CN108282331A - Cipher processing method, apparatus and system - Google Patents
Cipher processing method, apparatus and system Download PDFInfo
- Publication number
- CN108282331A CN108282331A CN201810002119.0A CN201810002119A CN108282331A CN 108282331 A CN108282331 A CN 108282331A CN 201810002119 A CN201810002119 A CN 201810002119A CN 108282331 A CN108282331 A CN 108282331A
- Authority
- CN
- China
- Prior art keywords
- user
- defined identification
- key
- encryption processing
- login account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
Abstract
The invention discloses a kind of cipher processing method, apparatus and system, this method includes:The user-defined identification that user is sent by first terminal equipment is received, sub-key corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance.The present invention can record the password of multiple login accounts of user while ensuring safety, and cipher processing method is simple and safe, effectively improves user experience.
Description
Technical field
The present invention relates to Cipher Processing technical field, more particularly to a kind of cipher processing method, apparatus and system.
Background technology
At this stage, internet has been fully immersed into daily life, most systems involved by internet or
Website is required to be logined by way of password.With increasing for Internet service, user needs the password remembered also to get over
Come it is more, how to help user remember multiple accounts password become urgent need to resolve the problem of.Excessive for solution password at present
Problem, the main method taken have:Multiple systems or website are remembered using same set of username and password, using system or website
Username and password remembers username and password by Password Management software.But the safety coefficient of the above each method is relatively low, user
Account safety be unable to get guarantee.
Invention content
A kind of cipher processing method of present invention offer, apparatus and system, can record user while ensuring safety
Multiple login accounts password, cipher processing method is simple and safe, effectively improves user experience.
To achieve the above object, the present invention provides a kind of cipher processing methods, including:
Receive the user-defined identification that user is sent by first terminal equipment;
It is close that son corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance
Key.
Optionally, described to be generated and the user-defined identification according to the user-defined identification and the private key for user obtained in advance
Corresponding sub-key includes:
According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse with it is described
The corresponding sub-key of user-defined identification.
Optionally, it is generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance described
Further include before knowing corresponding sub-key:
The private key for user that cloud service platform is sent is received, the private key for user is public according to the user of acquisition by cloud service platform
Key generates.
Optionally, further include after the user-defined identification that the reception user is sent by first terminal equipment:
From in the correspondence of pre-stored user-defined identification and login account, inquire corresponding with user-defined identification
Login account, and show the login account.
Optionally, it described from the correspondence of pre-stored user-defined identification and login account, inquires and oneself
Definition identifies corresponding login account, and further includes before showing the login account:
Receive the trigger signal that user is sent by first terminal equipment;
The correspondence of user-defined identification and login account is generated according to the trigger signal;
Store the correspondence of the user-defined identification and login account.
Optionally, it is generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance described
Knowing corresponding sub-key further includes later:
Show the sub-key.
To achieve the above object, the present invention also provides a kind of encryption processing apparatus, including:
Receiving module, the user-defined identification sent by first terminal equipment for receiving user;
Generation module, for being generated and the self-defined mark according to the user-defined identification and the private key for user obtained in advance
Know corresponding sub-key.
Optionally, the generation module is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described makes by oneself
Justice mark is calculated, and disperses sub-key corresponding with the user-defined identification.
Optionally, the receiving module be additionally operable to receive cloud service platform send private key for user, the private key for user by
Cloud service platform is generated according to the client public key of acquisition.
Optionally, further include:
Enquiry module, for from the correspondence of pre-stored user-defined identification and login account, inquiring and certainly
Definition identifies corresponding login account;
Display module, for showing the login account.
Optionally, further include memory module;
The receiving module is additionally operable to receive the trigger signal that user is sent by first terminal equipment;
The generation module is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal;
The memory module, the correspondence for storing the user-defined identification and login account.
Optionally,
The display module is additionally operable to show the sub-key.
To achieve the above object, the present invention also provides a kind of encryption processing systems, including:
First terminal equipment, for sending user-defined identification to the encryption processing apparatus;
Encryption processing apparatus, the user-defined identification sent by first terminal equipment for receiving user, according to it is described from
Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
Optionally, the encryption processing apparatus is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described
User-defined identification is calculated, and disperses sub-key corresponding with the user-defined identification.
Optionally, further include cloud service platform;
The cloud service platform generates private key for user according to the client public key, sends user for obtaining client public key
Private key is to the encryption processing apparatus;
The encryption processing apparatus is additionally operable to receive the private key for user that cloud service platform is sent.
Optionally, the encryption processing apparatus is additionally operable to close from pre-stored user-defined identification and the corresponding of login account
In system, login account corresponding with user-defined identification is inquired, and show the login account.
Optionally,
The encryption processing apparatus is additionally operable to receive the trigger signal that user is sent by first terminal equipment, according to described
Trigger signal generates the correspondence of user-defined identification and login account, stores the correspondence of the user-defined identification and login account
Relationship;
The first terminal equipment is additionally operable to send trigger signal to the encryption processing apparatus.
Optionally,
The encryption processing apparatus is additionally operable to show the sub-key, for user by first terminal equipment by the son
Key logs in login account corresponding with the user-defined identification as login password;
Alternatively, the system also includes second terminal equipment;The encryption processing apparatus is additionally operable to show the sub-key,
Login password is regard the sub-key as by second terminal equipment for user and logs in step on corresponding with the user-defined identification
Record account.
The invention has the advantages that:
Cipher processing method provided by the invention, receive first terminal equipment send user-defined identification, according to it is described from
Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification, can effectively record user
Multiple accounts password, the user experience is improved while ensureing account safety.
Description of the drawings
Fig. 1 is a kind of flow diagram for cipher processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow diagram of cipher processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of structural schematic diagram for encryption processing apparatus that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for encryption processing system that the embodiment of the present invention four provides.
Specific implementation mode
To make those skilled in the art more fully understand technical scheme of the present invention, below in conjunction with the accompanying drawings in the present invention
Technical solution carry out clear, complete description, it is clear that described embodiment be the present invention a part of the embodiment, without
It is whole embodiment.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work
Under the premise of the every other embodiment that is obtained, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is a kind of flow diagram for cipher processing method that the present embodiment one provides, as shown in Figure 1, this method packet
It includes:
Step 101 receives the user-defined identification that user is sent by first terminal equipment.
Step 102 generates and the user-defined identification pair according to the user-defined identification and the private key for user obtained in advance
The sub-key answered.
Cipher processing method provided in this embodiment receives the user-defined identification that user is sent by first terminal equipment,
Sub-key corresponding with the user-defined identification, Neng Gouyou are generated according to the user-defined identification and the private key for user obtained in advance
The password of multiple accounts of effect record user, the user experience is improved while ensureing account safety.
Embodiment two
Fig. 2 is a kind of flow diagram for cipher processing method that the present embodiment two provides, as shown in Fig. 2, this method packet
It includes:
Step 201, encryption processing apparatus send client public key to cloud service platform.
Preferably, cloud service platform and at least one encryption processing apparatus form encryption processing system in the present embodiment.
Client public key is used to encryption processing apparatus carrying out authentication registration on cloud service platform, and client public key can be postal
Case or phone number or identification card number etc..
Step 202, cloud service platform generate private key for user corresponding with the client public key according to the client public key.
This step specifically includes:Cloud Server platform firstly generates system Your Majesty key and main system private key pair, further according to
Family public key and main system private key generate the corresponding private key for user of client public key.
Different client public key corresponds to different private key for user.It is real that the cipher processing method of the present embodiment is based on SM9 algorithms
Existing, the client public key in SM9 algorithms can need to be configured according to user, if client public key could be provided as mailbox, pass through
SM9 algorithms calculate the client public key of setting, obtain private key for user corresponding with client public key.
Step 203, cloud service platform send the private key for user to encryption processing apparatus.
Private key for user is that the system level of encryption processing system disperses private key, and be subsequently used for generation encryption processing system is
System secondary breakup private key.
Client public key has uniqueness, if after encryption processing apparatus is lost, cloud service platform can be based on the client public key
Private key for user corresponding with client public key is generated, and private key for user is reissued to encryption processing apparatus in the case where ensureing safety
In.
Step 204, first terminal equipment send trigger signal to encryption processing apparatus.
First terminal equipment can be mobile terminal, it is preferable that first terminal equipment is mobile phone.
The method of first terminal equipment by radio communication is communicated with encryption processing apparatus, sends trigger signal.Such as:
Mobile phone is connected by bluetooth with encryption processing apparatus, and trigger signal is sent to encryption processing apparatus through the APP on mobile phone.It touches
Signalling can be combination button of the user by first terminal equipment operation.
Step 205, encryption processing apparatus generate user-defined identification pass corresponding with login account according to the trigger signal
System.
The user of encryption processing apparatus often has multiple login accounts, such as:Login account can be bank logon account,
The login account of all kinds of website log accounts, all kinds of mobile phone application softwares.Trigger signal is for being arranged multiple login accounts and oneself
The correspondence of mark is defined, user-defined identification is simple and convenient for memory.Such as:Login account is:Bank of China, setting and China
The corresponding user-defined identification of bank is 123, and the correspondence of login account and user-defined identification is:Bank of China -123.
User-defined identification can be configured by user.User-defined identification can be number, letter or Chinese character, with Cipher Processing
The user of device convenient for memory and use based on be configured.Such as:The corresponding user-defined identification of Bank of China may be China
Bank, the corresponding user-defined identification of Bank of Communications can be Bank of Communications.
Preferably, the login account in the present embodiment is user name, such as:The entitled Bank Account Number of user or log in mailbox or
Phone number or identification card number or user's name.
Step 206, encryption processing apparatus store the correspondence of the user-defined identification and login account.
Step 207, first terminal equipment send user-defined identification to encryption processing apparatus.
When the user of encryption processing apparatus needs to log in some login account, self-defined mark is sent through first terminal equipment
Know to encryption processing apparatus to obtain login password corresponding with the login account.Specifically, user, which works as, needs login password to step on
When recording some login account, by encryption processing apparatus store user-defined identification and login account correspondence inquire with
The corresponding user-defined identification of the login account sends user-defined identification to encryption processing apparatus by first terminal equipment.
Optionally, the correspondence of user-defined identification and login account can also be backed up and be stored into first terminal equipment.
Step 208, encryption processing apparatus are from the correspondence of pre-stored user-defined identification and login account, inquiry
Go out login account corresponding with user-defined identification, and shows the login account.
Optionally, user logs in the login account of the display as user name.
Step 209, encryption processing apparatus are according to SM9 algorithms, to the private key for user obtained in advance and the user-defined identification
It is calculated, disperses sub-key corresponding with the user-defined identification.
Such as:After encryption processing apparatus receives user-defined identification 123, disperse son corresponding with user-defined identification 123
Key, sub-key corresponding with user-defined identification 123 are the login password of Bank of China, and the user of encryption processing apparatus passes through certainly
The login password for fast and safely obtaining Bank of China can be realized in definition mark 123.It is close that the present embodiment is based on SM9 algorithms acquisition
Key, sub-key are the system secondary breakup private key of encryption processing system, and sub-key passes through private key for user every time without being stored
It is calculated with user-defined identification.
You need to add is that there are different format needs to login password in view of different login accounts, such as:Bank steps on
The login password for recording account is 6 bit digitals.The cipher processing method of the present embodiment can be directed to the difference of different login accounts
Login password format needs generate the sub-key for meeting format needs.
Step 210, encryption processing apparatus show the sub-key.
In the present embodiment, user can be logged in by first terminal equipment using sub-key and login account;Alternatively, with
Family can be logged in by second terminal equipment using sub-key and login account.Wherein, second terminal equipment is different from first
Terminal device, it is preferable that first terminal equipment is preferably mobile phone, and second terminal equipment is ATM machine or apparatus such as computer.
In practical applications, optionally, user can also by first terminal equipment using sub-key and user-defined identification into
Row logs in;Alternatively, user can also be logged in by second terminal using sub-key and user-defined identification.In such cases, may be used
Without execute be generated in advance and store user-defined identification and login account correspondence and from user-defined identification and login account
Number correspondence in inquire login account the step of, i.e.,:Without executing step 204, step 205, step 206 and step 208.
Sub-key in the present embodiment is formed through SM9 algorithm for encryption, meanwhile, this method provided in this embodiment is based on finance
And security level realizes Cipher Processing, can effectively ensure that the login account safety of encryption processing apparatus user.
Further, cloud service platform can also receive the backup request of encryption processing apparatus transmission, and backup request includes
User-defined identification, cloud service platform preserve user-defined identification according to backup request and realize backup.
It is understood that the sub-key that the cipher processing method of the present embodiment generates is different from the old close of login account
Code, is suitable as the initial password or new password of login account, and user is generated and login account by encryption processing apparatus
Without being recorded to the sub-key after sub-key, encryption processing apparatus is needed without the sub-key is stored after user
Sub-key can fast and safely only be obtained by user-defined identification corresponding with the login account when login account.
Cipher processing method provided in this embodiment receives the user-defined identification that first terminal equipment is sent, according to described
User-defined identification and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification, can effectively record use
The password of multiple accounts at family, the user experience is improved while ensureing account safety.
Embodiment three
Fig. 3 is a kind of structural schematic diagram of encryption processing apparatus described in the present embodiment three, as shown in figure 3, the device packet
It includes:Receiving module 11 and generation module 12.
Receiving module 11 is for receiving the user-defined identification that user is sent by first terminal equipment.
Generation module 12 be used for according to the user-defined identification and the private key for user obtained in advance generation with it is described self-defined
Identify corresponding sub-key.
Further, generation module 12 is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described makes by oneself
Justice mark is calculated, and disperses sub-key corresponding with the user-defined identification.
Further, receiving module 11 be additionally operable to receive cloud service platform send private key for user, the private key for user by
Cloud service platform is generated according to the client public key of acquisition.
Further, further include enquiry module 13 and display module 14.
Enquiry module 13 is for from the correspondence of pre-stored user-defined identification and login account, inquiring and certainly
Definition identifies corresponding login account.
Display module 14 is for showing the login account.
Further, further include memory module 15.
Receiving module 11 is additionally operable to receive the trigger signal that user is sent by first terminal equipment.
Generation module 12 is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal.
Memory module 15 is used to store the correspondence of the user-defined identification and login account.
Further, display module 14 is additionally operable to show the sub-key.
Encryption processing apparatus provided in this embodiment, receiving module receive user and are made by oneself by what first terminal equipment was sent
Justice mark, generation module generate corresponding with the user-defined identification according to the user-defined identification and the private key for user obtained in advance
Sub-key, which can effectively record the password of multiple accounts of user, use is improved while ensureing account safety
It experiences at family.
Example IV
Fig. 4 is a kind of structural schematic diagram of encryption processing system described in the present embodiment four, as shown in figure 4, the system packet
It includes:Encryption processing apparatus 1 and first terminal equipment 2.
First terminal equipment 2 is for sending user-defined identification to the encryption processing apparatus 1.
Encryption processing apparatus 1 for receiving the user-defined identification that user is sent by first terminal equipment 2, according to it is described oneself
Definition mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
Further, encryption processing apparatus 1 is specifically used for according to SM9 algorithms, the private key for user to obtaining in advance and described
User-defined identification is calculated, and disperses sub-key corresponding with the user-defined identification.
Further, further include cloud service platform 4.
Cloud service platform 4 generates private key for user for obtaining client public key, according to the client public key, sends private key for user
To the encryption processing apparatus 1.
Encryption processing apparatus 1 is additionally operable to receive the private key for user that cloud service platform 4 is sent.
Further, encryption processing apparatus 1 is additionally operable to close from pre-stored user-defined identification and the corresponding of login account
In system, login account corresponding with user-defined identification is inquired, and show the login account.
Further, encryption processing apparatus 1 is additionally operable to receive the trigger signal that user is sent by first terminal equipment 2,
The correspondence that user-defined identification and login account are generated according to the trigger signal stores the user-defined identification and logs in account
Number correspondence.
First terminal equipment 2 is additionally operable to send trigger signal to the encryption processing apparatus 1.
Further, which further includes second terminal equipment 3.
Encryption processing apparatus 1 is additionally operable to show the sub-key, so that user is close by the son by first terminal equipment 2
Key logs in login account corresponding with the user-defined identification as login password, or so that user passes through second terminal equipment
The sub-key is logged in login account corresponding with the user-defined identification by 3.
First terminal equipment 2 is used to log in step on corresponding with the user-defined identification using the sub-key as login password
Record account.
Second terminal equipment 3 is used to log in step on corresponding with the user-defined identification using the sub-key as login password
Record account.
Further specifically, encryption processing apparatus 1 includes microcontroller, wireless communication unit, display screen, power supply, power supply
Administrative unit and safety element (not shown), encryption processing apparatus 1 by radio communication unit and first terminal equipment 2 into
Row communication, wireless communication unit can be bluetooth or WIFI, and encryption processing apparatus 1 shows sub- secret key to second eventually by display screen
End equipment 3, encryption processing apparatus 1 ensure the safety of Cipher Processing process by safety element.
Encryption processing system provided in this embodiment, encryption processing apparatus receiving module receive user and are set by first terminal
The user-defined identification that preparation is sent, generation module according to the user-defined identification and the private key for user obtained in advance generate with it is described from
Definition identifies corresponding sub-key, which can effectively record the password of multiple accounts of user, is ensureing account safety
The user experience is improved simultaneously.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses
Mode, however the present invention is not limited thereto.For those skilled in the art, in the essence for not departing from the present invention
In the case of refreshing and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.
Claims (18)
1. a kind of cipher processing method, which is characterized in that including:
Receive the user-defined identification that user is sent by first terminal equipment;
Sub-key corresponding with the user-defined identification is generated according to the user-defined identification and the private key for user obtained in advance.
2. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and advance
The private key for user of acquisition generates sub-key corresponding with the user-defined identification:
According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse to make by oneself with described
Justice identifies corresponding sub-key.
3. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and pre-
The private key for user first obtained generates sub-key corresponding with the user-defined identification:
The private key for user that cloud service platform is sent is received, the private key for user is given birth to by cloud service platform according to the client public key of acquisition
At.
4. cipher processing method according to claim 1, which is characterized in that set by first terminal in the reception user
Further include after the user-defined identification that preparation is sent:
From in the correspondence of pre-stored user-defined identification and login account, login corresponding with user-defined identification is inquired
Account, and show the login account.
5. cipher processing method according to claim 4, which is characterized in that described from pre-stored user-defined identification
In the correspondence of login account, inquire login account corresponding with user-defined identification, and show the login account it
Before further include:
Receive the trigger signal that user is sent by first terminal equipment;
The correspondence of user-defined identification and login account is generated according to the trigger signal;
Store the correspondence of the user-defined identification and login account.
6. cipher processing method according to claim 1, which is characterized in that described according to the user-defined identification and pre-
The private key for user first obtained generates sub-key corresponding with the user-defined identification:
Show the sub-key.
7. a kind of encryption processing apparatus, which is characterized in that including:
Receiving module, the user-defined identification sent by first terminal equipment for receiving user;
Generation module, for being generated and the user-defined identification pair according to the user-defined identification and the private key for user obtained in advance
The sub-key answered.
8. encryption processing apparatus according to claim 7, which is characterized in that the generation module is specifically used for according to SM9
Algorithm calculates the private key for user and the user-defined identification that obtain in advance, disperses corresponding with the user-defined identification
Sub-key.
9. encryption processing apparatus according to claim 7, which is characterized in that the receiving module is additionally operable to receive cloud service
The private key for user that platform is sent, the private key for user are generated by cloud service platform according to the client public key of acquisition.
10. encryption processing apparatus according to claim 7, which is characterized in that further include:
Enquiry module, for from the correspondence of pre-stored user-defined identification and login account, inquire with it is self-defined
Identify corresponding login account;
Display module, for showing the login account.
11. encryption processing apparatus according to claim 10, which is characterized in that further include memory module;
The receiving module is additionally operable to receive the trigger signal that user is sent by first terminal equipment;
The generation module is additionally operable to generate the correspondence of user-defined identification and login account according to the trigger signal;
The memory module, the correspondence for storing the user-defined identification and login account.
12. encryption processing apparatus according to claim 7, it is characterised in that
The display module is additionally operable to show the sub-key.
13. a kind of encryption processing system, which is characterized in that including:
First terminal equipment, for sending user-defined identification to the encryption processing apparatus;
Encryption processing apparatus, the user-defined identification sent by first terminal equipment for receiving user, according to described self-defined
Mark and the private key for user obtained in advance generate sub-key corresponding with the user-defined identification.
14. encryption processing system according to claim 13, which is characterized in that the encryption processing apparatus is specifically used for root
According to SM9 algorithms, the private key for user and the user-defined identification that obtain in advance are calculated, disperse and the user-defined identification
Corresponding sub-key.
15. encryption processing system according to claim 13, which is characterized in that further include cloud service platform;
The cloud service platform generates private key for user according to the client public key, sends private key for user for obtaining client public key
To the encryption processing apparatus;
The encryption processing apparatus is additionally operable to receive the private key for user that cloud service platform is sent.
16. encryption processing system according to claim 13, which is characterized in that the encryption processing apparatus is additionally operable to from pre-
In the correspondence of the user-defined identification and login account that first store, login account corresponding with user-defined identification is inquired, and
Show the login account.
17. encryption processing system according to claim 16, which is characterized in that
The encryption processing apparatus is additionally operable to receive the trigger signal that user is sent by first terminal equipment, according to the triggering
Signal generates the correspondence of user-defined identification and login account, stores the user-defined identification and the corresponding of login account is closed
System;
The first terminal equipment is additionally operable to send trigger signal to the encryption processing apparatus.
18. encryption processing system according to claim 13, which is characterized in that
The encryption processing apparatus is additionally operable to show the sub-key, for user by first terminal equipment by the sub-key
Login account corresponding with the user-defined identification is logged in as login password;
Alternatively, the system also includes second terminal equipment;The encryption processing apparatus is additionally operable to show the sub-key, for
User regard the sub-key as login password by second terminal equipment and logs in login account corresponding with the user-defined identification
Number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810002119.0A CN108282331A (en) | 2018-01-02 | 2018-01-02 | Cipher processing method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810002119.0A CN108282331A (en) | 2018-01-02 | 2018-01-02 | Cipher processing method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108282331A true CN108282331A (en) | 2018-07-13 |
Family
ID=62802969
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810002119.0A Pending CN108282331A (en) | 2018-01-02 | 2018-01-02 | Cipher processing method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108282331A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111130774A (en) * | 2019-12-26 | 2020-05-08 | 北京阿尔山区块链联盟科技有限公司 | Password generation method, device and equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227302A (en) * | 2015-10-28 | 2016-01-06 | 广东欧珀移动通信有限公司 | The shared method of password and the shared system of password |
CN105915332A (en) * | 2016-07-04 | 2016-08-31 | 广东工业大学 | Cloud storage encryption and dereplication method and cloud storage encryption and dereplication system |
CN106357631A (en) * | 2016-08-31 | 2017-01-25 | 上海卓易科技股份有限公司 | Key information management method and cloud server |
US20170141923A1 (en) * | 2015-11-13 | 2017-05-18 | Verizon Patent And Licensing Inc. | Mobile content delivery via toll-free uniform resource locators |
CN106789848A (en) * | 2015-11-23 | 2017-05-31 | 阿里巴巴集团控股有限公司 | A kind of user key storage method and server |
CN107277320A (en) * | 2017-07-13 | 2017-10-20 | 北京视博融合科技有限公司 | A kind of safe picture pick-up device encryption method and safe picture pick-up device |
CN107395368A (en) * | 2017-08-18 | 2017-11-24 | 北京无字天书科技有限公司 | Without the digital signature method in media environment and solution encapsulating method and decryption method |
-
2018
- 2018-01-02 CN CN201810002119.0A patent/CN108282331A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227302A (en) * | 2015-10-28 | 2016-01-06 | 广东欧珀移动通信有限公司 | The shared method of password and the shared system of password |
US20170141923A1 (en) * | 2015-11-13 | 2017-05-18 | Verizon Patent And Licensing Inc. | Mobile content delivery via toll-free uniform resource locators |
CN106789848A (en) * | 2015-11-23 | 2017-05-31 | 阿里巴巴集团控股有限公司 | A kind of user key storage method and server |
CN105915332A (en) * | 2016-07-04 | 2016-08-31 | 广东工业大学 | Cloud storage encryption and dereplication method and cloud storage encryption and dereplication system |
CN106357631A (en) * | 2016-08-31 | 2017-01-25 | 上海卓易科技股份有限公司 | Key information management method and cloud server |
CN107277320A (en) * | 2017-07-13 | 2017-10-20 | 北京视博融合科技有限公司 | A kind of safe picture pick-up device encryption method and safe picture pick-up device |
CN107395368A (en) * | 2017-08-18 | 2017-11-24 | 北京无字天书科技有限公司 | Without the digital signature method in media environment and solution encapsulating method and decryption method |
Non-Patent Citations (1)
Title |
---|
袁峰 ET AL: "《SM9标识密码算法综述》", 《信息安全研究》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111130774A (en) * | 2019-12-26 | 2020-05-08 | 北京阿尔山区块链联盟科技有限公司 | Password generation method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106960148B (en) | Method and device for distributing equipment identifiers | |
EP2743855B1 (en) | Secure configuration of mobile application | |
US9451454B2 (en) | Mobile device identification for secure device access | |
CA2504843A1 (en) | Providing a user device with a set of access codes | |
CN104952128A (en) | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof | |
CN104410622A (en) | Safety authentication method, client side and system for logging in Web system | |
CN104092550A (en) | Password protection method, system and device | |
CN102572815A (en) | Method, system and device for processing terminal application request | |
CN103368928A (en) | System and method for resetting account password | |
CN102624687A (en) | Networking program user authentication method based on mobile terminal | |
CN104468108A (en) | User identity authentication system and user identity authentication method based on barcode | |
CN103905399A (en) | Account registration management method and apparatus | |
CN104022878A (en) | Film-mounted SIM card and corresponding application authentication system and authentication method | |
CN104796255A (en) | A safety certification method, device and system for a client end | |
CN103401686A (en) | User Internet identity authentication system and application method thereof | |
CN109089265B (en) | Equipment networking management system and method and intelligent equipment | |
CN109410397B (en) | Unlocking method, unlocking system, intelligent terminal and intelligent terminal storage medium | |
CN106302539A (en) | A kind of embedded type WEB safety certifying method | |
CN105790945A (en) | Authentication method, device and system for authenticating user unique identity | |
CN102624892B (en) | A kind of method preventing plug-in client simulation HTTP request | |
CN103139201A (en) | Network strategy acquiring method and data center switchboard | |
CN108282331A (en) | Cipher processing method, apparatus and system | |
CN105187417A (en) | Authority obtaining method and device | |
CN102780978B (en) | Unlocking method and system of smart card | |
GB2420256A (en) | Obtaining data from a server using first and second identifiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180713 |