CN110071863A - A kind of instant communication users group's encryption method based on id password - Google Patents

A kind of instant communication users group's encryption method based on id password Download PDF

Info

Publication number
CN110071863A
CN110071863A CN201910342724.7A CN201910342724A CN110071863A CN 110071863 A CN110071863 A CN 110071863A CN 201910342724 A CN201910342724 A CN 201910342724A CN 110071863 A CN110071863 A CN 110071863A
Authority
CN
China
Prior art keywords
group
instant
instant communication
communication users
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910342724.7A
Other languages
Chinese (zh)
Inventor
程朝辉
周枭淳
劳阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian Information Security Technology Co Ltd
Original Assignee
Shenzhen Ao Lian Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ao Lian Information Security Technology Co Ltd filed Critical Shenzhen Ao Lian Information Security Technology Co Ltd
Priority to CN201910342724.7A priority Critical patent/CN110071863A/en
Publication of CN110071863A publication Critical patent/CN110071863A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Abstract

Instant communication users group's encryption method based on id password that the invention discloses a kind of, by one group of instant communication users [Xi] composition instant communication users group, group members XiIt is respectively provided with identity ID_xi, a unique group identification GP_x is generated when instant communication users group creates, realizes the communication between security instant communication user group, instant communication users group members identify corresponding private key from the downloading of the key generation system of id password system;Any Instant Messenger user X in instant communication users groupiObtain the corresponding identity private key GS_x of group identification GP_x;When any Instant Messenger user needs to send instant messages in instant communication users group, session content all is encrypted using group identification GP_x, sends cipher-text message;Other Instant Messenger users decrypt the cipher-text message received using the private key GS_x of group identification GP_x in instant communication users group.The invention has the advantages that instant communication users group members possess private key GS_x, rather than instant communication users group members cannot obtain private key GS_x, cannot be decrypted, have a safety feature to information.

Description

A kind of instant communication users group's encryption method based on id password
Technical field
The present invention relates to the fields of the data safety in data communication, in particular to protect instant messaging using cryptographic technique A kind of instant communication users group's encryption method based on id password of the safety of data.
Background technique
Instant messaging tools such as QQ, wechat etc. carries out information transmitting using IP Digital Network technology, considerably reduces logical The expense of letter.Because of the opening of IP network, this kind of instant messaging faces leaking data, or the risk being tampered, and needs to use Cryptographic technique is protected.
Traditional method, such as QQ, Skype and wechat add in traditional IM (Instant Message) system-based Enter client to server encrypted tunnel.But there are still following 3 problems for this: the independent authentication problem of message, identity it is true Reality is guaranteed that user is unable to sender's identity of individual authentication message by server;End secure communication problem is held, message is through servicing Re-encrypted when device transfer, therefore content does not maintain secrecy to service provider, i.e., is not end end safety.Forward secrecy communication issue, The session key of QQ and Skype is permanent key, once leakage, will jeopardize all Content of Communication, that is, lack forward secrecy.
Summary of the invention
The purpose of the present invention is carry out letter using IP Digital Network technology for current instant messaging tools such as QQ, wechat etc. Breath transmitting, considerably reduces the expense of communication.Because of the opening of IP network, this kind of instant messaging faces leaking data, or The risk being tampered provides a kind of instant communication users group's encryption method based on id password.
The present invention is that technical solution used by realizing its purpose is: a kind of instant messaging encryption side based on id password Method, instant communication users identify corresponding private key from the downloading of the key generation system of id password system, have identity ID_ The instant communication users A of a realizes security instant communication, including following step with the instant communication users B with identity ID_b Suddenly;
Step A, whether online instant communication users A detects instant communication users B, if turning to step B online, otherwise turning To step C;
Step B01, instant communication users A initiates communication process using the identity of instant communication users B;In Instant Messenger The terminal of credit household A generates random X, according to the parameter G that system is selected, calculates R_a=GX;Include using hash function H calculating The abstract HASH_a of the first information of R_a, ID_a, ID_b;
Step B02, instant communication users A inquires the open system parameter PP_ of the id password system where ID_b mark b;Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts R_a and HASH_a;By the second information data including encrypted result It is sent to instant communication users B;
Step B03, after instant communication users B receives the second information data that instant communication users A is sent, ID_b pairs is used The private key decryption message answered obtains R_a, HASH_a;
Step B04, instant communication users B verifies the legitimacy of HASH_a;If illegal, this communication is terminated, it is no Random number Y is then generated, according to the parameter G that system is selected, calculates R_b=GY, K is calculated using R_a and R_b;Use hash function H Calculate includes R_a, R_b, ID_a, the abstract HASH_b of the third information of ID_b, K;
Step B05, instant communication users B inquires the open system parameter PP_ of the id password system where ID_a mark a;Mark Encryption Algorithm, which is executed, using PP_a and ID_a encrypts R_b and HASH_b;By the 4th information data including encrypted result It is sent to instant communication users A;
Step B06, after instant communication users A receives the 4th information data that instant communication users B is sent;Use ID_a pairs The private key decryption message answered obtains R_b, HASH_b;Verify the legitimacy of HASH_b;If illegal, this communication is terminated; Otherwise K is calculated using R_a and R_b;
Step B07, it uses K as master key when instant communication users A and instant communication users B conversate, uses The symmetric encipherment algorithm and message consistency protection algorithm of selection carry out encryption and data consistency protection to the content of session; Instant communication users A and instant communication users B realizes secured session, and session finishes end;
Step C, instant communication users A inquires the open system parameter PP_b of the id password system where ID_b mark; Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts instant message data.
The invention has the advantages that both sides have carried out by force when instant communication users A and instant communication users B online communication Authentication, i.e., communications protection key K can not effectively be calculated by not possessing the corresponding private key of ID_a or ID_b, thus can not be to encryption Data be decrypted, or forge or distort by data consistency protect message.In offline communications or group communication, There is no corresponding identity private key that can not decrypt offline or group communication data.
Further, in the above-mentioned instant messaging encryption method based on id password: being utilized in the step B04 The formula that R_a and R_b calculates K is K=(GX)Y=GXY;The formula of K is calculated using R_a and R_b in the step B06 as K =(GY)X=GXY
Further, in the above-mentioned instant messaging encryption method based on id password: in the step B04 and step The formula of K is calculated in B06 using R_a and R_b as K=R_a ⊕ R_b.
Further, in the above-mentioned instant messaging encryption method based on id password: the second information further includes ID_a, The mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b.4th information further includes ID_a, The mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b.In addition, the first information, Second information, third information in the 4th information further include current time T.
Further, in the above-mentioned instant messaging encryption method based on id password: the content packet of session in step B07 Include text, voice, file.
The present invention also provides a kind of instant communication users group's encryption method based on id password, technical solution are as follows: a kind of Instant communication users group's encryption method based on id password, by one group of instant communication users [Xi] composition instant communication users Group, i is natural number, group members XiIt is respectively provided with identity ID_xi, one is generated when the instant communication users group creates A unique group identification GP_x realizes the communication between security instant communication user group, includes the following steps;
Step 1, instant communication users group members identify corresponding private from the downloading of the key generation system of id password system Key;
Any Instant Messenger user X in step 2, instant communication users groupiObtain the corresponding identity private key GS_ of group identification GP_x x;
Step 3 when any Instant Messenger user needs to send instant messages in instant communication users group, is all marked using group Know GP_x and encrypt session content, sends cipher-text message;
Step 4, other Instant Messenger users are decrypted using the private key GS_x of group identification GP_x in instant communication users group The cipher-text message received.
Further, in above-mentioned instant communication users group's encryption method based on id password: any to be in step 2 The family Shi Tongyong XiObtaining the corresponding identity private key GS_x of group identification GP_x includes:
Instant Messenger user X in step 201, instant communication users groupiIt initiates to obtain mark GP_x's to instant way system Request;
Step 202, instant way system judge Instant Messenger user XiWhether instant communication users group GP_x member is belonged to, if It is to turn to step 203, otherwise terminates;
Step 203, instant way system then generate identity private key GS_x and are sent to Instant Messenger user X by the channel of safetyi。 In the step 203, user X in group is usediMark ID_xiX is sent to after encryption group identification private key GS_xi, XiUse it Group identification private key is obtained after identity private key decryption.
Further, in above-mentioned instant communication users group's encryption method based on id password: instant communication users group In any Instant Messenger user XiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system, notice Other Instant Messenger user is encrypted in group communication using new mark GP'_x in the instant communication users group, and is pacified again Distribute new group's private key GS'_x entirely.
The present invention is described in more detail in the following with reference to the drawings and specific embodiments.
Detailed description of the invention
Fig. 1 is two Instant Messenger user's online negotiation cipher key processes.
When Fig. 2 is two Instant Messenger user communication, secure communication process when one of them is not online.
Fig. 3 is group key distribution procedure in instant communication users group.
Fig. 4 is group encryption communication process in instant communication users group.
Specific embodiment
Embodiment 1, the present embodiment are a kind of methods that Instant Messenger user A and Instant Messenger user B carries out secure session.
The purpose of the present embodiment is the identity forgery faced in the process for real-time multimedia communication, leaking data, data The security risk faced is distorted, the key agreement and data ciphering method of a kind of strong identity authentication are provided.
The present embodiment is to illustrate two instant communication users A and B using the system such as QQ of instant messaging, wechat, SKYPE etc. Secrecy real-time session is carried out, it is known that the user to be conversated using such instant way system, needs to possess and has calculating The intelligent mobile terminal or PC terminal of ability, terminal install above system, instant communication users and Instant Messenger in description below Letter client, the physical aspect of user can be regarded as one intelligent terminal of a personal use and another uses other one Intelligent terminal is communicated by internet, can be unlimited as the spatial position of two people.In practice, instant messaging is used Made using the information with uniqueness such as phone number or mail address general during instant messaging, QQ number, WeChat ID at family For identity, user carries out that the authentication based on mark and key agreement mechanisms are first carried out when online instant messaging, association The key that quotient only has both sides that can just calculate realizes data exchange using key cooperation data ciphering method again.
This approach includes the following steps realizes:
It is step 1, corresponding in the communication process identity such as instant communication client loading mobile phone number or mail address Identity private key.Instant communication client needs to identify corresponding private key from the downloading of the key generation system of id password system.This Process, which may relate to key generation system certification user, has the identity informations such as corresponding phone number or mail address.It identifies close The key generation system of code system is a kind of " believable from trust authority (Self-Trust Authority, STA).
Situation 1, in the case where communicating pair A and B are online, as shown in Figure 1.
Step 2.1, user A (with identity ID_a) input the communications identities of user B using instant communication client It identifies (such as phone number or mail address ID_b) and initiates communication process;Instant communication client generates random X, according to system Selected parameter G calculates R_a=GX;Being calculated using hash function H includes R_a, ID_a, ID_b and some other related letters The abstract HASH_a of breath.Here parameter G can be generation member or the prime number met in the elliptic curve point group of security requirement Generation member in the comultiplication group of domain.
The open system parameter of id password system where step 2.2, the side's A instant communication client inquiry ID_b mark PP_b;Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts R_a and HASH_a;By encrypted result and optional ID_a, The information such as the mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b are sent to the side B.
After step 2.3, the side's B instant communication client receive the data of step 3, decryption is used using the corresponding mark of ID_b Message obtains R_a, HASH_a;B verifies the legitimacy of HASH_a first;If illegal, this communication is terminated, is otherwise generated Random Y calculates R_b=G according to the parameter G that system is selectedY, K=(GX)Y=GXYOr K=R_a ⊕ R_b;Use hash function It includes R_a, R_b, ID_a, the abstract HASH_b of ID_b, K and some other relevant informations that H, which is calculated,.
The open system parameter of id password system where step 2.4, the side's B instant communication client inquiry ID_a mark PP_a;Mark Encryption Algorithm, which is executed, using PP_a and ID_a encrypts R_b and HASH_b;By encrypted result and optional ID_a, The information such as the mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b are sent to the side A.
After step 2.5, the side's A instant communication client receive the message of step 5;Decryption is used using the corresponding mark of ID_a Message obtains R_b, HASH_b;Calculate K=(GY)X=GXYOr K=R_a ⊕ R_b;Verify the legitimacy of HASH_b;If no It is legal, then terminate this communication.
Step 2.6 uses K as key, using key derivation algorithm KDF (KDF1 as defined in ISO 18033-2 or Person KDF2) from K derivation encryption key and message consistency protection key, use the symmetric encipherment algorithm and message consistency of selection Protection algorism carries out encryption and data consistency protection to communication data.Protected data can be text, voice, file Deng.
Situation 2, in the case where recipient B is not online, as shown in Figure 2.
3.1, the open system parameter PP_ of the id password system where the side's A instant communication client inquiry ID_b mark b;Mark Encryption Algorithm is executed using PP_b and ID_b and encrypts instant message data, and data can be text, voice, file etc..
Situation 3, in the case where more people's group communications such as A, B, C: as shown in Figure 4.Here general saying is used, under Face group refers to that instant communication users group, user refer to Instant Messenger user.
It 4.1, is all living creatures when group creating into a unique group identification GP_x;
4.2, user Z obtains the corresponding identity private key GS_x of mark GP_x in group;
4.2.1, Z-direction system is initiated to obtain the request of mark GP_x
4.2.2, system judges whether Z belongs to crowd GP_x, and Z belongs to crowd GP_x, then generates identity private key GS_x
4.2.3, system is sent to user Z by the scheme of safety.Such as using sending after the mark encryption GS_x of Z, Z makes It is decrypted with its private key and obtains key;The scheme of safety is there are also very much, from the point of view of the present embodiment, the id password that is used due to us It is mailbox number, telephone number etc., therefore, instant way system can also be by the way of mail or mobile phone short message to instant messaging Member in user group sends identity private key GS_x.
4.3, U encrypts instant message using group identification GP_x;
4.4, Z decrypts cipher-text message using the private key GS_x of group identification GP_x;
If after 4.5, V leaves group, if it is desired, service system modifies group identification to GP'_x, and other in group is notified to use Encryption uses new mark GP'_x when the group communication of family, and re-downloads new group's private key GS'_x.As shown in Figure 3.
The beneficial effect of the present embodiment is, both sides have carried out strong identity authentication when two people's online communications, i.e., does not possess ID_a Or the corresponding private key of ID_b can not effectively calculate communications protection key K, to the data of encryption can not be decrypted, or pseudo- Make or distort the message protected by data consistency.In offline communications or group communication, without corresponding identity private key without Method decrypts offline or group communication data.

Claims (3)

1. a kind of instant communication users group's encryption method based on id password, it is characterised in that: by one group of instant communication users [Xi] composition instant communication users group, i is natural number, group members XiIt is respectively provided with identity ID_xi, the Instant Messenger To generate a unique group identification GP_x when credit household's group's creation, the communication between security instant communication user group, packet are realized Include following steps;
Step 1, instant communication users group members identify corresponding private key from the downloading of the key generation system of id password system;
Any Instant Messenger user X in step 2, instant communication users groupiObtain the corresponding identity private key GS_x of group identification GP_x;
Step 3 when any Instant Messenger user needs to send instant messages in instant communication users group, all uses group identification GP_x encrypts session content, sends cipher-text message;
Step 4, other Instant Messenger users are received using the private key GS_x decryption of group identification GP_x in instant communication users group Cipher-text message.
2. instant communication users group's encryption method according to claim 1 in id password, it is characterised in that: step 2 In, any Instant Messenger user XiObtaining the corresponding identity private key GS_x of group identification GP_x includes:
Instant Messenger user X in step 201, instant communication users groupiIt initiates to obtain the request for identifying GP_x to instant way system;
Step 202, instant way system judge Instant Messenger user XiWhether belong to instant communication users group GP_x member, if it is turn To step 203, otherwise terminate;
Step 203, instant way system then generate identity private key GS_x and are sent to Instant Messenger user X by the channel of safetyi
3. according to claim 1 instant communication users group's encryption method based on id password, it is characterised in that: Instant Messenger Any Instant Messenger user X in credit household groupiIf after leaving group, instant communication users group identification is modified to by instant way system GP'_x notifies that other Instant Messenger user is added in group communication using new mark GP'_x in the instant communication users group It is close, and the new group's private key GS'_x of secure distribution again.
CN201910342724.7A 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password Pending CN110071863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910342724.7A CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910342724.7A CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password
CN201611123159.8A CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201611123159.8A Division CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password

Publications (1)

Publication Number Publication Date
CN110071863A true CN110071863A (en) 2019-07-30

Family

ID=58397073

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201611123159.8A Active CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password
CN201910342724.7A Pending CN110071863A (en) 2016-12-08 2016-12-08 A kind of instant communication users group's encryption method based on id password

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201611123159.8A Active CN106549858B (en) 2016-12-08 2016-12-08 Instant messaging encryption method based on identification password

Country Status (1)

Country Link
CN (2) CN106549858B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941406B (en) * 2017-05-02 2019-11-08 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and device thereof
CN107135080B (en) * 2017-07-06 2019-09-27 深圳奥联信息安全技术有限公司 SM9 decryption method and device
CN107893549A (en) * 2017-11-09 2018-04-10 曹睿康 A kind of building block
CN108964893B (en) * 2018-06-26 2021-11-23 百度在线网络技术(北京)有限公司 Key processing method, device, equipment and medium
CN114938358B (en) * 2022-04-14 2024-02-23 厦门市美亚柏科信息股份有限公司 Backup method and terminal for instant messaging application data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170404A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method for secret key configuration based on specified group
CN102196384A (en) * 2011-05-18 2011-09-21 陈善真 Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network
CN104158653A (en) * 2014-08-14 2014-11-19 华北电力大学句容研究中心 Method of secure communication based on commercial cipher algorithm
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
CN104618397A (en) * 2015-03-04 2015-05-13 北京深思数盾科技有限公司 Encryption method and system for instant messaging software
CN105025019A (en) * 2015-07-07 2015-11-04 深圳奥联信息安全技术有限公司 Data safety sharing method
CN105281897A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 File encryption method and device and file decryption method and device
CN105610789A (en) * 2015-12-18 2016-05-25 成都三零瑞通移动通信有限公司 Data encryption method suitable for multi-user group chat instant communication
US20160226835A1 (en) * 2015-01-29 2016-08-04 Blackrock Financial Management, Inc. Authenticating Connections and Program Identity in a Messaging System

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662458A (en) * 2008-08-28 2010-03-03 西门子(中国)有限公司 Authentication method
US8958559B2 (en) * 2011-06-03 2015-02-17 Apple Inc. System and method for secure instant messaging
CN105306492B (en) * 2015-11-25 2019-01-04 成都三零瑞通移动通信有限公司 A kind of asynchronous cryptographic key negotiation method and device for security instant communication

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170404A (en) * 2006-10-24 2008-04-30 华为技术有限公司 Method for secret key configuration based on specified group
CN102196384A (en) * 2011-05-18 2011-09-21 陈善真 Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network
CN105281897A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 File encryption method and device and file decryption method and device
CN104158653A (en) * 2014-08-14 2014-11-19 华北电力大学句容研究中心 Method of secure communication based on commercial cipher algorithm
CN104219051A (en) * 2014-08-20 2014-12-17 北京奇艺世纪科技有限公司 In-group message communication method and system
US20160226835A1 (en) * 2015-01-29 2016-08-04 Blackrock Financial Management, Inc. Authenticating Connections and Program Identity in a Messaging System
CN104618397A (en) * 2015-03-04 2015-05-13 北京深思数盾科技有限公司 Encryption method and system for instant messaging software
CN105025019A (en) * 2015-07-07 2015-11-04 深圳奥联信息安全技术有限公司 Data safety sharing method
CN105610789A (en) * 2015-12-18 2016-05-25 成都三零瑞通移动通信有限公司 Data encryption method suitable for multi-user group chat instant communication

Also Published As

Publication number Publication date
CN106549858A (en) 2017-03-29
CN106549858B (en) 2019-12-10

Similar Documents

Publication Publication Date Title
Wu et al. A secure authentication scheme with anonymity for wireless communications
CN107888560B (en) Mail safe transmission system and method for mobile intelligent terminal
US9008312B2 (en) System and method of creating and sending broadcast and multicast data
CN105323070B (en) A kind of safety E-mail implementation method based on digital envelope
CN106301788B (en) A kind of group key management method for supporting user identity authentication
CN106549858B (en) Instant messaging encryption method based on identification password
CN109495274A (en) A kind of decentralization smart lock electron key distribution method and system
CN104821944A (en) Hybrid encrypted network data security method and system
CN108090370B (en) Instant communication encryption method and system based on index
CN101626294A (en) Certifying method based on identity, method, equipment and system for secure communication
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
EP2140605A1 (en) Secure electronic messaging system requiring key retrieval for deriving decryption key
CN108011885B (en) E-mail encryption method and system based on group cryptosystem
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN105743641B (en) It is a kind of can explicit authentication public key multi-receiver label decryption method
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN109873699A (en) A kind of voidable identity public key encryption method
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
CN112738133A (en) RSA authentication method
CN108390755A (en) The safe input method of SIM pasting cards based on built-in security chip
CN111049649A (en) Zero-interaction key negotiation security enhancement protocol based on identification password
CN106788997B (en) A kind of real-time multimedia encryption method based on id password
Kuppuswamy et al. New Innovation of Arabic language Encryption Technique using New symmetric key algorithm
CN111656728B (en) Device, system and method for secure data communication
CN111541603B (en) Independent intelligent safety mail terminal and encryption method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190730

RJ01 Rejection of invention patent application after publication