CN108322442A - A kind of special line encrypted authentication system - Google Patents

A kind of special line encrypted authentication system Download PDF

Info

Publication number
CN108322442A
CN108322442A CN201711477234.5A CN201711477234A CN108322442A CN 108322442 A CN108322442 A CN 108322442A CN 201711477234 A CN201711477234 A CN 201711477234A CN 108322442 A CN108322442 A CN 108322442A
Authority
CN
China
Prior art keywords
authentication system
encrypted authentication
special line
encryption
line encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711477234.5A
Other languages
Chinese (zh)
Inventor
罗志昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yaguang Mdt Infotech Ltd
Original Assignee
Guangzhou Yaguang Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yaguang Mdt Infotech Ltd filed Critical Guangzhou Yaguang Mdt Infotech Ltd
Priority to CN201711477234.5A priority Critical patent/CN108322442A/en
Publication of CN108322442A publication Critical patent/CN108322442A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Abstract

The invention discloses a kind of special line encrypted authentication system, the element of the special line encrypted authentication system includes:Algorithm and secret key;The encryption method of the special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.The present invention effectively prevent enterprise's classified papers to leak, and is relatively isolated computer, suspension, cancels for USB interface these measures, can reduce the influence to person works to greatest extent with encryption software, will not reduce working efficiency.The Technical comparing of some encryption softwares on the market is advanced now, for example uses kernel-driven grade file ciphering technology, 256 high strength encrypting algorithms.Encryption file is normally interacted in internal institution file, once unauthorized disengaging identity network, file shows mess code or can not open.

Description

A kind of special line encrypted authentication system
Technical field
The present invention relates to a kind of encrypted authentication system, specifically a kind of special line encrypted authentication system belongs to encryption technology neck Domain.
Background technology
Encryption technology is the main security secrecy provision that e-commerce is taken, and is most common safe and secret means, is utilized Important data are become mess code (encryption) transmission by technological means, are restored again with identical or different means after arriving at (decryption).The application of encryption technology is application various but most commonly used or in e-commerce and VPN, it is deep by Users' likes.
Existing encrypted authentication system is simultaneously not perfect, this allow for encryption certification effect be not achieved it is best, for information protect The progress of shield brings huge obstruction.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of special line encrypted authentication system, which is characterized in that described The element of special line encrypted authentication system includes:Algorithm and secret key.
Preferably, the algorithm is defined as:By common text or the information being appreciated that and string number key In conjunction with the step of generating impenetrable ciphertext.
Preferably, the algorithm is defined as:For a kind of algorithm coded and decoded to data.
Preferably, the encryption method of the special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.
Preferably, the symmetric encryption method is:Use symmetric cryptography coding techniques, its feature be file encryption and Decryption uses identical key, i.e. encryption key to be also used as decruption key.
Preferably, the symmetric encryption method is:The communication two party on unsafe media is allowed to exchange information, safety The key that ground is reached an agreement.
The beneficial effects of the invention are as follows:This method effectively prevent enterprise's classified papers to leak, be relatively isolated computer, suspension, For these measures of cancellation USB interface, the influence to person works can be reduced to greatest extent with encryption software, will not reduce work Make efficiency.The Technical comparing of some encryption softwares on the market is advanced now, for example uses kernel-driven grade file ciphering technology, 256 high strength encrypting algorithms.Encryption file is normally interacted in internal institution file, once unauthorized disengaging identity network, text Part shows mess code or can not open.
Specific implementation mode
The technical scheme in the embodiments of the invention will be clearly and completely described below.Obviously, described implementation Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common The every other embodiment that technical staff is obtained without making creative work belongs to the model that the present invention protects It encloses.
A kind of special line encrypted authentication system, the element of special line encrypted authentication system include:Algorithm and secret key.
Preferably, algorithm is defined as:By the combination of common text or the information and string number key that are appreciated that, The step of generating impenetrable ciphertext.
Preferably, algorithm is defined as:For a kind of algorithm coded and decoded to data.
Preferably, the encryption method of special line encrypted authentication system includes:Symmetric cryptography and asymmetric encryption.
Preferably, symmetric encryption method is:Symmetric cryptography coding techniques is used, its feature is file encryption and decryption Using identical key, i.e. encryption key is also used as decruption key.
Preferably, symmetric encryption method is:Allow the communication two party on unsafe media to exchange information, safely reaches At consistent key.
Embodiment provided above is the better embodiment of the present invention, only is used for facilitating illustrating the present invention, not to this hair It is bright to make any form of restriction, any those of ordinary skill in the art, if not departing from the put forward skill of the present invention In the range of art feature, using the equivalent embodiment for locally changing or modifying made by disclosed technology contents, and Without departing from the technical feature content of the present invention, in the range of still falling within the technology of the present invention feature.

Claims (6)

1. a kind of special line encrypted authentication system, which is characterized in that the element of the special line encrypted authentication system includes:Algorithm and secret Key.
2. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the algorithm is defined as:It will be general The combination of logical text or the information and string number key that are appreciated that, the step of generating impenetrable ciphertext.
3. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the algorithm is defined as:It is used for A kind of algorithm that data are coded and decoded.
4. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the special line encrypted authentication system Encryption method include:Symmetric cryptography and asymmetric encryption.
5. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the symmetric encryption method is: Symmetric cryptography coding techniques is used, its feature is that file encryption and decryption use identical key, i.e. encryption key also may be used For use as decruption key.
6. a kind of special line encrypted authentication system according to claim 1, which is characterized in that the symmetric encryption method is: The communication two party on unsafe media is allowed to exchange information, the key safely reached an agreement.
CN201711477234.5A 2017-12-29 2017-12-29 A kind of special line encrypted authentication system Pending CN108322442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711477234.5A CN108322442A (en) 2017-12-29 2017-12-29 A kind of special line encrypted authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711477234.5A CN108322442A (en) 2017-12-29 2017-12-29 A kind of special line encrypted authentication system

Publications (1)

Publication Number Publication Date
CN108322442A true CN108322442A (en) 2018-07-24

Family

ID=62894202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711477234.5A Pending CN108322442A (en) 2017-12-29 2017-12-29 A kind of special line encrypted authentication system

Country Status (1)

Country Link
CN (1) CN108322442A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160021075A1 (en) * 2012-09-17 2016-01-21 Google Technology Holdings LLC Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc)
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN106973056A (en) * 2017-03-30 2017-07-21 中国电力科学研究院 The safety chip and its encryption method of a kind of object-oriented
CN107046466A (en) * 2017-05-11 2017-08-15 广东网金控股股份有限公司 A kind of online key exchange method and system
CN107306254A (en) * 2016-04-21 2017-10-31 北京印刷学院 Digital literary property protection method and system based on double layer encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160021075A1 (en) * 2012-09-17 2016-01-21 Google Technology Holdings LLC Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc)
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN107306254A (en) * 2016-04-21 2017-10-31 北京印刷学院 Digital literary property protection method and system based on double layer encryption
CN106973056A (en) * 2017-03-30 2017-07-21 中国电力科学研究院 The safety chip and its encryption method of a kind of object-oriented
CN107046466A (en) * 2017-05-11 2017-08-15 广东网金控股股份有限公司 A kind of online key exchange method and system

Similar Documents

Publication Publication Date Title
CN204595860U (en) A kind of memory device encryption bridge
CN102710414B (en) Randomized document block encryption method
CN101115060B (en) Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN105956496A (en) Security and secrecy method for sharing storage files
CN108768990A (en) It is a kind of that encryption method can search for based on block chain
CN104243494B (en) A kind of data processing method
CN101350724A (en) Encrypting method base on biology characteristic information
CN106411515B (en) The method and system for promoting key safety are split to key using cipher machine
CN102082790A (en) Method and device for encryption/decryption of digital signature
CN108134671A (en) A kind of transparent encryption system and its encipher-decipher method based on quantum true random number
CN107342854A (en) The encrypting and decrypting method and intelligent access control system of gate inhibition's Quick Response Code authority information
CN102347836A (en) Electronic document protected view system and method
CN107784207A (en) Display methods, device, equipment and the storage medium at financial APP interfaces
CN106203137B (en) A kind of classified papers access safety system
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN109510702A (en) A method of it key storage based on computer characteristic code and uses
CN104376270A (en) File protection method and system
CN109614810A (en) Data encryption and decryption method based on fingerprint
CN106789046B (en) Method for realizing self-generating key pair
CN107633177A (en) A kind of file management method of graded encryption
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN108322442A (en) A kind of special line encrypted authentication system
CN107689867B (en) Key protection method and system under open environment
CN101945099B (en) Smart card external authentication method
CN111541652B (en) System for improving security of secret information keeping and transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180724

RJ01 Rejection of invention patent application after publication