CN108322442A - A kind of special line encrypted authentication system - Google Patents
A kind of special line encrypted authentication system Download PDFInfo
- Publication number
- CN108322442A CN108322442A CN201711477234.5A CN201711477234A CN108322442A CN 108322442 A CN108322442 A CN 108322442A CN 201711477234 A CN201711477234 A CN 201711477234A CN 108322442 A CN108322442 A CN 108322442A
- Authority
- CN
- China
- Prior art keywords
- authentication system
- encrypted authentication
- special line
- encryption
- line encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Abstract
The invention discloses a kind of special line encrypted authentication system, the element of the special line encrypted authentication system includes:Algorithm and secret key;The encryption method of the special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.The present invention effectively prevent enterprise's classified papers to leak, and is relatively isolated computer, suspension, cancels for USB interface these measures, can reduce the influence to person works to greatest extent with encryption software, will not reduce working efficiency.The Technical comparing of some encryption softwares on the market is advanced now, for example uses kernel-driven grade file ciphering technology, 256 high strength encrypting algorithms.Encryption file is normally interacted in internal institution file, once unauthorized disengaging identity network, file shows mess code or can not open.
Description
Technical field
The present invention relates to a kind of encrypted authentication system, specifically a kind of special line encrypted authentication system belongs to encryption technology neck
Domain.
Background technology
Encryption technology is the main security secrecy provision that e-commerce is taken, and is most common safe and secret means, is utilized
Important data are become mess code (encryption) transmission by technological means, are restored again with identical or different means after arriving at
(decryption).The application of encryption technology is application various but most commonly used or in e-commerce and VPN, it is deep by
Users' likes.
Existing encrypted authentication system is simultaneously not perfect, this allow for encryption certification effect be not achieved it is best, for information protect
The progress of shield brings huge obstruction.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of special line encrypted authentication system, which is characterized in that described
The element of special line encrypted authentication system includes:Algorithm and secret key.
Preferably, the algorithm is defined as:By common text or the information being appreciated that and string number key
In conjunction with the step of generating impenetrable ciphertext.
Preferably, the algorithm is defined as:For a kind of algorithm coded and decoded to data.
Preferably, the encryption method of the special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.
Preferably, the symmetric encryption method is:Use symmetric cryptography coding techniques, its feature be file encryption and
Decryption uses identical key, i.e. encryption key to be also used as decruption key.
Preferably, the symmetric encryption method is:The communication two party on unsafe media is allowed to exchange information, safety
The key that ground is reached an agreement.
The beneficial effects of the invention are as follows:This method effectively prevent enterprise's classified papers to leak, be relatively isolated computer, suspension,
For these measures of cancellation USB interface, the influence to person works can be reduced to greatest extent with encryption software, will not reduce work
Make efficiency.The Technical comparing of some encryption softwares on the market is advanced now, for example uses kernel-driven grade file ciphering technology,
256 high strength encrypting algorithms.Encryption file is normally interacted in internal institution file, once unauthorized disengaging identity network, text
Part shows mess code or can not open.
Specific implementation mode
The technical scheme in the embodiments of the invention will be clearly and completely described below.Obviously, described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
The every other embodiment that technical staff is obtained without making creative work belongs to the model that the present invention protects
It encloses.
A kind of special line encrypted authentication system, the element of special line encrypted authentication system include:Algorithm and secret key.
Preferably, algorithm is defined as:By the combination of common text or the information and string number key that are appreciated that,
The step of generating impenetrable ciphertext.
Preferably, algorithm is defined as:For a kind of algorithm coded and decoded to data.
Preferably, the encryption method of special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.
Preferably, symmetric encryption method is:Symmetric cryptography coding techniques is used, its feature is file encryption and decryption
Using identical key, i.e. encryption key is also used as decruption key.
Preferably, symmetric encryption method is:Allow the communication two party on unsafe media to exchange information, safely reaches
At consistent key.
Embodiment provided above is the better embodiment of the present invention, only is used for facilitating illustrating the present invention, not to this hair
It is bright to make any form of restriction, any those of ordinary skill in the art, if not departing from the put forward skill of the present invention
In the range of art feature, using the equivalent embodiment for locally changing or modifying made by disclosed technology contents, and
Without departing from the technical feature content of the present invention, in the range of still falling within the technology of the present invention feature.
Claims (6)
1. a kind of special line encrypted authentication system, which is characterized in that the element of the special line encrypted authentication system includes:Algorithm and secret
Key.
2. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the algorithm is defined as:It will be general
The combination of logical text or the information and string number key that are appreciated that, the step of generating impenetrable ciphertext.
3. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the algorithm is defined as:It is used for
A kind of algorithm that data are coded and decoded.
4. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the special line encrypted authentication system
Encryption method include:Symmetric cryptography and asymmetric encryption.
5. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the symmetric encryption method is:
Symmetric cryptography coding techniques is used, its feature is that file encryption and decryption use identical key, i.e. encryption key also may be used
For use as decruption key.
6. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the symmetric encryption method is:
The communication two party on unsafe media is allowed to exchange information, the key safely reached an agreement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711477234.5A CN108322442A (en) | 2017-12-29 | 2017-12-29 | A kind of special line encrypted authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711477234.5A CN108322442A (en) | 2017-12-29 | 2017-12-29 | A kind of special line encrypted authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108322442A true CN108322442A (en) | 2018-07-24 |
Family
ID=62894202
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711477234.5A Pending CN108322442A (en) | 2017-12-29 | 2017-12-29 | A kind of special line encrypted authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108322442A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160021075A1 (en) * | 2012-09-17 | 2016-01-21 | Google Technology Holdings LLC | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc) |
CN106921638A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of safety device based on asymmetric encryption |
CN106973056A (en) * | 2017-03-30 | 2017-07-21 | 中国电力科学研究院 | The safety chip and its encryption method of a kind of object-oriented |
CN107046466A (en) * | 2017-05-11 | 2017-08-15 | 广东网金控股股份有限公司 | A kind of online key exchange method and system |
CN107306254A (en) * | 2016-04-21 | 2017-10-31 | 北京印刷学院 | Digital literary property protection method and system based on double layer encryption |
-
2017
- 2017-12-29 CN CN201711477234.5A patent/CN108322442A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160021075A1 (en) * | 2012-09-17 | 2016-01-21 | Google Technology Holdings LLC | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc) |
CN106921638A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | A kind of safety device based on asymmetric encryption |
CN107306254A (en) * | 2016-04-21 | 2017-10-31 | 北京印刷学院 | Digital literary property protection method and system based on double layer encryption |
CN106973056A (en) * | 2017-03-30 | 2017-07-21 | 中国电力科学研究院 | The safety chip and its encryption method of a kind of object-oriented |
CN107046466A (en) * | 2017-05-11 | 2017-08-15 | 广东网金控股股份有限公司 | A kind of online key exchange method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN204595860U (en) | A kind of memory device encryption bridge | |
CN102710414B (en) | Randomized document block encryption method | |
CN101115060B (en) | Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system | |
CN105956496A (en) | Security and secrecy method for sharing storage files | |
CN108768990A (en) | It is a kind of that encryption method can search for based on block chain | |
CN104243494B (en) | A kind of data processing method | |
CN101350724A (en) | Encrypting method base on biology characteristic information | |
CN106411515B (en) | The method and system for promoting key safety are split to key using cipher machine | |
CN102082790A (en) | Method and device for encryption/decryption of digital signature | |
CN108134671A (en) | A kind of transparent encryption system and its encipher-decipher method based on quantum true random number | |
CN107342854A (en) | The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information | |
CN102347836A (en) | Electronic document protected view system and method | |
CN107784207A (en) | Display methods, device, equipment and the storage medium at financial APP interfaces | |
CN106203137B (en) | A kind of classified papers access safety system | |
CN103338106A (en) | Methods and devices for ciphering and deciphering file | |
CN109510702A (en) | A method of it key storage based on computer characteristic code and uses | |
CN104376270A (en) | File protection method and system | |
CN109614810A (en) | Data encryption and decryption method based on fingerprint | |
CN106789046B (en) | Method for realizing self-generating key pair | |
CN107633177A (en) | A kind of file management method of graded encryption | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN108322442A (en) | A kind of special line encrypted authentication system | |
CN107689867B (en) | Key protection method and system under open environment | |
CN101945099B (en) | Smart card external authentication method | |
CN111541652B (en) | System for improving security of secret information keeping and transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180724 |
|
RJ01 | Rejection of invention patent application after publication |