CN113347143A - Identity authentication method, device, equipment and storage medium - Google Patents
Identity authentication method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN113347143A CN113347143A CN202110398003.5A CN202110398003A CN113347143A CN 113347143 A CN113347143 A CN 113347143A CN 202110398003 A CN202110398003 A CN 202110398003A CN 113347143 A CN113347143 A CN 113347143A
- Authority
- CN
- China
- Prior art keywords
- hash value
- data
- ciphertext
- user
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The invention belongs to the technical field of data encryption, and particularly discloses an identity authentication method, an identity authentication device, identity authentication equipment and a storage medium. When a user uses the system, a picture encryption algorithm in a user side encrypts a stored picture, then the hash value of the encrypted picture is calculated by using the hash algorithm, the hash value, an encrypted time parameter and operation request information of the user are encrypted by using a public key, the user side transmits an encrypted ciphertext to a system server, the system server decrypts the ciphertext by using a private key, encrypts the picture stored by the system server by using the encrypted time parameter obtained by decryption, then the hash value of the encrypted picture is calculated by using the hash algorithm, and the hash value is compared with a big hash value obtained by decryption. The identity authentication method based on the asymmetric encryption algorithm, the Hash algorithm and the picture encryption can increase security authentication on the basis of a network environment without security encryption transmission or a network environment with encryption transmission.
Description
Technical Field
The present application relates to the field of data encryption technologies, and in particular, to an authentication method, an authentication device, an authentication apparatus, and a storage medium.
Background
With the popularization of computer technology application, computers play a significant role in production and life of people. Computers often suffer from various challenges during use, wherein security of various files on the computer is a very big challenge.
In order to ensure the security of the document, various effective encryption and decryption technologies have been developed. In the prior art, various encryption algorithms are often used to encrypt files in order to ensure the security of the files, so that the files are prevented from being illegally tampered to ensure the security of the files. However, in the process of the user interacting with the system, the user operation data is intercepted, and further the possibility of data tampering is increased, so that the risk of operation being imitated exists.
Therefore, it is an urgent technical problem to be solved by those skilled in the art to provide a new method for mutual authentication between system and user identity.
Disclosure of Invention
The invention aims to overcome the defect that data is intercepted and tampered in the prior art and provides an identity verification method.
In a first aspect of the invention, an identity authentication method is provided, comprising a user identity authentication method and a system server identity authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
In the steps S2 and S20, the user side randomly generates a key through an SM4 algorithm, and encrypts the data text to be transmitted by using the key through an SM4 algorithm.
Further, the hash is SM3 hash operation.
Further, in the steps S1 and S10, a temporal encryption algorithm is used to encrypt the picture.
In a second aspect of the present invention, an identity authentication apparatus is provided, which includes a user module and a system service module, where the user module and the system service module each include an encryption module, a key generation module, a data transmission module, a data reception module, a storage module, and an analysis module, and the encryption module is configured to encrypt and hash an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
Further, the user module and the system service module are provided with the same SM2, SM3, SM4 algorithm and picture encryption algorithm.
The further scheme is that a time encryption algorithm is adopted for encrypting the identification picture.
In a third aspect of the invention, there is provided an apparatus comprising: a memory and a processor; the memory is to store computer instructions; the processor is used for executing the computer instructions stored in the memory to realize the identity authentication method.
In a fourth aspect of the present invention, there is provided a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for implementing the identity verification method.
Compared with the prior art, the invention has the beneficial effects that:
(1) the identity authentication method based on the asymmetric encryption algorithm, the Hash algorithm and the picture encryption can increase security authentication on the basis of a network environment without security encryption transmission or a network environment with encryption transmission.
(2) The invention protects the file by confirming whether the data original text is falsified and confirming whether the identity of the user side or the system server sending the data is correct, thereby ensuring the security of the file.
Drawings
The invention is illustrated and described only by way of example and not by way of limitation in the scope of the invention as set forth in the following drawings, in which:
FIG. 1: a flow diagram of a user identity authentication method;
FIG. 2: the flow diagram of the system server identity authentication method.
Detailed Description
In order to make the objects, technical solutions, design methods, and advantages of the present invention more apparent, the present invention will be further described in detail by specific embodiments with reference to the accompanying drawings. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1 and fig. 2, in a first aspect of the present invention, there is provided an authentication method, including a user authentication method and a system server authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
The invention protects the file by confirming whether the data original text is falsified and confirming whether the identity of the user side or the system server sending the data is correct, thereby ensuring the security of the file.
Specifically, when user authentication is performed, the user side randomly generates an SM4 KEY1, and encrypts the original text of the data to be transmitted by using a KEY1 through an SM4 algorithm to obtain a ciphertext 1; (data originals are generally larger, using SM4 operations at a faster rate than SM2 operations); the client side carries out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 1; the user side encrypts the picture A by using the time T to obtain an encrypted picture 1; the user side carries out SM3 hash operation on the encrypted picture 1 to obtain a hash value 2; the user side combines the KEY1, the hash value 1, the hash value 2 and the time T into a group of data D1; carrying out SM2 encryption operation on the data D1 by using the public key B to obtain a ciphertext 2; forming data D2 by using data such as the ciphertext 1, the ciphertext 2, the user number and the like; the user side transmits the data D2 to the system server through the network; the system server receives the data D2; the system server takes out data such as the ciphertext 1, the ciphertext 2, the user number and the like from the D2; searching a corresponding identification picture and a corresponding key according to the user number; and using the B private key to decrypt the ciphertext 2 by the SM2 to obtain: KEY1, hash value 1, hash value 2, time T; using the KEY KEY1 to perform SM4 decryption on the ciphertext 1 to obtain a data plaintext; carrying out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 3; comparing the hash value 3 with the hash value 1, if the hash values are consistent, the data original text is not tampered; encrypting the picture A by using the time T to obtain an encrypted picture 2; carrying out SM3 hash operation on the encrypted picture 2 to obtain a hash value 4; and comparing the hash value 4 with the hash value 2, and confirming that the identity of the user side sending the information is correct if the hash values are consistent.
When the system server identity identification verification is carried out, similar to the user identity identification verification, the method is a reverse process, and specifically comprises the following steps:
the system server randomly generates an SM4 KEY1, and encrypts the original text of the data to be transmitted by using a KEY1 through an SM4 algorithm to obtain a ciphertext 1; (data originals are generally larger, using SM4 operations at a faster rate than SM2 operations); the system server carries out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 1; the system server encrypts the picture A by using the time T to obtain an encrypted picture 1; the system server carries out SM3 hash operation on the encrypted picture 1 to obtain a hash value 2; the system server combines the KEY1, the hash value 1, the hash value 2 and the time T into a group of data D1; carrying out SM2 encryption operation on the data D1 by using the public key A to obtain a ciphertext 2; composing data D2 from data such as ciphertext 1, ciphertext 2 and the like; the system service transmits the data D2 to the user terminal through the network; the user side receives the data D2; the user side takes out data such as ciphertext 1, ciphertext 2 and the like from the D2; and using the private key A to decrypt the ciphertext 2 by the SM2 to obtain: KEY1, hash value 1, hash value 2, time T; using the KEY KEY1 to perform SM4 decryption on the ciphertext 1 to obtain a data plaintext; carrying out SM3 hash operation on the original text of the data to be transmitted to obtain a hash value 3; comparing the hash value 3 with the hash value 1, if the hash values are consistent, the data original text is not tampered; encrypting the picture A by using the time T to obtain an encrypted picture 2; carrying out SM3 hash operation on the encrypted picture 2 to obtain a hash value 4; and comparing the hash value 4 with the hash value 2, and confirming that the system service identity of the transmitted information is correct if the hash values are consistent.
In a second aspect of the present invention, an identity authentication apparatus is provided, which includes a user module and a system service module, where the user module and the system service module each include an encryption module, a key generation module, a data transmission module, a data reception module, a storage module, and an analysis module, and the encryption module is configured to encrypt and hash an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
Optionally, the user module and the system service module are provided with the same SM2, SM3, SM4 algorithm and picture encryption algorithm.
Optionally, a time encryption algorithm is used for encrypting the identification picture.
In a third aspect of the invention, there is provided an apparatus comprising: a memory and a processor; the memory is to store computer instructions; the processor is used for executing the computer instructions stored in the memory to realize the identity authentication method.
In a fourth aspect of the present invention, there is provided a storage medium comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are used for implementing the identity verification method.
Having described embodiments of the present invention, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Claims (9)
1. An identity authentication method is characterized by comprising a user identity authentication method and a system server identity authentication method,
the user identity authentication method comprises the following steps:
s1: a user provides an identification picture, and the user encrypts and hashes the picture to obtain a hash value;
s2: a user randomly generates a secret key, and encrypts an original text of a file to form a ciphertext;
s3: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s4: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s5: the user side sends the new ciphertext to a system server through network data;
s6: the system server decrypts the new ciphertext to obtain a data original text and an identification picture;
s7: respectively hashing the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s8: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the user side sending the information is correct;
the system server identity authentication method comprises the following steps:
s10: the system server encrypts and hashes the picture according to the identification picture provided by the user to obtain a hash value;
s20: the system server randomly generates a secret key, and encrypts the original text of the file to form a ciphertext;
s30: carrying out Hash and symmetric encryption on the ciphertext to obtain a Hash value;
s40: asymmetrically encrypting the hash value and the ciphertext obtained in the steps S1-S3 to obtain a new ciphertext;
s50: the system server sends the new ciphertext to the user side through network data;
s60: the user terminal decrypts the new ciphertext to obtain a data original text and an identification picture;
s70: the user end respectively hashes the data original text and the identification picture to obtain a data original text hash value and an identification picture hash value;
s80: comparing the hash value of the data original text in the step S7 with the hash value in the step S3, wherein if the hash values are consistent, the data original text is not tampered; and comparing the hash value of the identification picture in the step S7 with the hash value in the step S1, and if the hash values are consistent, confirming that the identity of the system server sending the information is correct.
2. The method according to claim 1, wherein in steps S2 and S20, the user terminal randomly generates a key through SM4 algorithm, and the data to be transmitted is encrypted by SM4 algorithm using the key.
3. An authentication method according to claim 2, wherein the hash is an SM3 hash operation.
4. An authentication method according to claim 3, wherein the encryption of the pictures in steps S1 and S10 adopts a time encryption algorithm.
5. An identity authentication device is characterized by comprising a user module and a system service module, wherein the user module and the system service module respectively comprise an encryption module, a key generation module, a data transmission module, a data receiving module, a storage module and an analysis module, and the encryption module is used for encrypting and hashing an identification picture; the key generation module is used for randomly generating a key and encrypting the original text of the file to form a ciphertext; the data transmission module is used for transmitting the new ciphertext to a system server through network data; the data receiving module is used for receiving the encrypted file; the storage module is used for storing encrypted files and identification pictures; the analysis module is used for comparing the hash values and confirming whether the identity authentication is passed or not.
6. An authentication device according to claim 5, wherein the user module and the system service module are provided with the same SM2, SM3, SM4 algorithms and picture encryption algorithms.
7. An authentication apparatus according to claim 6, wherein the time encryption algorithm is used to encrypt the identification picture.
8. An apparatus, comprising: a memory and a processor; the memory is to store computer instructions; the processor is configured to execute the computer instructions stored by the memory to implement the authentication method of any one of claims 1 to 4.
9. A storage medium, comprising: a readable storage medium and computer instructions stored in the readable storage medium; the computer instructions are for implementing the identity verification method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110398003.5A CN113347143B (en) | 2021-04-14 | 2021-04-14 | Identity verification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110398003.5A CN113347143B (en) | 2021-04-14 | 2021-04-14 | Identity verification method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113347143A true CN113347143A (en) | 2021-09-03 |
CN113347143B CN113347143B (en) | 2023-04-21 |
Family
ID=77468009
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110398003.5A Active CN113347143B (en) | 2021-04-14 | 2021-04-14 | Identity verification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113347143B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114024710A (en) * | 2021-09-27 | 2022-02-08 | 中诚信征信有限公司 | Data transmission method, device, system and equipment |
CN114205484A (en) * | 2021-12-15 | 2022-03-18 | 湖南快乐阳光互动娱乐传媒有限公司 | Picture processing method and device |
CN114257398A (en) * | 2021-11-09 | 2022-03-29 | 广东南控云图科技有限公司 | Data processing method, system, equipment and medium based on state cryptographic algorithm |
CN115363545A (en) * | 2022-09-01 | 2022-11-22 | 北京雪扬科技有限公司 | Blood lipid monitoring method based on wearable equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050074116A1 (en) * | 2003-10-01 | 2005-04-07 | International Business Machines Corporation | Simple universal hash for plaintext aware encryption |
CN103684794A (en) * | 2013-12-25 | 2014-03-26 | 华南理工大学 | A Communication Data Encryption and Decryption Method Based on DES, RSA, and SHA-1 Encryption Algorithms |
CN106921640A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | Identity identifying method, authentication device and Verification System |
CN108683688A (en) * | 2018-07-20 | 2018-10-19 | 中国建设银行股份有限公司浙江省分行 | A method of information transmission security is realized based on Digital Envelope Technology |
CN111756545A (en) * | 2020-05-29 | 2020-10-09 | 中山大学深圳研究院 | Contract authentication method based on block chain digital signature technology |
CN111914308A (en) * | 2020-07-27 | 2020-11-10 | 万达信息股份有限公司 | Method for mobile data signature by using CA certificate in intelligent card |
-
2021
- 2021-04-14 CN CN202110398003.5A patent/CN113347143B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050074116A1 (en) * | 2003-10-01 | 2005-04-07 | International Business Machines Corporation | Simple universal hash for plaintext aware encryption |
CN103684794A (en) * | 2013-12-25 | 2014-03-26 | 华南理工大学 | A Communication Data Encryption and Decryption Method Based on DES, RSA, and SHA-1 Encryption Algorithms |
CN106921640A (en) * | 2015-12-28 | 2017-07-04 | 航天信息股份有限公司 | Identity identifying method, authentication device and Verification System |
CN108683688A (en) * | 2018-07-20 | 2018-10-19 | 中国建设银行股份有限公司浙江省分行 | A method of information transmission security is realized based on Digital Envelope Technology |
CN111756545A (en) * | 2020-05-29 | 2020-10-09 | 中山大学深圳研究院 | Contract authentication method based on block chain digital signature technology |
CN111914308A (en) * | 2020-07-27 | 2020-11-10 | 万达信息股份有限公司 | Method for mobile data signature by using CA certificate in intelligent card |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114024710A (en) * | 2021-09-27 | 2022-02-08 | 中诚信征信有限公司 | Data transmission method, device, system and equipment |
CN114024710B (en) * | 2021-09-27 | 2024-04-16 | 中诚信征信有限公司 | Data transmission method, device, system and equipment |
CN114257398A (en) * | 2021-11-09 | 2022-03-29 | 广东南控云图科技有限公司 | Data processing method, system, equipment and medium based on state cryptographic algorithm |
CN114205484A (en) * | 2021-12-15 | 2022-03-18 | 湖南快乐阳光互动娱乐传媒有限公司 | Picture processing method and device |
CN115363545A (en) * | 2022-09-01 | 2022-11-22 | 北京雪扬科技有限公司 | Blood lipid monitoring method based on wearable equipment |
CN115363545B (en) * | 2022-09-01 | 2024-11-29 | 北京雪扬科技有限公司 | Blood fat monitoring method based on wearable equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113347143B (en) | 2023-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347835B (en) | Information transmission method, client, server, and computer-readable storage medium | |
US8239679B2 (en) | Authentication method, client, server and system | |
US10785019B2 (en) | Data transmission method and apparatus | |
US9485096B2 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
CN113347143B (en) | Identity verification method, device, equipment and storage medium | |
CN109218825B (en) | Video encryption system | |
CN109151508B (en) | Video encryption method | |
WO2022022009A1 (en) | Message processing method and apparatus, device, and storage medium | |
EP3598714A1 (en) | Method, device, and system for encrypting secret key | |
CN108809936B (en) | A kind of intelligent mobile terminal identity verification method based on hybrid encryption algorithm and its implementation system | |
CN110912920A (en) | Data processing method, apparatus and medium | |
CN106713508A (en) | Data access method and system based on cloud server | |
US20240250826A1 (en) | Cryptographic method for verifying data | |
CN111080299B (en) | Anti-repudiation method for transaction information, client and server | |
CN114900304A (en) | Digital signature method and apparatus, electronic device, and computer-readable storage medium | |
CN113382002B (en) | Data request method, request response method, data communication system, and storage medium | |
CN115632880A (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN117675285A (en) | Identity verification method, chip and equipment | |
CN114785527B (en) | Data transmission method, device, equipment and storage medium | |
CN114553557A (en) | Key calling method, key calling device, computer equipment and storage medium | |
CN113347144A (en) | Method, system, equipment and storage medium for reciprocal data encryption | |
KR20140033824A (en) | Encryption systems and methods using hash value as symmetric key in the smart device | |
CN114374519B (en) | Data transmission method, system and equipment | |
CN112954388B (en) | A method, device, terminal device and storage medium for obtaining data files | |
CN112398818B (en) | Software activation method and related device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |