CN108282331A - Cipher processing method, apparatus and system - Google Patents

Cipher processing method, apparatus and system Download PDF

Info

Publication number
CN108282331A
CN108282331A CN201810002119.0A CN201810002119A CN108282331A CN 108282331 A CN108282331 A CN 108282331A CN 201810002119 A CN201810002119 A CN 201810002119A CN 108282331 A CN108282331 A CN 108282331A
Authority
CN
China
Prior art keywords
user
defined identification
key
encryption processing
login account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810002119.0A
Other languages
Chinese (zh)
Inventor
侯锐
李远刚
孙茂华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinbangda Co Ltd
Original Assignee
Jinbangda Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinbangda Co Ltd filed Critical Jinbangda Co Ltd
Priority to CN201810002119.0A priority Critical patent/CN108282331A/en
Publication of CN108282331A publication Critical patent/CN108282331A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

The invention discloses a kind of cipher processing method, apparatus and system, this method includes:The user-defined identification that user is sent by first terminal equipment is received, sub-key corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance.The present invention can record the password of multiple login accounts of user while ensuring safety, and cipher processing method is simple and safe, effectively improves user experience.

Description

Cipher processing method, apparatus and system
Technical field
The present invention relates to Cipher Processing technical field, more particularly to a kind of cipher processing method, apparatus and system.
Background technology
At this stage, internet has been fully immersed into daily life, most systems involved by internet or Website is required to be logined by way of password.With increasing for Internet service, user needs the password remembered also to get over Come it is more, how to help user remember multiple accounts password become urgent need to resolve the problem of.Excessive for solution password at present Problem, the main method taken have:Multiple systems or website are remembered using same set of username and password, using system or website Username and password remembers username and password by Password Management software.But the safety coefficient of the above each method is relatively low, user Account safety be unable to get guarantee.
Invention content
A kind of cipher processing method of present invention offer, apparatus and system, can record user while ensuring safety Multiple login accounts password, cipher processing method is simple and safe, effectively improves user experience.
To achieve the above object, the present invention provides a kind of cipher processing methods, including:
Receive the user-defined identification that user is sent by first terminal equipment;
It is close that son corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance Key.
Optionally, described to be generated and the user-defined identification according to the user-defined identification and the private key for user obtained in advance Corresponding sub-key includes:
According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse with it is described The corresponding sub-key of user-defined identification.
Optionally, it is generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance described Further include before knowing corresponding sub-key:
The private key for user that cloud service platform is sent is received, the private key for user is public according to the user of acquisition by cloud service platform Key generates.
Optionally, further include after the user-defined identification that the reception user is sent by first terminal equipment:
From in the correspondence of pre-stored user-defined identification and login account, inquire corresponding with user-defined identification Login account, and show the login account.
Optionally, it described from the correspondence of pre-stored user-defined identification and login account, inquires and oneself Definition identifies corresponding login account, and further includes before showing the login account:
Receive the trigger signal that user is sent by first terminal equipment;
The correspondence of user-defined identification and login account is generated according to the trigger signal;
Store the correspondence of the user-defined identification and login account.
Optionally, it is generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance described Knowing corresponding sub-key further includes later:
Show the sub-key.
To achieve the above object, the present invention also provides a kind of encryption processing apparatus, including:
Receiving module, the user-defined identification sent by first terminal equipment for receiving user;
Generation module, for being generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance Know corresponding sub-key.
Optionally, the generation module is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described makes by oneself Justice mark is calculated, and disperses sub-key corresponding with the user-defined identification.
Optionally, the receiving module be additionally operable to receive cloud service platform send private key for user, the private key for user by Cloud service platform is generated according to the client public key of acquisition.
Optionally, further include:
Enquiry module, for from the correspondence of pre-stored user-defined identification and login account, inquiring and certainly Definition identifies corresponding login account;
Display module, for showing the login account.
Optionally, further include memory module;
The receiving module is additionally operable to receive the trigger signal that user is sent by first terminal equipment;
The generation module is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal;
The memory module, the correspondence for storing the user-defined identification and login account.
Optionally,
The display module is additionally operable to show the sub-key.
To achieve the above object, the present invention also provides a kind of encryption processing systems, including:
First terminal equipment, for sending user-defined identification to the encryption processing apparatus;
Encryption processing apparatus, the user-defined identification sent by first terminal equipment for receiving user, according to it is described from Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
Optionally, the encryption processing apparatus is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described User-defined identification is calculated, and disperses sub-key corresponding with the user-defined identification.
Optionally, further include cloud service platform;
The cloud service platform generates private key for user according to the client public key, sends user for obtaining client public key Private key is to the encryption processing apparatus;
The encryption processing apparatus is additionally operable to receive the private key for user that cloud service platform is sent.
Optionally, the encryption processing apparatus is additionally operable to close from pre-stored user-defined identification and the corresponding of login account In system, login account corresponding with user-defined identification is inquired, and show the login account.
Optionally,
The encryption processing apparatus is additionally operable to receive the trigger signal that user is sent by first terminal equipment, according to described Trigger signal generates the correspondence of user-defined identification and login account, stores the correspondence of the user-defined identification and login account Relationship;
The first terminal equipment is additionally operable to send trigger signal to the encryption processing apparatus.
Optionally,
The encryption processing apparatus is additionally operable to show the sub-key, for user by first terminal equipment by the son Key logs in login account corresponding with the user-defined identification as login password;
Alternatively, the system also includes second terminal equipment;The encryption processing apparatus is additionally operable to show the sub-key, Login password is regard the sub-key as by second terminal equipment for user and logs in step on corresponding with the user-defined identification Record account.
The invention has the advantages that:
Cipher processing method provided by the invention, receive first terminal equipment send user-defined identification, according to it is described from Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification, can effectively record user Multiple accounts password, the user experience is improved while ensureing account safety.
Description of the drawings
Fig. 1 is a kind of flow diagram for cipher processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow diagram of cipher processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of structural schematic diagram for encryption processing apparatus that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for encryption processing system that the embodiment of the present invention four provides.
Specific implementation mode
To make those skilled in the art more fully understand technical scheme of the present invention, below in conjunction with the accompanying drawings in the present invention Technical solution carry out clear, complete description, it is clear that described embodiment be the present invention a part of the embodiment, without It is whole embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work Under the premise of the every other embodiment that is obtained, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is a kind of flow diagram for cipher processing method that the present embodiment one provides, as shown in Figure 1, this method packet It includes:
Step 101 receives the user-defined identification that user is sent by first terminal equipment.
Step 102 generates and the user-defined identification pair according to the user-defined identification and the private key for user obtained in advance The sub-key answered.
Cipher processing method provided in this embodiment receives the user-defined identification that user is sent by first terminal equipment, Sub-key corresponding with the user-defined identification, Neng Gouyou are generated according to the user-defined identification and the private key for user obtained in advance The password of multiple accounts of effect record user, the user experience is improved while ensureing account safety.
Embodiment two
Fig. 2 is a kind of flow diagram for cipher processing method that the present embodiment two provides, as shown in Fig. 2, this method packet It includes:
Step 201, encryption processing apparatus send client public key to cloud service platform.
Preferably, cloud service platform and at least one encryption processing apparatus form encryption processing system in the present embodiment.
Client public key is used to encryption processing apparatus carrying out authentication registration on cloud service platform, and client public key can be postal Case or phone number or identification card number etc..
Step 202, cloud service platform generate private key for user corresponding with the client public key according to the client public key.
This step specifically includes:Cloud Server platform firstly generates system Your Majesty key and main system private key pair, further according to Family public key and main system private key generate the corresponding private key for user of client public key.
Different client public key corresponds to different private key for user.It is real that the cipher processing method of the present embodiment is based on SM9 algorithms Existing, the client public key in SM9 algorithms can need to be configured according to user, if client public key could be provided as mailbox, pass through SM9 algorithms calculate the client public key of setting, obtain private key for user corresponding with client public key.
Step 203, cloud service platform send the private key for user to encryption processing apparatus.
Private key for user is that the system level of encryption processing system disperses private key, and be subsequently used for generation encryption processing system is System secondary breakup private key.
Client public key has uniqueness, if after encryption processing apparatus is lost, cloud service platform can be based on the client public key Private key for user corresponding with client public key is generated, and private key for user is reissued to encryption processing apparatus in the case where ensureing safety In.
Step 204, first terminal equipment send trigger signal to encryption processing apparatus.
First terminal equipment can be mobile terminal, it is preferable that first terminal equipment is mobile phone.
The method of first terminal equipment by radio communication is communicated with encryption processing apparatus, sends trigger signal.Such as: Mobile phone is connected by bluetooth with encryption processing apparatus, and trigger signal is sent to encryption processing apparatus through the APP on mobile phone.It touches Signalling can be combination button of the user by first terminal equipment operation.
Step 205, encryption processing apparatus generate user-defined identification pass corresponding with login account according to the trigger signal System.
The user of encryption processing apparatus often has multiple login accounts, such as:Login account can be bank logon account, The login account of all kinds of website log accounts, all kinds of mobile phone application softwares.Trigger signal is for being arranged multiple login accounts and oneself The correspondence of mark is defined, user-defined identification is simple and convenient for memory.Such as:Login account is:Bank of China, setting and China The corresponding user-defined identification of bank is 123, and the correspondence of login account and user-defined identification is:Bank of China -123.
User-defined identification can be configured by user.User-defined identification can be number, letter or Chinese character, with Cipher Processing The user of device convenient for memory and use based on be configured.Such as:The corresponding user-defined identification of Bank of China may be China Bank, the corresponding user-defined identification of Bank of Communications can be Bank of Communications.
Preferably, the login account in the present embodiment is user name, such as:The entitled Bank Account Number of user or log in mailbox or Phone number or identification card number or user's name.
Step 206, encryption processing apparatus store the correspondence of the user-defined identification and login account.
Step 207, first terminal equipment send user-defined identification to encryption processing apparatus.
When the user of encryption processing apparatus needs to log in some login account, self-defined mark is sent through first terminal equipment Know to encryption processing apparatus to obtain login password corresponding with the login account.Specifically, user, which works as, needs login password to step on When recording some login account, by encryption processing apparatus store user-defined identification and login account correspondence inquire with The corresponding user-defined identification of the login account sends user-defined identification to encryption processing apparatus by first terminal equipment.
Optionally, the correspondence of user-defined identification and login account can also be backed up and be stored into first terminal equipment.
Step 208, encryption processing apparatus are from the correspondence of pre-stored user-defined identification and login account, inquiry Go out login account corresponding with user-defined identification, and shows the login account.
Optionally, user logs in the login account of the display as user name.
Step 209, encryption processing apparatus are according to SM9 algorithms, to the private key for user obtained in advance and the user-defined identification It is calculated, disperses sub-key corresponding with the user-defined identification.
Such as:After encryption processing apparatus receives user-defined identification 123, disperse son corresponding with user-defined identification 123 Key, sub-key corresponding with user-defined identification 123 are the login password of Bank of China, and the user of encryption processing apparatus passes through certainly The login password for fast and safely obtaining Bank of China can be realized in definition mark 123.It is close that the present embodiment is based on SM9 algorithms acquisition Key, sub-key are the system secondary breakup private key of encryption processing system, and sub-key passes through private key for user every time without being stored It is calculated with user-defined identification.
You need to add is that there are different format needs to login password in view of different login accounts, such as:Bank steps on The login password for recording account is 6 bit digitals.The cipher processing method of the present embodiment can be directed to the difference of different login accounts Login password format needs generate the sub-key for meeting format needs.
Step 210, encryption processing apparatus show the sub-key.
In the present embodiment, user can be logged in by first terminal equipment using sub-key and login account;Alternatively, with Family can be logged in by second terminal equipment using sub-key and login account.Wherein, second terminal equipment is different from first Terminal device, it is preferable that first terminal equipment is preferably mobile phone, and second terminal equipment is ATM machine or apparatus such as computer.
In practical applications, optionally, user can also by first terminal equipment using sub-key and user-defined identification into Row logs in;Alternatively, user can also be logged in by second terminal using sub-key and user-defined identification.In such cases, may be used Without execute be generated in advance and store user-defined identification and login account correspondence and from user-defined identification and login account Number correspondence in inquire login account the step of, i.e.,:Without executing step 204, step 205, step 206 and step 208.
Sub-key in the present embodiment is formed through SM9 algorithm for encryption, meanwhile, this method provided in this embodiment is based on finance And security level realizes Cipher Processing, can effectively ensure that the login account safety of encryption processing apparatus user.
Further, cloud service platform can also receive the backup request of encryption processing apparatus transmission, and backup request includes User-defined identification, cloud service platform preserve user-defined identification according to backup request and realize backup.
It is understood that the sub-key that the cipher processing method of the present embodiment generates is different from the old close of login account Code, is suitable as the initial password or new password of login account, and user is generated and login account by encryption processing apparatus Without being recorded to the sub-key after sub-key, encryption processing apparatus is needed without the sub-key is stored after user Sub-key can fast and safely only be obtained by user-defined identification corresponding with the login account when login account.
Cipher processing method provided in this embodiment receives the user-defined identification that first terminal equipment is sent, according to described User-defined identification and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification, can effectively record use The password of multiple accounts at family, the user experience is improved while ensureing account safety.
Embodiment three
Fig. 3 is a kind of structural schematic diagram of encryption processing apparatus described in the present embodiment three, as shown in figure 3, the device packet It includes:Receiving module 11 and generation module 12.
Receiving module 11 is for receiving the user-defined identification that user is sent by first terminal equipment.
Generation module 12 be used for according to the user-defined identification and the private key for user obtained in advance generation with it is described self-defined Identify corresponding sub-key.
Further, generation module 12 is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described makes by oneself Justice mark is calculated, and disperses sub-key corresponding with the user-defined identification.
Further, receiving module 11 be additionally operable to receive cloud service platform send private key for user, the private key for user by Cloud service platform is generated according to the client public key of acquisition.
Further, further include enquiry module 13 and display module 14.
Enquiry module 13 is for from the correspondence of pre-stored user-defined identification and login account, inquiring and certainly Definition identifies corresponding login account.
Display module 14 is for showing the login account.
Further, further include memory module 15.
Receiving module 11 is additionally operable to receive the trigger signal that user is sent by first terminal equipment.
Generation module 12 is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal.
Memory module 15 is used to store the correspondence of the user-defined identification and login account.
Further, display module 14 is additionally operable to show the sub-key.
Encryption processing apparatus provided in this embodiment, receiving module receive user and are made by oneself by what first terminal equipment was sent Justice mark, generation module generate corresponding with the user-defined identification according to the user-defined identification and the private key for user obtained in advance Sub-key, which can effectively record the password of multiple accounts of user, use is improved while ensureing account safety It experiences at family.
Example IV
Fig. 4 is a kind of structural schematic diagram of encryption processing system described in the present embodiment four, as shown in figure 4, the system packet It includes:Encryption processing apparatus 1 and first terminal equipment 2.
First terminal equipment 2 is for sending user-defined identification to the encryption processing apparatus 1.
Encryption processing apparatus 1 for receiving the user-defined identification that user is sent by first terminal equipment 2, according to it is described oneself Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
Further, encryption processing apparatus 1 is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described User-defined identification is calculated, and disperses sub-key corresponding with the user-defined identification.
Further, further include cloud service platform 4.
Cloud service platform 4 generates private key for user for obtaining client public key, according to the client public key, sends private key for user To the encryption processing apparatus 1.
Encryption processing apparatus 1 is additionally operable to receive the private key for user that cloud service platform 4 is sent.
Further, encryption processing apparatus 1 is additionally operable to close from pre-stored user-defined identification and the corresponding of login account In system, login account corresponding with user-defined identification is inquired, and show the login account.
Further, encryption processing apparatus 1 is additionally operable to receive the trigger signal that user is sent by first terminal equipment 2, The correspondence that user-defined identification and login account are generated according to the trigger signal stores the user-defined identification and logs in account Number correspondence.
First terminal equipment 2 is additionally operable to send trigger signal to the encryption processing apparatus 1.
Further, which further includes second terminal equipment 3.
Encryption processing apparatus 1 is additionally operable to show the sub-key, so that user is close by the son by first terminal equipment 2 Key logs in login account corresponding with the user-defined identification as login password, or so that user passes through second terminal equipment The sub-key is logged in login account corresponding with the user-defined identification by 3.
First terminal equipment 2 is used to log in step on corresponding with the user-defined identification using the sub-key as login password Record account.
Second terminal equipment 3 is used to log in step on corresponding with the user-defined identification using the sub-key as login password Record account.
Further specifically, encryption processing apparatus 1 includes microcontroller, wireless communication unit, display screen, power supply, power supply Administrative unit and safety element (not shown), encryption processing apparatus 1 by radio communication unit and first terminal equipment 2 into Row communication, wireless communication unit can be bluetooth or WIFI, and encryption processing apparatus 1 shows sub- secret key to second eventually by display screen End equipment 3, encryption processing apparatus 1 ensure the safety of Cipher Processing process by safety element.
Encryption processing system provided in this embodiment, encryption processing apparatus receiving module receive user and are set by first terminal The user-defined identification that preparation is sent, generation module according to the user-defined identification and the private key for user obtained in advance generate with it is described from Definition identifies corresponding sub-key, which can effectively record the password of multiple accounts of user, is ensureing account safety The user experience is improved simultaneously.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.For those skilled in the art, in the essence for not departing from the present invention In the case of refreshing and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.

Claims (18)

1. a kind of cipher processing method, which is characterized in that including:
Receive the user-defined identification that user is sent by first terminal equipment;
Sub-key corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance.
2. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and advance The private key for user of acquisition generates sub-key corresponding with the user-defined identification:
According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse to make by oneself with described Justice identifies corresponding sub-key.
3. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and pre- The private key for user first obtained generates sub-key corresponding with the user-defined identification:
The private key for user that cloud service platform is sent is received, the private key for user is given birth to by cloud service platform according to the client public key of acquisition At.
4. cipher processing method according to claim 1, which is characterized in that set by first terminal in the reception user Further include after the user-defined identification that preparation is sent:
From in the correspondence of pre-stored user-defined identification and login account, login corresponding with user-defined identification is inquired Account, and show the login account.
5. cipher processing method according to claim 4, which is characterized in that described from pre-stored user-defined identification In the correspondence of login account, inquire login account corresponding with user-defined identification, and show the login account it Before further include:
Receive the trigger signal that user is sent by first terminal equipment;
The correspondence of user-defined identification and login account is generated according to the trigger signal;
Store the correspondence of the user-defined identification and login account.
6. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and pre- The private key for user first obtained generates sub-key corresponding with the user-defined identification:
Show the sub-key.
7. a kind of encryption processing apparatus, which is characterized in that including:
Receiving module, the user-defined identification sent by first terminal equipment for receiving user;
Generation module, for being generated and the user-defined identification pair according to the user-defined identification and the private key for user obtained in advance The sub-key answered.
8. encryption processing apparatus according to claim 7, which is characterized in that the generation module is specifically used for according to SM9 Algorithm calculates the private key for user and the user-defined identification that obtain in advance, disperses corresponding with the user-defined identification Sub-key.
9. encryption processing apparatus according to claim 7, which is characterized in that the receiving module is additionally operable to receive cloud service The private key for user that platform is sent, the private key for user are generated by cloud service platform according to the client public key of acquisition.
10. encryption processing apparatus according to claim 7, which is characterized in that further include:
Enquiry module, for from the correspondence of pre-stored user-defined identification and login account, inquire with it is self-defined Identify corresponding login account;
Display module, for showing the login account.
11. encryption processing apparatus according to claim 10, which is characterized in that further include memory module;
The receiving module is additionally operable to receive the trigger signal that user is sent by first terminal equipment;
The generation module is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal;
The memory module, the correspondence for storing the user-defined identification and login account.
12. encryption processing apparatus according to claim 7, it is characterised in that
The display module is additionally operable to show the sub-key.
13. a kind of encryption processing system, which is characterized in that including:
First terminal equipment, for sending user-defined identification to the encryption processing apparatus;
Encryption processing apparatus, the user-defined identification sent by first terminal equipment for receiving user, according to described self-defined Mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
14. encryption processing system according to claim 13, which is characterized in that the encryption processing apparatus is specifically used for root According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse and the user-defined identification Corresponding sub-key.
15. encryption processing system according to claim 13, which is characterized in that further include cloud service platform;
The cloud service platform generates private key for user according to the client public key, sends private key for user for obtaining client public key To the encryption processing apparatus;
The encryption processing apparatus is additionally operable to receive the private key for user that cloud service platform is sent.
16. encryption processing system according to claim 13, which is characterized in that the encryption processing apparatus is additionally operable to from pre- In the correspondence of the user-defined identification and login account that first store, login account corresponding with user-defined identification is inquired, and Show the login account.
17. encryption processing system according to claim 16, which is characterized in that
The encryption processing apparatus is additionally operable to receive the trigger signal that user is sent by first terminal equipment, according to the triggering Signal generates the correspondence of user-defined identification and login account, stores the user-defined identification and the corresponding of login account is closed System;
The first terminal equipment is additionally operable to send trigger signal to the encryption processing apparatus.
18. encryption processing system according to claim 13, which is characterized in that
The encryption processing apparatus is additionally operable to show the sub-key, for user by first terminal equipment by the sub-key Login account corresponding with the user-defined identification is logged in as login password;
Alternatively, the system also includes second terminal equipment;The encryption processing apparatus is additionally operable to show the sub-key, for User regard the sub-key as login password by second terminal equipment and logs in login account corresponding with the user-defined identification Number.
CN201810002119.0A 2018-01-02 2018-01-02 Cipher processing method, apparatus and system Pending CN108282331A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810002119.0A CN108282331A (en) 2018-01-02 2018-01-02 Cipher processing method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810002119.0A CN108282331A (en) 2018-01-02 2018-01-02 Cipher processing method, apparatus and system

Publications (1)

Publication Number Publication Date
CN108282331A true CN108282331A (en) 2018-07-13

Family

ID=62802969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810002119.0A Pending CN108282331A (en) 2018-01-02 2018-01-02 Cipher processing method, apparatus and system

Country Status (1)

Country Link
CN (1) CN108282331A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130774A (en) * 2019-12-26 2020-05-08 北京阿尔山区块链联盟科技有限公司 Password generation method, device and equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227302A (en) * 2015-10-28 2016-01-06 广东欧珀移动通信有限公司 The shared method of password and the shared system of password
CN105915332A (en) * 2016-07-04 2016-08-31 广东工业大学 Cloud storage encryption and dereplication method and cloud storage encryption and dereplication system
CN106357631A (en) * 2016-08-31 2017-01-25 上海卓易科技股份有限公司 Key information management method and cloud server
US20170141923A1 (en) * 2015-11-13 2017-05-18 Verizon Patent And Licensing Inc. Mobile content delivery via toll-free uniform resource locators
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN107277320A (en) * 2017-07-13 2017-10-20 北京视博融合科技有限公司 A kind of safe picture pick-up device encryption method and safe picture pick-up device
CN107395368A (en) * 2017-08-18 2017-11-24 北京无字天书科技有限公司 Without the digital signature method in media environment and solution encapsulating method and decryption method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227302A (en) * 2015-10-28 2016-01-06 广东欧珀移动通信有限公司 The shared method of password and the shared system of password
US20170141923A1 (en) * 2015-11-13 2017-05-18 Verizon Patent And Licensing Inc. Mobile content delivery via toll-free uniform resource locators
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN105915332A (en) * 2016-07-04 2016-08-31 广东工业大学 Cloud storage encryption and dereplication method and cloud storage encryption and dereplication system
CN106357631A (en) * 2016-08-31 2017-01-25 上海卓易科技股份有限公司 Key information management method and cloud server
CN107277320A (en) * 2017-07-13 2017-10-20 北京视博融合科技有限公司 A kind of safe picture pick-up device encryption method and safe picture pick-up device
CN107395368A (en) * 2017-08-18 2017-11-24 北京无字天书科技有限公司 Without the digital signature method in media environment and solution encapsulating method and decryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁峰 ET AL: "《SM9标识密码算法综述》", 《信息安全研究》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111130774A (en) * 2019-12-26 2020-05-08 北京阿尔山区块链联盟科技有限公司 Password generation method, device and equipment

Similar Documents

Publication Publication Date Title
CN106960148B (en) Method and device for distributing equipment identifiers
EP2743855B1 (en) Secure configuration of mobile application
US9451454B2 (en) Mobile device identification for secure device access
CA2504843A1 (en) Providing a user device with a set of access codes
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN104410622A (en) Safety authentication method, client side and system for logging in Web system
CN104092550A (en) Password protection method, system and device
CN102572815A (en) Method, system and device for processing terminal application request
CN103368928A (en) System and method for resetting account password
CN102624687A (en) Networking program user authentication method based on mobile terminal
CN104468108A (en) User identity authentication system and user identity authentication method based on barcode
CN103905399A (en) Account registration management method and apparatus
CN104022878A (en) Film-mounted SIM card and corresponding application authentication system and authentication method
CN104796255A (en) A safety certification method, device and system for a client end
CN103401686A (en) User Internet identity authentication system and application method thereof
CN109089265B (en) Equipment networking management system and method and intelligent equipment
CN109410397B (en) Unlocking method, unlocking system, intelligent terminal and intelligent terminal storage medium
CN106302539A (en) A kind of embedded type WEB safety certifying method
CN105790945A (en) Authentication method, device and system for authenticating user unique identity
CN102624892B (en) A kind of method preventing plug-in client simulation HTTP request
CN103139201A (en) Network strategy acquiring method and data center switchboard
CN108282331A (en) Cipher processing method, apparatus and system
CN105187417A (en) Authority obtaining method and device
CN102780978B (en) Unlocking method and system of smart card
GB2420256A (en) Obtaining data from a server using first and second identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180713