CN112751821A - Data transmission method, electronic equipment and storage medium - Google Patents

Data transmission method, electronic equipment and storage medium Download PDF

Info

Publication number
CN112751821A
CN112751821A CN202010745970.XA CN202010745970A CN112751821A CN 112751821 A CN112751821 A CN 112751821A CN 202010745970 A CN202010745970 A CN 202010745970A CN 112751821 A CN112751821 A CN 112751821A
Authority
CN
China
Prior art keywords
algorithm
password
access token
factor
session key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010745970.XA
Other languages
Chinese (zh)
Other versions
CN112751821B (en
Inventor
孟飞
童勇
张迪
徐启凡
范靖靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Anchen Network Technology Co ltd
Original Assignee
Shanghai Anchen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Anchen Network Technology Co ltd filed Critical Shanghai Anchen Network Technology Co ltd
Priority to CN202010745970.XA priority Critical patent/CN112751821B/en
Publication of CN112751821A publication Critical patent/CN112751821A/en
Application granted granted Critical
Publication of CN112751821B publication Critical patent/CN112751821B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a data transmission method, which is based on OTP technology, and generates a one-time effective access token for identity authentication in each communication process; meanwhile, an algorithm factor is used for deriving a one-time effective session key for encrypting and decrypting the communication data at the time; during communication, sending an access token and encrypted data; after receiving the data, firstly extracting the access token, verifying the identity of the client, if the access token is valid, deriving a session key of the communication at the moment by using an algorithm factor when the access token is verified, and finishing subsequent encryption, decryption and communication; the invention can automatically calculate and verify the access token by the receiving end, the session key does not need to be transmitted through the network, the security of the transmitted data is further enhanced, and moreover, because the access token and the key are effective once, the replay attack is prevented, the security level of the transmitted ciphertext is greatly improved, and better economic benefit and social benefit are achieved.

Description

Data transmission method, electronic equipment and storage medium
Technical Field
The invention relates to the field of communication, in particular to an encryption transmission technology of data.
Background
In order to ensure the security of network communication, two communication parties mutually authenticate the identity of each other and encrypt communication contents. Generally, a client sends identity authentication information to a server for identity authentication, after the identity is confirmed, the client and the server start communication, and communication data is encrypted in a well-agreed encryption mode. The encryption methods commonly used at present are generally as follows:
(1): asymmetric encryption
The two communication parties store own private keys and disclose corresponding public keys, and the identity and the encrypted and decrypted data are verified in a private key signature/public key signature verification mode and a public key encryption/private key decryption mode by adopting an asymmetric encryption algorithm.
(2): symmetric encryption
The server side maintains the keys of all the clients, and the client side obtains and stores the own keys in a safe mode. Identity authentication has no clear way, for example, the identity of a client is confirmed by using a static password and the like; during communication, the two parties directly adopt a symmetric encryption algorithm and a client key to encrypt and decrypt data.
(3): asymmetric and symmetric encryption hybrid mode
The method is a combination of the two methods, when in each communication, two parties firstly create an encryption tunnel by using an asymmetric method, then the two parties start to negotiate a temporary encryption key, and then a symmetric encryption algorithm and the temporary key are adopted to encrypt and decrypt the data of the communication.
The above several communication encryption methods have the following problems:
(1): although the asymmetric encryption is relatively secure, the operation overhead of the asymmetric algorithm is large, and the efficiency of communication is greatly influenced.
(2): when only symmetric encryption is adopted, the efficiency of the symmetric algorithm is far higher than that of the asymmetric algorithm, so the communication efficiency is higher than that of the asymmetric encryption mode. But the symmetric encryption has the problems that firstly, an additional identity authentication mode needs to be adopted for the identity verification of the client; secondly, because the encryption key is fixed, the ciphertexts of the same data after being encrypted are the same, so that some risks may be caused, and the key may be cracked after a large number of samples are obtained; and if the communication data is intercepted in the transmission process, the identity of the client can be disguised and the authority and the data of the client can be acquired by utilizing replay attack.
(3): the mixed mode of asymmetric encryption and symmetric encryption is between the two modes in communication efficiency. Because each communication is carried out, a communication tunnel is firstly established through an asymmetric encryption mode, then the two parties negotiate a session key, wherein the session key is actually transmitted in the communication tunnel, and then the actual data communication is started. In fact, much wasted overhead is added to complete a communication and in this way there is still the possibility of a man-in-the-middle attack.
Disclosure of Invention
In view of the above-mentioned drawbacks of the prior art, an object of the present invention is to provide a data transmission method, an electronic device and a storage medium, which are used to solve the problem of improving encryption performance.
The invention provides a data transmission method, which comprises the following steps:
calculating a password by using a master key and a preset algorithm factor, wherein the master key corresponds to user identification information one by one, and the algorithm factor comprises a time factor related to the current system time;
calculating a session key according to the algorithm factor;
encrypting the password and the transmission data by using the session key to obtain an access token and first transmission data;
and sending the user identification information, the access token and the first transmission data.
In an embodiment of the invention, the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period.
In an embodiment of the present invention, the calculating a password by using the master key and the predetermined algorithm factor includes:
the Password is calculated using an OTP (One Time Password) algorithm, a master key, and a predetermined algorithm factor.
In an embodiment of the present invention, the encrypting the password and the transmission data by using the session key to obtain the access token and the first transmission data includes: encrypting the password and transmission data into the access token and the first transmission data using a symmetric encryption algorithm.
In an embodiment of the present invention, the calculating a session key according to the algorithm factor includes:
and calculating the session key by utilizing an OWF (One Way Function) algorithm and the algorithm factor.
The invention also provides a data transmission method, which comprises the following steps:
after receiving the data, analyzing user identification information, an access token and first transmission data;
finding out a main key according to the user identification information;
determining a first session key which can successfully decrypt the access token through the master key and traversal optional algorithm factors;
decrypting the first transmission data by using the first session key;
wherein the algorithmic factor comprises a time factor related to a current system time.
In an embodiment of the present invention, the determining, by the master key and traversing optional algorithm factors, a first session key that can successfully decrypt the access token includes:
selecting the algorithm factor within a preset window range;
calculating a first password according to the master key, the algorithm factor and a one-time password (OTP) algorithm;
calculating a first session key according to the algorithm factor;
decrypting the access token through the session key to obtain a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password and the second password are the same;
and if the first password is the same as the second password, the current calculated session key is the first session key.
In an embodiment of the present invention, the decrypting the access token to obtain the second password specifically includes:
and decrypting the access token by using a symmetric encryption algorithm agreed with the sending end to obtain the second password.
The invention also provides a storage medium on which a computer program is stored which, when executed by a processor, implements a method as set forth in any one of the data transmission methods of the invention.
The invention also provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method according to any one of the data transmission methods of the invention when executing the program.
As described above, a data transmission method, an electronic device, and a storage medium of the present invention generate a one-time access token and a session key using an algorithm factor related to a current system time, and the session key is used to encrypt data itself and send the one-time access token together when transmitting the data. Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced. Moreover, because the access token and the secret key are effective once, replay attack is prevented, and the security level of the transmission ciphertext is greatly improved.
In addition, the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period. An event factor is added to the algorithm factor, and the variability of the algorithm factor is increased.
In addition, the calculating a password using the master key and a predetermined algorithm factor includes: the password is calculated using a one-time password OTP algorithm, a master key and a predetermined algorithm factor. The stability of the algorithm is improved by the OTP algorithm.
Additionally, the encrypting the password as an access token includes: encrypting the password into the access token using a symmetric encryption algorithm. In the process of generating the one-time access token by using the password, the symmetric encryption algorithm is used for encryption, the process of negotiating the key by the networks of the two parties is eliminated, and the communication efficiency is ensured.
In addition, the calculating a session key according to the algorithm factor includes: and calculating the session key by utilizing the irreversible OWF algorithm and the algorithm factor. And the session key is calculated by utilizing an OWF algorithm, so that the security performance of the session key is improved.
Therefore, the invention simultaneously considers the authentication, the data security and the communication efficiency, provides a new secure communication mode and has better economic and social benefits.
Drawings
Fig. 1 is a schematic view of a work flow in a first embodiment of the present invention.
Fig. 2 is a schematic view of the working process in the second embodiment of the present invention.
FIG. 3 is a diagram of an electronic device according to a fourth embodiment of the invention;
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention, and the components related to the present invention are only shown in the drawings rather than drawn according to the number, shape and size of the components in actual implementation, and the type, quantity and proportion of the components in actual implementation may be changed freely, and the layout of the components may be more complicated.
Referring to fig. 1, a first embodiment of the present invention relates to a data transmission method, which can be applied to a client, and specifically includes the following steps:
step 101, a password is calculated using a master key and a predetermined algorithm factor.
Specifically, the master key may be pre-stored locally at the client and invoked at the time of use. Further, the master key may be distributed by the system during registration, and the specific process may be: when the client application is used for the first time, the client needs to send local equipment information such as machine codes to the server to register the client, after the client is successfully registered, the server distributes a client Master Key (marked as Master-Key) to the client, and the client stores the Master Key locally in a safe manner; the master key corresponds to the user identification information one by one, and the master key held by each client is unique.
Continuing to explain, before beginning to communicate with the server each time, the client obtains a predetermined algorithm factor; the algorithm factor includes a time factor (T) that is used to calculate the current system time of the OTP, which is an 8 byte integer.
The algorithm factor may further include: the event factor (C), which is related to the number of password changes in the same password change period, is a 4-byte integer. The event factor may be confirmed as follows:
the period of change of the password is typically 60 seconds, i.e. the password is changed every 60 seconds when the time factor is used alone. If it is desired that the password in the same period also change, an event factor may be used, typically by adding 1 to the event factor at each calculation and resetting the event factor to 0 at the next minute in the same minute. Thus, the password calculated each time is different, which is the case in the first embodiment of the present invention.
In practical applications, the algorithm factor may further include: a random factor, the random factor being related to a random number.
It can be seen that by adding a time factor and a random factor to the algorithm factor, the variability of the algorithm factor can be increased.
Continuing to explain, the client uses the saved master key and the obtained algorithm factor to call the OTP algorithm to generate a current password; wherein, the generated password is a one-time dynamic password with the length not less than 6. By adopting the OTP algorithm, the stability of the algorithm can be improved.
It should be noted that the OTP technology used in the present invention is based on the dynamic password correlation technology described in "dynamic password application specification GM/T0021-2012" issued by the national password administration.
Step 102, calculating a session key according to the algorithm factor.
Specifically, a Key derivation algorithm can be defined in advance by the client and the server, and is recorded as a DK (derived Key) algorithm; calculating an algorithm factor by adopting a DK algorithm to generate a Session Key (marked as Session-Key) for current communication; the preferred DK algorithm in the present invention is an OWF algorithm, which generally employs an abstract algorithm, such as an abstract algorithm based on the secret SM 3. The symmetric encryption algorithm is used for encryption, so that the process of network key agreement between two parties is eliminated, and the communication efficiency is ensured; the session key is calculated by using an OWF algorithm, so that the security performance of the session key can be improved.
Step 103, encrypting the password and the transmission data by using the session key to obtain the access token and the first transmission data.
Specifically, a symmetric encryption algorithm and a symmetric decryption algorithm are defined in advance by the client and the server, wherein the encryption algorithm is marked as an Encrypt algorithm, and the decryption algorithm is marked as a Decrypt algorithm, such as a national encryption symmetric encryption and decryption algorithm SM4 algorithm.
And encrypting the password by using the session key and a symmetric encryption algorithm to obtain an Access Token (recorded as Access-Token).
And encrypting the transmission Data by using the Session key and utilizing a symmetric encryption algorithm to obtain first transmission Data (recorded as Session-Data).
It should be noted that the master key and the algorithm factor are used to calculate the password, the algorithm factor is used to calculate the session key, and then the session key is used to encrypt the password to obtain the access token. Because the algorithm factor is related to the system time, the password is a one-time dynamic password, so that the session key and the access token are all one-time.
Step 104, sending the user identification information, the access token and the first transmission data.
Specifically, the client sends the user identification information, the access token and the first transmission data to the server according to an actual communication protocol.
It can be seen that, in the data transmission method in this embodiment, based on the OTP technology, in each communication process, a one-time valid access token is generated for authentication; meanwhile, an algorithm factor is used for deriving a one-time effective session key for encrypting and decrypting the communication data at the time; during communication, the access token and the encrypted data are transmitted.
Referring to fig. 2, a second embodiment of the present invention relates to a data transmission method, which is applied to a server and specifically includes the following steps:
step 201, after receiving the data, parsing out the user identification information, the access token and the first transmission data.
Specifically, after receiving the request data sent by the client, the server analyzes the user identification information, the access token and the first transmission data in the request data.
Step 202, finding out the master key according to the user identification information.
Step 203 determines a first session key that successfully decrypts the access token using the master key and traversing the optional algorithmic factors.
Specifically, after the master key is searched successfully, the server strategy is determined, wherein the server strategy comprises an authentication time window strategy; acquiring a Time factor and a corresponding event factor in a certain Time Window (Time-Window); wherein the time window is determined according to national cryptographic standards.
Calculating a first password according to the master key, the algorithm factor and the one-time password (OTP) algorithm;
and in the time window range, after each first password is obtained through calculation, a first session Key (X-Key) is calculated through the DK algorithm by using the corresponding algorithm factor.
Decrypting the access token transmitted by the client by using the first session key and adopting a decryption algorithm, and if the decryption is successful, obtaining a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password is the same as the second password; if the first password is the same as the second password, the calculated session key is the first session key.
Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced.
If the access token of the client cannot be verified to be valid within the time window range, the access token is invalid and may be expired or an illegal token, the access of the client is denied, and the session is ended.
In step 204, the first transmission data is decrypted by using the first session key.
Specifically, a first session key is used, the first session key is equal to a session key of the client, a Decrypt algorithm is adopted to Decrypt first transmission data, and then specific service processing is carried out;
after the service is processed, data which needs to be returned to the client is encrypted by using a first session key and adopting an Encrypt algorithm and is sent back to the client;
the client receives the response data of the server, decrypts the returned data by using the session key, and processes the data;
after the communication is finished, the session key is discarded.
A third embodiment of the present invention relates to a storage medium having stored thereon a computer program that, when executed by a processor, implements the data transmission method in the first or second embodiment described above.
Referring to fig. 3, a fourth embodiment of the present invention relates to an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor executes the computer program to implement the data transmission method according to the first embodiment or the second embodiment.
In summary, the data transmission method, the electronic device and the storage medium of the present invention use an algorithm factor related to the current system time to generate a one-time access token and a session key, and the session key is used to encrypt data itself and send the one-time access token together when transmitting the data. Since the access token is calculated by the time factor and the master key, the authentication can be calculated by the receiving end. Meanwhile, due to the correlation between the token and the key, the session key for decrypting the transmission data can be determined by verifying the validity of the access token, so that the session key does not need to be transmitted through a network, and the security of the transmission data is further enhanced. Moreover, because the access token and the secret key are effective once, replay attack is prevented, and the security level of the transmission ciphertext is greatly improved.
In addition, an event factor is added to the algorithm factor, increasing the variability of the algorithm factor.
In addition, the stability of the algorithm is improved by the OTP algorithm.
In addition, the symmetric encryption algorithm is used for encryption, so that the process of negotiating the key between the two networks is eliminated, and the communication efficiency is ensured.
In addition, the session key is calculated by using an OWF algorithm, and the security performance of the session key is improved.
Therefore, the invention effectively overcomes various defects in the prior art and has high industrial utilization value.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (10)

1. A method of data transmission, the method comprising the steps of:
calculating a password by using a master key and a preset algorithm factor, wherein the master key corresponds to user identification information one by one, and the algorithm factor comprises a time factor related to the current system time;
calculating a session key according to the algorithm factor;
encrypting the password and the transmission data by using the session key to obtain an access token and first transmission data;
and sending the user identification information, the access token and the first transmission data.
2. The data transmission method according to claim 1, characterized in that: the algorithm factor further includes: an event factor relating to a number of password changes within the same password change period.
3. The data transmission method according to claim 1, characterized in that: the calculating the password by using the master key and the predetermined algorithm factor comprises:
the password is calculated using a one-time password OTP algorithm, a master key and a predetermined algorithm factor.
4. The data transmission method according to claim 1, characterized in that: the encrypting the password and the transmission data by using the session key to obtain the access token and the first transmission data comprises: encrypting the password and transmission data into the access token and the first transmission data using a symmetric encryption algorithm.
5. The data transmission method according to any one of claims 1 to 4, wherein the calculating a session key according to the algorithm factor includes:
and calculating the session key by utilizing the irreversible OWF algorithm and the algorithm factor.
6. A method of data transmission, the method comprising the steps of:
after receiving the data, analyzing user identification information, an access token and first transmission data;
finding out a main key according to the user identification information;
determining a first session key which can successfully decrypt the access token through the master key and traversal optional algorithm factors;
decrypting the first transmission data by using the first session key;
wherein the algorithmic factor comprises a time factor related to a current system time.
7. The data transmission method of claim 6, wherein determining, by the master key and traversing optional algorithmic factors, a first session key that successfully decrypts the access token comprises:
selecting the algorithm factor within a preset window range;
calculating a first password according to the master key, the algorithm factor and a one-time password (OTP) algorithm;
calculating a first session key according to the algorithm factor;
decrypting the access token through the session key to obtain a second password;
determining whether the selected algorithm factor is the algorithm factor adopted by the sending end by judging whether the first password and the second password are the same;
and if the first password is the same as the second password, the current calculated session key is the first session key.
8. The data transmission method according to claim 7, characterized in that: the decrypting the access token to obtain a second password specifically includes:
and decrypting the access token by using a symmetric encryption algorithm agreed with the sending end to obtain the second password.
9. A storage medium on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the data transmission method of any one of claims 1 to 8.
10. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: the processor, when executing the program, implements the data transmission method of any one of claims 1-8.
CN202010745970.XA 2020-07-29 2020-07-29 Data transmission method, electronic equipment and storage medium Active CN112751821B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010745970.XA CN112751821B (en) 2020-07-29 2020-07-29 Data transmission method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010745970.XA CN112751821B (en) 2020-07-29 2020-07-29 Data transmission method, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112751821A true CN112751821A (en) 2021-05-04
CN112751821B CN112751821B (en) 2022-12-13

Family

ID=75645338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010745970.XA Active CN112751821B (en) 2020-07-29 2020-07-29 Data transmission method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112751821B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553412A (en) * 2022-02-28 2022-05-27 百果园技术(新加坡)有限公司 Data transmission method, device, equipment and storage medium
CN115333847A (en) * 2022-08-22 2022-11-11 超聚变数字技术有限公司 Data transmission method, data processing system and computing equipment
US11625758B1 (en) 2021-05-10 2023-04-11 Wells Fargo Bank, N.A. Systems and methods for sharing revenue associated with digital assets
US11657180B1 (en) 2021-05-10 2023-05-23 Wells Fargo Bank, N.A. Data aggregation and classification modalities for a data sharing platform
CN116436710A (en) * 2023-06-15 2023-07-14 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment
US11748189B1 (en) 2021-05-10 2023-09-05 Wells Fargo Bank, N.A. Compliance tracking and remediation across a data sharing platform
US11973870B1 (en) * 2021-05-10 2024-04-30 Wells Fargo Bank, N.A. Digital identity proxy
US11985201B1 (en) 2021-05-10 2024-05-14 Wells Fargo Bank, N.A. User registration and preference configuration for a data sharing platform

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007011643A (en) * 2005-06-30 2007-01-18 Haruo Hayamizu Digital content distribution system and token device
US20070094503A1 (en) * 2005-10-21 2007-04-26 Novell, Inc. Techniques for key distribution for use in encrypted communications
CN101420298A (en) * 2008-09-08 2009-04-29 北京飞天诚信科技有限公司 Method and system for negotiating cipher
CN103597773A (en) * 2011-06-09 2014-02-19 高通股份有限公司 Method and apparatus for virtual pairing with a group of semi-connected devices
CN104135493A (en) * 2014-08-22 2014-11-05 上海众人科技有限公司 File compression method and system
CN107566123A (en) * 2017-08-07 2018-01-09 厦门市美亚柏科信息股份有限公司 PPTP VPN passwords methods of calibration and computer-readable recording medium
CN110224834A (en) * 2019-05-24 2019-09-10 清华大学 Identity identifying method, decryption and ciphering terminal based on dynamic token

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007011643A (en) * 2005-06-30 2007-01-18 Haruo Hayamizu Digital content distribution system and token device
US20070094503A1 (en) * 2005-10-21 2007-04-26 Novell, Inc. Techniques for key distribution for use in encrypted communications
CN101420298A (en) * 2008-09-08 2009-04-29 北京飞天诚信科技有限公司 Method and system for negotiating cipher
CN103597773A (en) * 2011-06-09 2014-02-19 高通股份有限公司 Method and apparatus for virtual pairing with a group of semi-connected devices
CN104135493A (en) * 2014-08-22 2014-11-05 上海众人科技有限公司 File compression method and system
CN107566123A (en) * 2017-08-07 2018-01-09 厦门市美亚柏科信息股份有限公司 PPTP VPN passwords methods of calibration and computer-readable recording medium
CN110224834A (en) * 2019-05-24 2019-09-10 清华大学 Identity identifying method, decryption and ciphering terminal based on dynamic token

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
于宝证等: "基于口令的跨服务器认证密钥交换协议研究", 《合肥工业大学学报(自然科学版)》 *
杨栋等: "一种基于公钥体制的双向认证及密钥协商方案", 《计算机安全》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11625758B1 (en) 2021-05-10 2023-04-11 Wells Fargo Bank, N.A. Systems and methods for sharing revenue associated with digital assets
US11657180B1 (en) 2021-05-10 2023-05-23 Wells Fargo Bank, N.A. Data aggregation and classification modalities for a data sharing platform
US11748189B1 (en) 2021-05-10 2023-09-05 Wells Fargo Bank, N.A. Compliance tracking and remediation across a data sharing platform
US11973870B1 (en) * 2021-05-10 2024-04-30 Wells Fargo Bank, N.A. Digital identity proxy
US11985201B1 (en) 2021-05-10 2024-05-14 Wells Fargo Bank, N.A. User registration and preference configuration for a data sharing platform
US12093424B2 (en) 2021-05-10 2024-09-17 Wells Fargo Bank, N.A. Data aggregation and classification modalities for a data sharing platform
CN114553412A (en) * 2022-02-28 2022-05-27 百果园技术(新加坡)有限公司 Data transmission method, device, equipment and storage medium
CN114553412B (en) * 2022-02-28 2024-02-23 百果园技术(新加坡)有限公司 Data transmission method, device, equipment and storage medium
CN115333847A (en) * 2022-08-22 2022-11-11 超聚变数字技术有限公司 Data transmission method, data processing system and computing equipment
CN115333847B (en) * 2022-08-22 2024-03-19 超聚变数字技术有限公司 Data transmission method, data processing system and computing device
CN116436710A (en) * 2023-06-15 2023-07-14 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment
CN116436710B (en) * 2023-06-15 2023-08-29 烟台岸基网络科技有限公司 Remote operation system for operation of port bridge type loading and unloading equipment

Also Published As

Publication number Publication date
CN112751821B (en) 2022-12-13

Similar Documents

Publication Publication Date Title
CN112751821B (en) Data transmission method, electronic equipment and storage medium
US11799656B2 (en) Security authentication method and device
CN105471833B (en) A kind of safe communication method and device
JP4617763B2 (en) Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program
CN110932870B (en) Quantum communication service station key negotiation system and method
CA2463034C (en) Method and system for providing client privacy when requesting content from a public server
JP2009529832A (en) Undiscoverable, ie secure data communication using black data
CN108809633B (en) Identity authentication method, device and system
JP2007520909A (en) Double-factor authenticated key exchange method, authentication method using the same, and recording medium storing program including the method
CN112351037B (en) Information processing method and device for secure communication
TW200402981A (en) Methods for remotely changing a communications password
KR101531662B1 (en) Method and system for mutual authentication between client and server
KR100860573B1 (en) Method for User Authentication
CN113612797A (en) Kerberos identity authentication protocol improvement method based on state cryptographic algorithm
CN112312393A (en) 5G application access authentication method and 5G application access authentication network architecture
CN115473655B (en) Terminal authentication method, device and storage medium for access network
US20090276622A1 (en) Secret authentication system
CN114513339A (en) Security authentication method, system and device
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
WO2024139347A1 (en) Method, system and apparatus for securely acquiring sensitive information, and electronic device
CN110535632B (en) Quantum communication service station AKA key negotiation method and system based on asymmetric key pool pair and DH protocol
CN114095229A (en) Method, device and system for constructing data transmission protocol of energy Internet
CN112887983A (en) Equipment identity authentication method, device, equipment and medium
EP3125595A1 (en) Method to provide identification in privacy mode
KR20170111809A (en) Bidirectional authentication method using security token based on symmetric key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant