terminal and diagnostic tool
CN110266641A (en) * 2019-05-13 2019-09-20 中国联合网络通信集团有限公司 Information-reading method and device
CN110266641B (en) * 2019-05-13 2021-08-17 中国联合网络通信集团有限公司 Information reading method, system, device and computer readable storage medium
CN110430051A (en) * 2019-08-01 2019-11-08 北京永新视博数字电视技术有限公司 A kind of method for storing cipher key, device and server
CN110719288A (en) * 2019-10-12 2020-01-21 深圳市道通科技股份有限公司 Cloud service access method, cloud server and terminal
CN113572717A (en) * 2020-04-29 2021-10-29 青岛海尔滚筒洗衣机有限公司 Communication connection establishing method, washing and protecting equipment and server
CN113572717B (en) * 2020-04-29 2024-02-20 青岛海尔洗涤电器有限公司 Communication connection establishment method, washing and protecting equipment and server
CN112291190A (en) * 2020-07-28 2021-01-29 国网思极网安科技(北京)有限公司 Identity authentication method, terminal and server
CN112291190B (en) * 2020-07-28 2022-10-14 国网思极网安科技(北京)有限公司 Identity authentication method, terminal and server
CN115471860B (en) * 2022-09-14 2024-02-13 联通数字科技有限公司 Express real name checking method, system and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN107733912A (en) Information ciphering method, information authentication method, terminal and computer-readable recording medium
US10595201B2 (en) Secure short message service (SMS) communications
US11032075B2 (en) Methods for secure cryptogram generation
US10491384B2 (en) Device for secure multi-party cryptographic authorization
US8700908B2 (en) System and method for managing secure information within a hybrid portable computing device
CN106612180A (en) Method and device for realizing session identifier synchronization
US9275241B2 (en) Cryptographic method
US20150113283A1 (en) Protecting credentials against physical capture of a computing device
CN103201998A (en) Data processing for securing local resources in a mobile device
CN106878245A (en) The offer of graphic code information, acquisition methods, device and terminal
KR20140134663A (en) Method for verifying the identity of a user of a communicating terminal and associated system
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
WO2017036201A1 (en) Protection method for cardless account transfer or deposit withdrawal, and mobile phone system
CN108401494B (en) Method and system for transmitting data
CN103081395A (en) Method for authenticating a portable data storage medium
US8806216B2 (en) Implementation process for the use of cryptographic data of a user stored in a data base
US20150324572A1 (en) Method for generating an identifier
US9876774B2 (en) Communication security system and method
CN111064736A (en) Data transmission method and equipment
CN107026734A (en) A kind of method and system that Password Management is carried out using certification lasting effectiveness
Cobourne et al. Using the smart card web server in secure branchless banking
CN104980913B (en) Protect the method and terminal device of data information security in terminal device
Oliveira Dynamic QR codes for Ticketing Systems
CN112925534A (en) Embedded application unloading method and device for cryptographic chip
Nithyanand Securing plastic money using an rfid based protocol stack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180223