CN108667603A - The cipher key processing method of electronic pen - Google Patents
The cipher key processing method of electronic pen Download PDFInfo
- Publication number
- CN108667603A CN108667603A CN201710215039.9A CN201710215039A CN108667603A CN 108667603 A CN108667603 A CN 108667603A CN 201710215039 A CN201710215039 A CN 201710215039A CN 108667603 A CN108667603 A CN 108667603A
- Authority
- CN
- China
- Prior art keywords
- license
- data
- key
- encryption key
- electronic pen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The present embodiments relate to a kind of cipher key processing methods of electronic pen, including:Application server generates the first encryption key and the second encryption key, wherein the second encryption key is corresponding with the first encryption key;Second encryption key is installed to application server;First encryption key and license data are sent to control terminal, wherein license data includes the geographic norms for having position data;Receive the digital signature information that control terminal is sent, wherein digital signature information includes the second encryption key and digital signature license data;Verify data is obtained from control terminal, wherein verify data includes verification digital signature information and verify data chain;It is associated with license data and the first encryption key;It generates and applies License Info, and license data information is sent to electronic pen, wherein using License Info include license data, digital signature information and license validation data.
Description
Technical field
The present invention relates to technical field of information processing more particularly to a kind of cipher key processing methods of electronic pen.
Background technology
With the rapid development of information technology, people are increasingly commonly produced, are handled, exchanged and propagated using computer
Various forms of information.Information technology gradually changes the traditional living habit of people.People, which start with detection device, to be had
There are mobile input information, server on the paper or electronic display of symbol pattern to pass through in detection device moving process
Change in location is calculated, and is carried out the information of recognition detection equipment input and is shown or executed corresponding instruction to solve to pass
System by paper and pen write in the way of can not carry out information process- the problem of.However, being detected in existing technology
Communication security between equipment and server uses authorization, but lower detection device of normal conditions is known by multiple servers
When other, the information transmitted is easy to be misinformated and service is caused to terminate.
Invention content
The purpose of the present invention is in view of the drawbacks of the prior art, providing a kind of cipher key processing method of electronic pen, pass through by
The geographic norms for being directed toward the position data of different application server are associated with each encryption key, add so that only corresponding to
The application server of the encryption key of the close position data could utilize the position data, at other application servers
In confidential state.
In view of this, an embodiment of the present invention provides a kind of cipher key processing method of electronic pen, this method includes:
Application server generates the first encryption key and the second encryption key, wherein second encryption key with it is described
First encryption key is corresponding;
Second encryption key is installed to the application server;
First encryption key and license data are sent to control terminal, added so that the control terminal receives described first
Key, and signed according to the private cipher key of the asymmetric authentication secret pair of the control terminal, to obtain digital signature letter
Breath, wherein the license data includes the geographic norms for having position data;
Receive the digital signature information that the control terminal is sent, wherein the digital signature information includes that number is signed
The second encryption key of name and digital signature license data;
Verify data is obtained from the control terminal, wherein the verify data includes verification digital signature information and verification
Data-link;
It is associated with the license data and first encryption key;
It generates and applies License Info, and the license data information is sent to electronic pen, wherein the application license letter
Breath includes the license data, the digital signature information and the license validation data, to make the electronic pen pass through institute
The first encryption key is stated the position data recorded in the geographic norms is encrypted.
Optionally, first encryption key is the public-key cryptography of unsymmetrical key, and second encryption key is non-right
Claim the private cipher key of key pair.
Optionally, the license data includes the first identifier symbol range information and/or application license letter of electronic pen
First effective time information of breath;
The license validation data includes the second identifier symbol range information and/or described using License Info of electronic pen
Second effective time information.
Optionally, wherein the parameter in the license data is no more than corresponding parameter in the license validation data
Range.
An embodiment of the present invention provides a kind of cipher key processing method of electronic pen, this method includes:
What electronic pen reception application server was sent applies License Info, wherein the application License Info includes license
Data, digital signature information and license validation data;
License validation data and license validation data are obtained according to the application License Info, wherein the License Authentication
Data include verify data chain;
The license validation data is matched with license data parameters;
When successful match, digital signature information is obtained according to the application License Info;
Verify data chain described in iteration, by the digital signature information of each link in the verify data chain and the number
Word signing messages is matched;
When successful match, installation is described to apply License Info;
Obtain record position data;
Determine the first encryption key corresponding with record position data;
The record position data are encrypted according to first encryption key.
Optionally, it is described the license validation data and license data parameters are matched after, the method further includes:
When matching unsuccessful, it is described using License Info to stop installation.
Optionally, described that the record position data are encrypted according to first encryption key, it specifically includes:
Generate random session key;
The record position data are encrypted according to the random session key;
The random session key is encrypted according to first encryption key;
Encrypted random session key is stored to the electronic pen.
Optionally, first encryption key is the public-key cryptography of unsymmetrical key, and second encryption key is non-right
Claim the private cipher key of key pair
Optionally, the license data includes the first identifier symbol range information and/or application license letter of electronic pen
First effective time information of breath;
The license validation data includes the second identifier symbol range information and/or described using License Info of electronic pen
Second effective time information.
Optionally, the parameter in the license data is no more than the model of corresponding parameter in the license validation data
It encloses.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward
The geographic norms of data are associated with each encryption key, so that only corresponding to the encryption key for encrypting the position data
Application server could utilize the position data, confidential state is in for other application servers.
Description of the drawings
Fig. 1 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention;
Fig. 3 is a kind of method flow diagram that record position data are encrypted provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention.As shown in Figure 1, this
The cipher key processing method of the electronic pen of inventive embodiments includes:
In step 100, application server generates the first encryption key and the second encryption key.Wherein, the second encryption is close
Key is corresponding with the first encryption key.
Optionally, the first encryption key is the public-key cryptography of unsymmetrical key, and the second encryption key is unsymmetrical key pair
Private cipher key.
For example, application server can be according to preset control instruction, it can also be according to the administrator's of application server
Instruction generates the first encryption key and the second encryption key.Alternatively, application server can give birth to a pair of of symmetric key,
A pair of of unsymmetrical key can also be generated, when generating unsymmetrical key, the first encryption key is the disclosure of unsymmetrical key pair
Key, the second encryption key are the private cipher key of unsymmetrical key pair.
In step 110, the second encryption key is installed to application server.
For example, installing the second encryption key corresponding with the first encryption key to application server.
In the step 120, the first encryption key and license data are sent to control terminal.Add so that control terminal receives first
Key, and signed according to the private cipher key of the asymmetric authentication secret pair of control terminal, to obtain digital signature information,
In, license data includes the geographic norms for having position data.
For example, the first encryption key and license data are sent to control terminal, wherein license data includes having positional number
According to geographic norms.Control terminal can be controlled by control executor, and control terminal also has the private cipher key of itself and discloses close
Key.After control terminal receives the first encryption key and license data, received from application server according to the private cipher key pair of itself
The first encryption key and license data be digitally signed, obtain digital signature information, the operation can make the number label
Name is the result that control terminal had not only been signed to public-key cryptography but also to license data parameters.Digital signature information includes the second encryption
The digital signature version of key and the digital signature version of license data.The digital signature information of generation is sent to and answers by control terminal
Use server.
In step 130, the digital signature information that control terminal is sent is received, wherein digital signature information includes that number is signed
The second encryption key of name and digital signature license data.
For example, application server receives the digital signature information that control terminal is sent.Digital signature information includes the second encryption
The digital signature version of key and the digital signature version of license data.
In step 140, verify data is obtained from control terminal.Wherein, verify data include verification digital signature information and
Verify data chain.
For example, application server obtains verify data from control terminal, verify data is sent to application server by control terminal.
Wherein, verify data includes verification digital signature information and verify data chain.The digital signature of control terminal discloses in verify data
Key is generated by the corresponding private cipher key of the public-key cryptography being stored in electronic pen.Verify data further includes specific part
Geographic norms, the geographic norms of the position data of license data are no more than the geographic norms of the specific part of verify data.
Optionally, license data includes that the first identifier of electronic pen accords with the first of range information and/or application License Info
Effective time information.
License validation data include electronic pen second identifier symbol range information and/or application License Info second effectively
Temporal information.
Optionally, the parameter in license data is no more than the range of corresponding parameter in license validation data.
For example, license data may include the first identifier symbol range of electronic pen, can also include applying License Info
First term of validity.License validation data may include the second identifier symbol range of electronic pen, can also include applying License Info
Second term of validity.Wherein, second identifier symbol range is more than first identifier symbol range, and the range of second term of validity, which is more than first, to be had
The range of effect phase.Value or range of the value or range of admissible parameter no more than relevant parameter in license validation data.If super
It crosses, then electronic pen cannot verify this during installing using License Info and apply License Info.
In step 150, association license data and the first encryption key.
For example, currently assume the new security service of application server configuration, mould of the application server selection for the service
Plate, and the mode region specification being used together with the service according to the formal definition of one or more page addresses, such as cover
It is printed on the page address of the mode region on product surface.Geographic norms pass through according to the data structure with above-mentioned format
Storage region specification and public-key cryptography, and it is associated with the public-key cryptography of privately owned/public encipherment key pair of application server.With
And the data such as the admissible parameter and cookie of storage in addition to geographic norms.
In a step 160, it generates and applies License Info, and license data information is sent to electronic pen.Wherein, using perhaps
Can information include license data, digital signature information and license validation data, to make electronic pen pass through the first encryption key pair
The position data recorded in geographic norms is encrypted.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward
The geographic norms of data are associated with each encryption key, so that only answering corresponding to the encryption key of encrypted position data
The position data could be utilized with server, confidential state is in for other application servers.
Fig. 2 is a kind of flow chart of the cipher key processing method of electronic pen provided in an embodiment of the present invention.As shown in Fig. 2, this
Inventive embodiments provide a kind of cipher key processing method of electronic pen, and this method includes:
In step 200, what electronic pen reception application server was sent applies License Info.Wherein, using License Info
Including license data, digital signature information and license validation data.
For example, electronic pen can receive the application license letter of application server transmission by any mode such as bluetooth, wireless
Breath, includes license data, digital signature information and license validation data using License Info.
In step 210, license validation data and license validation data are obtained according to application License Info.Wherein, permit
Verify data includes verify data chain.
License Info is applied for example, reading, and is extracted using the license validation data and License Authentication number in License Info
According to.Wherein, license validation data includes verify data chain.
In a step 220, license validation data and license data parameters are matched.
Optionally, license data includes that the first identifier of electronic pen accords with the first of range information and/or application License Info
Effective time information.
Optionally, license validation data includes the second identifier symbol range information of electronic pen and/or applies License Info
Second effective time information.
Optionally, in a step 220, after license validation data and license data parameters being matched, this method is also wrapped
It includes:
When matching unsuccessful, stops installation and apply License Info.
For example, electronic pen will apply each license data parameters of License Info compared with the correspondence parameter of verify data
Compared with.Check the parameter of each license data whether in the range of the correspondence parameter of license validation data.
License data may include the first identifier symbol range of electronic pen, can also include having using the first of License Info
The effect phase.License validation data may include the second identifier symbol range of electronic pen, can also include second using License Info
The term of validity.Wherein, the first effective time information can be the current time in electronic pen given by time circuit.Second it is effective when
Between information can be license validation data set by second term of validity.
First identifier symbol range and second identifier symbol range, first term of validity are compared respectively with second term of validity.
Range is accorded with when second identifier symbol range is more than first identifier, and the first effective time information is fallen by the set by license data
When in two terms of validity, successful match enters step 230, continues to install.Otherwise, it fails to match, abandons installing.
In step 230, when successful match, digital signature information is obtained according to application License Info.
For example, when the parameter in license data is no more than the range of corresponding parameter in license validation data, matching
Success obtains digital signature information according to application License Info.
In step 240, iteration verify data chain, by the digital signature information and number of each link in verify data chain
Word signing messages is matched.
For example, by the iteration on the license validation data chain of the digital signature with public-key cryptography and in the every of the chain
Public-key cryptography is verified in a link, to verify the disclosure key using License Info.Iteration is previously stored in from utilization in pen
The public-key cryptography of trusted party verify the close by disclosing for side's digital signature that pen is trusted of the top license validation data
Key starts.Then, the public-key cryptography verified in this way be used for verify PAL verify data chains in digital signature it is next disclose it is close
Key, until public-key cryptography of license validation data itself can be verified.Each this verification step can be based on decryption
It is verified and with calculating to execute.When if the public-key cryptography in chain cannot be verified, abandon installing.
Alternatively, iteration may include that License Authentication number is checked for each link in chain and since top link
According to license data field in each parameter whether be previous link license validation data in relevant parameter subset, wherein should
Verify data is comprised in the license validation data of current ink.And this license data parameters of each link can be with public affairs
It opens key to be encrypted together, wherein the verification of parameter further includes deciphering parameter and by itself and the parameter ratio in plaintext in each link
Compared with.If any parameter in link is abandoned installing not over verification.In order to verify top in this way
Link, iteration from arrange parameter " mode region specification "=" entire pattern ", " range of identifier "=" all pens ", " have
The effect phase "=" eternal " beginning.
Alternatively, above-mentioned verification can execute in applications, such as be held in the download website being connect with electronic pen
Row, which, which receives and verify according to the above method, each applies License Info.After successful authentication, applications can be with
All or selected application License Infos are provided to pen.
In step 250, when successful match, License Info is applied in installation.
In step 260, record position data are obtained.
For example, after being installed to special services in electronic pen using License Info, electronic pen can start
Use the service.The use of service is since the position data from product pattern region is recorded in notes, and wherein the mode region is
What plan was used together with the service.After surface recording position data, recorded information is transmitted to and provides by user
The application server of service.
In step 270, the first encryption key corresponding with record position data is determined.
It is derived for example, position data or coordinate that electronic pen is recorded by application License Info will identify specific webpage address
Public-key cryptography.
In step 280, record position data are encrypted according to the first encryption key.
Optionally, the first encryption key is the public-key cryptography of unsymmetrical key, and the second encryption key is unsymmetrical key pair
Private cipher key.
Optionally, Fig. 3 is a kind of method flow diagram that record position data are encrypted provided in an embodiment of the present invention,
As shown in figure 3, in step 280, being encrypted, being specifically included to record position data according to the first encryption key:
In step 281, random session key is generated.
In step 282, according to random session key scrambled record position data.
In step 283, random session key is encrypted according to the first encryption key.
In step 284, encrypted random session key is stored to electronic pen.
For example, electronic pen encrypts the information data to be communicated to application server according to the disclosure key.Encryption side
Formula can there are many, for example, in order to make computation complexity minimize, in step 281, electronic pen generates random session key.
In step 282, according to random session key scrambled record position data.Then, in step 283, using using License Info
The public key encryption random session key.In step 284, encrypted random session key is stored to electronic pen.
Application server decrypts encrypted session key using the private cipher key of its installation, and next using the session key after decryption
Decrypt encrypted information data.It is stored in electronic pen with the encrypted information data of public-key cryptography and generates coordinate file, PGC texts
To be routed to application server in part.The page address of position data can be unencryptedly stored in PGC files.
The cipher key processing method of electronic pen provided in an embodiment of the present invention, by the way that the position of different application server will be directed toward
The geographic norms of data are associated with each encryption key, so that only answering corresponding to the encryption key of encrypted position data
The position data could be utilized with server, confidential state is in for other application servers.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute
The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect
It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention
Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of cipher key processing method of electronic pen, which is characterized in that the method includes:
Application server generates the first encryption key and the second encryption key, wherein second encryption key and described first
Encryption key is corresponding;
Second encryption key is installed to the application server;
First encryption key and license data are sent to control terminal, so that control terminal reception first encryption is close
Key, and signed according to the private cipher key of the asymmetric authentication secret pair of the control terminal, to obtain digital signature information,
In, the license data includes the geographic norms for having position data;
Receive the digital signature information that the control terminal is sent, wherein the digital signature information includes digital signature the
Two encryption keys and digital signature license data;
Verify data is obtained from the control terminal, wherein the verify data includes verification digital signature information and verify data
Chain;
It is associated with the license data and first encryption key;
It generates and applies License Info, and the license data information is sent to electronic pen, wherein the application License Info packet
The license data, the digital signature information and the license validation data are included, to make the electronic pen pass through described
The position data recorded in the geographic norms is encrypted in one encryption key.
2. according to the method described in claim 1, it is characterized in that, first encryption key is that disclosing for unsymmetrical key is close
Key, second encryption key are the private cipher key of unsymmetrical key pair.
3. method according to claim 1 or 2, which is characterized in that the license data includes the first identifier of electronic pen
Accord with range information and/or the first effective time information using License Info;
The license validation data includes the second identifier symbol range information and/or described using the second of License Info of electronic pen
Effective time information.
4. according to the method described in claim 3, the parameter in the wherein described license data is no more than the license validation data
In corresponding parameter range.
5. a kind of cipher key processing method of electronic pen, which is characterized in that the method includes:
Electronic pen receive application server send apply License Info, wherein the application License Info include license data,
Digital signature information and license validation data;
License validation data and license validation data are obtained according to the application License Info, wherein the license validation data
Including verify data chain;
The license validation data is matched with license data parameters;
When successful match, digital signature information is obtained according to the application License Info;
Verify data chain described in iteration signs the digital signature information of each link in the verify data chain and the number
Name information is matched;
When successful match, installation is described to apply License Info;
Obtain record position data;
Determine the first encryption key corresponding with record position data;
The record position data are encrypted according to first encryption key.
6. according to the method described in claim 5, it is characterized in that, described by the license validation data and license data parameters
After matching, the method further includes:
When matching unsuccessful, it is described using License Info to stop installation.
7. the method according to the description of claim 7 is characterized in that it is described according to first encryption key to the record position
It sets data to be encrypted, specifically include:
Generate random session key;
The record position data are encrypted according to the random session key;
The random session key is encrypted according to first encryption key;
Encrypted random session key is stored to the electronic pen.
8. according to claim 5-7 any one of them methods, which is characterized in that first encryption key is unsymmetrical key
Public-key cryptography, second encryption key be unsymmetrical key pair private cipher key.
9. according to the method described in claim 8, it is characterized in that, the license data includes the first identifier symbol model of electronic pen
Enclose information and/or the first effective time information using License Info.
10. according to the method described in claim 8, it is characterized in that, the license validation data includes the second mark of electronic pen
Know symbol range information and/or the second effective time information using License Info.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710215039.9A CN108667603A (en) | 2017-04-02 | 2017-04-02 | The cipher key processing method of electronic pen |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710215039.9A CN108667603A (en) | 2017-04-02 | 2017-04-02 | The cipher key processing method of electronic pen |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108667603A true CN108667603A (en) | 2018-10-16 |
Family
ID=63784844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710215039.9A Pending CN108667603A (en) | 2017-04-02 | 2017-04-02 | The cipher key processing method of electronic pen |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108667603A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1371496A (en) * | 1999-06-30 | 2002-09-25 | 西尔弗布鲁克研究股份有限公司 | Interactive printer persistent storage provider |
US20030021419A1 (en) * | 2001-07-11 | 2003-01-30 | Hansen Mads Dore | Encryption protocol |
CN101133418A (en) * | 2004-10-12 | 2008-02-27 | 阿诺托股份公司 | Method and a system for secure management of information from an electronic pen |
CN105487739A (en) * | 2015-12-07 | 2016-04-13 | 深圳易普森科技股份有限公司 | Wireless transmission electromagnetic type touch device |
-
2017
- 2017-04-02 CN CN201710215039.9A patent/CN108667603A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1371496A (en) * | 1999-06-30 | 2002-09-25 | 西尔弗布鲁克研究股份有限公司 | Interactive printer persistent storage provider |
US20030021419A1 (en) * | 2001-07-11 | 2003-01-30 | Hansen Mads Dore | Encryption protocol |
CN101133418A (en) * | 2004-10-12 | 2008-02-27 | 阿诺托股份公司 | Method and a system for secure management of information from an electronic pen |
CN105487739A (en) * | 2015-12-07 | 2016-04-13 | 深圳易普森科技股份有限公司 | Wireless transmission electromagnetic type touch device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3642997B1 (en) | Secure communications providing forward secrecy | |
US8724819B2 (en) | Credential provisioning | |
JP6543040B2 (en) | System and method for remote access, remote digital signature | |
CN102594558B (en) | Anonymous digital certificate system and verification method of trustable computing environment | |
US7353383B2 (en) | System and method for single session sign-on with cryptography | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
CN102647461B (en) | Communication means based on HTTP, server, terminal | |
TWI288552B (en) | Method for implementing new password and computer readable medium for performing the method | |
CN107196966A (en) | The identity identifying method and system of multi-party trust based on block chain | |
CN101212293B (en) | Identity authentication method and system | |
CN103546289B (en) | USB (universal serial bus) Key based secure data transmission method and system | |
CN109687965B (en) | Real-name authentication method for protecting user identity information in network | |
CN108347419A (en) | Data transmission method and device | |
CN106452764B (en) | Method for automatically updating identification private key and password system | |
CN108092779A (en) | A kind of method and device for realizing electronic signature | |
JP2012530996A (en) | Authentication method and system | |
JPH11231775A (en) | Device and method for conditional authentication | |
CN106953732B (en) | Key management system and method for chip card | |
CN102577301A (en) | Method and apparatus for trusted authentication and logon | |
CN104322003A (en) | Cryptographic authentication and identification method using real-time encryption | |
CN105681470A (en) | Communication method, server and terminal based on hypertext transfer protocol | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN113918967A (en) | Data transmission method, system, computer equipment and medium based on security check | |
CN114513339A (en) | Security authentication method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200731 Address after: No.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing 100083 Applicant after: BEIJING TSTUDY TECHNOLOGY Co.,Ltd. Address before: 100098, No. 2, building 18, North Third Ring Road, Haidian District, Beijing, 803-3 Applicant before: Tian Xuesong |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181016 |