CN108667603A - The cipher key processing method of electronic pen - Google Patents

The cipher key processing method of electronic pen Download PDF

Info

Publication number
CN108667603A
CN108667603A CN201710215039.9A CN201710215039A CN108667603A CN 108667603 A CN108667603 A CN 108667603A CN 201710215039 A CN201710215039 A CN 201710215039A CN 108667603 A CN108667603 A CN 108667603A
Authority
CN
China
Prior art keywords
license
data
key
encryption key
electronic pen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710215039.9A
Other languages
Chinese (zh)
Inventor
田雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TSTUDY TECHNOLOGY Co.,Ltd.
Original Assignee
田雪松
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 田雪松 filed Critical 田雪松
Priority to CN201710215039.9A priority Critical patent/CN108667603A/en
Publication of CN108667603A publication Critical patent/CN108667603A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The present embodiments relate to a kind of cipher key processing methods of electronic pen, including:Application server generates the first encryption key and the second encryption key, wherein the second encryption key is corresponding with the first encryption key;Second encryption key is installed to application server;First encryption key and license data are sent to control terminal, wherein license data includes the geographic norms for having position data;Receive the digital signature information that control terminal is sent, wherein digital signature information includes the second encryption key and digital signature license data;Verify data is obtained from control terminal, wherein verify data includes verification digital signature information and verify data chain;It is associated with license data and the first encryption key;It generates and applies License Info, and license data information is sent to electronic pen, wherein using License Info include license data, digital signature information and license validation data.

Description

The cipher key processing method of electronic pen
Technical field
The present invention relates to technical field of information processing more particularly to a kind of cipher key processing methods of electronic pen.
Background technology
With the rapid development of information technology, people are increasingly commonly produced, are handled, exchanged and propagated using computer Various forms of information.Information technology gradually changes the traditional living habit of people.People, which start with detection device, to be had There are mobile input information, server on the paper or electronic display of symbol pattern to pass through in detection device moving process Change in location is calculated, and is carried out the information of recognition detection equipment input and is shown or executed corresponding instruction to solve to pass System by paper and pen write in the way of can not carry out information process- the problem of.However, being detected in existing technology Communication security between equipment and server uses authorization, but lower detection device of normal conditions is known by multiple servers When other, the information transmitted is easy to be misinformated and service is caused to terminate.
Invention content
The purpose of the present invention is in view of the drawbacks of the prior art, providing a kind of cipher key processing method of electronic pen, pass through by The geographic norms for being directed toward the position data of different application server are associated with each encryption key, add so that only corresponding to The application server of the encryption key of the close position data could utilize the position data, at other application servers In confidential state.
In view of this, an embodiment of the present invention provides a kind of cipher key processing method of electronic pen, this method includes:
Application server generates the first encryption key and the second encryption key, wherein second encryption key with it is described First encryption key is corresponding;
Second encryption key is installed to the application server;
First encryption key and license data are sent to control terminal, added so that the control terminal receives described first Key, and signed according to the private cipher key of the asymmetric authentication secret pair of the control terminal, to obtain digital signature letter Breath, wherein the license data includes the geographic norms for having position data;
Receive the digital signature information that the control terminal is sent, wherein the digital signature information includes that number is signed The second encryption key of name and digital signature license data;
Verify data is obtained from the control terminal, wherein the verify data includes verification digital signature information and verification Data-link;
It is associated with the license data and first encryption key;
It generates and applies License Info, and the license data information is sent to electronic pen, wherein the application license letter Breath includes the license data, the digital signature information and the license validation data, to make the electronic pen pass through institute The first encryption key is stated the position data recorded in the geographic norms is encrypted.
Optionally, first encryption key is the public-key cryptography of unsymmetrical key, and second encryption key is non-right Claim the private cipher key of key pair.
Optionally, the license data includes the first identifier symbol range information and/or application license letter of electronic pen First effective time information of breath;
The license validation data includes the second identifier symbol range information and/or described using License Info of electronic pen Second effective time information.
Optionally, wherein the parameter in the license data is no more than corresponding parameter in the license validation data Range.
An embodiment of the present invention provides a kind of cipher key processing method of electronic pen, this method includes:
What electronic pen reception application server was sent applies License Info, wherein the application License Info includes license Data, digital signature information and license validation data;
License validation data and license validation data are obtained according to the application License Info, wherein the License Authentication Data include verify data chain;
The license validation data is matched with license data parameters;
When successful match, digital signature information is obtained according to the application License Info;
Verify data chain described in iteration, by the digital signature information of each link in the verify data chain and the number Word signing messages is matched;
When successful match, installation is described to apply License Info;
Obtain record position data;
Determine the first encryption key corresponding with record position data;
The record position data are encrypted according to first encryption key.
Optionally, it is described the license validation data and license data parameters are matched after, the method further includes:
When matching unsuccessful, it is described using License Info to stop installation.
Optionally, described that the record position data are encrypted according to first encryption key, it specifically includes:
Generate random session key;
The record position data are encrypted according to the random session key;
The random session key is encrypted according to first encryption key;
Encrypted random session key is stored to the electronic pen.
Optionally, first encryption key is the public-key cryptography of unsymmetrical key, and second encryption key is non-right Claim the private cipher key of key pair
Optionally, the license data includes the first identifier symbol range information and/or application license letter of electronic pen First effective time information of breath;
The license validation data includes the second identifier symbol range information and/or described using License Info of electronic pen Second effective time information.
Optionally, the parameter in the license data is no more than the model of corresponding parameter in the license validation data It encloses.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward The geographic norms of data are associated with each encryption key, so that only corresponding to the encryption key for encrypting the position data Application server could utilize the position data, confidential state is in for other application servers.
Description of the drawings
Fig. 1 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention;
Fig. 3 is a kind of method flow diagram that record position data are encrypted provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention.As shown in Figure 1, this The cipher key processing method of the electronic pen of inventive embodiments includes:
In step 100, application server generates the first encryption key and the second encryption key.Wherein, the second encryption is close Key is corresponding with the first encryption key.
Optionally, the first encryption key is the public-key cryptography of unsymmetrical key, and the second encryption key is unsymmetrical key pair Private cipher key.
For example, application server can be according to preset control instruction, it can also be according to the administrator's of application server Instruction generates the first encryption key and the second encryption key.Alternatively, application server can give birth to a pair of of symmetric key, A pair of of unsymmetrical key can also be generated, when generating unsymmetrical key, the first encryption key is the disclosure of unsymmetrical key pair Key, the second encryption key are the private cipher key of unsymmetrical key pair.
In step 110, the second encryption key is installed to application server.
For example, installing the second encryption key corresponding with the first encryption key to application server.
In the step 120, the first encryption key and license data are sent to control terminal.Add so that control terminal receives first Key, and signed according to the private cipher key of the asymmetric authentication secret pair of control terminal, to obtain digital signature information, In, license data includes the geographic norms for having position data.
For example, the first encryption key and license data are sent to control terminal, wherein license data includes having positional number According to geographic norms.Control terminal can be controlled by control executor, and control terminal also has the private cipher key of itself and discloses close Key.After control terminal receives the first encryption key and license data, received from application server according to the private cipher key pair of itself The first encryption key and license data be digitally signed, obtain digital signature information, the operation can make the number label Name is the result that control terminal had not only been signed to public-key cryptography but also to license data parameters.Digital signature information includes the second encryption The digital signature version of key and the digital signature version of license data.The digital signature information of generation is sent to and answers by control terminal Use server.
In step 130, the digital signature information that control terminal is sent is received, wherein digital signature information includes that number is signed The second encryption key of name and digital signature license data.
For example, application server receives the digital signature information that control terminal is sent.Digital signature information includes the second encryption The digital signature version of key and the digital signature version of license data.
In step 140, verify data is obtained from control terminal.Wherein, verify data include verification digital signature information and Verify data chain.
For example, application server obtains verify data from control terminal, verify data is sent to application server by control terminal. Wherein, verify data includes verification digital signature information and verify data chain.The digital signature of control terminal discloses in verify data Key is generated by the corresponding private cipher key of the public-key cryptography being stored in electronic pen.Verify data further includes specific part Geographic norms, the geographic norms of the position data of license data are no more than the geographic norms of the specific part of verify data.
Optionally, license data includes that the first identifier of electronic pen accords with the first of range information and/or application License Info Effective time information.
License validation data include electronic pen second identifier symbol range information and/or application License Info second effectively Temporal information.
Optionally, the parameter in license data is no more than the range of corresponding parameter in license validation data.
For example, license data may include the first identifier symbol range of electronic pen, can also include applying License Info First term of validity.License validation data may include the second identifier symbol range of electronic pen, can also include applying License Info Second term of validity.Wherein, second identifier symbol range is more than first identifier symbol range, and the range of second term of validity, which is more than first, to be had The range of effect phase.Value or range of the value or range of admissible parameter no more than relevant parameter in license validation data.If super It crosses, then electronic pen cannot verify this during installing using License Info and apply License Info.
In step 150, association license data and the first encryption key.
For example, currently assume the new security service of application server configuration, mould of the application server selection for the service Plate, and the mode region specification being used together with the service according to the formal definition of one or more page addresses, such as cover It is printed on the page address of the mode region on product surface.Geographic norms pass through according to the data structure with above-mentioned format Storage region specification and public-key cryptography, and it is associated with the public-key cryptography of privately owned/public encipherment key pair of application server.With And the data such as the admissible parameter and cookie of storage in addition to geographic norms.
In a step 160, it generates and applies License Info, and license data information is sent to electronic pen.Wherein, using perhaps Can information include license data, digital signature information and license validation data, to make electronic pen pass through the first encryption key pair The position data recorded in geographic norms is encrypted.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward The geographic norms of data are associated with each encryption key, so that only answering corresponding to the encryption key of encrypted position data The position data could be utilized with server, confidential state is in for other application servers.
Fig. 2 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention.As shown in Fig. 2, this Inventive embodiments provide a kind of cipher key processing method of electronic pen, and this method includes:
In step 200, what electronic pen reception application server was sent applies License Info.Wherein, using License Info Including license data, digital signature information and license validation data.
For example, electronic pen can receive the application license letter of application server transmission by any mode such as bluetooth, wireless Breath, includes license data, digital signature information and license validation data using License Info.
In step 210, license validation data and license validation data are obtained according to application License Info.Wherein, permit Verify data includes verify data chain.
License Info is applied for example, reading, and is extracted using the license validation data and License Authentication number in License Info According to.Wherein, license validation data includes verify data chain.
In a step 220, license validation data and license data parameters are matched.
Optionally, license data includes that the first identifier of electronic pen accords with the first of range information and/or application License Info Effective time information.
Optionally, license validation data includes the second identifier symbol range information of electronic pen and/or applies License Info Second effective time information.
Optionally, in a step 220, after license validation data and license data parameters being matched, this method is also wrapped It includes:
When matching unsuccessful, stops installation and apply License Info.
For example, electronic pen will apply each license data parameters of License Info compared with the correspondence parameter of verify data Compared with.Check the parameter of each license data whether in the range of the correspondence parameter of license validation data.
License data may include the first identifier symbol range of electronic pen, can also include having using the first of License Info The effect phase.License validation data may include the second identifier symbol range of electronic pen, can also include second using License Info The term of validity.Wherein, the first effective time information can be the current time in electronic pen given by time circuit.Second it is effective when Between information can be license validation data set by second term of validity.
First identifier symbol range and second identifier symbol range, first term of validity are compared respectively with second term of validity. Range is accorded with when second identifier symbol range is more than first identifier, and the first effective time information is fallen by the set by license data When in two terms of validity, successful match enters step 230, continues to install.Otherwise, it fails to match, abandons installing.
In step 230, when successful match, digital signature information is obtained according to application License Info.
For example, when the parameter in license data is no more than the range of corresponding parameter in license validation data, matching Success obtains digital signature information according to application License Info.
In step 240, iteration verify data chain, by the digital signature information and number of each link in verify data chain Word signing messages is matched.
For example, by the iteration on the license validation data chain of the digital signature with public-key cryptography and in the every of the chain Public-key cryptography is verified in a link, to verify the disclosure key using License Info.Iteration is previously stored in from utilization in pen The public-key cryptography of trusted party verify the close by disclosing for side's digital signature that pen is trusted of the top license validation data Key starts.Then, the public-key cryptography verified in this way be used for verify PAL verify data chains in digital signature it is next disclose it is close Key, until public-key cryptography of license validation data itself can be verified.Each this verification step can be based on decryption It is verified and with calculating to execute.When if the public-key cryptography in chain cannot be verified, abandon installing.
Alternatively, iteration may include that License Authentication number is checked for each link in chain and since top link According to license data field in each parameter whether be previous link license validation data in relevant parameter subset, wherein should Verify data is comprised in the license validation data of current ink.And this license data parameters of each link can be with public affairs It opens key to be encrypted together, wherein the verification of parameter further includes deciphering parameter and by itself and the parameter ratio in plaintext in each link Compared with.If any parameter in link is abandoned installing not over verification.In order to verify top in this way Link, iteration from arrange parameter " mode region specification "=" entire pattern ", " range of identifier "=" all pens ", " have The effect phase "=" eternal " beginning.
Alternatively, above-mentioned verification can execute in applications, such as be held in the download website being connect with electronic pen Row, which, which receives and verify according to the above method, each applies License Info.After successful authentication, applications can be with All or selected application License Infos are provided to pen.
In step 250, when successful match, License Info is applied in installation.
In step 260, record position data are obtained.
For example, after being installed to special services in electronic pen using License Info, electronic pen can start Use the service.The use of service is since the position data from product pattern region is recorded in notes, and wherein the mode region is What plan was used together with the service.After surface recording position data, recorded information is transmitted to and provides by user The application server of service.
In step 270, the first encryption key corresponding with record position data is determined.
It is derived for example, position data or coordinate that electronic pen is recorded by application License Info will identify specific webpage address Public-key cryptography.
In step 280, record position data are encrypted according to the first encryption key.
Optionally, the first encryption key is the public-key cryptography of unsymmetrical key, and the second encryption key is unsymmetrical key pair Private cipher key.
Optionally, Fig. 3 is a kind of method flow diagram that record position data are encrypted provided in an embodiment of the present invention, As shown in figure 3, in step 280, being encrypted, being specifically included to record position data according to the first encryption key:
In step 281, random session key is generated.
In step 282, according to random session key scrambled record position data.
In step 283, random session key is encrypted according to the first encryption key.
In step 284, encrypted random session key is stored to electronic pen.
For example, electronic pen encrypts the information data to be communicated to application server according to the disclosure key.Encryption side Formula can there are many, for example, in order to make computation complexity minimize, in step 281, electronic pen generates random session key. In step 282, according to random session key scrambled record position data.Then, in step 283, using using License Info The public key encryption random session key.In step 284, encrypted random session key is stored to electronic pen. Application server decrypts encrypted session key using the private cipher key of its installation, and next using the session key after decryption Decrypt encrypted information data.It is stored in electronic pen with the encrypted information data of public-key cryptography and generates coordinate file, PGC texts To be routed to application server in part.The page address of position data can be unencryptedly stored in PGC files.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward The geographic norms of data are associated with each encryption key, so that only answering corresponding to the encryption key of encrypted position data The position data could be utilized with server, confidential state is in for other application servers.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (10)

1. a kind of cipher key processing method of electronic pen, which is characterized in that the method includes:
Application server generates the first encryption key and the second encryption key, wherein second encryption key and described first Encryption key is corresponding;
Second encryption key is installed to the application server;
First encryption key and license data are sent to control terminal, so that control terminal reception first encryption is close Key, and signed according to the private cipher key of the asymmetric authentication secret pair of the control terminal, to obtain digital signature information, In, the license data includes the geographic norms for having position data;
Receive the digital signature information that the control terminal is sent, wherein the digital signature information includes digital signature the Two encryption keys and digital signature license data;
Verify data is obtained from the control terminal, wherein the verify data includes verification digital signature information and verify data Chain;
It is associated with the license data and first encryption key;
It generates and applies License Info, and the license data information is sent to electronic pen, wherein the application License Info packet The license data, the digital signature information and the license validation data are included, to make the electronic pen pass through described The position data recorded in the geographic norms is encrypted in one encryption key.
2. according to the method described in claim 1, it is characterized in that, first encryption key is that disclosing for unsymmetrical key is close Key, second encryption key are the private cipher key of unsymmetrical key pair.
3. method according to claim 1 or 2, which is characterized in that the license data includes the first identifier of electronic pen Accord with range information and/or the first effective time information using License Info;
The license validation data includes the second identifier symbol range information and/or described using the second of License Info of electronic pen Effective time information.
4. according to the method described in claim 3, the parameter in the wherein described license data is no more than the license validation data In corresponding parameter range.
5. a kind of cipher key processing method of electronic pen, which is characterized in that the method includes:
Electronic pen receive application server send apply License Info, wherein the application License Info include license data, Digital signature information and license validation data;
License validation data and license validation data are obtained according to the application License Info, wherein the license validation data Including verify data chain;
The license validation data is matched with license data parameters;
When successful match, digital signature information is obtained according to the application License Info;
Verify data chain described in iteration signs the digital signature information of each link in the verify data chain and the number Name information is matched;
When successful match, installation is described to apply License Info;
Obtain record position data;
Determine the first encryption key corresponding with record position data;
The record position data are encrypted according to first encryption key.
6. according to the method described in claim 5, it is characterized in that, described by the license validation data and license data parameters After matching, the method further includes:
When matching unsuccessful, it is described using License Info to stop installation.
7. the method according to the description of claim 7 is characterized in that it is described according to first encryption key to the record position It sets data to be encrypted, specifically include:
Generate random session key;
The record position data are encrypted according to the random session key;
The random session key is encrypted according to first encryption key;
Encrypted random session key is stored to the electronic pen.
8. according to claim 5-7 any one of them methods, which is characterized in that first encryption key is unsymmetrical key Public-key cryptography, second encryption key be unsymmetrical key pair private cipher key.
9. according to the method described in claim 8, it is characterized in that, the license data includes the first identifier symbol model of electronic pen Enclose information and/or the first effective time information using License Info.
10. according to the method described in claim 8, it is characterized in that, the license validation data includes the second mark of electronic pen Know symbol range information and/or the second effective time information using License Info.
CN201710215039.9A 2017-04-02 2017-04-02 The cipher key processing method of electronic pen Pending CN108667603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710215039.9A CN108667603A (en) 2017-04-02 2017-04-02 The cipher key processing method of electronic pen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710215039.9A CN108667603A (en) 2017-04-02 2017-04-02 The cipher key processing method of electronic pen

Publications (1)

Publication Number Publication Date
CN108667603A true CN108667603A (en) 2018-10-16

Family

ID=63784844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710215039.9A Pending CN108667603A (en) 2017-04-02 2017-04-02 The cipher key processing method of electronic pen

Country Status (1)

Country Link
CN (1) CN108667603A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1371496A (en) * 1999-06-30 2002-09-25 西尔弗布鲁克研究股份有限公司 Interactive printer persistent storage provider
US20030021419A1 (en) * 2001-07-11 2003-01-30 Hansen Mads Dore Encryption protocol
CN101133418A (en) * 2004-10-12 2008-02-27 阿诺托股份公司 Method and a system for secure management of information from an electronic pen
CN105487739A (en) * 2015-12-07 2016-04-13 深圳易普森科技股份有限公司 Wireless transmission electromagnetic type touch device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1371496A (en) * 1999-06-30 2002-09-25 西尔弗布鲁克研究股份有限公司 Interactive printer persistent storage provider
US20030021419A1 (en) * 2001-07-11 2003-01-30 Hansen Mads Dore Encryption protocol
CN101133418A (en) * 2004-10-12 2008-02-27 阿诺托股份公司 Method and a system for secure management of information from an electronic pen
CN105487739A (en) * 2015-12-07 2016-04-13 深圳易普森科技股份有限公司 Wireless transmission electromagnetic type touch device

Similar Documents

Publication Publication Date Title
EP3642997B1 (en) Secure communications providing forward secrecy
US8724819B2 (en) Credential provisioning
JP6543040B2 (en) System and method for remote access, remote digital signature
CN102594558B (en) Anonymous digital certificate system and verification method of trustable computing environment
US7353383B2 (en) System and method for single session sign-on with cryptography
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
CN102647461B (en) Communication means based on HTTP, server, terminal
TWI288552B (en) Method for implementing new password and computer readable medium for performing the method
CN107196966A (en) The identity identifying method and system of multi-party trust based on block chain
CN101212293B (en) Identity authentication method and system
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN109687965B (en) Real-name authentication method for protecting user identity information in network
CN108347419A (en) Data transmission method and device
CN106452764B (en) Method for automatically updating identification private key and password system
CN108092779A (en) A kind of method and device for realizing electronic signature
JP2012530996A (en) Authentication method and system
JPH11231775A (en) Device and method for conditional authentication
CN106953732B (en) Key management system and method for chip card
CN102577301A (en) Method and apparatus for trusted authentication and logon
CN104322003A (en) Cryptographic authentication and identification method using real-time encryption
CN105681470A (en) Communication method, server and terminal based on hypertext transfer protocol
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN113918967A (en) Data transmission method, system, computer equipment and medium based on security check
CN114513339A (en) Security authentication method, system and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200731

Address after: No.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing 100083

Applicant after: BEIJING TSTUDY TECHNOLOGY Co.,Ltd.

Address before: 100098, No. 2, building 18, North Third Ring Road, Haidian District, Beijing, 803-3

Applicant before: Tian Xuesong

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181016