CN113347143A - Identity authentication method, device, equipment and storage medium - Google Patents

Identity authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN113347143A
CN113347143A CN202110398003.5A CN202110398003A CN113347143A CN 113347143 A CN113347143 A CN 113347143A CN 202110398003 A CN202110398003 A CN 202110398003A CN 113347143 A CN113347143 A CN 113347143A
Authority
CN
China
Prior art keywords
hash value
data
ciphertext
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110398003.5A
Other languages
Chinese (zh)
Other versions
CN113347143B (en
Inventor
殷亮亮
屈志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Huibo Wending Information Technology Co Ltd
Original Assignee
Xi'an Huibo Wending Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Huibo Wending Information Technology Co Ltd filed Critical Xi'an Huibo Wending Information Technology Co Ltd
Priority to CN202110398003.5A priority Critical patent/CN113347143B/en
Publication of CN113347143A publication Critical patent/CN113347143A/en
Application granted granted Critical
Publication of CN113347143B publication Critical patent/CN113347143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of data encryption, and particularly discloses an identity authentication method, an identity authentication device, identity authentication equipment and a storage medium. When a user uses the system, a picture encryption algorithm in a user side encrypts a stored picture, then the hash value of the encrypted picture is calculated by using the hash algorithm, the hash value, an encrypted time parameter and operation request information of the user are encrypted by using a public key, the user side transmits an encrypted ciphertext to a system server, the system server decrypts the ciphertext by using a private key, encrypts the picture stored by the system server by using the encrypted time parameter obtained by decryption, then the hash value of the encrypted picture is calculated by using the hash algorithm, and the hash value is compared with a big hash value obtained by decryption. The identity authentication method based on the asymmetric encryption algorithm, the Hash algorithm and the picture encryption can increase security authentication on the basis of a network environment without security encryption transmission or a network environment with encryption transmission.

Description

Identity authentication method, device, equipment and storage medium
Technical Field
The present application relates to the field of data encryption technologies, and in particular, to an authentication method, an authentication device, an authentication apparatus, and a storage medium.
Background
With the popularization of computer technology application, computers play a significant role in production and life of people. Computers often suffer from various challenges during use, wherein security of various files on the computer is a very big challenge.
In order to ensure the security of the document, various effective encryption and decryption technologies have been developed. In the prior art, various encryption algorithms are often used to encrypt files in order to ensure the security of the files, so that the files are prevented from being illegally tampered to ensure the security of the files. However, in the process of the user interacting with the system, the user operation data is intercepted, and further the possibility of data tampering is increased, so that the risk of operation being imitated exists.
Therefore, it is an urgent technical problem to be solved by those skilled in the art to provide a new method for mutual authentication between system and user identity.
Disclosure of Invention
The invention aims to overcome the defect that data is intercepted and tampered in the prior art and provides an identity verification method.
In a first aspect of the invention, an identity authentication method is provided, comprising a user identity authentication method and a system server identity authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
In the steps S2 and S20, the user side randomly generates a key through an SM4 algorithm, and encrypts the data text to be transmitted by using the key through an SM4 algorithm.
Further, the hash is SM3 hash operation.
Further, in the steps S1 and S10, a temporal encryption algorithm is used to encrypt the picture.
In a second aspect of the present invention, an identity authentication apparatus is provided, which includes a user module and a system service module, where the user module and the system service module each include an encryption module, a key generation module, a data transmission module, a data reception module, a storage module, and an analysis module, and the encryption module is configured to encrypt and hash an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
Further, the user module and the system service module are provided with the same SM2, SM3, SM4 algorithm and picture encryption algorithm.
The further scheme is that a time encryption algorithm is adopted for encrypting the identification picture.
In a third aspect of the invention, there is provided an apparatus comprising: a memory and a processor; the memory is to store computer instructions; the processor is used for executing the computer instructions stored in the memory to realize the identity authentication method.
In a fourth aspect of the present invention, there is provided a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for implementing the identity verification method.
Compared with the prior art, the invention has the beneficial effects that:
(1) the identity authentication method based on the asymmetric encryption algorithm, the Hash algorithm and the picture encryption can increase security authentication on the basis of a network environment without security encryption transmission or a network environment with encryption transmission.
(2) The invention protects the file by confirming whether the data original text is falsified and confirming whether the identity of the user side or the system server sending the data is correct, thereby ensuring the security of the file.
Drawings
The invention is illustrated and described only by way of example and not by way of limitation in the scope of the invention as set forth in the following drawings, in which:
FIG. 1: a flow diagram of a user identity authentication method;
FIG. 2: the flow diagram of the system server identity authentication method.
Detailed Description
In order to make the objects, technical solutions, design methods, and advantages of the present invention more apparent, the present invention will be further described in detail by specific embodiments with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1 and fig. 2, in a first aspect of the present invention, there is provided an authentication method, including a user authentication method and a system server authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
The invention protects the file by confirming whether the data original text is falsified and confirming whether the identity of the user side or the system server sending the data is correct, thereby ensuring the security of the file.
Specifically, when user authentication is performed, the user side randomly generates an SM4 KEY1, and encrypts the original text of the data to be transmitted by using a KEY1 through an SM4 algorithm to obtain a ciphertext 1; (data originals are generally larger, using SM4 operations at a faster rate than SM2 operations); the client side carries out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 1; the user side encrypts the picture A by using the time T to obtain an encrypted picture 1; the user side carries out SM3 hash operation on the encrypted picture 1 to obtain a hash value 2; the user side combines the KEY1, the hash value 1, the hash value 2 and the time T into a group of data D1; carrying out SM2 encryption operation on the data D1 by using the public key B to obtain a ciphertext 2; forming data D2 by using data such as the ciphertext 1, the ciphertext 2, the user number and the like; the user side transmits the data D2 to the system server through the network; the system server receives the data D2; the system server takes out data such as the ciphertext 1, the ciphertext 2, the user number and the like from the D2; searching a corresponding identification picture and a corresponding key according to the user number; and using the B private key to decrypt the ciphertext 2 by the SM2 to obtain: KEY1, hash value 1, hash value 2, time T; using the KEY KEY1 to perform SM4 decryption on the ciphertext 1 to obtain a data plaintext; carrying out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 3; comparing the hash value 3 with the hash value 1, if the hash values are consistent, the data original text is not tampered; encrypting the picture A by using the time T to obtain an encrypted picture 2; carrying out SM3 hash operation on the encrypted picture 2 to obtain a hash value 4; and comparing the hash value 4 with the hash value 2, and confirming that the identity of the user side sending the information is correct if the hash values are consistent.
When the system server identity identification verification is carried out, similar to the user identity identification verification, the method is a reverse process, and specifically comprises the following steps:
the system server randomly generates an SM4 KEY1, and encrypts the original text of the data to be transmitted by using a KEY1 through an SM4 algorithm to obtain a ciphertext 1; (data originals are generally larger, using SM4 operations at a faster rate than SM2 operations); the system server carries out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 1; the system server encrypts the picture A by using the time T to obtain an encrypted picture 1; the system server carries out SM3 hash operation on the encrypted picture 1 to obtain a hash value 2; the system server combines the KEY1, the hash value 1, the hash value 2 and the time T into a group of data D1; carrying out SM2 encryption operation on the data D1 by using the public key A to obtain a ciphertext 2; composing data D2 from data such as ciphertext 1, ciphertext 2 and the like; the system service transmits the data D2 to the user terminal through the network; the user side receives the data D2; the user side takes out data such as ciphertext 1, ciphertext 2 and the like from the D2; and using the private key A to decrypt the ciphertext 2 by the SM2 to obtain: KEY1, hash value 1, hash value 2, time T; using the KEY KEY1 to perform SM4 decryption on the ciphertext 1 to obtain a data plaintext; carrying out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 3; comparing the hash value 3 with the hash value 1, if the hash values are consistent, the data original text is not tampered; encrypting the picture A by using the time T to obtain an encrypted picture 2; carrying out SM3 hash operation on the encrypted picture 2 to obtain a hash value 4; and comparing the hash value 4 with the hash value 2, and confirming that the system service identity of the transmitted information is correct if the hash values are consistent.
In a second aspect of the present invention, an identity authentication apparatus is provided, which includes a user module and a system service module, where the user module and the system service module each include an encryption module, a key generation module, a data transmission module, a data reception module, a storage module, and an analysis module, and the encryption module is configured to encrypt and hash an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
Optionally, the user module and the system service module are provided with the same SM2, SM3, SM4 algorithm and picture encryption algorithm.
Optionally, a time encryption algorithm is used for encrypting the identification picture.
In a third aspect of the invention, there is provided an apparatus comprising: a memory and a processor; the memory is to store computer instructions; the processor is used for executing the computer instructions stored in the memory to realize the identity authentication method.
In a fourth aspect of the present invention, there is provided a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for implementing the identity verification method.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (9)

1. An identity authentication method is characterized by comprising a user identity authentication method and a system server identity authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
2. The method according to claim 1, wherein in steps S2 and S20, the user terminal randomly generates a key through SM4 algorithm, and the data to be transmitted is encrypted by SM4 algorithm using the key.
3. An authentication method according to claim 2, wherein the hash is an SM3 hash operation.
4. An authentication method according to claim 3, wherein the encryption of the pictures in steps S1 and S10 adopts a time encryption algorithm.
5. An identity authentication device is characterized by comprising a user module and a system service module, wherein the user module and the system service module respectively comprise an encryption module, a key generation module, a data transmission module, a data receiving module, a storage module and an analysis module, and the encryption module is used for encrypting and hashing an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
6. An authentication device according to claim 5, wherein the user module and the system service module are provided with the same SM2, SM3, SM4 algorithms and picture encryption algorithms.
7. An authentication apparatus according to claim 6, wherein the time encryption algorithm is used to encrypt the identification picture.
8. An apparatus, comprising: a memory and a processor; the memory is to store computer instructions; the processor is configured to execute the computer instructions stored by the memory to implement the authentication method of any one of claims 1 to 4.
9. A storage medium, comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are for implementing the identity verification method of any one of claims 1 to 4.
CN202110398003.5A 2021-04-14 2021-04-14 Identity verification method, device, equipment and storage medium Active CN113347143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110398003.5A CN113347143B (en) 2021-04-14 2021-04-14 Identity verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110398003.5A CN113347143B (en) 2021-04-14 2021-04-14 Identity verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113347143A true CN113347143A (en) 2021-09-03
CN113347143B CN113347143B (en) 2023-04-21

Family

ID=77468009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110398003.5A Active CN113347143B (en) 2021-04-14 2021-04-14 Identity verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113347143B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024710A (en) * 2021-09-27 2022-02-08 中诚信征信有限公司 Data transmission method, device, system and equipment
CN114205484A (en) * 2021-12-15 2022-03-18 湖南快乐阳光互动娱乐传媒有限公司 Picture processing method and device
CN114257398A (en) * 2021-11-09 2022-03-29 广东南控云图科技有限公司 Data processing method, system, equipment and medium based on state cryptographic algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050074116A1 (en) * 2003-10-01 2005-04-07 International Business Machines Corporation Simple universal hash for plaintext aware encryption
CN103684794A (en) * 2013-12-25 2014-03-26 华南理工大学 Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN106921640A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 Identity identifying method, authentication device and Verification System
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111756545A (en) * 2020-05-29 2020-10-09 中山大学深圳研究院 Contract authentication method based on block chain digital signature technology
CN111914308A (en) * 2020-07-27 2020-11-10 万达信息股份有限公司 Method for mobile data signature by using CA certificate in intelligent card

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050074116A1 (en) * 2003-10-01 2005-04-07 International Business Machines Corporation Simple universal hash for plaintext aware encryption
CN103684794A (en) * 2013-12-25 2014-03-26 华南理工大学 Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN106921640A (en) * 2015-12-28 2017-07-04 航天信息股份有限公司 Identity identifying method, authentication device and Verification System
CN108683688A (en) * 2018-07-20 2018-10-19 中国建设银行股份有限公司浙江省分行 A method of information transmission security is realized based on Digital Envelope Technology
CN111756545A (en) * 2020-05-29 2020-10-09 中山大学深圳研究院 Contract authentication method based on block chain digital signature technology
CN111914308A (en) * 2020-07-27 2020-11-10 万达信息股份有限公司 Method for mobile data signature by using CA certificate in intelligent card

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114024710A (en) * 2021-09-27 2022-02-08 中诚信征信有限公司 Data transmission method, device, system and equipment
CN114024710B (en) * 2021-09-27 2024-04-16 中诚信征信有限公司 Data transmission method, device, system and equipment
CN114257398A (en) * 2021-11-09 2022-03-29 广东南控云图科技有限公司 Data processing method, system, equipment and medium based on state cryptographic algorithm
CN114205484A (en) * 2021-12-15 2022-03-18 湖南快乐阳光互动娱乐传媒有限公司 Picture processing method and device

Also Published As

Publication number Publication date
CN113347143B (en) 2023-04-21

Similar Documents

Publication Publication Date Title
CN109347835B (en) Information transmission method, client, server, and computer-readable storage medium
US10785019B2 (en) Data transmission method and apparatus
US8239679B2 (en) Authentication method, client, server and system
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN109218825B (en) Video encryption system
CN113347143B (en) Identity verification method, device, equipment and storage medium
WO2022022009A1 (en) Message processing method and apparatus, device, and storage medium
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN109151508B (en) Video encryption method
EP3598714A1 (en) Method, device, and system for encrypting secret key
JP2020505849A (en) Digital certificate management method and device
CN110912920A (en) Data processing method, apparatus and medium
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
KR102146940B1 (en) Method for verifying fogery of token
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN111970114A (en) File encryption method, system, server and storage medium
CN114900304A (en) Digital signature method and apparatus, electronic device, and computer-readable storage medium
CN114785527B (en) Data transmission method, device, equipment and storage medium
KR20140033824A (en) Encryption systems and methods using hash value as symmetric key in the smart device
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN115766119A (en) Communication method, communication apparatus, communication system, and storage medium
CN112398818B (en) Software activation method and related device thereof
CN111541652B (en) System for improving security of secret information keeping and transmission
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant