CN111835510A - ETC safety management method - Google Patents

ETC safety management method Download PDF

Info

Publication number
CN111835510A
CN111835510A CN202010465654.7A CN202010465654A CN111835510A CN 111835510 A CN111835510 A CN 111835510A CN 202010465654 A CN202010465654 A CN 202010465654A CN 111835510 A CN111835510 A CN 111835510A
Authority
CN
China
Prior art keywords
key
password
keys
administrator
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010465654.7A
Other languages
Chinese (zh)
Inventor
李云飞
张勇
徐志成
尹山
周方
苏丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Aerospace Jiangnan Data System Technology Co ltd
Original Assignee
Wuxi Aerospace Jiangnan Data System Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Aerospace Jiangnan Data System Technology Co ltd filed Critical Wuxi Aerospace Jiangnan Data System Technology Co ltd
Priority to CN202010465654.7A priority Critical patent/CN111835510A/en
Publication of CN111835510A publication Critical patent/CN111835510A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an ETC safety management method.A password management module is arranged in ETC equipment and comprises a password algorithm, a key management module, a password protocol and a role management module, wherein the password algorithm selects an SM4 symmetric password algorithm, an SM2 asymmetric password algorithm and an SM3 hash password algorithm; the key management comprises key types, key generation and storage, key updating and revocation and key destruction, the key types comprise management keys and application keys, the management keys comprise key protection keys, device keys and administrator authentication keys, the application keys comprise user work keys, key encryption keys and session keys, and the role management comprises administrators and user roles. According to the invention, the password management module is arranged in the ETC, the data transmission is encrypted and decrypted by adopting a password algorithm, and the identity of an administrator is authenticated, so that the safety of the data transmission can be ensured.

Description

ETC safety management method
The technical field is as follows:
the invention belongs to the technical field of ETC (electronic toll collection) safety management, and particularly relates to an ETC safety management method.
Background art:
in recent years, the state vigorously advances policy implementation, deepens toll road system reform, and ETC systems are rapidly deployed and widely applied nationwide.
However, the ETC system based on wireless communication is just like the communication developed rapidly and the information security transmission encountered in the wide application of computer network, and faces huge information security problems, on one hand, the security defects from the network itself, such as insecurity of network protocol and insufficient protection measures of service data, and on the other hand, human factors, such as poor management, cause hacking. The network information security is related to the security of national ownership and the stability of society, and is related to the security of public and private property and personal privacy. The degree of informatization of the current society is continuously improved, the problem of network information safety is getting more and more severe, and a large amount of important data stored and transmitted in the network needs to be effectively protected.
In order to ensure the data security of the ETC system, sensitive data needs to be transmitted and stored in an encryption mode. The safety solution scheme based on ZYNQ framework design and applicable to the ETC system draws attention to the localization trend of commercial passwords, focuses on the key application industry of the ETC system, and effectively solves the safety problem of the ETC system.
The information disclosed in this background section is only for enhancement of understanding of the general background of the invention and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
The invention content is as follows:
the present invention is directed to providing an ETC security management method, which overcomes the above-mentioned drawbacks of the prior art.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a password management module is arranged in an ETC device, the password management module comprises a password algorithm, a key management, a password protocol and a role management, and the password algorithm selects an SM4 symmetric password algorithm, an SM2 asymmetric password algorithm and an SM3 hash password algorithm; the key management comprises key types, key generation and storage, key updating and revocation and key destruction, the key types comprise management keys and application keys, the management keys comprise key protection keys, device keys and administrator authentication keys, the application keys comprise user work keys, key encryption keys and session keys, and the role management comprises administrators and user roles.
The SM4 symmetric cryptographic algorithm has a key length of 128 bits and a packet length of 128 bits, and is used for encrypting and decrypting data and protecting the key; the SM2 asymmetric cryptographic algorithm has a secret key length of 256 bits, and is used for generating a signature, verifying the signature and distributing a symmetric cryptographic algorithm secret key; the SM3 hash cipher algorithm is used to compress messages of arbitrary length into message digests.
The key protection key is used for encrypting and storing a key; the device key is used for issuing an administrator certificate and verifying the identity of the administrator; the administrator authentication key is used for administrator identity authentication and operation signature; the user work key is stored and accessed in an index mode; the key encryption key is used for protecting a session key; the session key is used for data encryption and decryption and data compression operation of the right key.
The destroying of the secret key comprises two modes of destroying by a software mode and destroying by a manual mode.
The password module carries out correctness verification on a password algorithm before starting, and the verification method comprises the following steps:
1) encrypting and decrypting the test case data, and if the processing result is matched with the expected result, continuing to send the random data D for encrypting and decrypting; if the processing result is not matched with the expected result, an alarm prompt is sent out;
2) if the processing result is equal to the random data D, the random data is used for encryption and decryption again for more than 100 times, if the processing result is equal to the random data every time, the test is ended, and if the processing result is not equal to the random data, an alarm prompt is sent out.
The cryptographic protocol is as follows:
1) during initialization, the intelligent password key generates a pair of SM2 keys as an administrator authentication key, the administrator authentication key is stored in the intelligent password key, and the private key of the intelligent password key is not allowed to be exported;
2) deriving a public key of an administrator authentication key from the intelligent password key, signing by using an equipment key of the password module to generate an administrator certificate, storing the administrator certificate in the password module, and simultaneously writing the administrator certificate into the intelligent password key;
3) when the identity is authenticated, the password module reads the administrator certificate from the intelligent password key, verifies the legality of the certificate by using the equipment key, and checks whether the certificate exists in the password module;
4) the password module generates a random number and requires the intelligent password key to sign the random number;
5) the intelligent password key signs the random number by using a private key of the administrator authentication key and returns a signature result;
6) the password module verifies the correctness of the signature result by using a public key of the administrator authentication key;
7) all the steps are passed, and the identity of the administrator is legal.
One aspect of the technical scheme adopted by the invention has the following beneficial effects:
according to the invention, a password management module is arranged in the ETC, an SM4 symmetric password algorithm, an SM2 asymmetric password algorithm and an SM3 hash password algorithm are adopted to carry out encryption and decryption processing on data transmission, and the correctness of the password algorithm is verified, so that the correctness of the algorithm is ensured; in addition, the password protocol management is adopted to authenticate the identity of the administrator, so that the safety of the protocol can be ensured.
Description of the drawings:
FIG. 1 is a flow of verification of correctness of a cryptographic algorithm according to the present invention.
The specific implementation mode is as follows:
the following detailed description of specific embodiments of the present invention is provided, but it should be understood that the scope of the present invention is not limited by the specific embodiments.
Throughout the specification and claims, unless explicitly stated otherwise, the word "comprise", or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element or component but not the exclusion of any other element or component.
As shown in fig. 1, in an ETC security management method, a cryptographic management module is embedded in an ETC device, the cryptographic management module includes a cryptographic algorithm, a key management, a cryptographic protocol and a role management, and the cryptographic algorithm is selected from an SM4 symmetric cryptographic algorithm, an SM2 asymmetric cryptographic algorithm and an SM3 hash cryptographic algorithm; the key management comprises key types, key generation and storage, key updating and revocation and key destruction, the key types comprise management keys and application keys, the management keys comprise key protection keys, device keys and administrator authentication keys, the application keys comprise user work keys, key encryption keys and session keys, and the role management comprises administrators and user roles.
The SM4 symmetric cryptographic algorithm has a key length of 128 bits and a packet length of 128 bits, and is used for encrypting and decrypting data and protecting the key; the SM2 asymmetric cryptographic algorithm has a secret key length of 256 bits, and is used for generating a signature, verifying the signature and distributing a symmetric cryptographic algorithm secret key; the SM3 hash cipher algorithm is used to compress messages of arbitrary length into message digests.
The key protection key is used for encrypting and storing a key; the device key is used for issuing an administrator certificate and verifying the identity of the administrator; the administrator authentication key is used for administrator identity authentication and operation signature; the user work key is stored and accessed in an index mode; the key encryption key is used for protecting a session key; the session key is used for data encryption and decryption and data compression operation of the right key.
The key destruction comprises two modes of software mode destruction and manual mode destruction, when the key is destroyed in a specific software mode, the password module is provided with a key removal command, and the specified key can be removed in a software mode by means of the command; when the secret key is destroyed manually, the cipher module is provided with a secret key destroying switch, and all the ciphers in the secret key storage component can be eliminated by pressing the secret key destroying switch.
The password module carries out correctness verification on a password algorithm before starting, and the verification method comprises the following steps:
1) encrypting and decrypting the test case data, and if the processing result is matched with the expected result, continuing to send the random data D for encrypting and decrypting; if the processing result is not matched with the expected result, an alarm prompt is sent out;
2) if the processing result is equal to the random data D, the random data is used for encryption and decryption again for more than 100 times, if the processing result is equal to the random data every time, the test is ended, and if the processing result is not equal to the random data, an alarm prompt is sent out.
The specific key is generated and stored as follows:
1) key protection key: the 128-bit symmetric key consists of two components, is generated by the cryptographic module during original initialization or recovery initialization, one component is stored in the boot UKEY, and the other component is stored in a security chip of the cryptographic module;
2) device key: the signature key pair is generated by a cipher module when equipment is initialized, the cipher module is in a ready state after the key is generated, a public key of the equipment can be led out to apply for a certificate to CA at any time in the state, the equipment encryption key pair is generated by a key management center, a private key of the equipment is protected by the equipment signature public key through a digital envelope and can be downloaded into the cipher module, the equipment key is encrypted by a key protection key, and an encrypted ciphertext is stored in FLASH of the cipher module;
3) administrator authentication key: the asymmetric key of the SM2 algorithm, one for each administrator, is generated by the intelligent password key, is stored in the intelligent password key and is used for administrator identity authentication and operation signature;
4) the application key is: the signature key pair is generated by a cryptographic module, a public key can be derived and signed by CA, and the encryption key pair is generated by a key management center, wherein a private key is protected by a corresponding signature public key through a digital envelope and downloaded into the cryptographic module, and a user key is encrypted by a key protection key and stored in FLASH of the cryptographic module;
5) key encryption key: the key encryption key is generated by a key management center, encrypted and protected by a public key of an equipment encryption key of a cryptographic module, downloaded into the cryptographic module, encrypted by a key protection key and stored in FLASH of the cryptographic module;
6) session key: and according to the temporary generation of the password operation, the password operation is packaged in a digital envelope and transmitted along with the message, and the password operation is deleted after the password operation is used up, and the session key is not stored in the password module.
The cryptographic protocol is as follows:
1) during initialization, the intelligent password key generates a pair of SM2 keys as an administrator authentication key, the administrator authentication key is stored in the intelligent password key, and the private key of the intelligent password key is not allowed to be exported;
2) deriving a public key of an administrator authentication key from the intelligent password key, signing by using an equipment key of the password module to generate an administrator certificate, storing the administrator certificate in the password module, and simultaneously writing the administrator certificate into the intelligent password key;
3) when the identity is authenticated, the password module reads the administrator certificate from the intelligent password key, verifies the legality of the certificate by using the equipment key, and checks whether the certificate exists in the password module;
4) the password module generates a random number and requires the intelligent password key to sign the random number;
5) the intelligent password key signs the random number by using a private key of the administrator authentication key and returns a signature result;
6) the password module verifies the correctness of the signature result by using a public key of the administrator authentication key;
7) all the steps are passed, and the identity of the administrator is legal.
According to the invention, a password management module is arranged in the ETC, the SM4 symmetric password algorithm, the SM2 asymmetric password algorithm and the SM3 hash password algorithm are adopted to carry out encryption and decryption processing on data transmission, and the password protocol management is adopted to carry out authentication on the identity of an administrator, so that the safety of the protocol can be ensured.
The foregoing descriptions of specific exemplary embodiments of the present invention have been presented for purposes of illustration and description. It is not intended to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teaching. The exemplary embodiments were chosen and described in order to explain certain principles of the invention and its practical application to enable one skilled in the art to make and use various exemplary embodiments of the invention and various alternatives and modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims and their equivalents.

Claims (6)

1. An ETC safety management method is characterized in that: a password management module is arranged in the ETC equipment, the password management module comprises a password algorithm, key management, a password protocol and role management, and the password algorithm is selected from an SM4 symmetric password algorithm, an SM2 asymmetric password algorithm and an SM3 hash password algorithm; the key management comprises key types, key generation and storage, key updating and revocation and key destruction, the key types comprise management keys and application keys, the management keys comprise key protection keys, device keys and administrator authentication keys, the application keys comprise user work keys, key encryption keys and session keys, and the role management comprises administrators and user roles.
2. The ETC security management method according to claim 1, wherein: the SM4 symmetric cryptographic algorithm has a key length of 128 bits and a packet length of 128 bits, and is used for encrypting and decrypting data and protecting the key; the SM2 asymmetric cryptographic algorithm has a secret key length of 256 bits, and is used for generating a signature, verifying the signature and distributing a symmetric cryptographic algorithm secret key; the SM3 hash cipher algorithm is used to compress messages of arbitrary length into message digests.
3. The ETC security management method according to claim 1, wherein: the key protection key is used for encrypting and storing a key; the device key is used for issuing an administrator certificate and verifying the identity of the administrator; the administrator authentication key is used for administrator identity authentication and operation signature; the user work key is stored and accessed in an index mode; the key encryption key is used for protecting a session key; the session key is used for data encryption and decryption and data compression operation with the key.
4. The ETC security management method according to claim 1, wherein: the destroying of the secret key comprises two modes of destroying by a software mode and destroying by a manual mode.
5. The ETC security management method according to claim 1, wherein: the password module carries out correctness verification on a password algorithm before starting, and the verification method comprises the following steps:
1) encrypting and decrypting the test case data, and if the processing result is matched with the expected result, continuing to send the random data D for encrypting and decrypting; if the processing result is not matched with the expected result, an alarm prompt is sent out;
2) if the processing result is equal to the random data D, the random data is used for encryption and decryption again for more than 100 times, if the processing result is equal to the random data every time, the test is ended, and if the processing result is not equal to the random data, an alarm prompt is sent out.
6. The ETC security management method according to claim 1, wherein: the cryptographic protocol is as follows:
1) during initialization, the intelligent password key generates a pair of SM2 keys as an administrator authentication key, the administrator authentication key is stored in the intelligent password key, and the private key of the intelligent password key is not allowed to be exported;
2) deriving a public key of an administrator authentication key from the intelligent password key, signing by using an equipment key of the password module to generate an administrator certificate, storing the administrator certificate in the password module, and simultaneously writing the administrator certificate into the intelligent password key;
3) when the identity is authenticated, the password module reads the administrator certificate from the intelligent password key, verifies the legality of the certificate by using the equipment key, and checks whether the certificate exists in the password module;
4) the password module generates a random number and requires the intelligent password key to sign the random number;
5) the intelligent password key signs the random number by using a private key of the administrator authentication key and returns a signature result;
6) the password module verifies the correctness of the signature result by using a public key of the administrator authentication key;
7) all the steps are passed, and the identity of the administrator is legal.
CN202010465654.7A 2020-05-28 2020-05-28 ETC safety management method Pending CN111835510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010465654.7A CN111835510A (en) 2020-05-28 2020-05-28 ETC safety management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010465654.7A CN111835510A (en) 2020-05-28 2020-05-28 ETC safety management method

Publications (1)

Publication Number Publication Date
CN111835510A true CN111835510A (en) 2020-10-27

Family

ID=72913519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010465654.7A Pending CN111835510A (en) 2020-05-28 2020-05-28 ETC safety management method

Country Status (1)

Country Link
CN (1) CN111835510A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883396A (en) * 2021-02-27 2021-06-01 郑州信大捷安信息技术股份有限公司 Trusted cryptographic module security management method and system
CN113783868A (en) * 2021-09-08 2021-12-10 广西东信数建信息科技有限公司 Method and system for protecting security of gate Internet of things based on commercial password
CN114022964A (en) * 2021-09-24 2022-02-08 北京中交国通智能交通系统技术有限公司 ETC application key updating method, device and system
CN115021927A (en) * 2022-05-12 2022-09-06 中国科学院信息工程研究所 Cipher machine cluster-oriented administrator identity control method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136069A (en) * 2007-09-18 2008-03-05 深圳市金溢科技有限公司 Issuing method of ETC electronic label
CN105939354A (en) * 2016-06-10 2016-09-14 北京数盾信息科技有限公司 Large-scale network key management system based on GDOI protocol
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN107808419A (en) * 2016-09-08 2018-03-16 全球泊(深圳)技术有限责任公司 A kind of garage parking based on intelligent mobile terminal()Management system
CN110061991A (en) * 2019-04-22 2019-07-26 陈喆 A kind of gateway setting method for realizing expressway tol lcollection private network security access internet
CN110765438A (en) * 2019-10-24 2020-02-07 江苏云涌电子科技股份有限公司 High-performance password card and working method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136069A (en) * 2007-09-18 2008-03-05 深圳市金溢科技有限公司 Issuing method of ETC electronic label
CN106921638A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 A kind of safety device based on asymmetric encryption
CN105939354A (en) * 2016-06-10 2016-09-14 北京数盾信息科技有限公司 Large-scale network key management system based on GDOI protocol
CN107808419A (en) * 2016-09-08 2018-03-16 全球泊(深圳)技术有限责任公司 A kind of garage parking based on intelligent mobile terminal()Management system
CN110061991A (en) * 2019-04-22 2019-07-26 陈喆 A kind of gateway setting method for realizing expressway tol lcollection private network security access internet
CN110765438A (en) * 2019-10-24 2020-02-07 江苏云涌电子科技股份有限公司 High-performance password card and working method thereof

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883396A (en) * 2021-02-27 2021-06-01 郑州信大捷安信息技术股份有限公司 Trusted cryptographic module security management method and system
CN112883396B (en) * 2021-02-27 2022-04-08 郑州信大捷安信息技术股份有限公司 Trusted cryptographic module security management method and system
CN113783868A (en) * 2021-09-08 2021-12-10 广西东信数建信息科技有限公司 Method and system for protecting security of gate Internet of things based on commercial password
CN113783868B (en) * 2021-09-08 2023-09-01 广西东信数建信息科技有限公司 Method and system for protecting Internet of things safety of gate based on commercial password
CN114022964A (en) * 2021-09-24 2022-02-08 北京中交国通智能交通系统技术有限公司 ETC application key updating method, device and system
CN114022964B (en) * 2021-09-24 2024-05-17 北京中交国通智能交通系统技术有限公司 ETC application key updating method, device and system
CN115021927A (en) * 2022-05-12 2022-09-06 中国科学院信息工程研究所 Cipher machine cluster-oriented administrator identity control method and system
CN115021927B (en) * 2022-05-12 2024-04-16 中国科学院信息工程研究所 Administrator identity management and control method and system for cryptographic machine cluster

Similar Documents

Publication Publication Date Title
CN114154135B (en) Internet of vehicles communication security authentication method, system and equipment based on state cryptographic algorithm
CN110881048B (en) Safety communication method and device based on identity authentication
US6976162B1 (en) Platform and method for establishing provable identities while maintaining privacy
CN111835510A (en) ETC safety management method
CN111740844A (en) SSL communication method and device based on hardware cryptographic algorithm
CN110138799A (en) A kind of secure cloud storage method based on SGX
CN109150897B (en) End-to-end communication encryption method and device
CN110535626B (en) Secret communication method and system for identity-based quantum communication service station
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN110233729B (en) Encrypted solid-state disk key management method based on PUF
KR101531662B1 (en) Method and system for mutual authentication between client and server
CN101296083A (en) Enciphered data transmission method and system
CN113204760B (en) Method and system for establishing secure channel for software cryptographic module
CN112487380B (en) Data interaction method, device, equipment and medium
CN111540093A (en) Access control system and control method thereof
CN117278330B (en) Lightweight networking and secure communication method for electric power Internet of things equipment network
KR100668446B1 (en) Safe --method for transferring digital certificate
CN114826659B (en) Encryption communication method and system
CN117335989A (en) Safety application method in internet system based on national cryptographic algorithm
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
CN110611679A (en) Data transmission method, device, equipment and system
CN110149205B (en) Method for protecting Internet of things terminal by using block chain
CN107276961B (en) Method and device for encrypting and decrypting data based on cryptographic algorithm
CN105873043B (en) Method and system for generating and applying network private key for mobile terminal
CN114091055A (en) Quantum encryption information transmission system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20201027