CN110071863A - A kind of instant communication users group's encryption method based on id password - Google Patents
A kind of instant communication users group's encryption method based on id password Download PDFInfo
- Publication number
- CN110071863A CN110071863A CN201910342724.7A CN201910342724A CN110071863A CN 110071863 A CN110071863 A CN 110071863A CN 201910342724 A CN201910342724 A CN 201910342724A CN 110071863 A CN110071863 A CN 110071863A
- Authority
- CN
- China
- Prior art keywords
- group
- instant
- instant communication
- communication users
- private key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Abstract
Instant communication users group's encryption method based on id password that the invention discloses a kind of, by one group of instant communication users [Xi] composition instant communication users group, group members XiIt is respectively provided with identity ID_xi, a unique group identification GP_x is generated when instant communication users group creates, realizes the communication between security instant communication user group, instant communication users group members identify corresponding private key from the downloading of the key generation system of id password system;Any Instant Messenger user X in instant communication users groupiObtain the corresponding identity private key GS_x of group identification GP_x;When any Instant Messenger user needs to send instant messages in instant communication users group, session content all is encrypted using group identification GP_x, sends cipher-text message;Other Instant Messenger users decrypt the cipher-text message received using the private key GS_x of group identification GP_x in instant communication users group.The invention has the advantages that instant communication users group members possess private key GS_x, rather than instant communication users group members cannot obtain private key GS_x, cannot be decrypted, have a safety feature to information.
Description
Technical field
The present invention relates to the fields of the data safety in data communication, in particular to protect instant messaging using cryptographic technique
A kind of instant communication users group's encryption method based on id password of the safety of data.
Background technique
Instant messaging tools such as QQ, wechat etc. carries out information transmitting using IP Digital Network technology, considerably reduces logical
The expense of letter.Because of the opening of IP network, this kind of instant messaging faces leaking data, or the risk being tampered, and needs to use
Cryptographic technique is protected.
Traditional method, such as QQ, Skype and wechat add in traditional IM (Instant Message) system-based
Enter client to server encrypted tunnel.But there are still following 3 problems for this: the independent authentication problem of message, identity it is true
Reality is guaranteed that user is unable to sender's identity of individual authentication message by server;End secure communication problem is held, message is through servicing
Re-encrypted when device transfer, therefore content does not maintain secrecy to service provider, i.e., is not end end safety.Forward secrecy communication issue,
The session key of QQ and Skype is permanent key, once leakage, will jeopardize all Content of Communication, that is, lack forward secrecy.
Summary of the invention
The purpose of the present invention is carry out letter using IP Digital Network technology for current instant messaging tools such as QQ, wechat etc.
Breath transmitting, considerably reduces the expense of communication.Because of the opening of IP network, this kind of instant messaging faces leaking data, or
The risk being tampered provides a kind of instant communication users group's encryption method based on id password.
The present invention is that technical solution used by realizing its purpose is: a kind of instant messaging encryption side based on id password
Method, instant communication users identify corresponding private key from the downloading of the key generation system of id password system, have identity ID_
The instant communication users A of a realizes security instant communication, including following step with the instant communication users B with identity ID_b
Suddenly;
Step A, whether online instant communication users A detects instant communication users B, if turning to step B online, otherwise turning
To step C;
Step B01, instant communication users A initiates communication process using the identity of instant communication users B;In Instant Messenger
The terminal of credit household A generates random X, according to the parameter G that system is selected, calculates R_a=GX;Include using hash function H calculating
The abstract HASH_a of the first information of R_a, ID_a, ID_b;
Step B02, instant communication users A inquires the open system parameter PP_ of the id password system where ID_b mark
b;Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts R_a and HASH_a;By the second information data including encrypted result
It is sent to instant communication users B;
Step B03, after instant communication users B receives the second information data that instant communication users A is sent, ID_b pairs is used
The private key decryption message answered obtains R_a, HASH_a;
Step B04, instant communication users B verifies the legitimacy of HASH_a;If illegal, this communication is terminated, it is no
Random number Y is then generated, according to the parameter G that system is selected, calculates R_b=GY, K is calculated using R_a and R_b;Use hash function H
Calculate includes R_a, R_b, ID_a, the abstract HASH_b of the third information of ID_b, K;
Step B05, instant communication users B inquires the open system parameter PP_ of the id password system where ID_a mark
a;Mark Encryption Algorithm, which is executed, using PP_a and ID_a encrypts R_b and HASH_b;By the 4th information data including encrypted result
It is sent to instant communication users A;
Step B06, after instant communication users A receives the 4th information data that instant communication users B is sent;Use ID_a pairs
The private key decryption message answered obtains R_b, HASH_b;Verify the legitimacy of HASH_b;If illegal, this communication is terminated;
Otherwise K is calculated using R_a and R_b;
Step B07, it uses K as master key when instant communication users A and instant communication users B conversate, uses
The symmetric encipherment algorithm and message consistency protection algorithm of selection carry out encryption and data consistency protection to the content of session;
Instant communication users A and instant communication users B realizes secured session, and session finishes end;
Step C, instant communication users A inquires the open system parameter PP_b of the id password system where ID_b mark;
Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts instant message data.
The invention has the advantages that both sides have carried out by force when instant communication users A and instant communication users B online communication
Authentication, i.e., communications protection key K can not effectively be calculated by not possessing the corresponding private key of ID_a or ID_b, thus can not be to encryption
Data be decrypted, or forge or distort by data consistency protect message.In offline communications or group communication,
There is no corresponding identity private key that can not decrypt offline or group communication data.
Further, in the above-mentioned instant messaging encryption method based on id password: being utilized in the step B04
The formula that R_a and R_b calculates K is K=(GX)Y=GXY;The formula of K is calculated using R_a and R_b in the step B06 as K
=(GY)X=GXY。
Further, in the above-mentioned instant messaging encryption method based on id password: in the step B04 and step
The formula of K is calculated in B06 using R_a and R_b as K=R_a ⊕ R_b.
Further, in the above-mentioned instant messaging encryption method based on id password: the second information further includes ID_a,
The mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b.4th information further includes ID_a,
The mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b.In addition, the first information,
Second information, third information in the 4th information further include current time T.
Further, in the above-mentioned instant messaging encryption method based on id password: the content packet of session in step B07
Include text, voice, file.
The present invention also provides a kind of instant communication users group's encryption method based on id password, technical solution are as follows: a kind of
Instant communication users group's encryption method based on id password, by one group of instant communication users [Xi] composition instant communication users
Group, i is natural number, group members XiIt is respectively provided with identity ID_xi, one is generated when the instant communication users group creates
A unique group identification GP_x realizes the communication between security instant communication user group, includes the following steps;
Step 1, instant communication users group members identify corresponding private from the downloading of the key generation system of id password system
Key;
Any Instant Messenger user X in step 2, instant communication users groupiObtain the corresponding identity private key GS_ of group identification GP_x
x;
Step 3 when any Instant Messenger user needs to send instant messages in instant communication users group, is all marked using group
Know GP_x and encrypt session content, sends cipher-text message;
Step 4, other Instant Messenger users are decrypted using the private key GS_x of group identification GP_x in instant communication users group
The cipher-text message received.
Further, in above-mentioned instant communication users group's encryption method based on id password: any to be in step 2
The family Shi Tongyong XiObtaining the corresponding identity private key GS_x of group identification GP_x includes:
Instant Messenger user X in step 201, instant communication users groupiIt initiates to obtain mark GP_x's to instant way system
Request;
Step 202, instant way system judge Instant Messenger user XiWhether instant communication users group GP_x member is belonged to, if
It is to turn to step 203, otherwise terminates;
Step 203, instant way system then generate identity private key GS_x and are sent to Instant Messenger user X by the channel of safetyi。
In the step 203, user X in group is usediMark ID_xiX is sent to after encryption group identification private key GS_xi, XiUse it
Group identification private key is obtained after identity private key decryption.
Further, in above-mentioned instant communication users group's encryption method based on id password: instant communication users group
In any Instant Messenger user XiIf after leaving group, instant communication users group identification is modified to GP'_x by instant way system, notice
Other Instant Messenger user is encrypted in group communication using new mark GP'_x in the instant communication users group, and is pacified again
Distribute new group's private key GS'_x entirely.
The present invention is described in more detail in the following with reference to the drawings and specific embodiments.
Detailed description of the invention
Fig. 1 is two Instant Messenger user's online negotiation cipher key processes.
When Fig. 2 is two Instant Messenger user communication, secure communication process when one of them is not online.
Fig. 3 is group key distribution procedure in instant communication users group.
Fig. 4 is group encryption communication process in instant communication users group.
Specific embodiment
Embodiment 1, the present embodiment are a kind of methods that Instant Messenger user A and Instant Messenger user B carries out secure session.
The purpose of the present embodiment is the identity forgery faced in the process for real-time multimedia communication, leaking data, data
The security risk faced is distorted, the key agreement and data ciphering method of a kind of strong identity authentication are provided.
The present embodiment is to illustrate two instant communication users A and B using the system such as QQ of instant messaging, wechat, SKYPE etc.
Secrecy real-time session is carried out, it is known that the user to be conversated using such instant way system, needs to possess and has calculating
The intelligent mobile terminal or PC terminal of ability, terminal install above system, instant communication users and Instant Messenger in description below
Letter client, the physical aspect of user can be regarded as one intelligent terminal of a personal use and another uses other one
Intelligent terminal is communicated by internet, can be unlimited as the spatial position of two people.In practice, instant messaging is used
Made using the information with uniqueness such as phone number or mail address general during instant messaging, QQ number, WeChat ID at family
For identity, user carries out that the authentication based on mark and key agreement mechanisms are first carried out when online instant messaging, association
The key that quotient only has both sides that can just calculate realizes data exchange using key cooperation data ciphering method again.
This approach includes the following steps realizes:
It is step 1, corresponding in the communication process identity such as instant communication client loading mobile phone number or mail address
Identity private key.Instant communication client needs to identify corresponding private key from the downloading of the key generation system of id password system.This
Process, which may relate to key generation system certification user, has the identity informations such as corresponding phone number or mail address.It identifies close
The key generation system of code system is a kind of " believable from trust authority (Self-Trust Authority, STA).
Situation 1, in the case where communicating pair A and B are online, as shown in Figure 1.
Step 2.1, user A (with identity ID_a) input the communications identities of user B using instant communication client
It identifies (such as phone number or mail address ID_b) and initiates communication process;Instant communication client generates random X, according to system
Selected parameter G calculates R_a=GX;Being calculated using hash function H includes R_a, ID_a, ID_b and some other related letters
The abstract HASH_a of breath.Here parameter G can be generation member or the prime number met in the elliptic curve point group of security requirement
Generation member in the comultiplication group of domain.
The open system parameter of id password system where step 2.2, the side's A instant communication client inquiry ID_b mark
PP_b;Mark Encryption Algorithm, which is executed, using PP_b and ID_b encrypts R_a and HASH_a;By encrypted result and optional ID_a,
The information such as the mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b are sent to the side B.
After step 2.3, the side's B instant communication client receive the data of step 3, decryption is used using the corresponding mark of ID_b
Message obtains R_a, HASH_a;B verifies the legitimacy of HASH_a first;If illegal, this communication is terminated, is otherwise generated
Random Y calculates R_b=G according to the parameter G that system is selectedY, K=(GX)Y=GXYOr K=R_a ⊕ R_b;Use hash function
It includes R_a, R_b, ID_a, the abstract HASH_b of ID_b, K and some other relevant informations that H, which is calculated,.
The open system parameter of id password system where step 2.4, the side's B instant communication client inquiry ID_a mark
PP_a;Mark Encryption Algorithm, which is executed, using PP_a and ID_a encrypts R_b and HASH_b;By encrypted result and optional ID_a,
The information such as the mark ID_kgc_a/ID_kgc_b of id password system where ID_b, ID_a/ID_b are sent to the side A.
After step 2.5, the side's A instant communication client receive the message of step 5;Decryption is used using the corresponding mark of ID_a
Message obtains R_b, HASH_b;Calculate K=(GY)X=GXYOr K=R_a ⊕ R_b;Verify the legitimacy of HASH_b;If no
It is legal, then terminate this communication.
Step 2.6 uses K as key, using key derivation algorithm KDF (KDF1 as defined in ISO 18033-2 or
Person KDF2) from K derivation encryption key and message consistency protection key, use the symmetric encipherment algorithm and message consistency of selection
Protection algorism carries out encryption and data consistency protection to communication data.Protected data can be text, voice, file
Deng.
Situation 2, in the case where recipient B is not online, as shown in Figure 2.
3.1, the open system parameter PP_ of the id password system where the side's A instant communication client inquiry ID_b mark
b;Mark Encryption Algorithm is executed using PP_b and ID_b and encrypts instant message data, and data can be text, voice, file etc..
Situation 3, in the case where more people's group communications such as A, B, C: as shown in Figure 4.Here general saying is used, under
Face group refers to that instant communication users group, user refer to Instant Messenger user.
It 4.1, is all living creatures when group creating into a unique group identification GP_x;
4.2, user Z obtains the corresponding identity private key GS_x of mark GP_x in group;
4.2.1, Z-direction system is initiated to obtain the request of mark GP_x
4.2.2, system judges whether Z belongs to crowd GP_x, and Z belongs to crowd GP_x, then generates identity private key GS_x
4.2.3, system is sent to user Z by the scheme of safety.Such as using sending after the mark encryption GS_x of Z, Z makes
It is decrypted with its private key and obtains key;The scheme of safety is there are also very much, from the point of view of the present embodiment, the id password that is used due to us
It is mailbox number, telephone number etc., therefore, instant way system can also be by the way of mail or mobile phone short message to instant messaging
Member in user group sends identity private key GS_x.
4.3, U encrypts instant message using group identification GP_x;
4.4, Z decrypts cipher-text message using the private key GS_x of group identification GP_x;
If after 4.5, V leaves group, if it is desired, service system modifies group identification to GP'_x, and other in group is notified to use
Encryption uses new mark GP'_x when the group communication of family, and re-downloads new group's private key GS'_x.As shown in Figure 3.
The beneficial effect of the present embodiment is, both sides have carried out strong identity authentication when two people's online communications, i.e., does not possess ID_a
Or the corresponding private key of ID_b can not effectively calculate communications protection key K, to the data of encryption can not be decrypted, or pseudo-
Make or distort the message protected by data consistency.In offline communications or group communication, without corresponding identity private key without
Method decrypts offline or group communication data.
Claims (3)
1. a kind of instant communication users group's encryption method based on id password, it is characterised in that: by one group of instant communication users
[Xi] composition instant communication users group, i is natural number, group members XiIt is respectively provided with identity ID_xi, the Instant Messenger
To generate a unique group identification GP_x when credit household's group's creation, the communication between security instant communication user group, packet are realized
Include following steps;
Step 1, instant communication users group members identify corresponding private key from the downloading of the key generation system of id password system;
Any Instant Messenger user X in step 2, instant communication users groupiObtain the corresponding identity private key GS_x of group identification GP_x;
Step 3 when any Instant Messenger user needs to send instant messages in instant communication users group, all uses group identification
GP_x encrypts session content, sends cipher-text message;
Step 4, other Instant Messenger users are received using the private key GS_x decryption of group identification GP_x in instant communication users group
Cipher-text message.
2. instant communication users group's encryption method according to claim 1 in id password, it is characterised in that: step 2
In, any Instant Messenger user XiObtaining the corresponding identity private key GS_x of group identification GP_x includes:
Instant Messenger user X in step 201, instant communication users groupiIt initiates to obtain the request for identifying GP_x to instant way system;
Step 202, instant way system judge Instant Messenger user XiWhether belong to instant communication users group GP_x member, if it is turn
To step 203, otherwise terminate;
Step 203, instant way system then generate identity private key GS_x and are sent to Instant Messenger user X by the channel of safetyi。
3. according to claim 1 instant communication users group's encryption method based on id password, it is characterised in that: Instant Messenger
Any Instant Messenger user X in credit household groupiIf after leaving group, instant communication users group identification is modified to by instant way system
GP'_x notifies that other Instant Messenger user is added in group communication using new mark GP'_x in the instant communication users group
It is close, and the new group's private key GS'_x of secure distribution again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910342724.7A CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910342724.7A CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
CN201611123159.8A CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611123159.8A Division CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110071863A true CN110071863A (en) | 2019-07-30 |
Family
ID=58397073
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611123159.8A Active CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
CN201910342724.7A Pending CN110071863A (en) | 2016-12-08 | 2016-12-08 | A kind of instant communication users group's encryption method based on id password |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611123159.8A Active CN106549858B (en) | 2016-12-08 | 2016-12-08 | Instant messaging encryption method based on identification password |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106549858B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106941406B (en) * | 2017-05-02 | 2019-11-08 | 深圳奥联信息安全技术有限公司 | Identify-based encryption endorsement method, decryption sign test method and device thereof |
CN107135080B (en) * | 2017-07-06 | 2019-09-27 | 深圳奥联信息安全技术有限公司 | SM9 decryption method and device |
CN107893549A (en) * | 2017-11-09 | 2018-04-10 | 曹睿康 | A kind of building block |
CN108964893B (en) * | 2018-06-26 | 2021-11-23 | 百度在线网络技术(北京)有限公司 | Key processing method, device, equipment and medium |
CN114938358B (en) * | 2022-04-14 | 2024-02-23 | 厦门市美亚柏科信息股份有限公司 | Backup method and terminal for instant messaging application data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170404A (en) * | 2006-10-24 | 2008-04-30 | 华为技术有限公司 | Method for secret key configuration based on specified group |
CN102196384A (en) * | 2011-05-18 | 2011-09-21 | 陈善真 | Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network |
CN104158653A (en) * | 2014-08-14 | 2014-11-19 | 华北电力大学句容研究中心 | Method of secure communication based on commercial cipher algorithm |
CN104219051A (en) * | 2014-08-20 | 2014-12-17 | 北京奇艺世纪科技有限公司 | In-group message communication method and system |
CN104618397A (en) * | 2015-03-04 | 2015-05-13 | 北京深思数盾科技有限公司 | Encryption method and system for instant messaging software |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
CN105281897A (en) * | 2014-07-22 | 2016-01-27 | 中兴通讯股份有限公司 | File encryption method and device and file decryption method and device |
CN105610789A (en) * | 2015-12-18 | 2016-05-25 | 成都三零瑞通移动通信有限公司 | Data encryption method suitable for multi-user group chat instant communication |
US20160226835A1 (en) * | 2015-01-29 | 2016-08-04 | Blackrock Financial Management, Inc. | Authenticating Connections and Program Identity in a Messaging System |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662458A (en) * | 2008-08-28 | 2010-03-03 | 西门子(中国)有限公司 | Authentication method |
US8958559B2 (en) * | 2011-06-03 | 2015-02-17 | Apple Inc. | System and method for secure instant messaging |
CN105306492B (en) * | 2015-11-25 | 2019-01-04 | 成都三零瑞通移动通信有限公司 | A kind of asynchronous cryptographic key negotiation method and device for security instant communication |
-
2016
- 2016-12-08 CN CN201611123159.8A patent/CN106549858B/en active Active
- 2016-12-08 CN CN201910342724.7A patent/CN110071863A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170404A (en) * | 2006-10-24 | 2008-04-30 | 华为技术有限公司 | Method for secret key configuration based on specified group |
CN102196384A (en) * | 2011-05-18 | 2011-09-21 | 陈善真 | Automatic switching system and method based on cellular mobile communication network and Internet protocol (IP) network |
CN105281897A (en) * | 2014-07-22 | 2016-01-27 | 中兴通讯股份有限公司 | File encryption method and device and file decryption method and device |
CN104158653A (en) * | 2014-08-14 | 2014-11-19 | 华北电力大学句容研究中心 | Method of secure communication based on commercial cipher algorithm |
CN104219051A (en) * | 2014-08-20 | 2014-12-17 | 北京奇艺世纪科技有限公司 | In-group message communication method and system |
US20160226835A1 (en) * | 2015-01-29 | 2016-08-04 | Blackrock Financial Management, Inc. | Authenticating Connections and Program Identity in a Messaging System |
CN104618397A (en) * | 2015-03-04 | 2015-05-13 | 北京深思数盾科技有限公司 | Encryption method and system for instant messaging software |
CN105025019A (en) * | 2015-07-07 | 2015-11-04 | 深圳奥联信息安全技术有限公司 | Data safety sharing method |
CN105610789A (en) * | 2015-12-18 | 2016-05-25 | 成都三零瑞通移动通信有限公司 | Data encryption method suitable for multi-user group chat instant communication |
Also Published As
Publication number | Publication date |
---|---|
CN106549858A (en) | 2017-03-29 |
CN106549858B (en) | 2019-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu et al. | A secure authentication scheme with anonymity for wireless communications | |
CN107888560B (en) | Mail safe transmission system and method for mobile intelligent terminal | |
US9008312B2 (en) | System and method of creating and sending broadcast and multicast data | |
CN105323070B (en) | A kind of safety E-mail implementation method based on digital envelope | |
CN106301788B (en) | A kind of group key management method for supporting user identity authentication | |
CN106549858B (en) | Instant messaging encryption method based on identification password | |
CN109495274A (en) | A kind of decentralization smart lock electron key distribution method and system | |
CN104821944A (en) | Hybrid encrypted network data security method and system | |
CN108090370B (en) | Instant communication encryption method and system based on index | |
CN101626294A (en) | Certifying method based on identity, method, equipment and system for secure communication | |
US9130744B1 (en) | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |
EP2140605A1 (en) | Secure electronic messaging system requiring key retrieval for deriving decryption key | |
CN108011885B (en) | E-mail encryption method and system based on group cryptosystem | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN105743641B (en) | It is a kind of can explicit authentication public key multi-receiver label decryption method | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN109873699A (en) | A kind of voidable identity public key encryption method | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
CN112738133A (en) | RSA authentication method | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN111049649A (en) | Zero-interaction key negotiation security enhancement protocol based on identification password | |
CN106788997B (en) | A kind of real-time multimedia encryption method based on id password | |
Kuppuswamy et al. | New Innovation of Arabic language Encryption Technique using New symmetric key algorithm | |
CN111656728B (en) | Device, system and method for secure data communication | |
CN111541603B (en) | Independent intelligent safety mail terminal and encryption method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190730 |
|
RJ01 | Rejection of invention patent application after publication |