CN108173644A - Data transmission encryption method and device, storage medium, equipment and server - Google Patents

Data transmission encryption method and device, storage medium, equipment and server Download PDF

Info

Publication number
CN108173644A
CN108173644A CN201711259284.6A CN201711259284A CN108173644A CN 108173644 A CN108173644 A CN 108173644A CN 201711259284 A CN201711259284 A CN 201711259284A CN 108173644 A CN108173644 A CN 108173644A
Authority
CN
China
Prior art keywords
key
equipment end
public
itself
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711259284.6A
Other languages
Chinese (zh)
Inventor
祁红波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201711259284.6A priority Critical patent/CN108173644A/en
Publication of CN108173644A publication Critical patent/CN108173644A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data transmission encryption method, a data transmission encryption device, a storage medium, equipment and a server. The data transmission encryption method applied to the server side comprises the following steps: receiving a public key of the equipment end sent by the equipment end; generating a session key, and encrypting the session key by using a public key of the equipment end; and sending the encrypted session key to the equipment end so that the equipment end and the server end can communicate through the session key. The technical scheme provided by the invention adopts a mode of combining a symmetric encryption algorithm and an asymmetric encryption algorithm, and ensures the safety and reliability of data transmission. The asymmetric encryption is used for transmitting a session key, and the symmetric encryption is used for data encryption, so that the security of data transmission is ensured, and the encryption efficiency is also ensured.

Description

Data transfer encryption method, device, storage medium, equipment and server
Technical field
The present invention relates to field of communication technology more particularly to a kind of data transfer encryption method, device, storage medium, set Standby and server.
Background technology
Currently used encryption technology is generally divided into two major class:" symmetrical expression " and " asymmetric ".Symmetry encryption is exactly Encryption and decryption use same key, normally referred to as " session key ".Unsymmetrical tridiagonal matrix is exactly to encrypt and decrypt to be made It is not same key, usually there are two keys, referred to as " public key " and " private key ", and both must match use, no Encryption file cannot then be opened.Here " public key " refers to what can externally be announced, " private key " then cannot, can only be by holder one Individual knows.Because symmetrical encryption method is difficult to not tell pair key if in transmission over networks encryption file Side, no matter how to be likely to not intercepted.And key there are two the encryption methods of asymmetric, and it is therein " public key " is can be disclosed, is not also just afraid of others and knows, if when addressee decrypts with the private key of oneself can, thus The transmission security problem of key is avoided well.But the shortcomings that asymmetric encryption is that the speed of algorithm performs is slower.It is existing The cipher mode of technology can not take into account Information Security and encryption efficiency, data transmission method there are safety it is poor, attacked Risk is larger, the problems such as encryption efficiency is low.
Invention content
The defects of it is a primary object of the present invention to overcome the above-mentioned prior art, provides a kind of data transmission encryption Method, apparatus, storage medium, equipment and server, to solve data transmission method, there are safety is poor, encryption efficiency is low Problem.
One aspect of the present invention provides a kind of data transfer encryption method, and the method is applied to server end, including:It connects The public key for the equipment end that receiving unit end is sent;Session key is generated, and close using session described in the public key encryption of the equipment end Key;The encrypted session key is sent to the equipment end, so as to the equipment end pass through with the server end it is described Session key communicates.
Optionally, it before the public key for receiving the equipment end that the equipment end is sent, further includes:It is calculated using asymmetric encryption Method generates the public private key pair of itself, and the public key of itself is disclosed to the equipment end;The public key of the equipment end is to pass through institute State what the public key of server end was encrypted;After the public key of the equipment end sent at receiving device end, and using described set Before session key described in the public key encryption at standby end, further include:The public key of the equipment end is decrypted using the private key of itself.
Optionally, the public private key pair that itself is generated using rivest, shamir, adelman, including:Generating the public and private of itself Key to while, generate the version identifier of the public private key pair;Periodically upgrading public private key pair, and generation simultaneously and the upgrading The corresponding version identifier of public private key pair.
Optionally, it further includes:Receive the identity information for the equipment end that the equipment end is sent;According to it is described receive set The identity information at standby end verifies the equipment end;After described be verified, the session key is generated.
Optionally, it further includes:The identity information of the equipment end is encrypted by the public key of the server end; After the identity information for receiving the equipment end that the equipment end is sent, and in the identity letter of the equipment end received according to Before breath verifies the equipment end, further include:The identity information of the equipment end is decrypted using the private key of itself.
Optionally, it is described the public key of itself is disclosed to equipment end to include:By document agreement or network transmission by itself Public key be disclosed to equipment end.
Optionally, the term of validity of the session key is set, after the term of validity, updates the session key.
Another aspect of the present invention provides a kind of data transfer encryption method again, and the method is applied to equipment end, packet It includes:The public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is sent to server end;Described in reception The session key that server end is sent, the session key is encrypted using the public key of the equipment end;Use itself Private key decrypt the session key, so that the equipment end is communicated with the server end by the session key.
Optionally, it after the public private key pair of itself is generated using rivest, shamir, adelman, and is sent out by the public key of itself It is sent to before server end, further includes:Public key disclosed in the server end is obtained, uses public key disclosed in the server end The encryption public key of itself.
Optionally, it further includes:The identity information of itself is sent to the server end, so that the server end is being sent out It send and authentication is carried out to equipment end before the session key.
Optionally, it before the identity information of itself is sent to the server end, further includes:Use the server The identity information of itself described in public key encryption disclosed in end.
Optionally, public key disclosed in the acquisition server end includes:It is obtained by document agreement or network transmission Public key disclosed in the server end.
Optionally, the public private key pair that itself is generated using rivest, shamir, adelman, is further included:It is every in the equipment end It is secondary to regenerate the public private key pair of itself when powering on.
Optionally, it further includes:The session key is provided with the term of validity;After the term of validity, asked to server Update the session key.
Another aspect of the present invention provides a kind of data transmission encryption device again, and described device is applied to server end, Including:Networking module, for the public key for the equipment end that receiving device end is sent;Session secret key generating module, for generating session Key, and use session key described in the public key encryption of the equipment end;The networking module is additionally operable to:By the encrypted meeting Words key is sent to the equipment end, so that the equipment end is communicated with the server end by the session key.
Optionally, it further includes:Unsymmetrical key generation module, is used for:Receiving the equipment end of the equipment end transmission Before public key, the public private key pair of itself is generated using rivest, shamir, adelman;Public key discloses module, for the public key of itself is public Equipment end described in open;The public key of the equipment end is encrypted by the public key of the server end;Deciphering module is used In:After the public key of the equipment end sent at receiving device end, and it is close in session described in the public key encryption for using the equipment end Before key, the public key of the equipment end is decrypted using the private key of itself.
Optionally, the unsymmetrical key generation module is additionally operable to:While the public private key pair of itself is generated, institute is generated State the version identifier of public private key pair;Periodically upgrading public private key pair, and generate simultaneously corresponding with the public private key pair of the upgrading Version identifier.
Optionally, the networking module is additionally operable to receive the identity information for the equipment end that the equipment end is sent;The dress It puts and further includes authentication module, the identity information of equipment end for being received according to verifies the equipment end;Institute Session secret key generating module is stated to be additionally operable to:After described be verified, the session key is generated.
Optionally, it further includes:The identity information of the equipment end is encrypted by the public key of the server end; The deciphering module is additionally operable to:It is connect after the identity information for receiving the equipment end that the equipment end is sent, and according to Before the identity information of the equipment end received verifies the equipment end, the equipment end is decrypted using the private key of itself Identity information.
Optionally, the public key discloses module and is additionally operable to:The public key of itself is disclosed by document agreement or network transmission To equipment end.
Optionally, the session secret key generating module is additionally operable to:The term of validity of the session key is set, described effective After the phase, the session key is updated.
Another aspect of the present invention provides a kind of data transmission encryption device again, and described device is applied to equipment end, packet It includes:Unsymmetrical key generation module, is used for:The public private key pair of itself is generated using rivest, shamir, adelman;Networking module is used for The public key of itself is sent to server end;The networking module is additionally operable to:The session key that the server end is sent is received, The session key is encrypted using the public key of the equipment end;Deciphering module, for the private key of itself to be used to decrypt The session key, so that the equipment end is communicated with the server end by the session key.
Optionally, public key acquisition module is further included, is used for:The public private key pair of itself is being generated using rivest, shamir, adelman Later, and before the public key of itself is sent to server end, public key disclosed in the server end is obtained;Encrypting module, For:Use the public key of itself described in public key encryption disclosed in the server end.
Optionally, the networking module is additionally operable to:The identity information of itself is sent to the server end, so as to described Server end carries out authentication before the session key is sent to equipment end.
Optionally, the encrypting module is additionally operable to:Before the identity information of itself is sent to the server end, make The identity information of itself described in the public key encryption disclosed in the server end.
Optionally, the public key acquisition module is additionally operable to:The server end is obtained by document agreement or network transmission Disclosed public key.
Optionally, the unsymmetrical key generation module is additionally operable to:It is regenerated when the equipment end powers on every time certainly The public private key pair of body.
Optionally, the session key is provided with the term of validity;The networking module is additionally operable to:After the term of validity, The session key is updated to server request.
Another aspect of the invention provides a kind of server again, has and is applied to server end described in any of the above-described Device;Or the computer program that can be run on a processor on a memory including processor, memory and storage, it is described Processor realizes the step of method for being applied to server end described in any of the above-described when performing described program.
Another aspect of the invention provides a kind of equipment again, has the dress for being applied to equipment end described in any of the above-described It puts;Or the computer program that can be run on a processor on a memory including processor, memory and storage, the place Manage the step of method for being applied to equipment end described in any of the above-described is realized when device performs described program.
Optionally, the equipment includes air-conditioning, refrigerator, washing machine or terminal.
Another aspect of the invention provides a kind of computer readable storage medium again, is stored thereon with computer program, It is realized when described program is executed by processor and is applied to server end, the method applied to equipment end described in any of the above-described Step.
Technical solution provided by the invention ensures in a manner that symmetric encipherment algorithm and rivest, shamir, adelman are combined Data transmission it is safe and reliable.Asymmetric encryption is used for transmission session key, and symmetric cryptography is used for data encryption, that is, ensure that number According to the safety of transmission, encrypted efficiency is in turn ensured.
Description of the drawings
Attached drawing described herein is used to provide further understanding of the present invention, and forms the part of the present invention, this hair Bright illustrative embodiments and their description do not constitute improper limitations of the present invention for explaining the present invention.In the accompanying drawings:
Fig. 1 is the general frame figure of servers' data transmission encryption method provided by the invention;
Fig. 2 is a kind of step flow of preferred embodiment of servers' data transmission encryption method provided by the invention Figure;
Fig. 3 is the general frame figure of equipment end data transfer encryption method provided by the invention;
Fig. 4 is the general frame figure of servers' data transmission encryption device provided by the invention;
Fig. 5 is a kind of structural representation of preferred embodiment of servers' data transmission encryption device provided by the invention Figure;
Fig. 6 is the general frame figure of equipment end data transmission encryption device provided by the invention;
Fig. 7 is a kind of structure diagram of preferred embodiment of equipment end data transmission encryption device provided by the invention;
Fig. 8 is a kind of encrypted flow chart of steps of the data transmission of preferred embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with the specific embodiment of the invention and Technical solution of the present invention is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the present invention one Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Go out all other embodiments obtained under the premise of creative work, shall fall within the protection scope of the present invention.
It should be noted that term " first " in description and claims of this specification and above-mentioned attached drawing, " Two " etc. be the object for distinguishing similar, and specific sequence or precedence are described without being used for.It should be appreciated that it uses in this way Data can be interchanged in the appropriate case, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, be not necessarily limited to for example, containing the process of series of steps or unit, method, system, product or equipment Those steps or unit clearly listed, but may include not listing clearly or for these processes, method, product Or the intrinsic other steps of equipment or unit.
One aspect of the present invention provides a kind of data transfer encryption method applied to server end.Fig. 1 is that the present invention carries The general frame figure of the servers' data transmission encryption method of confession.As shown in Figure 1, servers' data transmission encryption of the present invention Method includes:Step S110, the public key for the equipment end that receiving device end is sent;Step S120 generates session key, and uses institute State session key described in the public key encryption of equipment end;The encrypted session key is sent to the equipment end by step S130, So that the equipment end is communicated with the server end by the session key.
Technical solution provided by the invention is conversated the transmission of key using rivest, shamir, adelman, and session key is also It is symmetric key, because same key is used to encrypt and decrypt;Symmetric cryptography is used for transmission the encryption of data, and transmission data can wrap It includes the Login Register information between equipment and server, control instruction, control parameter or uploads status data etc..Specifically, may be used Using rivest, shamir, adelman such as RSA (Ron Rivest, Adi Shamir, Leonard Adleman, RSA cryptographic algorithms), ECC (Elliptic Curves Cryptography, elliptic curve cipher coding theory), Rabin scheduling algorithms transmission AES (Advanced Encryption Standard, Advanced Encryption Standard) key realizes encrypted be perfectly safe;Using AES into Row data encryption ensures encrypted efficiency.The advantages of asymmetric encryption is safe, and shortcoming is that speed is slower.Symmetric cryptography The advantages of be that speed is fast, symmetry encryption usually message sender need encrypt mass data when uses, algorithm is disclosed, is calculated Measure that small, enciphering rate is fast, encryption efficiency is high.The shortcomings that symmetric cryptography is before data transmission, and sender and recipient must quotient Secret key is set, then makes both sides that can keep secret key;If secondly the secret key of a side is leaked, then encryption information is just not yet Safety;In addition, when each pair of user uses symmetric encipherment algorithm every time, it is required for using other people ignorant unique secret keys, This can cause the key enormous amount that sending and receiving both sides are possessed, and key management becomes the burden of both sides.Using symmetric encipherment algorithm The mode being combined with rivest, shamir, adelman ensure that the safety of data transmission, in turn ensure encrypted efficiency.
In addition, technical solution provided by the invention generates session key, public private key pair and session key by server end All it is to be generated by exploitation side oneself, cost-effective, convenient for control, and encryption efficiency is high.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, is sent receiving the equipment end Equipment end public key before, further include:Generate the public private key pair of itself using rivest, shamir, adelman, and by the public key of itself It is disclosed to the equipment end;The public key of the equipment end is encrypted by the public key of the server end;It is set in reception After the public key of equipment end that standby end is sent, and before session key described in the public key encryption for using the equipment end, also wrap It includes:The public key of the equipment end is decrypted using the private key of itself.In this embodiment, the request of session key is to pass through clothes The public key encryption of business device, since the form of request is secrecy, it is impossible to be forged, realize encrypted is perfectly safe.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, it is described to be calculated using asymmetric encryption Method generates the public private key pair of itself, including:While the public private key pair of itself is generated, the version mark of the public private key pair is generated Know;Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.Due to server Public key is disclosed, there is the possibility being stolen, and in order to ensure safety, can be distinguished by version identifier different public and private Key version completes the upgrading of public key, regularly updates public key, reduces the risk being stolen.
In this embodiment, server-side can freely control the rule of generation key, avoid the generation of symmetric key Mode is fixed.Which kind of, once the generating mode of symmetric key is fixed up (using Encryption Algorithm, key length), own Data encryption with batch is all using same rule, if later release needs to upgrade, for example 128 keys of AES are broken Solution, then originally module in this way can all face the risk attacked, unless all modules are replaced, rise For grade to other cipher modes (longer key or other Encryption Algorithm), this mode cost is very high.It is generated by server-side Session key can be to avoid this risk, because server-side can freely control the rule of generation key, so as to further carry High encrypted safety.
Fig. 2 is a kind of step flow of preferred embodiment of servers' data transmission encryption method provided by the invention Figure.As shown in Fig. 2, transmitting a kind of embodiment of encryption method according to servers' data of the present invention, further include:Connect step S210 receives the identity information for the equipment end that the equipment end is sent;Step S220 is met, according to the equipment end received Identity information verifies the equipment end;Step S230 is met, after described be verified, generates the session key.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, is further included:The equipment end Identity information is encrypted by the public key of the server end;In the identity for receiving the equipment end that the equipment end is sent After information, and before the identity information of equipment end received according to verifies the equipment end, further include: The identity information of the equipment end is decrypted using the private key of itself.
Specifically, the verification information that own public key and its identity information are combined into can be transmitted to server by equipment end. This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, it is described to disclose the public key of itself Include to equipment end:The public key of itself is disclosed to by equipment end by document agreement or network transmission.Wherein, document agreement is For the interaction protocol of inside exploitation, such as Rest ful (Representational State Transfer) API (Application Programming Interface, application programming interface), it is specified that good public key is, exploit person This public key is written to module by member.
A kind of embodiment of encryption method is transmitted according to servers' data of the present invention, having for the session key is set The effect phase after the term of validity, updates the session key.Session key usage time is long to have the danger that can be cracked Danger, regularly updates the safety that can ensure session key.
Another aspect of the present invention provides a kind of data transfer encryption method applied to equipment end again.Fig. 3 is this hair The general frame figure of the equipment end data transfer encryption method of bright offer.As shown in figure 3, the present invention is applied to the data of equipment end Transmission encryption method includes:Step S310, generates the public private key pair of itself using rivest, shamir, adelman, and by the public key of itself It is sent to server end;Step S320, receives the session key that the server end is sent, and the session key is using described What the public key of equipment end was encrypted;Step S330 decrypts the session key, so as to the equipment end using the private key of itself It is communicated with the server end by the session key.
A kind of embodiment of encryption method is transmitted according to present device end data, is given birth to using rivest, shamir, adelman Into after the public private key pair of itself, and before the public key of itself is sent to server end, further include:Obtain the server Public key disclosed in end uses the public key of itself described in public key encryption disclosed in the server end.
It has been observed that session key is generated by server end, communicated using session key, it is ensured that encryption effect Rate;In addition, session key is encrypted using rivest, shamir, adelman, it can ensure safety in this way.
A kind of embodiment of encryption method is transmitted according to present device end data, is further included:The identity of itself is believed Breath is sent to the server end, is tested so that the server end carries out identity before the session key is sent to equipment end Card.
A kind of embodiment of encryption method is transmitted according to present device end data, is sent by the identity information of itself To before the server end, further include:Use the identity information of itself described in public key encryption disclosed in the server end.
Specifically, equipment end is established with server end and is connected, the verification that own public key and its identity information are combined into Information is transmitted to server.This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
A kind of embodiment of encryption method is transmitted according to present device end data, it is described to obtain the server end public affairs The public key opened includes:Public key disclosed in the server end is obtained by document agreement or network transmission.Wherein, document agreement is To be used for the internal interaction protocol developed, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption method is transmitted according to present device end data, it is described to use rivest, shamir, adelman The public private key pair of itself is generated, is further included:The public private key pair of itself is regenerated when the equipment end powers on every time.On every time Electricity can effectively prevent to crack using newly-generated public private key pair, ensure safety.
A kind of embodiment of encryption method is transmitted according to present device end data, is further included:The session key is set It is equipped with the term of validity;After the term of validity, the session key is updated to server request.The term of validity later please to server The i.e. renewable session key of session key is sought, ensures the safety of communication data.
Another aspect of the present invention provides a kind of data transmission encryption device applied to server end again, and Fig. 4 is this The general frame figure of servers' data transmission encryption device that invention provides.As shown in figure 4, the present invention is applied to server end Data transmission encryption device include:Networking module 100, for the public key for the equipment end that receiving device end is sent;Session key Generation module 200 for generating session key, and uses session key described in the public key encryption of the equipment end;The networking Module 100 is additionally operable to:The encrypted session key is sent to the equipment end, so as to the equipment end and the server End is communicated by the session key.Wherein, server end refer to carry out equipment connection, business logic processing server Or cloud platform.
Fig. 5 is a kind of structural representation of preferred embodiment of servers' data transmission encryption device provided by the invention Figure.As shown in figure 5, transmitting a kind of embodiment of encryption device according to servers' data of the present invention, further include:It is asymmetric close Key generation module 300, is used for:Before the public key for receiving the equipment end that the equipment end is sent, using rivest, shamir, adelman Generate the public private key pair of itself;Public key discloses module 150, for the public key of itself to be disclosed to the equipment end;The equipment The public key at end is encrypted by the public key of the server end;Deciphering module 400, is used for:It is sent at receiving device end Equipment end public key after, and before session key described in the public key encryption for using the equipment end, use the private of itself Key decrypts the public key of the equipment end.
Wherein, after server end unsymmetrical key generation module 300 generates the public private key pair of itself, module is disclosed by public key The public key of itself is disclosed to equipment end by 150, and server is sent to after the public key of the public key encryption of equipment end server self It holds, by deciphering module 400, the private key decryption of itself obtains the public key of equipment end after received server-side.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the unsymmetrical key generates mould Block 300 is additionally operable to:While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;Periodically upgrading is public Private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the networking module 100 is also used In the identity information for receiving the equipment end that the equipment end is sent;Described device further includes authentication module 500, for according to The identity information of the equipment end received verifies the equipment end;The session secret key generating module 200 is additionally operable to: It is described be verified after, generate the session key.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, is further included:The equipment end Identity information is encrypted by the public key of the server end;The deciphering module 400 is additionally operable to:It is being set described in reception After the identity information of equipment end that standby end is sent, and in the identity information of equipment end received according to the equipment Before end is verified, the identity information of the equipment end is decrypted using the private key of itself.
A kind of embodiment of encryption device is transmitted according to servers' data of the present invention, the public key discloses module 150 It is additionally operable to:The public key of itself is disclosed to by equipment end by document agreement or network transmission.Wherein, document agreement is for interior For the interaction protocol of portion's exploitation, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption device, the session secret key generating module are transmitted according to servers' data of the present invention 200 are additionally operable to:The term of validity of the session key is set, after the term of validity, updates the session key.
Another aspect of the present invention provides a kind of data transmission encryption device applied to equipment end again.Fig. 6 is this hair The general frame figure of the equipment end data transmission encryption device of bright offer.As shown in fig. 6, the present invention is applied to the data of equipment end Transmission encryption device includes:Unsymmetrical key generation module 700, is used for:The public and private of itself is generated using rivest, shamir, adelman Key pair;Networking module 600, for the public key of itself to be sent to server end;The networking module 600 is additionally operable to:Receive institute The session key of server end transmission is stated, the session key is encrypted using the public key of the equipment end;Decrypt mould Block 800, for the private key of itself to be used to decrypt the session key, so as to the equipment end pass through with the server end it is described Session key communicates.
In the case of one kind, equipment end refers to the networked devices in intelligent domestic system, such as refrigerator, air-conditioning, washing machine;Separately In the case of one kind, equipment end refers to terminal, such as mobile phone, tablet computer mobile terminal.Equipment end networking module refers to and services Device establishes the module of connection, such as WiFi module/Gprs/3G/4G modules.
Fig. 7 is a kind of structure diagram of preferred embodiment of equipment end data transmission encryption device provided by the invention. As shown in fig. 7, transmitting a kind of embodiment of encryption device according to present device end data, public key acquisition module is further included 650, it is used for:After the public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is being sent to clothes It is engaged in before device end, obtains public key disclosed in the server end;Encrypting module 900, is used for:Using disclosed in the server end The public key of itself described in public key encryption.
Wherein, public key acquisition module 650 obtains public key disclosed in server end, and then encrypting module 900 uses server end The public key of itself that generates of public key encryption unsymmetrical key generation module 700, itself public key is sent out by networking module 600 It is sent to server end.
A kind of embodiment of encryption device is transmitted according to present device end data, the networking module 600 is additionally operable to: The identity information of itself is sent to the server end, so that the server end pair is set before the session key is sent Standby end carries out authentication.
A kind of embodiment of encryption device is transmitted according to present device end data, the encrypting module 900 is additionally operable to: Before the identity information of itself is sent to the server end, using described in public key encryption disclosed in the server end from The identity information of body.
A kind of embodiment of encryption device is transmitted according to present device end data, the public key acquisition module 650 is also For:Public key disclosed in the server end is obtained by document agreement or network transmission.Wherein, document agreement is for interior For the interaction protocol of portion's exploitation, it is specified that good public key is, this public key is written to module by developer.
A kind of embodiment of encryption device, the unsymmetrical key generation module are transmitted according to present device end data 700 are additionally operable to:The public private key pair of itself is regenerated when the equipment end powers on every time.
A kind of embodiment of encryption device is transmitted according to present device end data, the session key is provided with effectively Phase;The networking module 600 is additionally operable to:After the term of validity, the session key is updated to server request.
Fig. 8 is a kind of encrypted flow chart of steps of the data transmission of preferred embodiment of the present invention.As shown in figure 8, data pass Defeated encryption embodiment includes three phases.Stage one:Server generates the public private key pair of asymmetric system, and public key is disclosed To equipment.Stage two:Session key is sent to equipment end networking module by server.Stage three:Equipment end networking module and clothes Communication is encrypted using session key in business device.
One flow of stage:
1. server uses rivest, shamir, adelman, public private key pair is generated, and preserve.
2. public key is disclosed to equipment end by server in some way.Publicity pattern includes:Document agreement, network transmission etc. Mode.
Two flow of stage:
1. equipment end networking module powers on, public private key pair is generated.To ensure safety, equipment end networking module powers on every time Public private key pair can be regenerated.
2. equipment end networking module is established with server and is connected, the verification that own public key and its identity information are combined into Information is transmitted to server.This verification information is encrypted by server public key, is avoided being monitored on network, be stolen.
It after 3. server receives verification information, is decrypted with own private key.After being verified, session key is generated.
4. the public key encryption session key of server equipment end networking module, is sent to equipment end networking module.
After 5. equipment end networking module receives encrypted session key, it is decrypted with own private key, so as to obtain session Key.
Three flow of stage:
By the stage two, equipment end networking module and server-side have been owned by session key.Subsequent communication process Decryption is encrypted with this session key.
Another aspect of the invention provides a kind of server again, has and is applied to server end described in any of the above-described Device;Or the computer program that can be run on a processor on a memory including processor, memory and storage, it is described Processor realizes the step of method for being applied to server end described in any of the above-described when performing described program.
Another aspect of the invention provides a kind of equipment again, has the dress for being applied to equipment end described in any of the above-described It puts;Or the computer program that can be run on a processor on a memory including processor, memory and storage, the place Manage the step of method for being applied to equipment end described in any of the above-described is realized when device performs described program.
According to a kind of embodiment of present device, the equipment includes air-conditioning, refrigerator, washing machine or terminal.
Another aspect of the invention provides a kind of computer readable storage medium again, is stored thereon with computer program, It is realized when described program is executed by processor and is applied to server end, the method applied to equipment end described in any of the above-described Step.
Technical solution provided by the invention ensures in a manner that symmetric encipherment algorithm and rivest, shamir, adelman are combined Data transmission it is safe and reliable.Asymmetric encryption is used for transmission session key, and symmetric cryptography is used for data encryption, that is, ensure that number According to the safety of transmission, encrypted efficiency is in turn ensured.
Function described herein can hardware, by processor perform software, firmware or any combination thereof in implement. If implement in the software performed by processor, then computer can be stored in using function as one or more instructions or codes It is transmitted on readable media or via computer-readable media.Other examples and embodiment will in the present invention and appended right It asks in the range and spirit of book.For example, be attributed to the property of software, function described above can be used by processor, Hardware, firmware, hardwired appoint the software implementation that the combination of whichever performs in these.In addition, each functional unit can integrate In a processing unit or each unit is individually physically present, can also two or more units be integrated in In one unit.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of division of logic function, can there is an other dividing mode in actual implementation, for example, multiple units or component can combine or Person is desirably integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module It connects, can be electrical or other forms.
The unit illustrated as separating component may or may not be it is physically separate, as control fill The component put may or may not be physical unit, can be located at a place or or be distributed to multiple On unit.Some or all of unit therein can be selected according to the actual needs to realize the purpose of this embodiment scheme. Device embodiment is substantially corresponding with embodiment of the method, and the description of the related part of device embodiment can be found in the portion of embodiment of the method It defends oneself bright, the similarly description of the related part of embodiment of the method also can be found in the part explanation of device embodiment.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products It embodies, which is stored in a storage medium, is used including some instructions so that a computer Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The foregoing is merely the embodiment of the present invention, are not intended to restrict the invention, for those skilled in the art For member, the invention may be variously modified and varied.Any modification for all within the spirits and principles of the present invention, being made, Equivalent replacement, improvement etc., should be included within scope of the presently claimed invention.

Claims (32)

1. a kind of data transfer encryption method, which is characterized in that the method is applied to server end, including:
The public key for the equipment end that receiving device end is sent;
Session key is generated, and uses session key described in the public key encryption of the equipment end;
The encrypted session key is sent to the equipment end, so as to the equipment end pass through with the server end it is described Session key communicates.
2. according to the method described in claim 1, it is characterized in that,
Before the public key for receiving the equipment end that the equipment end is sent, further include:Itself is generated using rivest, shamir, adelman Public private key pair, and the public key of itself is disclosed to the equipment end;The public key of the equipment end is by the server end Public key be encrypted;
After the public key of the equipment end sent at receiving device end, and it is close in session described in the public key encryption for using the equipment end Before key, further include:The public key of the equipment end is decrypted using the private key of itself.
3. according to the method described in claim 2, it is characterized in that, described generate the public and private of itself using rivest, shamir, adelman Key pair, including:
While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;
Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
4. according to the method in claim 2 or 3, which is characterized in that further include:
Receive the identity information for the equipment end that the equipment end is sent;
The equipment end is verified according to the identity information of the equipment end received;
After described be verified, the session key is generated.
5. it according to the method described in claim 4, it is characterized in that, further includes:
The identity information of the equipment end is encrypted by the public key of the server end;
After the identity information for receiving the equipment end that the equipment end is sent, and in the body of equipment end received according to Before part information verifies the equipment end, further include:The identity information of the equipment end is decrypted using the private key of itself.
6. method according to any one of claims 1-5, which is characterized in that described that the public key of itself is disclosed to equipment End includes:The public key of itself is disclosed to by equipment end by document agreement or network transmission.
7. according to the method described in any one of claim 1-6, which is characterized in that the term of validity of the session key is set, After the term of validity, the session key is updated.
8. a kind of data transfer encryption method, which is characterized in that the method is applied to equipment end, including:
The public private key pair of itself is generated using rivest, shamir, adelman, and the public key of itself is sent to server end;
The session key that the server end is sent is received, the session key is encrypted using the public key of the equipment end 's;
The session key is decrypted using the private key of itself, so that the equipment end is close by the session with the server end Key communicates.
9. according to the method described in claim 8, it is characterized in that, generating the public and private key of itself using rivest, shamir, adelman To later, and before the public key of itself is sent to server end, further include:Public key disclosed in the server end is obtained, Use the public key of itself described in public key encryption disclosed in the server end.
10. it according to the method described in claim 9, it is characterized in that, further includes:The identity information of itself is sent to the clothes Business device end, so that the server end carries out authentication before the session key is sent to equipment end.
11. according to the method described in claim 10, it is characterized in that, the identity information of itself is sent to the server Before end, further include:Use the identity information of itself described in public key encryption disclosed in the server end.
12. according to the method described in any one of claim 9-11, which is characterized in that the acquisition server end discloses Public key include:Public key disclosed in the server end is obtained by document agreement or network transmission.
13. according to the method described in any one of claim 8-12, which is characterized in that described to be given birth to using rivest, shamir, adelman Into the public private key pair of itself, further include:The public private key pair of itself is regenerated when the equipment end powers on every time.
14. according to the method described in any one of claim 8-13, which is characterized in that further include:The session key setting There is the term of validity;After the term of validity, the session key is updated to server request.
15. a kind of data transmission encryption device, which is characterized in that described device is applied to server end, including:
Networking module, for the public key for the equipment end that receiving device end is sent;
Session secret key generating module for generating session key, and uses session key described in the public key encryption of the equipment end;
The networking module is additionally operable to:The encrypted session key is sent to the equipment end, so as to the equipment end with The server end is communicated by the session key.
16. device according to claim 15, which is characterized in that further include:
Unsymmetrical key generation module, is used for:Before the public key for receiving the equipment end that the equipment end is sent, use is asymmetric Encryption Algorithm generates the public private key pair of itself;
Public key discloses module, for the public key of itself to be disclosed to the equipment end;The public key of the equipment end is by described What the public key of server end was encrypted;
Deciphering module is used for:After the public key of the equipment end sent at receiving device end, and in the public key for using the equipment end Before encrypting the session key, the public key of the equipment end is decrypted using the private key of itself.
17. device according to claim 16, which is characterized in that the unsymmetrical key generation module is additionally operable to:
While the public private key pair of itself is generated, the version identifier of the public private key pair is generated;
Periodically upgrading public private key pair, and the corresponding version identifier of public private key pair of generation and the upgrading simultaneously.
18. device according to claim 16 or 17, which is characterized in that
The networking module is additionally operable to receive the identity information for the equipment end that the equipment end is sent;
Described device further includes authentication module, for according to the identity information of equipment end that receives to the equipment end into Row verification;
The session secret key generating module is additionally operable to:After described be verified, the session key is generated.
19. device according to claim 18, which is characterized in that further include:
The identity information of the equipment end is encrypted by the public key of the server end;
The deciphering module is additionally operable to:After the identity information for receiving the equipment end that the equipment end is sent, and according to institute State the equipment end received identity information the equipment end is verified before, the private key of itself is used to decrypt the equipment The identity information at end.
20. according to the device described in any one of claim 15-19, which is characterized in that the public key discloses module and is additionally operable to: The public key of itself is disclosed to by equipment end by document agreement or network transmission.
21. according to the device described in any one of claim 15-20, which is characterized in that the session secret key generating module is also For:The term of validity of the session key is set, after the term of validity, updates the session key.
22. a kind of data transmission encryption device, which is characterized in that described device is applied to equipment end, including:
Unsymmetrical key generation module, is used for:The public private key pair of itself is generated using rivest, shamir, adelman;
Networking module, for the public key of itself to be sent to server end;
The networking module is additionally operable to:The session key that the server end is sent is received, the session key is using described What the public key of equipment end was encrypted;
Deciphering module, for the private key of itself to be used to decrypt the session key, so as to the equipment end and the server end It is communicated by the session key.
23. device according to claim 22, which is characterized in that further include public key acquisition module, be used for:Using non-right After title Encryption Algorithm generates the public private key pair of itself, and before the public key of itself is sent to server end, described in acquisition Public key disclosed in server end;
Encrypting module is used for:Use the public key of itself described in public key encryption disclosed in the server end.
24. device according to claim 23, which is characterized in that the networking module is additionally operable to:The identity of itself is believed Breath is sent to the server end, is tested so that the server end carries out identity before the session key is sent to equipment end Card.
25. device according to claim 24, which is characterized in that the encrypting module is additionally operable to:By the identity of itself Information is sent to before the server end, uses the identity information of itself described in public key encryption disclosed in the server end.
26. according to the device described in any one of claim 23-25, which is characterized in that the public key acquisition module is additionally operable to: Public key disclosed in the server end is obtained by document agreement or network transmission.
27. according to the device described in any one of claim 22-26, which is characterized in that the unsymmetrical key generation module It is additionally operable to:The public private key pair of itself is regenerated when the equipment end powers on every time.
28. according to the device described in any one of claim 22-27, which is characterized in that the session key is provided with effectively Phase;The networking module is additionally operable to:After the term of validity, the session key is updated to server request.
29. a kind of server, which is characterized in that
With the device as described in any one of claim 15-21;Or
Including the computer program that processor, memory and storage can be run on a processor on a memory, the processing Device realizes the step of claim 1-7 any the method when performing described program.
30. a kind of equipment, which is characterized in that
With the device as described in any one of claim 22-28;Or
Including the computer program that processor, memory and storage can be run on a processor on a memory, the processing Device realizes the step of claim 8-14 any the method when performing described program.
31. equipment according to claim 30, which is characterized in that the equipment includes air-conditioning, refrigerator, washing machine or end End.
32. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, described program is handled The step of any one of any one of claim 1-7 or 8-14 the methods are realized when device performs.
CN201711259284.6A 2017-12-04 2017-12-04 Data transmission encryption method and device, storage medium, equipment and server Pending CN108173644A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711259284.6A CN108173644A (en) 2017-12-04 2017-12-04 Data transmission encryption method and device, storage medium, equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711259284.6A CN108173644A (en) 2017-12-04 2017-12-04 Data transmission encryption method and device, storage medium, equipment and server

Publications (1)

Publication Number Publication Date
CN108173644A true CN108173644A (en) 2018-06-15

Family

ID=62524303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711259284.6A Pending CN108173644A (en) 2017-12-04 2017-12-04 Data transmission encryption method and device, storage medium, equipment and server

Country Status (1)

Country Link
CN (1) CN108173644A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848091A (en) * 2018-06-20 2018-11-20 上海织语网络科技有限公司 A kind of mixed encryption method for instant messaging
CN109005196A (en) * 2018-09-10 2018-12-14 北京旷视科技有限公司 Data transmission method, data decryption method, device and electronic equipment
CN109120641A (en) * 2018-09-28 2019-01-01 中国平安财产保险股份有限公司 The automatic method for uploading of report, device, computer equipment and storage medium
CN109150502A (en) * 2018-09-19 2019-01-04 广州通达汽车电气股份有限公司 Data ciphering method, device, system, computer equipment and storage medium
CN109495265A (en) * 2018-12-06 2019-03-19 江苏中威科技软件系统有限公司 Network data transmission method, communication terminal and the device with store function
CN110224976A (en) * 2019-04-29 2019-09-10 北京邮电大学 A kind of encryption communication method, device and computer readable storage medium
CN110519215A (en) * 2019-07-02 2019-11-29 珠海格力电器股份有限公司 Data communication method and device
CN110768938A (en) * 2018-07-27 2020-02-07 上海汽车集团股份有限公司 Vehicle safety communication method and device
CN111416718A (en) * 2020-03-13 2020-07-14 浙江华消科技有限公司 Method and device for receiving communication key, method and device for sending communication key
CN112134911A (en) * 2019-06-25 2020-12-25 联合汽车电子有限公司 Remote program upgrading method, device and medium
CN112217796A (en) * 2020-09-07 2021-01-12 西安通软软件科技有限公司 Internet of things module software upgrading method based on encryption technology
CN113411345A (en) * 2021-06-29 2021-09-17 中国农业银行股份有限公司 Method and device for secure session
CN114679287A (en) * 2020-12-24 2022-06-28 美的集团股份有限公司 Data processing method, system, electronic device and storage medium
CN116112234A (en) * 2023-01-04 2023-05-12 北京国联政信科技有限公司 Electronic signing security verification method, system, medium and equipment
CN117527419A (en) * 2023-12-06 2024-02-06 北京东方通科技股份有限公司 Safety transmission method for identification data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN102833253A (en) * 2012-08-29 2012-12-19 五八同城信息技术有限公司 Method and server for establishing safe connection between client and server
CN102882685A (en) * 2012-09-27 2013-01-16 东莞宇龙通信科技有限公司 Identity authentication system and identity authentication method
US20160359824A1 (en) * 2008-04-10 2016-12-08 Alcatel-Lucent Usa Inc. Methods and Apparatus for Authentication and Identity Management Using a Public Key Infrastructure (PKI) in an IP-Based Telephony Environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160359824A1 (en) * 2008-04-10 2016-12-08 Alcatel-Lucent Usa Inc. Methods and Apparatus for Authentication and Identity Management Using a Public Key Infrastructure (PKI) in an IP-Based Telephony Environment
CN101964793A (en) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 Method and system for transmitting data between terminal and server and sign-in and payment method
CN102833253A (en) * 2012-08-29 2012-12-19 五八同城信息技术有限公司 Method and server for establishing safe connection between client and server
CN102882685A (en) * 2012-09-27 2013-01-16 东莞宇龙通信科技有限公司 Identity authentication system and identity authentication method

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848091A (en) * 2018-06-20 2018-11-20 上海织语网络科技有限公司 A kind of mixed encryption method for instant messaging
CN110768938A (en) * 2018-07-27 2020-02-07 上海汽车集团股份有限公司 Vehicle safety communication method and device
CN109005196A (en) * 2018-09-10 2018-12-14 北京旷视科技有限公司 Data transmission method, data decryption method, device and electronic equipment
CN109150502A (en) * 2018-09-19 2019-01-04 广州通达汽车电气股份有限公司 Data ciphering method, device, system, computer equipment and storage medium
CN109120641B (en) * 2018-09-28 2022-09-09 中国平安财产保险股份有限公司 Report automatic uploading method and device, computer equipment and storage medium
CN109120641A (en) * 2018-09-28 2019-01-01 中国平安财产保险股份有限公司 The automatic method for uploading of report, device, computer equipment and storage medium
CN109495265A (en) * 2018-12-06 2019-03-19 江苏中威科技软件系统有限公司 Network data transmission method, communication terminal and the device with store function
CN110224976A (en) * 2019-04-29 2019-09-10 北京邮电大学 A kind of encryption communication method, device and computer readable storage medium
CN112134911A (en) * 2019-06-25 2020-12-25 联合汽车电子有限公司 Remote program upgrading method, device and medium
CN110519215A (en) * 2019-07-02 2019-11-29 珠海格力电器股份有限公司 Data communication method and device
CN111416718A (en) * 2020-03-13 2020-07-14 浙江华消科技有限公司 Method and device for receiving communication key, method and device for sending communication key
CN112217796A (en) * 2020-09-07 2021-01-12 西安通软软件科技有限公司 Internet of things module software upgrading method based on encryption technology
CN114679287A (en) * 2020-12-24 2022-06-28 美的集团股份有限公司 Data processing method, system, electronic device and storage medium
CN113411345A (en) * 2021-06-29 2021-09-17 中国农业银行股份有限公司 Method and device for secure session
CN113411345B (en) * 2021-06-29 2023-10-10 中国农业银行股份有限公司 Method and device for secure session
CN116112234A (en) * 2023-01-04 2023-05-12 北京国联政信科技有限公司 Electronic signing security verification method, system, medium and equipment
CN117527419A (en) * 2023-12-06 2024-02-06 北京东方通科技股份有限公司 Safety transmission method for identification data

Similar Documents

Publication Publication Date Title
CN108173644A (en) Data transmission encryption method and device, storage medium, equipment and server
US10785019B2 (en) Data transmission method and apparatus
CN104023013B (en) Data transmission method, server side and client
CN106790223B (en) Data transmission method, equipment and system
CN112398651B (en) Quantum secret communication method and device, electronic equipment and storage medium
CN110198295A (en) Safety certifying method and device and storage medium
CN108347419A (en) Data transmission method and device
CN107800675A (en) A kind of data transmission method, terminal and server
CA3178180A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN113806772A (en) Information encryption transmission method and device based on block chain
CN111914291A (en) Message processing method, device, equipment and storage medium
CN113497778A (en) Data transmission method and device
CN109586908A (en) A kind of safe packet transmission method and its system
CN109544747A (en) Encryption key update method, system and the computer storage medium of intelligent door lock
CN104917807A (en) Resource transfer method, apparatus and system
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN113868672B (en) Module wireless firmware upgrading method, security chip and wireless firmware upgrading platform
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN108206739A (en) Key generation method and device
CN102857889A (en) Method and device for encrypting short messages
US11088835B1 (en) Cryptographic module to generate cryptographic keys from cryptographic key parts
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN102281303A (en) Data exchange method
CN104253692B (en) Key management method and device based on SE

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180615

RJ01 Rejection of invention patent application after publication