CN112738073A - High-security special document transmission method and system - Google Patents

High-security special document transmission method and system Download PDF

Info

Publication number
CN112738073A
CN112738073A CN202011566984.1A CN202011566984A CN112738073A CN 112738073 A CN112738073 A CN 112738073A CN 202011566984 A CN202011566984 A CN 202011566984A CN 112738073 A CN112738073 A CN 112738073A
Authority
CN
China
Prior art keywords
key
document
party
encrypted
symmetric key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011566984.1A
Other languages
Chinese (zh)
Inventor
文聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Itruschina Co ltd
Original Assignee
Itruschina Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Itruschina Co ltd filed Critical Itruschina Co ltd
Priority to CN202011566984.1A priority Critical patent/CN112738073A/en
Publication of CN112738073A publication Critical patent/CN112738073A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing

Abstract

The invention provides a high-security special document transmission method and a system, wherein the method comprises the following steps: the authority randomly generates an SM4 symmetric key, and encrypts the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document; the authority end encrypts the SM4 symmetric key to obtain an encryption key; the organ side sends the encrypted document and the encrypted key to the party side through the sending platform; the party side decrypts the received encryption key to obtain SM4 symmetric key plaintext; the party decrypts the received encrypted document using the SM4 symmetric key plaintext to obtain the private document plaintext. The method reduces the risk of privacy leakage of the parties.

Description

High-security special document transmission method and system
Technical Field
The invention belongs to the technical field of electronic special document delivery, and particularly relates to a high-security special document delivery method and system.
Background
The private document delivery process requires protection of the party's privacy. The existing special document delivery methods mainly comprise the following methods: 1. adopting a direct delivery mode; 2. the person to be delivered refuses and can be left for delivery; 3. direct delivery is difficult, and related organizations can be entrusted with delivery; 4. mailing for delivery; 5. the delivery person is not clear or can not be delivered by other modes, and can announce the delivery.
The above delivery method is usually to put a special document into a file bag and seal the file bag to avoid the privacy leakage of the party, but the delivery method still has the risk of privacy leakage of the party.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a high-security special document transmission method and system, which reduces the risk of privacy leakage of parties.
In a first aspect, a method for delivering a high-security document comprises the following steps:
the authority randomly generates an SM4 symmetric key, and encrypts the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document;
the authority end encrypts the SM4 symmetric key to obtain an encryption key;
the organ side sends the encrypted document and the encrypted key to the party side through the sending platform;
the party side decrypts the received encryption key to obtain SM4 symmetric key plaintext;
the party decrypts the received encrypted document using the SM4 symmetric key plaintext to obtain the private document plaintext.
Preferably, the encrypting, by the authority, the SM4 symmetric key to obtain the encryption key specifically includes:
receiving the recorded unique identification of the party by the organ side;
and the organ side IBE encrypts the SM4 symmetric key by using the unique identifier of the principal and the IBE asymmetric public key to obtain the encryption key.
Preferably, the delivering the encrypted document and the encrypted key to the party by the delivery platform by the bureau terminal specifically includes:
generating delivery information by the organ end;
the organ end sends the delivery information, the encrypted document and the encrypted key to the delivery platform;
the delivery platform stores delivery information, an encrypted document and an encrypted key;
the delivery platform sends the encrypted document and the encrypted key to the party side in a mail mode.
Preferably, the method further comprises, after the authority terminal delivers the encrypted document and the encryption key to the principal terminal through the delivery platform, before the principal terminal decrypts the received encryption key:
the party side initiates a decryption request to the delivery platform by accessing the hyperlink in the mail;
the delivery platform generates a verification code according to the decryption request and returns the verification code to the party side;
the party side starts to perform decryption by entering the verification code in the mail.
Preferably, the decrypting, by the principal side, the received encryption key to obtain the SM4 symmetric key plaintext specifically includes:
and the party side decrypts the encrypted key by using the unique identifier of the party and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
In a second aspect, a high security, dedicated document delivery system, comprising:
and a machine end: the system is used for randomly generating an SM4 symmetric key, and encrypting the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document; the organ side is also used for encrypting the SM4 symmetric key to obtain an encryption key, and the delivery platform delivers the encryption document and the encryption key to the party side;
a delivery platform;
the client side: for decrypting the received encryption key to obtain SM4 symmetric key plaintext, and decrypting the received encrypted document using SM4 symmetric key plaintext to obtain the private document plaintext.
Preferably, the trap end is specifically configured to:
and receiving the recorded unique identifier of the party, and IBE encrypting the SM4 symmetric key by using the unique identifier of the party and the IBE asymmetric public key to obtain the encryption key.
Preferably, the trap end is specifically configured to:
generating delivery information, and delivering the delivery information, the encrypted document and the encrypted key to a delivery platform;
the delivery platform is specifically configured to:
the delivery information, the encrypted document and the encrypted key are stored, and the encrypted document and the encrypted key are sent to the party side in a mail mode.
Preferably, the party side is further configured to:
initiating a decryption request to a delivery platform by accessing a hyperlink in the mail; the principal side is also used for starting to execute decryption by inputting the verification code in the mail;
the delivery platform is further configured to:
and generating a verification code according to the decryption request, and returning the verification code to the party side.
Preferably, the party side is specifically configured to:
decrypting the encrypted key with the SM4 symmetric key using the principal unique identifier and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
According to the technical scheme, the high-security private document transmission method and the high-security private document transmission system have the advantages that the privacy of the parties is better protected on the basis of convenience, and the specific content of the private document cannot be obtained even if the encryption document and the encryption key are taken before decryption operation is initiated by no party. Compared with the traditional document delivery mode, the method has the advantages that the privacy protection is obviously improved, the encryption and decryption technology is matched with a confirmation mechanism, the condition that other people cannot know the content of the special document except the intention of the party is ensured, and the risk of privacy leakage of the party is reduced.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of a method for transmitting a special document according to an embodiment of the present invention.
Fig. 2 is a block diagram of a dedicated document delivery system according to a second embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The first embodiment is as follows:
a high security document delivery method, see fig. 1, comprising the steps of:
s1: the authority randomly generates an SM4 symmetric key, and encrypts the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document;
s2: the authority end encrypts the SM4 symmetric key to obtain an encryption key, which specifically includes:
receiving the recorded unique identification of the party by the organ side; the principal unique identifier is used to uniquely identify the principal.
And the organ side IBE encrypts the SM4 symmetric key by using the unique identifier of the principal and the IBE asymmetric public key to obtain the encryption key.
S3: the organ side sends the encrypted document and the encrypted key to the party side through the delivery platform, which specifically comprises the following steps:
generating delivery information by the organ end;
the organ end sends the delivery information, the encrypted document and the encrypted key to the delivery platform;
the delivery platform stores delivery information, an encrypted document and an encrypted key;
the delivery platform sends the encrypted document and the encrypted key to the party side in a mail mode.
S4: the party side decrypts the received encryption key to obtain the SM4 symmetric key plaintext, which specifically includes:
and the party side decrypts the encrypted key by using the unique identifier of the party and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
S5: the party decrypts the received encrypted document using the SM4 symmetric key plaintext to obtain the private document plaintext.
Specifically, the private document transmission method randomly generates an SM4 symmetric key during encryption, encrypts the private document by using an SM4 algorithm, and performs IBE encryption on the SM4 key by using the unique identifier of the party and the IBE asymmetric public key. And after the encryption of the organ end is finished, the special-purpose end sends the special-purpose end to the party end through the delivery platform, the party decrypts the encryption key by using the unique identifier of the party and the IBE asymmetric private key, and the encrypted document is decrypted by using the decrypted key plaintext in SM4 to obtain the special-purpose document plaintext.
The method adopts two encryption and decryption methods of SM4 and IBE for encryption and decryption, and combines the advantages of the two encryption and decryption technologies. The SM4 has high encryption and decryption speed, but only one key is used, so that the leakage risk is high. The IBE has a slow encryption and decryption speed, but there are two keys, and the key used for encryption cannot be decrypted in the reverse direction, and even if leaked, the symmetric key of SM4 cannot be leaked, that is, the ciphertext of the private document cannot be decrypted.
The method is matched with an electronic special document delivery platform, so that the privacy of the parties is better protected on the basis of convenience, and the specific content of the special document cannot be obtained even if the encryption document and the encryption key are taken before no party initiates decryption operation. Compared with the traditional document delivery mode, the method has the advantages that the privacy protection is obviously improved, the encryption and decryption technology is matched with a confirmation mechanism, the condition that other people cannot know the content of the special document except the intention of the party is ensured, and the risk of privacy leakage of the party is reduced.
Preferably, the method further comprises, after the authority terminal delivers the encrypted document and the encryption key to the principal terminal through the delivery platform, before the principal terminal decrypts the received encryption key:
the party side initiates a decryption request to the delivery platform by accessing the hyperlink in the mail;
the delivery platform generates a verification code according to the decryption request and returns the verification code to the party side;
the party side starts to perform decryption by entering the verification code in the mail.
Specifically, when the mail of the gateway end is sent to the party end, the party can log in the delivery platform and confirm to execute the decryption of the special document through the mailbox verification code confirmation mechanism.
In summary, the method adopts SM4 and IBE (identity-based encryption) encryption and decryption technologies, and combines three modes of private document encryption, SM4 symmetric key encryption, verification code confirmation and the like, so as to ensure that the private document can be delivered to the party in time, and other people cannot know the content of the private document before the party does not operate decryption.
Example two:
a high security, dedicated document delivery system, see fig. 2, comprising:
and a machine end: the system is used for randomly generating an SM4 symmetric key, and encrypting the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document; the organ side is also used for encrypting the SM4 symmetric key to obtain an encryption key, and the delivery platform delivers the encryption document and the encryption key to the party side;
a delivery platform;
the client side: for decrypting the received encryption key to obtain SM4 symmetric key plaintext, and decrypting the received encrypted document using SM4 symmetric key plaintext to obtain the private document plaintext.
Preferably, the trap end is specifically configured to:
and receiving the recorded unique identifier of the party, and IBE encrypting the SM4 symmetric key by using the unique identifier of the party and the IBE asymmetric public key to obtain the encryption key.
Preferably, the trap end is specifically configured to:
generating delivery information, and delivering the delivery information, the encrypted document and the encrypted key to a delivery platform;
the delivery platform is specifically configured to:
the delivery information, the encrypted document and the encrypted key are stored, and the encrypted document and the encrypted key are sent to the party side in a mail mode.
Preferably, the party side is further configured to:
initiating a decryption request to a delivery platform by accessing a hyperlink in the mail; the principal side is also used for starting to execute decryption by inputting the verification code in the mail;
the delivery platform is further configured to:
and generating a verification code according to the decryption request, and returning the verification code to the party side.
Preferably, the party side is specifically configured to:
decrypting the encrypted key with the SM4 symmetric key using the principal unique identifier and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
The system better protects the privacy of the parties on the basis of convenience, and the specific content of the special document cannot be obtained even if the encryption document and the encryption key are taken before no party initiates decryption operation. Compared with the traditional document delivery mode, the method has the advantages that the privacy protection is obviously improved, the encryption and decryption technology is matched with a confirmation mechanism, the condition that other people cannot know the content of the special document except the intention of the party is ensured, and the risk of privacy leakage of the party is reduced.
For the sake of brief description, the system provided by the embodiment of the present invention may refer to the corresponding content in the foregoing method embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. A high-security special document transmission method is characterized by comprising the following steps:
the authority randomly generates an SM4 symmetric key, and encrypts the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document;
the authority end encrypts the SM4 symmetric key to obtain an encryption key;
the organ side sends the encrypted document and the encrypted key to the party side through the sending platform;
the party side decrypts the received encryption key to obtain SM4 symmetric key plaintext;
the party decrypts the received encrypted document using the SM4 symmetric key plaintext to obtain the private document plaintext.
2. The method of claim 1, wherein the act of encrypting the SM4 symmetric key by the authority to obtain the encryption key comprises:
receiving the recorded unique identification of the party by the organ side;
and the organ side IBE encrypts the SM4 symmetric key by using the unique identifier of the principal and the IBE asymmetric public key to obtain the encryption key.
3. The method of claim 2, wherein the delivering the encrypted document and the encryption key to the party by the bureau terminal via the delivery platform comprises:
generating delivery information by the organ end;
the organ end sends the delivery information, the encrypted document and the encrypted key to the delivery platform;
the delivery platform stores delivery information, an encrypted document and an encrypted key;
the delivery platform sends the encrypted document and the encrypted key to the party side in a mail mode.
4. The method of claim 3, wherein after the authority sends the encrypted document and the encryption key to the party via the delivery platform, the method further comprises, before the party decrypts the received encryption key:
the party side initiates a decryption request to the delivery platform by accessing the hyperlink in the mail;
the delivery platform generates a verification code according to the decryption request and returns the verification code to the party side;
the party side starts to perform decryption by entering the verification code in the mail.
5. The method of claim 4, wherein the party decrypting the received encryption key to obtain SM4 symmetric key plaintext comprises:
and the party side decrypts the encrypted key by using the unique identifier of the party and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
6. A high security, specialized document delivery system, comprising:
and a machine end: the system is used for randomly generating an SM4 symmetric key, and encrypting the special document to be delivered by using the SM4 symmetric key to obtain an encrypted document; the organ side is also used for encrypting the SM4 symmetric key to obtain an encryption key, and the delivery platform delivers the encryption document and the encryption key to the party side;
a delivery platform;
the client side: for decrypting the received encryption key to obtain SM4 symmetric key plaintext, and decrypting the received encrypted document using SM4 symmetric key plaintext to obtain the private document plaintext.
7. The specialized document delivery system according to claim 6,
the machine end is specifically configured to:
and receiving the recorded unique identifier of the party, and IBE encrypting the SM4 symmetric key by using the unique identifier of the party and the IBE asymmetric public key to obtain the encryption key.
8. The specialized document delivery system according to claim 7,
the machine end is specifically configured to:
generating delivery information, and delivering the delivery information, the encrypted document and the encrypted key to a delivery platform;
the delivery platform is specifically configured to:
the delivery information, the encrypted document and the encrypted key are stored, and the encrypted document and the encrypted key are sent to the party side in a mail mode.
9. The specialized document delivery system according to claim 8,
the party side is further configured to:
initiating a decryption request to a delivery platform by accessing a hyperlink in the mail; the principal side is also used for starting to execute decryption by inputting the verification code in the mail;
the delivery platform is further configured to:
and generating a verification code according to the decryption request, and returning the verification code to the party side.
10. The specialized document delivery system according to claim 9, wherein the party end is specifically configured to:
decrypting the encrypted key with the SM4 symmetric key using the principal unique identifier and the IBE asymmetric private key to obtain the SM4 symmetric key plaintext.
CN202011566984.1A 2020-12-25 2020-12-25 High-security special document transmission method and system Pending CN112738073A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011566984.1A CN112738073A (en) 2020-12-25 2020-12-25 High-security special document transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011566984.1A CN112738073A (en) 2020-12-25 2020-12-25 High-security special document transmission method and system

Publications (1)

Publication Number Publication Date
CN112738073A true CN112738073A (en) 2021-04-30

Family

ID=75617055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011566984.1A Pending CN112738073A (en) 2020-12-25 2020-12-25 High-security special document transmission method and system

Country Status (1)

Country Link
CN (1) CN112738073A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078743A (en) * 2013-01-15 2013-05-01 武汉理工大学 E-mail IBE (Internet Booking Engine) encryption realizing method
CN109255248A (en) * 2018-08-28 2019-01-22 福建南威软件有限公司 A kind of text searching method based on enciphering and deciphering algorithm
CN110519041A (en) * 2019-07-29 2019-11-29 同济大学 A kind of attribute base encryption method based on SM9 mark encryption
US20200374117A1 (en) * 2019-05-24 2020-11-26 Wenko Wei Method for creating or verifying input value by using asymmetric encryption algorithm and application method thereof
CN112016111A (en) * 2020-09-08 2020-12-01 杭州天谷信息科技有限公司 Credible bidding encryption and decryption method supporting centralized decryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078743A (en) * 2013-01-15 2013-05-01 武汉理工大学 E-mail IBE (Internet Booking Engine) encryption realizing method
CN109255248A (en) * 2018-08-28 2019-01-22 福建南威软件有限公司 A kind of text searching method based on enciphering and deciphering algorithm
US20200374117A1 (en) * 2019-05-24 2020-11-26 Wenko Wei Method for creating or verifying input value by using asymmetric encryption algorithm and application method thereof
CN110519041A (en) * 2019-07-29 2019-11-29 同济大学 A kind of attribute base encryption method based on SM9 mark encryption
CN112016111A (en) * 2020-09-08 2020-12-01 杭州天谷信息科技有限公司 Credible bidding encryption and decryption method supporting centralized decryption

Similar Documents

Publication Publication Date Title
US10567357B2 (en) Secure transmission system with upgraded encryption strength
JP2000165373A (en) Enciphering device, cryptographic communication system, key restoration system and storage medium
JPH11231778A (en) Device and method for enciphering and deciphering and recording medium recording the same methods
CN111193750A (en) Mailbox encryption method, mailbox decryption method and mailbox processing method based on block chain
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
JPH0962596A (en) Electronic mail system
WO2009154580A1 (en) Secure short message service
CN105471657B (en) inter-domain communication log management method, device and system for virtual machine
CN102055722B (en) Implementation method for ensuring secure storage of electronic mails
CN114567431A (en) Security authentication method for unidirectional transmission
JPH0969831A (en) Cipher communication system
AU2010350058A1 (en) Method and apparatus for authenticated encryption of audio
CN112738073A (en) High-security special document transmission method and system
KR20140033824A (en) Encryption systems and methods using hash value as symmetric key in the smart device
CN111541652B (en) System for improving security of secret information keeping and transmission
JP2007096580A (en) Facsimile communication system
JP4140617B2 (en) Authentication system using authentication recording medium and method of creating authentication recording medium
JP4034946B2 (en) COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND RECORDING MEDIUM
JP3747394B2 (en) Electronic data arrival guarantee method and program recording medium
JP3864656B2 (en) Data transmission method
CN113545025A (en) Method and system for information transmission
JP2008005396A (en) Data transmission method and system, program, and recording medium
CN116506120B (en) Key loading method, key system and readable storage medium
JPH0787081A (en) Entity registration method to key publicity center
CN113014531B (en) Method for encrypting and transmitting e-mail data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination