CN112751821A - Data transmission method, electronic equipment and storage medium - Google Patents
Data transmission method, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112751821A CN112751821A CN202010745970.XA CN202010745970A CN112751821A CN 112751821 A CN112751821 A CN 112751821A CN 202010745970 A CN202010745970 A CN 202010745970A CN 112751821 A CN112751821 A CN 112751821A
- Authority
- CN
- China
- Prior art keywords
- algorithm
- password
- access token
- factor
- session key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a data transmission method, which is based on OTP technology, and generates a one-time effective access token for identity authentication in each communication process; meanwhile, an algorithm factor is used for deriving a one-time effective session key for encrypting and decrypting the communication data at the time; during communication, sending an access token and encrypted data; after receiving the data, firstly extracting the access token, verifying the identity of the client, if the access token is valid, deriving a session key of the communication at the moment by using an algorithm factor when the access token is verified, and finishing subsequent encryption, decryption and communication; the invention can automatically calculate and verify the access token by the receiving end, the session key does not need to be transmitted through the network, the security of the transmitted data is further enhanced, and moreover, because the access token and the key are effective once, the replay attack is prevented, the security level of the transmitted ciphertext is greatly improved, and better economic benefit and social benefit are achieved.
Description
Technical Field
The invention relates to the field of communication, in particular to an encryption transmission technology of data.
Background
In order to ensure the security of network communication, two communication parties mutually authenticate the identity of each other and encrypt communication contents. Generally, a client sends identity authentication information to a server for identity authentication, after the identity is confirmed, the client and the server start communication, and communication data is encrypted in a well-agreed encryption mode. The encryption methods commonly used at present are generally as follows:
(1): asymmetric encryption
The two communication parties store own private keys and disclose corresponding public keys, and the identity and the encrypted and decrypted data are verified in a private key signature/public key signature verification mode and a public key encryption/private key decryption mode by adopting an asymmetric encryption algorithm.
(2): symmetric encryption
The server side maintains the keys of all the clients, and the client side obtains and stores the own keys in a safe mode. Identity authentication has no clear way, for example, the identity of a client is confirmed by using a static password and the like; during communication, the two parties directly adopt a symmetric encryption algorithm and a client key to encrypt and decrypt data.
(3): asymmetric and symmetric encryption hybrid mode
The method is a combination of the two methods, when in each communication, two parties firstly create an encryption tunnel by using an asymmetric method, then the two parties start to negotiate a temporary encryption key, and then a symmetric encryption algorithm and the temporary key are adopted to encrypt and decrypt the data of the communication.
The above several communication encryption methods have the following problems:
(1): although the asymmetric encryption is relatively secure, the operation overhead of the asymmetric algorithm is large, and the efficiency of communication is greatly influenced.
(2): when only symmetric encryption is adopted, the efficiency of the symmetric algorithm is far higher than that of the asymmetric algorithm, so the communication efficiency is higher than that of the asymmetric encryption mode. But the symmetric encryption has the problems that firstly, an additional identity authentication mode needs to be adopted for the identity verification of the client; secondly, because the encryption key is fixed, the ciphertexts of the same data after being encrypted are the same, so that some risks may be caused, and the key may be cracked after a large number of samples are obtained; and if the communication data is intercepted in the transmission process, the identity of the client can be disguised and the authority and the data of the client can be acquired by utilizing replay attack.
(3): the mixed mode of asymmetric encryption and symmetric encryption is between the two modes in communication efficiency. Because each communication is carried out, a communication tunnel is firstly established through an asymmetric encryption mode, then the two parties negotiate a session key, wherein the session key is actually transmitted in the communication tunnel, and then the actual data communication is started. In fact, much wasted overhead is added to complete a communication and in this way there is still the possibility of a man-in-the-middle attack.
Disclosure of Invention
In view of the above-mentioned drawbacks of the prior art, an object of the present invention is to provide a data transmission method, an electronic device and a storage medium, which are used to solve the problem of improving encryption performance.
The invention provides a data transmission method, which comprises the following steps:
calculating a password by using a master key and a preset algorithm factor, wherein the master key corresponds to user identification information one by one, and the algorithm factor comprises a time factor related to the current system time;
calculating a session key according to the algorithm factor;
encrypting the password and the transmission data by using the session key to obtain an access token and first transmission data;
and sending the user identification information, the access token and the first transmission data.
In an embodiment of the invention, the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period.
In an embodiment of the present invention, the calculating a password by using the master key and the predetermined algorithm factor includes:
the Password is calculated using an OTP (One Time Password) algorithm, a master key, and a predetermined algorithm factor.
In an embodiment of the present invention, the encrypting the password and the transmission data by using the session key to obtain the access token and the first transmission data includes: encrypting the password and transmission data into the access token and the first transmission data using a symmetric encryption algorithm.
In an embodiment of the present invention, the calculating a session key according to the algorithm factor includes:
and calculating the session key by utilizing an OWF (One Way Function) algorithm and the algorithm factor.
The invention also provides a data transmission method, which comprises the following steps:
after receiving the data, analyzing user identification information, an access token and first transmission data;
finding out a main key according to the user identification information;
determining a first session key which can successfully decrypt the access token through the master key and traversal optional algorithm factors;
decrypting the first transmission data by using the first session key;
wherein the algorithmic factor comprises a time factor related to a current system time.
In an embodiment of the present invention, the determining, by the master key and traversing optional algorithm factors, a first session key that can successfully decrypt the access token includes:
selecting the algorithm factor within a preset window range;
calculating a first password according to the master key, the algorithm factor and a one-time password (OTP) algorithm;
calculating a first session key according to the algorithm factor;
decrypting the access token through the session key to obtain a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password and the second password are the same;
and if the first password is the same as the second password, the current calculated session key is the first session key.
In an embodiment of the present invention, the decrypting the access token to obtain the second password specifically includes:
and decrypting the access token by using a symmetric encryption algorithm agreed with the sending end to obtain the second password.
The invention also provides a storage medium on which a computer program is stored which, when executed by a processor, implements a method as set forth in any one of the data transmission methods of the invention.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method according to any one of the data transmission methods of the invention when executing the program.
As described above, a data transmission method, an electronic device, and a storage medium of the present invention generate a one-time access token and a session key using an algorithm factor related to a current system time, and the session key is used to encrypt data itself and send the one-time access token together when transmitting the data. Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced. Moreover, because the access token and the secret key are effective once, replay attack is prevented, and the security level of the transmission ciphertext is greatly improved.
In addition, the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period. An event factor is added to the algorithm factor, and the variability of the algorithm factor is increased.
In addition, the calculating a password using the master key and a predetermined algorithm factor includes: the password is calculated using a one-time password OTP algorithm, a master key and a predetermined algorithm factor. The stability of the algorithm is improved by the OTP algorithm.
Additionally, the encrypting the password as an access token includes: encrypting the password into the access token using a symmetric encryption algorithm. In the process of generating the one-time access token by using the password, the symmetric encryption algorithm is used for encryption, the process of negotiating the key by the networks of the two parties is eliminated, and the communication efficiency is ensured.
In addition, the calculating a session key according to the algorithm factor includes: and calculating the session key by utilizing the irreversible OWF algorithm and the algorithm factor. And the session key is calculated by utilizing an OWF algorithm, so that the security performance of the session key is improved.
Therefore, the invention simultaneously considers the authentication, the data security and the communication efficiency, provides a new secure communication mode and has better economic and social benefits.
Drawings
Fig. 1 is a schematic view of a work flow in a first embodiment of the present invention.
Fig. 2 is a schematic view of the working process in the second embodiment of the present invention.
FIG. 3 is a diagram of an electronic device according to a fourth embodiment of the invention;
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Referring to fig. 1, a first embodiment of the present invention relates to a data transmission method, which can be applied to a client, and specifically includes the following steps:
Specifically, the master key may be pre-stored locally at the client and invoked at the time of use. Further, the master key may be distributed by the system during registration, and the specific process may be: when the client application is used for the first time, the client needs to send local equipment information such as machine codes to the server to register the client, after the client is successfully registered, the server distributes a client Master Key (marked as Master-Key) to the client, and the client stores the Master Key locally in a safe manner; the master key corresponds to the user identification information one by one, and the master key held by each client is unique.
Continuing to explain, before beginning to communicate with the server each time, the client obtains a predetermined algorithm factor; the algorithm factor includes a time factor (T) that is used to calculate the current system time of the OTP, which is an 8 byte integer.
The algorithm factor may further include: the event factor (C), which is related to the number of password changes in the same password change period, is a 4-byte integer. The event factor may be confirmed as follows:
the period of change of the password is typically 60 seconds, i.e. the password is changed every 60 seconds when the time factor is used alone. If it is desired that the password in the same period also change, an event factor may be used, typically by adding 1 to the event factor at each calculation and resetting the event factor to 0 at the next minute in the same minute. Thus, the password calculated each time is different, which is the case in the first embodiment of the present invention.
In practical applications, the algorithm factor may further include: a random factor, the random factor being related to a random number.
It can be seen that by adding a time factor and a random factor to the algorithm factor, the variability of the algorithm factor can be increased.
Continuing to explain, the client uses the saved master key and the obtained algorithm factor to call the OTP algorithm to generate a current password; wherein, the generated password is a one-time dynamic password with the length not less than 6. By adopting the OTP algorithm, the stability of the algorithm can be improved.
It should be noted that the OTP technology used in the present invention is based on the dynamic password correlation technology described in "dynamic password application specification GM/T0021-2012" issued by the national password administration.
Specifically, a Key derivation algorithm can be defined in advance by the client and the server, and is recorded as a DK (derived Key) algorithm; calculating an algorithm factor by adopting a DK algorithm to generate a Session Key (marked as Session-Key) for current communication; the preferred DK algorithm in the present invention is an OWF algorithm, which generally employs an abstract algorithm, such as an abstract algorithm based on the secret SM 3. The symmetric encryption algorithm is used for encryption, so that the process of network key agreement between two parties is eliminated, and the communication efficiency is ensured; the session key is calculated by using an OWF algorithm, so that the security performance of the session key can be improved.
Specifically, a symmetric encryption algorithm and a symmetric decryption algorithm are defined in advance by the client and the server, wherein the encryption algorithm is marked as an Encrypt algorithm, and the decryption algorithm is marked as a Decrypt algorithm, such as a national encryption symmetric encryption and decryption algorithm SM4 algorithm.
And encrypting the password by using the session key and a symmetric encryption algorithm to obtain an Access Token (recorded as Access-Token).
And encrypting the transmission Data by using the Session key and utilizing a symmetric encryption algorithm to obtain first transmission Data (recorded as Session-Data).
It should be noted that the master key and the algorithm factor are used to calculate the password, the algorithm factor is used to calculate the session key, and then the session key is used to encrypt the password to obtain the access token. Because the algorithm factor is related to the system time, the password is a one-time dynamic password, so that the session key and the access token are all one-time.
Specifically, the client sends the user identification information, the access token and the first transmission data to the server according to an actual communication protocol.
It can be seen that, in the data transmission method in this embodiment, based on the OTP technology, in each communication process, a one-time valid access token is generated for authentication; meanwhile, an algorithm factor is used for deriving a one-time effective session key for encrypting and decrypting the communication data at the time; during communication, the access token and the encrypted data are transmitted.
Referring to fig. 2, a second embodiment of the present invention relates to a data transmission method, which is applied to a server and specifically includes the following steps:
Specifically, after receiving the request data sent by the client, the server analyzes the user identification information, the access token and the first transmission data in the request data.
Step 203 determines a first session key that successfully decrypts the access token using the master key and traversing the optional algorithmic factors.
Specifically, after the master key is searched successfully, the server strategy is determined, wherein the server strategy comprises an authentication time window strategy; acquiring a Time factor and a corresponding event factor in a certain Time Window (Time-Window); wherein the time window is determined according to national cryptographic standards.
Calculating a first password according to the master key, the algorithm factor and the one-time password (OTP) algorithm;
and in the time window range, after each first password is obtained through calculation, a first session Key (X-Key) is calculated through the DK algorithm by using the corresponding algorithm factor.
Decrypting the access token transmitted by the client by using the first session key and adopting a decryption algorithm, and if the decryption is successful, obtaining a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password is the same as the second password; if the first password is the same as the second password, the calculated session key is the first session key.
Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced.
If the access token of the client cannot be verified to be valid within the time window range, the access token is invalid and may be expired or an illegal token, the access of the client is denied, and the session is ended.
In step 204, the first transmission data is decrypted by using the first session key.
Specifically, a first session key is used, the first session key is equal to a session key of the client, a Decrypt algorithm is adopted to Decrypt first transmission data, and then specific service processing is carried out;
after the service is processed, data which needs to be returned to the client is encrypted by using a first session key and adopting an Encrypt algorithm and is sent back to the client;
the client receives the response data of the server, decrypts the returned data by using the session key, and processes the data;
after the communication is finished, the session key is discarded.
A third embodiment of the present invention relates to a storage medium having stored thereon a computer program that, when executed by a processor, implements the data transmission method in the first or second embodiment described above.
Referring to fig. 3, a fourth embodiment of the present invention relates to an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor executes the computer program to implement the data transmission method according to the first embodiment or the second embodiment.
In summary, the data transmission method, the electronic device and the storage medium of the present invention use an algorithm factor related to the current system time to generate a one-time access token and a session key, and the session key is used to encrypt data itself and send the one-time access token together when transmitting the data. Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced. Moreover, because the access token and the secret key are effective once, replay attack is prevented, and the security level of the transmission ciphertext is greatly improved.
In addition, an event factor is added to the algorithm factor, increasing the variability of the algorithm factor.
In addition, the stability of the algorithm is improved by the OTP algorithm.
In addition, the symmetric encryption algorithm is used for encryption, so that the process of negotiating the key between the two networks is eliminated, and the communication efficiency is ensured.
In addition, the session key is calculated by using an OWF algorithm, and the security performance of the session key is improved.
Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.
Claims (10)
1. A method of data transmission, the method comprising the steps of:
calculating a password by using a master key and a preset algorithm factor, wherein the master key corresponds to user identification information one by one, and the algorithm factor comprises a time factor related to the current system time;
calculating a session key according to the algorithm factor;
encrypting the password and the transmission data by using the session key to obtain an access token and first transmission data;
and sending the user identification information, the access token and the first transmission data.
2. The data transmission method according to claim 1, characterized in that: the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period.
3. The data transmission method according to claim 1, characterized in that: the calculating the password by using the master key and the predetermined algorithm factor comprises:
the password is calculated using a one-time password OTP algorithm, a master key and a predetermined algorithm factor.
4. The data transmission method according to claim 1, characterized in that: the encrypting the password and the transmission data by using the session key to obtain the access token and the first transmission data comprises: encrypting the password and transmission data into the access token and the first transmission data using a symmetric encryption algorithm.
5. The data transmission method according to any one of claims 1 to 4, wherein the calculating a session key according to the algorithm factor includes:
and calculating the session key by utilizing the irreversible OWF algorithm and the algorithm factor.
6. A method of data transmission, the method comprising the steps of:
after receiving the data, analyzing user identification information, an access token and first transmission data;
finding out a main key according to the user identification information;
determining a first session key which can successfully decrypt the access token through the master key and traversal optional algorithm factors;
decrypting the first transmission data by using the first session key;
wherein the algorithmic factor comprises a time factor related to a current system time.
7. The data transmission method of claim 6, wherein determining, by the master key and traversing optional algorithmic factors, a first session key that successfully decrypts the access token comprises:
selecting the algorithm factor within a preset window range;
calculating a first password according to the master key, the algorithm factor and a one-time password (OTP) algorithm;
calculating a first session key according to the algorithm factor;
decrypting the access token through the session key to obtain a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password and the second password are the same;
and if the first password is the same as the second password, the current calculated session key is the first session key.
8. The data transmission method according to claim 7, characterized in that: the decrypting the access token to obtain a second password specifically includes:
and decrypting the access token by using a symmetric encryption algorithm agreed with the sending end to obtain the second password.
9. A storage medium on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the data transmission method of any one of claims 1 to 8.
10. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the program, implements the data transmission method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010745970.XA CN112751821B (en) | 2020-07-29 | 2020-07-29 | Data transmission method, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010745970.XA CN112751821B (en) | 2020-07-29 | 2020-07-29 | Data transmission method, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112751821A true CN112751821A (en) | 2021-05-04 |
CN112751821B CN112751821B (en) | 2022-12-13 |
Family
ID=75645338
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010745970.XA Active CN112751821B (en) | 2020-07-29 | 2020-07-29 | Data transmission method, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112751821B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553412A (en) * | 2022-02-28 | 2022-05-27 | 百果园技术(新加坡)有限公司 | Data transmission method, device, equipment and storage medium |
CN115333847A (en) * | 2022-08-22 | 2022-11-11 | 超聚变数字技术有限公司 | Data transmission method, data processing system and computing equipment |
US11625758B1 (en) | 2021-05-10 | 2023-04-11 | Wells Fargo Bank, N.A. | Systems and methods for sharing revenue associated with digital assets |
US11657180B1 (en) | 2021-05-10 | 2023-05-23 | Wells Fargo Bank, N.A. | Data aggregation and classification modalities for a data sharing platform |
CN116436710A (en) * | 2023-06-15 | 2023-07-14 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
US11748189B1 (en) | 2021-05-10 | 2023-09-05 | Wells Fargo Bank, N.A. | Compliance tracking and remediation across a data sharing platform |
US11973870B1 (en) * | 2021-05-10 | 2024-04-30 | Wells Fargo Bank, N.A. | Digital identity proxy |
US11985201B1 (en) | 2021-05-10 | 2024-05-14 | Wells Fargo Bank, N.A. | User registration and preference configuration for a data sharing platform |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007011643A (en) * | 2005-06-30 | 2007-01-18 | Haruo Hayamizu | Digital content distribution system and token device |
US20070094503A1 (en) * | 2005-10-21 | 2007-04-26 | Novell, Inc. | Techniques for key distribution for use in encrypted communications |
CN101420298A (en) * | 2008-09-08 | 2009-04-29 | 北京飞天诚信科技有限公司 | Method and system for negotiating cipher |
CN103597773A (en) * | 2011-06-09 | 2014-02-19 | 高通股份有限公司 | Method and apparatus for virtual pairing with a group of semi-connected devices |
CN104135493A (en) * | 2014-08-22 | 2014-11-05 | 上海众人科技有限公司 | File compression method and system |
CN107566123A (en) * | 2017-08-07 | 2018-01-09 | 厦门市美亚柏科信息股份有限公司 | PPTP VPN passwords methods of calibration and computer-readable recording medium |
CN110224834A (en) * | 2019-05-24 | 2019-09-10 | 清华大学 | Identity identifying method, decryption and ciphering terminal based on dynamic token |
-
2020
- 2020-07-29 CN CN202010745970.XA patent/CN112751821B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007011643A (en) * | 2005-06-30 | 2007-01-18 | Haruo Hayamizu | Digital content distribution system and token device |
US20070094503A1 (en) * | 2005-10-21 | 2007-04-26 | Novell, Inc. | Techniques for key distribution for use in encrypted communications |
CN101420298A (en) * | 2008-09-08 | 2009-04-29 | 北京飞天诚信科技有限公司 | Method and system for negotiating cipher |
CN103597773A (en) * | 2011-06-09 | 2014-02-19 | 高通股份有限公司 | Method and apparatus for virtual pairing with a group of semi-connected devices |
CN104135493A (en) * | 2014-08-22 | 2014-11-05 | 上海众人科技有限公司 | File compression method and system |
CN107566123A (en) * | 2017-08-07 | 2018-01-09 | 厦门市美亚柏科信息股份有限公司 | PPTP VPN passwords methods of calibration and computer-readable recording medium |
CN110224834A (en) * | 2019-05-24 | 2019-09-10 | 清华大学 | Identity identifying method, decryption and ciphering terminal based on dynamic token |
Non-Patent Citations (2)
Title |
---|
于宝证等: "基于口令的跨服务器认证密钥交换协议研究", 《合肥工业大学学报(自然科学版)》 * |
杨栋等: "一种基于公钥体制的双向认证及密钥协商方案", 《计算机安全》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11625758B1 (en) | 2021-05-10 | 2023-04-11 | Wells Fargo Bank, N.A. | Systems and methods for sharing revenue associated with digital assets |
US11657180B1 (en) | 2021-05-10 | 2023-05-23 | Wells Fargo Bank, N.A. | Data aggregation and classification modalities for a data sharing platform |
US11748189B1 (en) | 2021-05-10 | 2023-09-05 | Wells Fargo Bank, N.A. | Compliance tracking and remediation across a data sharing platform |
US11973870B1 (en) * | 2021-05-10 | 2024-04-30 | Wells Fargo Bank, N.A. | Digital identity proxy |
US11985201B1 (en) | 2021-05-10 | 2024-05-14 | Wells Fargo Bank, N.A. | User registration and preference configuration for a data sharing platform |
US12093424B2 (en) | 2021-05-10 | 2024-09-17 | Wells Fargo Bank, N.A. | Data aggregation and classification modalities for a data sharing platform |
CN114553412A (en) * | 2022-02-28 | 2022-05-27 | 百果园技术(新加坡)有限公司 | Data transmission method, device, equipment and storage medium |
CN114553412B (en) * | 2022-02-28 | 2024-02-23 | 百果园技术(新加坡)有限公司 | Data transmission method, device, equipment and storage medium |
CN115333847A (en) * | 2022-08-22 | 2022-11-11 | 超聚变数字技术有限公司 | Data transmission method, data processing system and computing equipment |
CN115333847B (en) * | 2022-08-22 | 2024-03-19 | 超聚变数字技术有限公司 | Data transmission method, data processing system and computing device |
CN116436710A (en) * | 2023-06-15 | 2023-07-14 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
CN116436710B (en) * | 2023-06-15 | 2023-08-29 | 烟台岸基网络科技有限公司 | Remote operation system for operation of port bridge type loading and unloading equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112751821B (en) | 2022-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112751821B (en) | Data transmission method, electronic equipment and storage medium | |
US11799656B2 (en) | Security authentication method and device | |
CN105471833B (en) | A kind of safe communication method and device | |
JP4617763B2 (en) | Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program | |
CN110932870B (en) | Quantum communication service station key negotiation system and method | |
CA2463034C (en) | Method and system for providing client privacy when requesting content from a public server | |
JP2009529832A (en) | Undiscoverable, ie secure data communication using black data | |
CN108809633B (en) | Identity authentication method, device and system | |
JP2007520909A (en) | Double-factor authenticated key exchange method, authentication method using the same, and recording medium storing program including the method | |
CN112351037B (en) | Information processing method and device for secure communication | |
TW200402981A (en) | Methods for remotely changing a communications password | |
KR101531662B1 (en) | Method and system for mutual authentication between client and server | |
KR100860573B1 (en) | Method for User Authentication | |
CN113612797A (en) | Kerberos identity authentication protocol improvement method based on state cryptographic algorithm | |
CN112312393A (en) | 5G application access authentication method and 5G application access authentication network architecture | |
CN115473655B (en) | Terminal authentication method, device and storage medium for access network | |
US20090276622A1 (en) | Secret authentication system | |
CN114513339A (en) | Security authentication method, system and device | |
CN110519222B (en) | External network access identity authentication method and system based on disposable asymmetric key pair and key fob | |
WO2024139347A1 (en) | Method, system and apparatus for securely acquiring sensitive information, and electronic device | |
CN110535632B (en) | Quantum communication service station AKA key negotiation method and system based on asymmetric key pool pair and DH protocol | |
CN114095229A (en) | Method, device and system for constructing data transmission protocol of energy Internet | |
CN112887983A (en) | Equipment identity authentication method, device, equipment and medium | |
EP3125595A1 (en) | Method to provide identification in privacy mode | |
KR20170111809A (en) | Bidirectional authentication method using security token based on symmetric key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |