CN116782210B - Dynamic encryption key generation method of high-speed encryption algorithm - Google Patents

Dynamic encryption key generation method of high-speed encryption algorithm Download PDF

Info

Publication number
CN116782210B
CN116782210B CN202310984162.2A CN202310984162A CN116782210B CN 116782210 B CN116782210 B CN 116782210B CN 202310984162 A CN202310984162 A CN 202310984162A CN 116782210 B CN116782210 B CN 116782210B
Authority
CN
China
Prior art keywords
key
sender
identity
receiver
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310984162.2A
Other languages
Chinese (zh)
Other versions
CN116782210A (en
Inventor
朱云
李元骅
刘飞宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shudun Information Technology Co ltd
Original Assignee
Shudun Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shudun Information Technology Co ltd filed Critical Shudun Information Technology Co ltd
Priority to CN202310984162.2A priority Critical patent/CN116782210B/en
Publication of CN116782210A publication Critical patent/CN116782210A/en
Application granted granted Critical
Publication of CN116782210B publication Critical patent/CN116782210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a dynamic encryption key generation method of a high-speed encryption algorithm, which comprises the following steps: the sender client generates a key request instruction according to the acquired sender identity characteristic, time characteristic and receiver identity characteristic, and sends the key request instruction to a key management center; the key management center extracts the sender identity feature, the time feature and the receiver identity feature according to the key request instruction, and forms a feature set C according to the obtained sender identity feature, time feature and receiver identity feature; the key management center obtains a hash value hash (C) with a specified length according to the obtained hash processing of the feature set; generating a key lockKey according to the obtained hash value; the key management center returns a key lockKey to the sender client to enable the sender client to encrypt the target file according to key lockKey. The invention is beneficial to improving the safety and reliability of point-to-point private data transmission in the data transmission process of the mobile equipment.

Description

Dynamic encryption key generation method of high-speed encryption algorithm
Technical Field
The invention relates to the technical field of internet data encryption, in particular to a dynamic encryption key generation method of a high-speed encryption algorithm.
Background
With the development and popularization of the mobile internet, a large number of mobile devices perform data interaction based on the mobile internet in the fields of e-government affairs, mobile payment, cloud services and the like. Where files related to private or confidential information need to be interacted with between devices. For file interaction with high security, encryption transmission is usually required to be performed on files or data during file transmission, so that the security of data transmission is improved.
Currently, when a mobile device encrypts data of a target file, a fixed key is generally used to encrypt the data. However, the encrypted files are encrypted by a fixed key, and a user can decrypt all the files by using one key, for example, when the user or the device needs to perform peer-to-peer private data transmission, the receiving users can decrypt the files by using the same key, which easily causes leakage of the encrypted files or a leak of malicious decryption, resulting in leakage of the private data.
Therefore, a dynamic encryption key generation method of a high-speed encryption algorithm is proposed to improve the security of key generation in the data encryption transmission process, which is needed.
Disclosure of Invention
Aiming at the problem that when users or devices need to transmit point-to-point privacy data, the same secret key can be adopted to decrypt the files of each other among the users, so that the leakage of the encrypted files or the leakage of the maliciously decrypted files and the leakage of the privacy data are easily caused, the invention aims to provide a dynamic encryption key generation method of a high-speed encryption algorithm.
The aim of the invention is realized by adopting the following technical scheme:
The invention discloses a dynamic encryption key generation method of a high-speed encryption algorithm, which comprises the following steps:
S1, a sender client generates a key request instruction according to acquired sender identity characteristics, time characteristics and receiver identity characteristics, and sends the key request instruction to a key management center;
S2, the key management center extracts the identity characteristics, the time characteristics and the identity characteristics of the receiver according to the key request instruction, and forms a characteristic set C according to the obtained identity characteristics, the obtained time characteristics and the obtained identity characteristics of the receiver;
S3, the key management center obtains hash value hash (C) with specified length according to the obtained hash processing of the feature set; generating a key lockKey according to the obtained hash value;
the S4 key management center returns a key lockKey to the sender client to enable the sender client to encrypt the target file according to the key lockKey.
In one embodiment, the method further comprises:
S5, the key management center associates the key lockKey with the corresponding feature set C and stores the key to a key table; the key table stores a dynamically generated key and a feature set corresponding to the key.
In one embodiment, step S1 includes:
the sender client verifies the sender identity information, and obtains sender identity characteristics after the sender identity information passes the verification, wherein the sender identity characteristics comprise a sender identity ID;
the sender client obtains a receiver identity feature according to receiver identity information selected by the sender, wherein the receiver identity feature comprises a receiver identity ID.
In one embodiment, the sender client obtains its own device ID and uses the own device ID as the sender identity.
The sender client takes the sender-selected receiver equipment ID as the receiver identity.
In one embodiment, the sender client obtains the system time at which the key request instruction was sent as a time feature.
In one embodiment, a sender client acquires a user ID and a password of a sender, verifies the identity of the sender according to the user ID and the password, and acquires sender identity characteristics after the verification is passed, wherein the sender identity characteristics comprise the sender identity ID; and/or
The sender client acquires face image data of the sender, performs identity recognition based on the acquired face image data, and acquires a user ID corresponding to the sender as a sender identity characteristic.
In one embodiment, step S2 includes: the generated feature set c= { sender identity feature; time characteristics; receiver identity }.
In one embodiment, step S3 includes:
The obtained hash value hash (C) is used as a key lockKey =hash (C), or is further transformed according to the hash value hash (C), so as to generate a corresponding key lockKey.
In one embodiment, the method further comprises:
S6, the sender client encrypts the target file according to the acquired key lockKey, and uploads the encrypted file to the server for storage or transmission, wherein the encrypted file carries the sender identity and time characteristics;
s7, the server stores the encrypted file uploaded by the sender client and sends the summary information of the encrypted file to the receiver client;
S8, when the receiver acquires the encrypted file, the receiver client sends a file acquisition instruction to the server according to the abstract information of the encrypted file;
s9, the server transmits the encrypted file to the receiver client according to the acquired file acquisition instruction;
S10, a receiver client initiates a key extraction instruction to a key management center according to the acquired encrypted file, wherein the key extraction instruction carries sender identity characteristics and time characteristics corresponding to the encrypted file and receiver identity characteristics corresponding to the receiver client;
s11, the key management center acquires a corresponding key unlockKey according to the received key extraction instruction, and returns a key unlockKey to the receiver client;
And S12, the receiver client decrypts the encrypted file according to the received key unlockKey to obtain a decrypted file.
The beneficial effects of the invention are as follows: when the sender client needs to transmit the encrypted file or data, the sender client can take the identity characteristics of the sender client and the identity characteristics of the receiver of the target object as the basis, send a key generation instruction to the key management center, and the key management center forms a one-to-one corresponding characteristic set with the sent file according to the sender identity characteristics and the receiver identity characteristics of the target file and the time characteristics, and obtains a hash value with a specified length according to the characteristics and the sum to complete the dynamically generated key. The target file is encrypted by the dynamically generated key, so that the security problem caused by key leakage can be avoided, and the security and reliability of point-to-point private data transmission in the data transmission process of the mobile equipment can be improved.
Drawings
The invention will be further described with reference to the accompanying drawings, in which embodiments do not constitute any limitation of the invention, and other drawings can be obtained by one of ordinary skill in the art without inventive effort from the following drawings.
Fig. 1 is a schematic flow chart of steps of a dynamic encryption key generation method of a high-speed encryption algorithm according to an embodiment of the present invention.
Description of the embodiments
The invention is further described in connection with the following application scenario.
Referring to a dynamic encryption key generation method of a high-speed encryption algorithm shown in the embodiment of fig. 1, the method includes:
S1, a sender client generates a key request instruction according to acquired sender identity characteristics, time characteristics and receiver identity characteristics, and sends the key request instruction to a key management center;
The sender client and the receiver client comprise mobile equipment, special intelligent terminals or intelligent industrial equipment and other equipment needing directional transmission of encrypted data. The sender client and the receiver client may be the same terminal (e.g., the receiver client needs to perform encryption storage management on specific private data, and make further calls when needed), or may be different terminals (e.g., encrypted file transmission between two different mobile devices), which is not particularly limited herein.
In one embodiment, step S1 includes:
the sender client verifies the sender identity information, and obtains sender identity characteristics after the sender identity information passes the verification, wherein the sender identity characteristics comprise a sender identity ID;
the sender client obtains a receiver identity feature according to receiver identity information selected by the sender, wherein the receiver identity feature comprises a receiver identity ID.
In one embodiment, a sender client acquires a user ID and a password of a sender, verifies the identity of the sender according to the user ID and the password, and acquires sender identity characteristics after the verification is passed, wherein the sender identity characteristics comprise the sender identity ID; and/or
The sender client acquires face image data of the sender, performs identity recognition based on the acquired face image data, and acquires a user ID corresponding to the sender as a sender identity characteristic.
The user ID is obtained through a user account password or face recognition mode to serve as the identity characteristic of the sender, so that the identity of the sender can be verified first, and the reliability of the identity verification of the sender is improved.
In one embodiment, the sender client obtains its own device ID and uses the own device ID as the sender identity.
The sender client takes the sender-selected receiver equipment ID as the receiver identity.
The sender identity feature in the above embodiment may be a device identity feature based on a device level, such as a device ID, a device name, or the like, or may be a user identity feature based on a user level, such as a user ID, a user name, or the like, which is capable of adapting to applications in different scenarios.
In one embodiment, the sender client obtains the system time at which the key request instruction was sent as a time feature.
S2, the key management center extracts the identity characteristics, the time characteristics and the identity characteristics of the receiver according to the key request instruction, and forms a characteristic set C according to the obtained identity characteristics, the obtained time characteristics and the obtained identity characteristics of the receiver;
The key management center can be set as an independent third-party key data management center and is specially used for storing and managing massive dynamic key data, so that leakage of key data can be effectively avoided, and the safety and management level of dynamic key management are improved. Even if the encrypted file or the key data are independently leaked, the leakage of the private data can not be caused, and the security of directional encrypted data transmission management among mobile devices is improved.
In one embodiment, step S2 includes: the generated feature set c= { sender identity feature; time characteristics; receiver identity }.
In one scenario, the feature set c= {4857996 (sender unique ID) 20221085105638 (time information) 5226411 (receiver unique ID) } is obtained by combining the obtained sender identity feature, time feature, and receiver identity feature.
S3, the key management center obtains hash value hash (C) with specified length according to the obtained hash processing of the feature set; generating a key lockKey according to the obtained hash value;
In one embodiment, step S3 includes:
The obtained hash value hash (C) is used as a key lockKey =hash (C), or further transformed, such as up-scaling or further convolution processing, according to the hash value hash (C) to generate a corresponding key lockKey.
The S4 key management center returns a key lockKey to the sender client to enable the sender client to encrypt the target file according to the key lockKey.
In one embodiment, the method further comprises:
S5, the key management center associates the key lockKey with the corresponding feature set C and stores the key to a key table; the key table stores a dynamically generated key and a feature set corresponding to the key.
In the key management center, the keys corresponding to all the encrypted files and the corresponding feature sets are stored in an associated mode through a key table, and the encrypted files can be conveniently called in the subsequent decryption process.
When the sender client needs to transmit the encrypted file or data, the sender client can send a key generation instruction to the key management center according to the identity characteristics of the sender client and the identity characteristics of the receiver client of the target object, and the key management center dynamically generates a corresponding key according to the sender identity characteristics and the receiver identity characteristics of the target file and the time characteristics and the transmitted file to form a one-to-one correspondence. The target file is encrypted by the dynamically generated key, so that the security problem caused by key leakage can be avoided, and the security and reliability of point-to-point private data transmission in the data transmission process of the mobile equipment can be improved.
In one embodiment, the method further comprises:
S6, the sender client encrypts the target file according to the acquired key lockKey, and uploads the encrypted file to the server for storage or transmission, wherein the encrypted file carries the sender identity and time characteristics;
In one embodiment, step S6 includes: the sender client side adopts a secret key lockKey to carry out symmetric encryption on the target file to obtain an encrypted file;
Wherein the object file comprises a text file, a bit file, or a multimedia file.
In one embodiment, step S6 includes: after the sender client side marks the encrypted file in a correlated way by the sender characteristics and the time characteristics, the encrypted file is uploaded to a server, and the server stores the encrypted file and further sends the encrypted file to the receiver client side.
And encrypting the target file based on the obtained key, and uploading the encrypted file to a server.
S7, the server stores the encrypted file uploaded by the sender client and sends the summary information of the encrypted file to the receiver client;
in one embodiment, step S7 includes:
S71, the server verifies the identity characteristics of a sender and the identity characteristics of a receiver of the encrypted file according to the obtained encrypted file, and after the verification is passed, the encrypted file is stored;
the S72 server generates summary information from the stored encrypted file and transmits the summary information to the recipient.
In one embodiment, step S71 includes:
and the server verifies the legality of the sender of the file according to the sender identity characteristic associated with the encrypted file, compares and verifies the sender identity characteristic with the authorized sender identity list, and after the comparison and verification result passes, classifies, stores and manages the encrypted file and stores the encrypted file and the corresponding sender identity characteristic in an associated manner.
The server performs correctness verification according to the sender identity characteristic and the receiver identity characteristic corresponding to the encrypted file, and when the sender and the receiver are legal users of the server after verification, the verification is passed, and the encrypted file is further stored and managed.
In one embodiment, step S72 includes: the server generates summary information according to the encrypted file and the corresponding time characteristics, and sends the summary information to the receiver, so that the receiver client can request the server to acquire the encrypted file according to the received summary information.
The generated summary information comprises an acquisition address of the corresponding encrypted file in the server, and a receiver can access the server according to the summary information and extract the corresponding encrypted file.
The server further transmits the generated summary information to the corresponding receiver client according to the file sending instruction sent by the sender client.
S8, when the receiver acquires the encrypted file, the receiver client sends a file acquisition instruction to the server according to the abstract information of the encrypted file;
s9, the server transmits the encrypted file to the receiver client according to the acquired file acquisition instruction;
S10, a receiver client initiates a key extraction instruction to a key management center according to the acquired encrypted file, wherein the key extraction instruction carries sender identity characteristics and time characteristics corresponding to the encrypted file and receiver identity characteristics corresponding to the receiver client;
In one embodiment, step S10 includes:
And the receiver client side extracts sender identity characteristics and time characteristics associated with the encrypted file from the encrypted file according to the obtained encrypted file, generates a key extraction instruction by the extracted sender identity characteristics and time characteristics and the receiver identity characteristics, and sends the key extraction instruction to the key management center.
S11, the key management center acquires a corresponding key unlockKey according to the received key extraction instruction, and returns a key unlockKey to the receiver client;
In one embodiment, step S8 includes:
The key management center extracts corresponding sender identity characteristics, time characteristics and receiver identity characteristics from the key extraction instruction according to the acquired key extraction instruction; matching and acquiring a corresponding key unlockKey from a key table according to the acquired sender identity characteristic, time characteristic and receiver identity characteristic;
and when the matching according to the sender identity characteristic, the time characteristic and the receiver identity characteristic is unsuccessful, returning key extraction failure information to the receiver client.
When the recipient who requests decryption is not the designated recipient, the corresponding decryption key cannot be matched based on the identity thereof, and thus the encrypted target file cannot be decrypted when the recipient client is not the designated recipient client.
And S12, the receiver client decrypts the encrypted file according to the received key unlockKey to obtain a decrypted file.
And finally, the receiver client decrypts the encrypted file according to the obtained secret key to finish the acquisition of the encrypted file.
In the above embodiment, when the sender client sends the encrypted information, the sender client first sends the identity feature of the sender client, the time feature of the sending file and the identity feature of the receiver to the key management center, the key management center dynamically generates the corresponding encryption key according to the features, the sender client encrypts the target file or the data according to the dynamically acquired encryption key, and the encrypted data is transmitted to the server. By means of dynamic encryption, the encryption key of the target file can be enabled to correspond to the identity of the sender and the identity of the receiver, so that the safety of dynamic encryption is improved.
When a receiver receives a target file, a key extraction instruction for the target file needs to be initiated to a key management center according to the identity characteristics of the receiver, the identity characteristics of the receiver of the key management center and the corresponding sender identity characteristics of the file are matched with corresponding encryption keys, and the verification of the user/equipment identity of the receiver is completed in the mode, so that the safety problem caused by forwarding leakage or data theft can be effectively avoided, and the reliability and safety of data encryption transmission are effectively improved. The method is suitable for security authentication application for data encryption transmission and reception in different application scenes.
Finally, it should be noted that the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the scope of the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, those skilled in the art should understand that modifications or equivalent substitutions can be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (9)

1. A dynamic encryption key generation method for a high-speed encryption algorithm, comprising:
S1, a sender client generates a key request instruction according to acquired sender identity characteristics, time characteristics and receiver identity characteristics, and sends the key request instruction to a key management center;
S2, the key management center extracts the identity characteristics, the time characteristics and the identity characteristics of the receiver according to the key request instruction, and forms a characteristic set C according to the obtained identity characteristics, the obtained time characteristics and the obtained identity characteristics of the receiver;
S3, the key management center obtains hash value hash (C) with specified length according to the obtained hash processing of the feature set; generating a key lockKey according to the obtained hash value;
S4, the key management center returns a key lockKey to the sender client so that the sender client can encrypt the target file according to the key lockKey;
S6, the sender client encrypts the target file according to the acquired key lockKey, and uploads the encrypted file to the server for storage or transmission, wherein the encrypted file carries the sender identity and time characteristics;
The S7 server stores the encrypted file uploaded by the sender client and transmits digest information of the encrypted file to the receiver client.
2. The method for dynamic encryption key generation for a high-speed encryption algorithm according to claim 1, further comprising:
S5, the key management center associates the key lockKey with the corresponding feature set C and stores the key to a key table; the key table stores a dynamically generated key and a feature set corresponding to the key.
3. The method for generating a dynamic encryption key for a high-speed encryption algorithm according to claim 1, wherein the step S1 comprises:
the sender client verifies the sender identity information, and obtains sender identity characteristics after the sender identity information passes the verification, wherein the sender identity characteristics comprise a sender identity ID;
the sender client obtains a receiver identity feature according to receiver identity information selected by the sender, wherein the receiver identity feature comprises a receiver identity ID.
4. The method for generating dynamic encryption key of high-speed encryption algorithm according to claim 1, wherein the sender client obtains self-device ID, and uses self-device ID as sender identity;
the sender client takes the sender-selected receiver equipment ID as the receiver identity.
5. The dynamic encryption key generation method of a high-speed encryption algorithm according to claim 1, wherein the sender client acquires the system time when the key request command is sent as the time characteristic.
6. A dynamic encryption key generation method of a high-speed encryption algorithm according to claim 3, wherein the sender client acquires the user ID and the password of the sender, verifies the sender identity according to the user ID and the password, and acquires the sender identity after the verification is passed, wherein the sender identity comprises the sender identity ID; and/or
The sender client acquires face image data of the sender, performs identity recognition based on the acquired face image data, and acquires a user ID corresponding to the sender as a sender identity characteristic.
7. The method for generating a dynamic encryption key for a high-speed encryption algorithm according to claim 1, wherein the step S2 comprises: the generated feature set c= { sender identity feature; time characteristics; receiver identity }.
8. The method for generating a dynamic encryption key for a high-speed encryption algorithm according to claim 7, wherein the step S3 comprises:
The obtained hash value hash (C) is used as a key lockKey =hash (C), or is further transformed according to the hash value hash (C), so as to generate a corresponding key lockKey.
9. The method for dynamic encryption key generation for a high-speed encryption algorithm according to claim 1, further comprising:
S8, when the receiver acquires the encrypted file, the receiver client sends a file acquisition instruction to the server according to the abstract information of the encrypted file;
s9, the server transmits the encrypted file to the receiver client according to the acquired file acquisition instruction;
S10, a receiver client initiates a key extraction instruction to a key management center according to the acquired encrypted file, wherein the key extraction instruction carries sender identity characteristics and time characteristics corresponding to the encrypted file and receiver identity characteristics corresponding to the receiver client;
s11, the key management center acquires a corresponding key unlockKey according to the received key extraction instruction, and returns a key unlockKey to the receiver client;
And S12, the receiver client decrypts the encrypted file according to the received key unlockKey to obtain a decrypted file.
CN202310984162.2A 2023-08-07 2023-08-07 Dynamic encryption key generation method of high-speed encryption algorithm Active CN116782210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310984162.2A CN116782210B (en) 2023-08-07 2023-08-07 Dynamic encryption key generation method of high-speed encryption algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310984162.2A CN116782210B (en) 2023-08-07 2023-08-07 Dynamic encryption key generation method of high-speed encryption algorithm

Publications (2)

Publication Number Publication Date
CN116782210A CN116782210A (en) 2023-09-19
CN116782210B true CN116782210B (en) 2024-04-30

Family

ID=87986076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310984162.2A Active CN116782210B (en) 2023-08-07 2023-08-07 Dynamic encryption key generation method of high-speed encryption algorithm

Country Status (1)

Country Link
CN (1) CN116782210B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359A (en) * 2006-01-18 2007-07-25 华为技术有限公司 Method and device for realizing safety communication between terminal devices
JP2008199496A (en) * 2007-02-15 2008-08-28 Hitachi Software Eng Co Ltd Key distribution method and system
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN108306739A (en) * 2018-01-22 2018-07-20 武汉斗鱼网络科技有限公司 A kind of method, server and computer equipment for detecting subscriber identity information
KR20210002955A (en) * 2019-07-01 2021-01-11 에스지에이 주식회사 An OTP security management method by using dynamic shared secret distribution algorithm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140325225A1 (en) * 2013-04-27 2014-10-30 Quantron Inc. Self-authenticated method with timestamp

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005359A (en) * 2006-01-18 2007-07-25 华为技术有限公司 Method and device for realizing safety communication between terminal devices
JP2008199496A (en) * 2007-02-15 2008-08-28 Hitachi Software Eng Co Ltd Key distribution method and system
CN105577680A (en) * 2016-01-18 2016-05-11 青岛海尔智能家电科技有限公司 Key generation method, encrypted data analyzing method, devices and key managing center
CN108306739A (en) * 2018-01-22 2018-07-20 武汉斗鱼网络科技有限公司 A kind of method, server and computer equipment for detecting subscriber identity information
KR20210002955A (en) * 2019-07-01 2021-01-11 에스지에이 주식회사 An OTP security management method by using dynamic shared secret distribution algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于PKI 公钥体系的电力监控网络安全接入机制";章熙,段金长,刘晓放 等;;《沈阳工业大学学报》;20230705;第46卷(第01期);第115-120页 *

Also Published As

Publication number Publication date
CN116782210A (en) 2023-09-19

Similar Documents

Publication Publication Date Title
JP7119040B2 (en) Data transmission method, device and system
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
US8396218B2 (en) Cryptographic module distribution system, apparatus, and program
US10594479B2 (en) Method for managing smart home environment, method for joining smart home environment and method for connecting communication session with smart device
US20080031458A1 (en) System, methods, and apparatus for simplified encryption
CN103036872B (en) The encryption and decryption method of transfer of data, equipment and system
CN108809633B (en) Identity authentication method, device and system
CN110690956B (en) Bidirectional authentication method and system, server and terminal
SE538304C2 (en) Improved installation of a terminal in a secure system
CN111970114B (en) File encryption method, system, server and storage medium
US20240259358A1 (en) Communication method and apparatus, device, storage medium, and program product
CN114553590B (en) Data transmission method and related equipment
CN114244508B (en) Data encryption method, device, equipment and storage medium
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN116709325B (en) Mobile equipment security authentication method based on high-speed encryption algorithm
US20120166801A1 (en) Mutual authentication system and method for mobile terminals
CN103973543A (en) Method and device for instant messaging
CN110890959B (en) Account encryption method, system and device
CN112565156B (en) Information registration method, device and system
CN111698203A (en) Cloud data encryption method
CN116782210B (en) Dynamic encryption key generation method of high-speed encryption algorithm
KR20020079044A (en) Method and apparatus for mataining data security on network camera, home gateway and home automation
CN112398818B (en) Software activation method and related device thereof
CN111431846B (en) Data transmission method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: China

Address after: 901, 9th Floor, Building 7, Yard 8, Automobile Museum East Road, Fengtai District, Beijing, 100160

Applicant after: Shudun Information Technology Co.,Ltd.

Address before: 100000 901, Floor 9, Building 7, Yard 8, Auto Museum East Road, Fengtai District, Beijing

Applicant before: BEIJING SHUDUN INFORMATION TECHNOLOGY CO.,LTD.

Country or region before: China

GR01 Patent grant
GR01 Patent grant