CN115426109A - Encryption mobile storage system with access control function - Google Patents
Encryption mobile storage system with access control function Download PDFInfo
- Publication number
- CN115426109A CN115426109A CN202211073537.1A CN202211073537A CN115426109A CN 115426109 A CN115426109 A CN 115426109A CN 202211073537 A CN202211073537 A CN 202211073537A CN 115426109 A CN115426109 A CN 115426109A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- mobile storage
- storage device
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 claims abstract description 39
- 238000013500 data storage Methods 0.000 claims description 12
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an encrypted mobile storage system with access control, which relates to the technical field of mobile storage data encryption.A distribution registration module and a key distribution module are arranged to register an account number on a quantum private network platform through a mobile terminal and obtain a distributed quantum key; when a user connects the mobile storage device for the first time, a matched password setting module sets a verification password and generates a public key and a private key; an identity authentication module is arranged to authenticate the identity of a user before the user stores and reads data; when a user stores data, a data encryption module is arranged, and the data is encrypted by using a quantum key through identity authentication in advance; the data reading and decrypting module is arranged to pass identity authentication in advance and decrypt data by using a quantum key when a user reads the data; the data security problem of the mobile storage device is solved.
Description
Technical Field
The invention belongs to the field of mobile storage, relates to an encryption storage technology, and particularly relates to an encryption mobile storage system with access control.
Background
The data in the information age is massive, a plurality of data relate to personal privacy and data security and influence various aspects of daily life, and the personal privacy, work and life data need to be safely and effectively protected;
especially, a large amount of data is stored in the personal mobile storage device at present, and the data in the mobile storage device needs to be encrypted; the key of most of the current encryption algorithms is easy to crack by a quantum computer; or decrypting the stored data by adopting a brute force cracking method;
therefore, a mobile storage system with access control and with keys that cannot be cracked is required;
therefore, an encrypted mobile storage system with access control is provided.
Disclosure of Invention
The present invention is directed to solving at least one of the problems of the prior art. The encryption mobile storage system with access control is provided with a distribution registration module and a key distribution module, and registers an account number on a quantum private network platform through a mobile terminal and obtains a distributed quantum key; when a user connects the mobile storage device for the first time, a matched password setting module sets a verification password and generates a public key and a private key; the identity authentication module is arranged to authenticate the identity of the user before the user stores and reads data; the data encryption module is arranged to pass identity authentication in advance and encrypt data by using a quantum key when a user stores the data; the data reading and decrypting module is arranged to decrypt the data by using a quantum key through identity authentication in advance when a user reads the data; the data security problem of the mobile storage device is solved.
In order to achieve the above object, an embodiment according to a first aspect of the present invention provides an encrypted mobile storage system with access control, including a distribution and registration module, a key distribution module, a matching password setting module, an identity verification module, a data encryption module, and a data reading and decryption module; the modules are connected in an electric and/or wireless network mode;
the key distribution registration module is mainly used for registering a key distribution account in a key distribution platform through a mobile phone APP in advance;
the key distribution platform is a quantum private network platform; the quantum private network platform generates a quantum key by using quantum characteristics; the quantum key is sent to a mobile terminal of a user through a quantum private network; the distribution and registration module acquires quantum key distribution authority of the quantum private network platform in a mode of remotely registering an account at the mobile terminal;
the key distribution module is mainly used for distributing quantum keys to users through a quantum private network;
the key distribution module is used for generating a quantum key for a user by the quantum private network platform by utilizing the physical characteristics of a quantum after the user sends a key distribution request to the quantum private network platform through the mobile terminal; the quantum private network platform sends the quantum key to a mobile terminal of a user through a quantum private network; the mobile terminal sends the received quantum key to an identity verification module;
the matching password setting module is mainly used for setting a verification password for the user mobile terminal and the mobile storage device;
the mode that the matching password setting module sets the verification password is as follows: the mobile terminal is connected with the mobile storage device in a short-distance wireless network mode; when the mobile terminal is in wireless connection with the mobile storage device for the first time, a user inputs an authentication password through the mobile terminal; sending the verification password to the mobile storage terminal in a short-distance wireless network mode; further, the mobile terminal generates a public key and a private key of a group of asymmetric encryption algorithms; sending the public key to the mobile storage device in a short-distance wireless network mode; the mobile terminal stores the private key; after the verification password and the public and private keys are set or generated, the user can store data into the mobile storage device and encrypt the data;
the identity authentication module is mainly used for authenticating the identity of a user before data storage and data reading are carried out on the user;
in order to ensure the confidentiality and the security of the content in the mobile storage device; whether the user inputs data or reads the data, the user needs to perform identity authentication in advance; the matching between the mobile terminal and the mobile storage equipment is ensured;
the authentication module performs authentication in the following manner:
step S1: the mobile terminal obtains a hash value of the verification password through a hash algorithm;
step S2: the mobile terminal encrypts the hash value of the verification password by using a private key;
and step S3: the mobile terminal sends the encrypted hash value to the mobile storage device;
and step S4: the mobile storage device calculates the hash value of the verification password by using the same hash algorithm; marking the hash value as H1;
step S5: the mobile storage device decrypts the encrypted hash value sent by the mobile terminal by using the public key; marking the decrypted hash value as H2;
step S6: comparing the hash value H1 with the hash value H2 by the mobile storage equipment; if the hash value H1 is the same as the hash value H2, the identity authentication is successful; otherwise, the identity authentication fails;
the data encryption module is mainly used for encrypting data transmitted into the mobile storage equipment by a user;
the mobile storage equipment is electrically connected with other data storage equipment, and before the data storage equipment transmits data to the mobile storage equipment, the identity of a user is verified in advance through an identity verification module; after the verification is passed, the data storage device electrically transmits data to the mobile storage device, and after the mobile storage device receives the data, the data in the mobile storage device is encrypted by using a quantum password; it can be understood that the encrypted data can be read and decrypted by the data reading decryption module;
the data reading and decrypting module is mainly used for decrypting and transmitting data in the mobile storage device;
the data reading and decrypting module for reading and decrypting the data in the mobile storage device comprises the following steps:
step P1: after the mobile storage device is electrically connected with the data reading device, the mobile terminal is connected with the data reading device in a short-distance wireless mode, and the mobile terminal completes identity authentication on the mobile storage device through the identity verification module;
step P2: the mobile terminal acquires a physical address of the data reading equipment; sending the physical address of the data reading equipment to the mobile storage equipment;
step P3: the mobile storage device reads the physical address of the data reading device; comparing the read physical address with the physical address sent by the mobile terminal; if the two physical addresses are the same, turning to the step P4; otherwise, sending the wrong information of the equipment to the mobile terminal;
step P4: the mobile storage device decrypts the stored data by using the quantum key and electrically transmits the data to the data reading module.
Compared with the prior art, the invention has the beneficial effects that:
the invention registers an account number on a quantum private network platform through a mobile terminal and obtains a distributed quantum key by setting a distribution registration module and a key distribution module; when a user connects the mobile storage device for the first time, a matched password setting module sets a verification password and generates a public key and a private key; the identity authentication module is arranged to authenticate the identity of the user before the user stores and reads data; when a user stores data, a data encryption module is arranged, and the data is encrypted by using a quantum key through identity authentication in advance; the data reading and decrypting module is arranged to pass identity authentication in advance and decrypt data by using a quantum key when a user reads the data; the data security problem of the mobile storage device is solved.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, an encrypted mobile storage system with access control includes a distribution registration module, a key distribution module, a matching password setting module, an identity authentication module, a data encryption module, and a data reading decryption module; the modules are connected in an electric and/or wireless network mode;
the key distribution registration module is mainly used for registering a key distribution account in a key distribution platform through a mobile phone APP in advance;
in a preferred embodiment, the key distribution platform is a quantum private network platform; the quantum private network platform generates a quantum key by using quantum characteristics; the quantum key is sent to a mobile terminal of a user through a quantum private network; the distribution and registration module acquires quantum key distribution authority of the quantum private network platform in a mode of remotely registering an account at the mobile terminal; after registering a quantum private network account through a mobile terminal, a user can obtain a quantum key through a key distribution module;
the key distribution module is mainly used for distributing quantum keys to users through a quantum private network;
in a preferred embodiment, after a user sends a key distribution request to a quantum private network platform through a mobile terminal, the quantum private network platform generates a quantum key for the user by using the physical characteristics of a quantum; the quantum private network platform sends the quantum key to a mobile terminal of a user through a quantum private network; the mobile terminal sends the received quantum key to an identity verification module; it can be understood that the mode of sending the quantum key through the quantum private network can effectively avoid the key from being monitored or stolen;
the matching password setting module is mainly used for setting a verification password for the user mobile terminal and the mobile storage device;
it can be understood that, when the user uses the mobile storage device for the first time, the mobile storage device has not determined the user; therefore, an authentication password needs to be determined for the mobile terminal and the mobile storage device in advance to authenticate the identity of the user;
in a preferred embodiment, the matching password setting module sets the verification password in the following manner: the mobile terminal is connected with the mobile storage device in a short-distance wireless network mode; the short-range wireless network can be in a Bluetooth connection mode; when the mobile terminal is in wireless connection with the mobile storage device for the first time, a user inputs an authentication password through the mobile terminal; sending the verification password to the mobile storage terminal in a short-distance wireless network mode; further, the mobile terminal generates a public key and a private key of a group of asymmetric encryption algorithms; sending the public key to the mobile storage device in a short-distance wireless network mode; the mobile terminal stores the private key; the asymmetric encryption algorithm can be an RSA algorithm or an elliptic curve encryption algorithm and the like; after the verification password and the public and private keys are set or generated, the user can store data into the mobile storage device and encrypt the data;
the identity authentication module is mainly used for authenticating the identity of a user before data storage and data reading of the user;
it is understood that, in order to ensure the confidentiality and security of the content in the mobile storage device; whether the user inputs data or reads the data, the user needs to perform identity authentication in advance; the matching between the mobile terminal and the mobile storage equipment is ensured;
in a preferred embodiment, the authentication module performs authentication in a manner including the following steps:
step S1: the mobile terminal obtains a hash value of the verification password through a hash algorithm;
step S2: the mobile terminal encrypts the hash value of the verification password by using a private key;
and step S3: the mobile terminal sends the encrypted hash value to the mobile storage device;
and step S4: the mobile storage device calculates the hash value of the verification password by using the same hash algorithm; marking the hash value as H1;
step S5: the mobile storage device decrypts the encrypted hash value sent by the mobile terminal by using the public key; marking the decrypted hash value as H2;
step S6: comparing the hash value H1 with the hash value H2 by the mobile storage equipment; if the hash value H1 is the same as the hash value H2, the identity verification is successful; otherwise, the identity authentication fails;
the data encryption module is mainly used for encrypting data transmitted into the mobile storage equipment by a user;
in a preferred embodiment, the mobile storage device is electrically connected with other data storage devices, and before the data storage devices transmit data to the mobile storage devices, the identity of the user is verified in advance through the identity verification module; after the verification is passed, the data storage device electrically transmits data to the mobile storage device, and after the mobile storage device receives the data, the data in the mobile storage device is encrypted by using a quantum password; it can be understood that the encrypted data can be read and decrypted by the data reading decryption module;
the data reading and decrypting module is mainly used for decrypting and transmitting data in the mobile storage device;
in a preferred embodiment, the reading and decrypting of the data in the mobile storage device by the data reading and decrypting module includes the following steps:
step P1: after the mobile storage device is electrically connected with the data reading device, the mobile terminal is connected with the data reading device in a short-distance wireless mode, and the mobile terminal completes identity authentication on the mobile storage device through the identity verification module;
step P2: the mobile terminal acquires a physical address of the data reading equipment; sending the physical address of the data reading device to the mobile storage device;
step P3: the mobile storage device reads the physical address of the data reading device; comparing the read physical address with the physical address sent by the mobile terminal; if the two physical addresses are the same, turning to the step P4; otherwise, sending the equipment error information to the mobile terminal;
and step P4: the mobile storage device decrypts the stored data by using the quantum key and transmits the decrypted data to the data reading module in an electrical mode;
it can be understood that the security and the accuracy of data reading and decryption are ensured through the double verification of the mobile terminal and the mobile storage device on the data reading device.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present invention.
Claims (6)
1. An encryption mobile storage system with access control is characterized by comprising a distribution and registration module, a key distribution module, a matching password setting module, an identity verification module, a data encryption module and a data reading and decryption module; wherein, the modules are connected in an electric and/or wireless network mode;
the distribution registration module is used for registering a key distribution account in a key distribution platform through a mobile phone APP in advance; after registering a quantum private network account through a mobile terminal, a user obtains a quantum key through a key distribution module;
the key distribution module is used for distributing quantum keys to users through a quantum private network; the mobile terminal sends the received quantum key to an identity verification module;
the matching password setting module is used for setting a verification password for the user mobile terminal and the mobile storage device;
the identity authentication module is used for authenticating the identity of a user by using an authentication password and a public and private key generated by the matching password setting module before data storage and data reading of the user;
the data encryption module is used for encrypting the data transmitted into the mobile storage equipment by the user after the user identity authentication is successfully performed by the identity authentication module;
and the data reading and decrypting module is used for decrypting and transmitting the data in the mobile storage equipment after the user identity authentication is successfully performed by the identity authentication module.
2. The encrypted mobile storage system with access control of claim 1, wherein the key distribution platform is a quantum private network platform; the quantum private network platform generates a quantum key by using quantum characteristics; the quantum key is sent to a mobile terminal of a user through a quantum private network; the distribution and registration module acquires the quantum key distribution permission of the quantum private network platform in a manner of remotely registering an account number at the mobile terminal.
3. The encryption mobile storage system with access control according to claim 1, wherein the matching password setting module sets the verification password in a manner that: the mobile terminal is connected with the mobile storage device in a short-distance wireless network mode; when the mobile terminal is in wireless connection with the mobile storage device for the first time, a user inputs an authentication password through the mobile terminal; sending the verification password to the mobile storage terminal in a short-distance wireless network mode; the mobile terminal generates a public key and a private key of a group of asymmetric encryption algorithms; sending the public key to the mobile storage device in a short-distance wireless network mode; the mobile terminal stores the private key.
4. The encryption mobile storage system with access control as claimed in claim 1, wherein the authentication module performs authentication by the following steps:
step S1: the mobile terminal obtains a hash value of the verification password through a hash algorithm;
step S2: the mobile terminal encrypts the hash value of the verification password by using a private key;
and step S3: the mobile terminal sends the encrypted hash value to the mobile storage device;
and step S4: the mobile storage device calculates the hash value of the verification password by using the same hash algorithm; marking the hash value as H1;
step S5: the mobile storage device decrypts the encrypted hash value sent by the mobile terminal by using the public key; marking the decrypted hash value as H2;
step S6: comparing the hash value H1 with the hash value H2 by the mobile storage equipment; if the hash value H1 is the same as the hash value H2, the identity authentication is successful; otherwise, the authentication fails.
5. The encrypted mobile storage system with access control according to claim 1, wherein the data encryption module encrypts the data in a manner that: the mobile storage equipment is electrically connected with other data storage equipment, and before the data storage equipment transmits data to the mobile storage equipment, the identity of a user is verified in advance through an identity verification module; after the verification is passed, the data storage device electrically transmits data to the mobile storage device, and after the mobile storage device receives the data, the data in the mobile storage device is encrypted by using the quantum password.
6. The encryption mobile storage system with access control as claimed in claim 1, wherein the data reading decryption module performs reading decryption on the data in the mobile storage device, including the following steps:
step P1: after the mobile storage device is electrically connected with the data reading device, the mobile terminal is connected with the data reading device in a short-distance wireless mode, and the mobile terminal completes identity authentication on the mobile storage device through the identity verification module;
step P2: the mobile terminal acquires a physical address of the data reading equipment; sending the physical address of the data reading device to the mobile storage device;
step P3: the mobile storage device reads the physical address of the data reading device; comparing the read physical address with the physical address sent by the mobile terminal; if the two physical addresses are the same, turning to the step P4; otherwise, sending the equipment error information to the mobile terminal;
step P4: the mobile storage device decrypts the stored data by using the quantum key and transmits the data to the data reading module in an electrical mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211073537.1A CN115426109A (en) | 2022-09-02 | 2022-09-02 | Encryption mobile storage system with access control function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211073537.1A CN115426109A (en) | 2022-09-02 | 2022-09-02 | Encryption mobile storage system with access control function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115426109A true CN115426109A (en) | 2022-12-02 |
Family
ID=84201709
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211073537.1A Pending CN115426109A (en) | 2022-09-02 | 2022-09-02 | Encryption mobile storage system with access control function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115426109A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004215232A (en) * | 2002-12-19 | 2004-07-29 | Buffalo Inc | Encryption key setting system, access point, and encryption key setting method, and authentication code setting system |
CN106407825A (en) * | 2016-10-13 | 2017-02-15 | 深圳市魔样科技有限公司 | Bracelet and terminal-based U disk encryption method and system |
CN109714166A (en) * | 2019-03-07 | 2019-05-03 | 山东鲁能软件技术有限公司 | A kind of mobile distribution method, system, terminal and storage medium based on quantum key |
CN110650011A (en) * | 2019-10-29 | 2020-01-03 | 江苏亨通问天量子信息研究院有限公司 | Encryption storage method and encryption storage card based on quantum key |
CN114697039A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Identity authentication method of quantum cipher network expansion network equipment |
CN114765543A (en) * | 2020-12-31 | 2022-07-19 | 科大国盾量子技术股份有限公司 | Encryption communication method and system of quantum cryptography network expansion equipment |
-
2022
- 2022-09-02 CN CN202211073537.1A patent/CN115426109A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004215232A (en) * | 2002-12-19 | 2004-07-29 | Buffalo Inc | Encryption key setting system, access point, and encryption key setting method, and authentication code setting system |
CN106407825A (en) * | 2016-10-13 | 2017-02-15 | 深圳市魔样科技有限公司 | Bracelet and terminal-based U disk encryption method and system |
CN109714166A (en) * | 2019-03-07 | 2019-05-03 | 山东鲁能软件技术有限公司 | A kind of mobile distribution method, system, terminal and storage medium based on quantum key |
CN110650011A (en) * | 2019-10-29 | 2020-01-03 | 江苏亨通问天量子信息研究院有限公司 | Encryption storage method and encryption storage card based on quantum key |
CN114697039A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Identity authentication method of quantum cipher network expansion network equipment |
CN114765543A (en) * | 2020-12-31 | 2022-07-19 | 科大国盾量子技术股份有限公司 | Encryption communication method and system of quantum cryptography network expansion equipment |
Non-Patent Citations (3)
Title |
---|
林熹: "区块链导论", 31 January 2022, 机械工业出版社 * |
熊君: "企业内网移动存储设备安全保密管理研究", 保密科学技术, 10 April 2015 (2015-04-10) * |
雷敏等: "网络空间安全专业规划教材 应用密码学 第3版", vol. 3, 30 April 2022, 北京邮电大学出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103532713B (en) | Sensor authentication and shared key production method and system and sensor | |
CN111031047B (en) | Device communication method, device, computer device and storage medium | |
CN101783800B (en) | Embedded system safety communication method, device and system | |
US7689211B2 (en) | Secure login method for establishing a wireless local area network connection, and wireless local area network system | |
JPH09167098A (en) | Communication system for portable device | |
CN110505055B (en) | External network access identity authentication method and system based on asymmetric key pool pair and key fob | |
WO2005091149A1 (en) | Backup device, backed-up device, backup intermediation device, backup system, backup method, data restoration method, program, and recording medium | |
CN111512608A (en) | Trusted execution environment based authentication protocol | |
CN112565265B (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN101488111A (en) | Identification authentication method and system | |
CN113472793A (en) | Personal data protection system based on hardware password equipment | |
CN101964805B (en) | Method, equipment and system for safely sending and receiving data | |
CN111614621A (en) | Internet of things communication method and system | |
US20020018570A1 (en) | System and method for secure comparison of a common secret of communicating devices | |
US20120124378A1 (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
CN114208113B (en) | Method for accessing private key, first device, first server, second server and system | |
CN111583482A (en) | Access control system based on two-dimensional code and control method thereof | |
CN112507296A (en) | User login verification method and system based on block chain | |
CN110493177B (en) | Method and system for quantum communication service station AKA key negotiation based on asymmetric key pool pair and serial number | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
CN103944721A (en) | Method and device for protecting terminal data security on basis of web | |
US11463251B2 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
Yoon et al. | Security enhancement scheme for mobile device using H/W cryptographic module | |
CN107343276B (en) | Method and system for protecting SIM card locking data of terminal | |
CN115426109A (en) | Encryption mobile storage system with access control function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |