CN114531235B - Communication method and system for end-to-end encryption - Google Patents

Communication method and system for end-to-end encryption Download PDF

Info

Publication number
CN114531235B
CN114531235B CN202210193962.8A CN202210193962A CN114531235B CN 114531235 B CN114531235 B CN 114531235B CN 202210193962 A CN202210193962 A CN 202210193962A CN 114531235 B CN114531235 B CN 114531235B
Authority
CN
China
Prior art keywords
terminal
information
public
token
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210193962.8A
Other languages
Chinese (zh)
Other versions
CN114531235A (en
Inventor
王建民
雒海波
武延军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Software of CAS
Original Assignee
Institute of Software of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Software of CAS filed Critical Institute of Software of CAS
Priority to CN202210193962.8A priority Critical patent/CN114531235B/en
Publication of CN114531235A publication Critical patent/CN114531235A/en
Application granted granted Critical
Publication of CN114531235B publication Critical patent/CN114531235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a communication method and a communication system for end-to-end encryption, and relates to the technical field of internet information communication. The method comprises the following steps: under a trusted environment, acquiring a public key2 and authentication information of a second terminal; the first ciphertext information is sent to a second terminal to acquire an access_token, a symmetric key and a corresponding symmetric encryption algorithm returned by the second terminal; the access_token and the second ciphertext information are sent to a second terminal, so that third ciphertext information returned by the second terminal is obtained; and decrypting the third ciphertext information by using the symmetric key and a corresponding symmetric encryption algorithm to obtain the data response information. The invention realizes the safe transmission of the data of both parties based on the symmetric encryption algorithm in the transmission process, and presets the encryption scheme in the preparation stage, thereby eliminating the risk that a third party and a data transmission platform intercept the data packet from the middle layer to obtain the user data, and the data safety is doubly protected.

Description

Communication method and system for end-to-end encryption
Technical Field
The invention relates to the technical field of internet information communication, in particular to a communication method and a communication system for end-to-end encryption.
Background
In the internet age, data information is the most important property of individuals, and secure transmission of data is an important means of protecting privacy of individuals. In order to protect data transmission security, encryption is generally required in a communication network, and a data encryption transmission scheme provided in the prior art relates to a plurality of encryption modes such as key information encryption, a network layer encryption mechanism, an application layer encryption mechanism and the like. These schemes still do not well avoid the risk of third party intervention intercepting the hacked information, and the data security is not secured.
Disclosure of Invention
Aiming at the problems, the invention discloses a communication method and a communication system for end-to-end encryption so as to realize safe transmission of data.
The technical scheme of the invention comprises the following steps:
an end-to-end encrypted communication method applied to a first terminal, comprising the steps of:
under a trusted environment, acquiring a public key2 and authentication information of a second terminal;
sending the first ciphertext information to a second terminal to obtain an access_token, a symmetric key and a corresponding symmetric encryption algorithm returned by the second terminal, wherein the first ciphertext information comprises: the authentication information encrypted by using the public key2, wherein the access_token comprises the symmetric key encrypted by the public key2;
sending the access_token and the second ciphertext information to a second terminal to obtain third ciphertext information returned by the second terminal, wherein the second ciphertext information comprises: the data request information encrypted by using the symmetric key, the third ciphertext information is obtained based on the second ciphertext information and the symmetric key encrypted by the public key2 included in the access_token, and the third ciphertext information includes: encrypted data response information;
and decrypting the third ciphertext information by using the symmetric key and a corresponding symmetric encryption algorithm to obtain the data response information.
Further, the first terminal includes: client, PC or Web.
Further, when the first terminal is a client, the obtaining the public key2 and the authentication information of the second terminal includes:
creating a public-private key pair;
and sending the public key1 and the first terminal identity information in the public-private key pair to a second client to obtain the public key2 and the authentication information of the second terminal.
Further, when the first terminal is a client, the obtaining the access_token, the symmetric key and the corresponding symmetric encryption algorithm returned by the second terminal includes:
transmitting the first ciphertext information to a second terminal, the first ciphertext information further comprising: the first terminal encrypted by the public key2 unifies a unique identification code;
obtaining access_token and fourth ciphertext information, wherein the fourth ciphertext information comprises: a symmetric key encrypted using public key1 and a corresponding symmetric encryption algorithm;
and decoding the fourth ciphertext information by using the private key A to obtain a symmetric key and a corresponding symmetric encryption algorithm.
Further, when the first terminal is a PC or Web, the obtaining the public key2 and authentication information of the second terminal includes:
establishing connection with a third client, wherein the third client and the second terminal have established a trust relationship;
and receiving authentication information sent by the third client, wherein the authentication information is an authorization code or an invitation code generated by the second terminal, and the authorization code or the invitation code comprises the public key2.
Further, when the first terminal is a PC or Web terminal, the obtaining the access_token, the symmetric key and the corresponding symmetric encryption algorithm returned by the second terminal includes:
generating a set of temporary symmetric keys;
under a trusted environment, the first ciphertext information is sent to a third client, so that a second terminal generates an access_token based on the first ciphertext information sent by the third client and identification information of the first terminal, and sends the access_token, a symmetric key and a corresponding symmetric encryption algorithm to the first terminal, wherein the first ciphertext information further comprises: the temporary symmetric key encrypted using the public key2.
Further, the third ciphertext information is obtained based on the second ciphertext information and the symmetric key encrypted by the public key2 included in the access_token:
verifying first terminal identity information in the access_token;
decrypting the symmetric key encrypted by the public key2 in the access_token by using the private key B corresponding to the public key2 for the authenticated access_token;
decrypting the second ciphertext information using the symmetric key to obtain the data request information;
obtaining data response information based on the data request information;
and encrypting the data response information by using the symmetric key and the corresponding symmetric encryption algorithm to generate third ciphertext information.
A storage medium having a computer program stored therein, wherein the computer program is arranged to perform any of the methods above when run.
A terminal comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform any of the methods described above.
An end-to-end encrypted communication system comprising a first terminal and a second terminal,
the first terminal is used for acquiring a public key2 and authentication information of the second terminal in a trusted environment; sending the first ciphertext information to the second terminal to obtain an access_token, a symmetric key and a corresponding symmetric encryption algorithm returned by the second terminal, wherein the first ciphertext information comprises: the authentication information encrypted by using the public key2, wherein the access_token comprises the symmetric key encrypted by the public key2; the access_token and the second ciphertext information are sent to a second terminal to obtain third ciphertext information returned by the second terminal, wherein the second ciphertext information comprises: data request information encrypted using the symmetric key; decrypting the third ciphertext information by using the symmetric key and a corresponding symmetric encryption algorithm to obtain the data response information;
the second terminal is used for generating a public and private key pair; obtaining an access_token, a symmetric key and a corresponding symmetric encryption algorithm according to the first ciphertext information; and obtaining the third ciphertext information based on the second ciphertext information and the symmetric key encrypted by the public key2 contained in the access token.
Compared with the prior art, the invention has at least the following advantages:
1. the encryption scheme is preset in the preparation stage of data transmission, so that the data is ensured to be in a relatively safe environment before the data starts to be transmitted;
2. in the transmission process, the invention realizes the safe transmission of the data of both parties by utilizing the symmetric encryption algorithm, thereby eliminating the risk that a third party and a data transmission platform intercept the data packet from the middle layer to obtain the user data, and the data safety is doubly protected.
Drawings
FIG. 1 is a system diagram of the present invention.
Figure 2 is a flow chart of the method of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is apparent that the embodiments described are merely specific embodiments of the present invention, and not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, are intended to fall within the scope of the present invention.
The invention provides an end-to-end encryption communication system, as shown in figure 1, comprising a first terminal and a second terminal, wherein the opposite side terminal for establishing communication connection between the first terminal and the second terminal comprises a client, a PC or a Web; the second terminal is a contralateral terminal that establishes a communication connection with the first terminal, which is a service storable and running in an operating system, and may include, but is not limited to, an electronic device having a processor and memory or a computer-readable storage medium.
The encryption communication method provided by the invention, as shown in fig. 2, comprises the following steps:
step 110: and under the trusted environment, acquiring the public key2 and authentication information of the second terminal.
In an example, when the first terminal is a client, the initialized first terminal is paired with the second terminal in a trusted environment. Alternatively, the trusted environment may be based on bluetooth functionality or a usb transfer implementation.
When the two ends are connected, the first terminal creates a key1 (public key), a key A (private key), and the second terminal creates a key2 (public key) and a key B (private key).
At this time, in a trusted environment, the first terminal sends the contents such as the public key1 and the identity information to the second terminal, and the second terminal sends the contents such as the public key2 and the authentication information to the first terminal after receiving the contents.
In another example, when the first terminal is in a form of a terminal other than the client, such as a PC or Web, the trusted environment may be completed based on a third client because the first terminal does not have bluetooth function. Namely, a third client which establishes trust relation with the second terminal based on the trusted environment is selected first.
The second terminal then creates key2 (public key), key B (private key), and sends an authentication message (e.g. authorization code or invitation code) carrying the public key2 to the third client.
The first terminal obtains a public key2 through the authentication information obtained from the third client.
Step 120: and sending the first ciphertext information to the second terminal to acquire the access_token, the symmetric key and the corresponding symmetric encryption algorithm returned by the second terminal.
In an example, when the first terminal is a client, the first terminal encrypts authentication information (such as auth_key) and client-UUID (unified unique identifier of the terminal) with public key2 using RSA asymmetric encryption algorithm to obtain first ciphertext information, and sends the first ciphertext information to the second terminal.
After receiving the first ciphertext information, the second terminal generates an access_token, wherein the access_token comprises the symmetric key encrypted by the public key2, returns an access credential access_token, the symmetric key encrypted by the public key1 and the algorithm information encrypted by AES (Advanced Encryption Standard) symmetrically, and accordingly the two ends establish an interconnection access trust relationship.
In another example, when the first terminal is in the form of a terminal other than the client, the first terminal generates a set of temporary symmetric keys and encrypts the set of temporary symmetric keys and the authorization/invitation code using public key2 to send to the second terminal.
And the second terminal generates an access certificate access_token after verifying the identity of the second terminal, wherein the access_token comprises the symmetric key encrypted by the public key2, and returns the access_token, the symmetric key and symmetric encryption algorithm information to the first terminal in a trusted environment, so that the two ends establish an interconnection access trust relationship.
In the above two examples, the symmetric encryption algorithm information is used for the algorithm information used by the first terminal in decryption in the subsequent data transmission, and includes basic contents such as formula information of the algorithm; alternatively, the symmetric algorithm information may be AES (Advanced EncryptionStandard), DES (Data Encryption Standard), etc.
Step 130: and sending the access_token and the second ciphertext information to the second terminal to acquire third ciphertext information returned by the second terminal.
After steps 110-120, the first terminal and the second terminal have established a mutual trust relationship, and at this time, the first terminal may perform data transmission with the corresponding second terminal by means of the obtained access_token, which specifically includes:
step 1301: the first terminal uses the data request information encrypted by the symmetric key to obtain second ciphertext information, and sends the access_token and the second ciphertext information to the second terminal;
step 1302: after receiving the access_token and the second ciphertext information, the second terminal verifies the access_token and the first terminal identity information contained in the access_token to judge the identity of the first terminal;
step 1303: after the verification is passed, decrypting the access_token by using the private key B to obtain a symmetric key;
step 1304: decrypting the first ciphertext information by using the symmetric key to obtain data request information;
step 1305: generating data response information of the data request information;
step 1306: and encrypting the data response information by using the symmetric key, and generating and transmitting third ciphertext information to the first terminal.
Step 140: and decrypting the third ciphertext information by using the symmetric key and the corresponding symmetric encryption algorithm to obtain the data response information.
After the first terminal receives the third ciphertext, the third ciphertext information is decrypted by using the symmetric key and the corresponding symmetric encryption algorithm, so that the corresponding information of the data generated by the second terminal is obtained.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (5)

1. A communication method of end-to-end encryption, applied to a first terminal, the first terminal comprising: the method comprises the following steps of:
under a trusted environment, acquiring a public key2 and authentication information of a second terminal; the obtaining the public key2 and the authentication information of the second terminal in the trusted environment includes:
when the first terminal is a client, the first terminal creates a public-private key pair, and sends public key1 and first terminal identity information in the public-private key pair to a second client so as to acquire public key2 and authentication information of the second terminal;
or alternatively, the first and second heat exchangers may be,
when the first terminal is a PC terminal or a Web terminal, the first terminal establishes connection with a third client and receives authentication information sent by the third client, wherein the third client and the second terminal have established trust relationship, the authentication information is an authorization code or an invitation code generated by the second terminal, and the authorization code or the invitation code comprises a public key2;
sending the first ciphertext information to a second terminal to obtain an access_token, a symmetric key and a corresponding symmetric encryption algorithm returned by the second terminal, wherein the first ciphertext information comprises: the authentication information encrypted by using the public key2, wherein the access_token comprises the symmetric key encrypted by the public key2; the obtaining the access_token returned by the second terminal, the symmetric key and the corresponding symmetric encryption algorithm comprises the following steps:
when the first terminal is a client, the first ciphertext information is sent to a second terminal, and the first ciphertext information further includes: the first terminal encrypted by the public key2 unifies a unique identification code;
obtaining access_token and fourth ciphertext information, wherein the fourth ciphertext information comprises: a symmetric key encrypted using public key1 and a corresponding symmetric encryption algorithm;
decoding the fourth ciphertext information by using a private key A to obtain a symmetric key and a corresponding symmetric encryption algorithm;
or alternatively, the first and second heat exchangers may be,
when the first terminal is a PC end or a Web end, generating a group of temporary symmetric keys;
under a trusted environment, the first ciphertext information is sent to a third client, so that a second terminal generates an access_token based on the first ciphertext information sent by the third client and identification information of the first terminal, and sends the access_token, a symmetric key and a corresponding symmetric encryption algorithm to the first terminal, wherein the first ciphertext information further comprises: the temporary symmetric key encrypted using the public key2;
sending the access_token and the second ciphertext information to a second terminal to obtain third ciphertext information returned by the second terminal, wherein the second ciphertext information comprises: the data request information encrypted by using the symmetric key, the third ciphertext information is obtained based on the second ciphertext information and the symmetric key encrypted by the public key2 included in the access_token, and the third ciphertext information includes: encrypted data response information;
and decrypting the third ciphertext information by using the symmetric key and a corresponding symmetric encryption algorithm to obtain the data response information.
2. The method of claim 1, wherein the third ciphertext information is derived based on the second ciphertext information and the symmetric key included in the access_token that was encrypted by public key 2:
verifying first terminal identity information in the access_token;
decrypting the symmetric key encrypted by the public key2 in the access_token by using the private key B corresponding to the public key2 for the authenticated access_token;
decrypting the second ciphertext information using the symmetric key to obtain the data request information;
obtaining data response information based on the data request information;
and encrypting the data response information by using the symmetric key and the corresponding symmetric encryption algorithm to generate third ciphertext information.
3. A storage medium having a computer program stored therein, wherein the computer program is arranged to perform the method of any of claims 1-2 when run.
4. A terminal comprising a memory and a processor, the memory having stored therein a computer program, the processor being arranged to run the computer program to perform the method of any of claims 1-2.
5. An end-to-end encrypted communication system comprising a first terminal and a second terminal,
a first terminal for:
under a trusted environment, acquiring a public key2 and authentication information of a second terminal; the obtaining the public key2 and the authentication information of the second terminal in the trusted environment includes:
when the first terminal is a client, the first terminal creates a public-private key pair, and sends public key1 and first terminal identity information in the public-private key pair to a second client so as to acquire public key2 and authentication information of the second terminal; or alternatively, the first and second heat exchangers may be,
when the first terminal is a PC terminal or a Web terminal, the first terminal establishes connection with a third client and receives authentication information sent by the third client, wherein the third client and the second terminal have established trust relationship, the authentication information is an authorization code or an invitation code generated by the second terminal, and the authorization code or the invitation code comprises a public key2;
sending the first ciphertext information to the second terminal to obtain an access_token, a symmetric key and a corresponding symmetric encryption algorithm returned by the second terminal, wherein the first ciphertext information comprises: the authentication information encrypted by using the public key2, wherein the access_token comprises the symmetric key encrypted by the public key2; the obtaining the access_token returned by the second terminal, the symmetric key and the corresponding symmetric encryption algorithm comprises the following steps:
when the first terminal is a client, the first ciphertext information is sent to a second terminal, and the first ciphertext information further includes: the first terminal encrypted by the public key2 unifies a unique identification code;
obtaining access_token and fourth ciphertext information, wherein the fourth ciphertext information comprises: a symmetric key encrypted using public key1 and a corresponding symmetric encryption algorithm;
decoding the fourth ciphertext information by using a private key A to obtain a symmetric key and a corresponding symmetric encryption algorithm; or alternatively, the first and second heat exchangers may be,
when the first terminal is a PC end or a Web end, generating a group of temporary symmetric keys;
under a trusted environment, the first ciphertext information is sent to a third client, so that a second terminal generates an access_token based on the first ciphertext information sent by the third client and identification information of the first terminal, and sends the access_token, a symmetric key and a corresponding symmetric encryption algorithm to the first terminal, wherein the first ciphertext information further comprises: the temporary symmetric key encrypted using the public key2;
the access_token and the second ciphertext information are sent to a second terminal to obtain third ciphertext information returned by the second terminal, wherein the second ciphertext information comprises: data request information encrypted using the symmetric key;
decrypting the third ciphertext information by using the symmetric key and a corresponding symmetric encryption algorithm to obtain data response information;
a second terminal for:
generating a public-private key pair;
obtaining an access_token, a symmetric key and a corresponding symmetric encryption algorithm according to the first ciphertext information;
and obtaining the third ciphertext information based on the second ciphertext information and the symmetric key encrypted by the public key2 contained in the access token.
CN202210193962.8A 2022-03-01 2022-03-01 Communication method and system for end-to-end encryption Active CN114531235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210193962.8A CN114531235B (en) 2022-03-01 2022-03-01 Communication method and system for end-to-end encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210193962.8A CN114531235B (en) 2022-03-01 2022-03-01 Communication method and system for end-to-end encryption

Publications (2)

Publication Number Publication Date
CN114531235A CN114531235A (en) 2022-05-24
CN114531235B true CN114531235B (en) 2023-06-13

Family

ID=81626135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210193962.8A Active CN114531235B (en) 2022-03-01 2022-03-01 Communication method and system for end-to-end encryption

Country Status (1)

Country Link
CN (1) CN114531235B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193695A (en) * 2019-07-26 2020-05-22 腾讯科技(深圳)有限公司 Encryption method and device for third party account login and storage medium
CN113489585A (en) * 2021-07-02 2021-10-08 北京明朝万达科技股份有限公司 Identity authentication method and system of terminal equipment, storage medium and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10999276B2 (en) * 2012-02-02 2021-05-04 Josiah Johnson Umezurike Industrial internet encryption system
KR102457809B1 (en) * 2014-09-24 2022-10-24 삼성전자주식회사 Method, Apparatus and System of Security of Data Communication
CN106506470B (en) * 2016-10-31 2018-07-27 大唐高鸿信安(浙江)信息科技有限公司 network data security transmission method
CN108809936B (en) * 2018-04-20 2020-12-08 山东大学 Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN111556025B (en) * 2020-04-02 2023-06-02 深圳壹账通智能科技有限公司 Data transmission method, system and computer equipment based on encryption and decryption operations
CN113225352B (en) * 2021-05-28 2023-04-07 国网绿色能源有限公司 Data transmission method and device, electronic equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111193695A (en) * 2019-07-26 2020-05-22 腾讯科技(深圳)有限公司 Encryption method and device for third party account login and storage medium
CN113489585A (en) * 2021-07-02 2021-10-08 北京明朝万达科技股份有限公司 Identity authentication method and system of terminal equipment, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于国密算法的即时通信加密软件系统的设计与实现;奚宇航;黄一平;苏检德;王淑沛;;计算机应用与软件(第06期);全文 *

Also Published As

Publication number Publication date
CN114531235A (en) 2022-05-24

Similar Documents

Publication Publication Date Title
US7584505B2 (en) Inspected secure communication protocol
US7688975B2 (en) Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
US9407617B2 (en) Pass-thru for client authentication
KR100990320B1 (en) Method and system for providing client privacy when requesting content from a public server
US7975139B2 (en) Use and generation of a session key in a secure socket layer connection
US7607012B2 (en) Method for securing a communication
KR101265873B1 (en) Distributed single sign-on service
US20020038420A1 (en) Method for efficient public key based certification for mobile and desktop environments
JP2009529832A (en) Undiscoverable, ie secure data communication using black data
CN108809633B (en) Identity authentication method, device and system
CN111756529B (en) Quantum session key distribution method and system
WO2010078755A1 (en) Method and system for transmitting electronic mail, wlan authentication and privacy infrastructure (wapi) terminal thereof
JP2000083018A (en) Method for transmitting information needing secrecy by first using communication that is not kept secret
KR20090098542A (en) Encryption data communication system using proxy and method for encryption data communication thereof
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN103905388A (en) Authentication method, authentication device, smart card, and server
US20060053288A1 (en) Interface method and device for the on-line exchange of content data in a secure manner
JPH10242957A (en) User authentication method, system therefor and storage medium for user authentication
KR100456624B1 (en) Authentication and key agreement scheme for mobile network
Barker et al. Sp 800-57. recommendation for key management, part 1: General (revised)
KR100970552B1 (en) Method for generating secure key using certificateless public key
TW200803392A (en) Method, device, server arrangement, system and computer program products for securely storing data in a portable device
KR20070035342A (en) Method for mutual authentication based on the user's password
KR20040105064A (en) Key-exchange protocol method for mobile communication system
CN112035820B (en) Data analysis method used in Kerberos encryption environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant